I. DJ on Caravan to Midnight (Episode 309) (The interview begins shortly after 12 minutes. The first 12 minutes are filler by the moderator.)
Webmaster’s notes from interview:
ETK Introduction: In the following two youtube interviews, DJ summarizes her conclusions regarding the purpose of Jade Helm 25 military exercises as well as the GEOINT (Geospatial Intelligence) Network. In these systems, we see that humans are reduced to “nodes” and “human inventory items” in the global Geographic Information Grid (GIG).
Perhaps it important to remind ourselves and each other of the vision for America laid out by Col. Edward Mandel House, Illuminati agentur, Rothschild agent, Jew, and intimate advisor to President Woodrow Wilson:
Edward Mandell House had this to say in a private meeting with Woodrow Wilson (President) [1913-1921]
“[Very] soon, every American will be required to register their biological property in a National system designed to keep track of the people and that will operate under the ancient system of pledging. By such methodology, we can compel people to submit to our agenda, which will affect our security as a chargeback for our fiat paper currency. Every American will be forced to register or suffer not being able to work and earn a living. They will be our chattel, and we will hold the security interest over them forever, by operation of the law merchant under the scheme of secured transactions. Americans, by unknowingly or unwittingly delivering the bills of lading to us will be rendered bankrupt and insolvent, forever to remain economic slaves through taxation, secured by their pledges. They will be stripped of their rights and given a commercial value designed to make us a profit and they will be non the wiser, for not one man in a million could ever figure our plans and, if by accident one or two would figure it out, we have in our arsenal plausible deniability. After all, this is the only logical way to fund government, by floating liens and debt to the registrants in the form of benefits and privileges. This will inevitably reap to us huge profits beyond our wildest expectations and leave every American a contributor or to this fraud which we will call “Social Insurance.” Without realizing it, every American will insure us for any loss we may incur and in this manner; every American will unknowingly be our servant, however begrudgingly. The people will become helpless and without any hope for their redemption and, we will employ the high office of the President of our dummy corporation to foment this plot against America.”
DJ Welsh, webmaster of Level9News.com – has systems and engineering background, has examined many official docs including:
Jade Helm 15 documents
Studying Jade II A.I. software program
SOCOM docs- ARSOF
1033 program, Exec. Order 13684 (militarizing police forces)
GEOINT symposium and papers
Neural Net reports
Pentagon document: Human System Roadmap Review: HSCOI: Human System Community of Interest= Jade 2. Version 2.0
Jade II, Jade Helm and GEOINT docs all repeatedly use the phrase “Mastering the Human Domain”
A) America is the battlefield and we, the human population, are the enemy. Jade II used in Jade Helm 15 is an A.I. quantum computing system that can make decisions, set up battle plans, identify, formulate plans and take out targets for “dissident extraction,” etc. and it takes responsibility for doing these things. It is an autonomous warfare system based on AI.
B) “Threats” are actually threats to COG (continuity of government- global government).
C) Intended to obtain dominance in cyberspace. And it uses the adaptive learning function of AI.
D) The goal is total C2 (Command and Control) Technocratic Rule. They are taking decision making and handing over to AI systems.
E) In the Jade Helm 15 military/paramilitary exercise, supposedly 1200 to 1600 Special Operations Forces from all branches of the military cooperate with DHS and interagency partners (police, civilian groups, role players, special ops forces in plain clothes, etc.) in this 2 month-long military drill/exercise covering 8 states and 25% of the coterminous U.S.
F) Jade Helm is a giant psyop! Through its secrecy, it creates anxiety in the populace- a range of emotional responses on the civilian side used to develop a force management response on the military side.
G) They want to be able to determine how well they can socially engineer the public before an event occurs.
H) Jade Helm is a system roll out.
I) Indeed, Jade Helm has already been successfully tested in the past. In Iraq, Afghanistan and during the chaos of the Haiti EQ and Hurricane Katrina. This suggests it is designed to contain and control the public’s response to chaotic situations contrived and executed by the government. These include state-sponsored terrorist disasters (geoengineered hurricanes, EQs, managed financial collapses, and supposedly genuine disasters as well).
J) Jade Helm is just a sublayer or a layer on top of a much larger command and control system already in place- GEOINT (Geospatial Intelligence Network)- that goes beyond military applications. It’s global in scope- and includes everything regarding the internet, social platforms, ….. If something has the word smart in front of it… Smart grid, phone, TV, appliances- all of these are plugged into the GIG.
K) This is system is supported and distributed by multinational intelligence collaboration, domestic interagency collaboration (police) by the (corporate) proponents of global governance.
L) GEOINT is a tool for the proponents of global government for them to cast a neural net over humanity. How do you control 7 billion people? You control the environment they live in.
M) Using “big data,” GEOINT maps human dynamics, human terrain, and human geography. Individual humans are nodes on the GEOINT human terrain network are considered “human inventory items.” All data is collected on all nodes.
L) Threat assessment (fusion) centers are global and are an integral part of this program.
M) System can be and will be used to kill people (targets, dissidents, enemies, etc.). System can deliver orders to boots on the ground. People will become human nodes on this geospatial intelligence network. They can unplug you from the network erasing their data and eliminating their connectivity to the GIG. If you can’t buy, sell, work, obtain life essentials that you need- you will be doomed.
N) Thus, this system is a technical approach to the tactics employed in Nazi and Communist Germany by the Stasi, the Brown Shirts, and the SS- including gang stalking domestic enemies. This is a technological version of those social engineering, “pacification” tactics that they used then. It is also a technical version of the CIA’s Phoenix Program that killed between 25,000 and 40,000+ Vietnamese civilians designated as “threats” to the American takeover of that nation.
1. Jade II Computer Software
Jade II computer software is a technology that allows battles to be run by computer not by generals.
What’s in the news re: Jade Helm- is highly sanitized.
The Jade II system is capable- uses vast sums of information collected on individuals, groups, countries—dumps this information into a HTA (Human Terrain Assessment)-
Human Terrain Assessment (HTA): Once HTA determines norms for behavior and – this is the “Human Domain.” This information can be stored in prodigy module (battle planning module)- this is a military-civilian application. It can create holographic battlefield simulations on the fly.
Case-based reasoning module- adapts its plans to the changing human terrain. Human activities = it can read and measure human emotions.
It can change its own COA (Course of Action) on the fly.
Where’s the central point for data? The GIG (Geographic Information Grid). These data dump centers- Bluffdale, UT-
Force Management Model (developed by MITRE Corps.) Government now perceives American people as its greatest threat. Patriots will be classified as terrorists, and the terrorist government will be deemed patriots. PARKA- can handle complex queiries against large data dumps.
Machine interpretation of commanders’ intent.
One of these papers states: “The system sits on a global information grid, which is a flexible, scalable, and a dynamic architecture in order to support multilateral civilian and military operations.”
Subheading: “The process of sense making in complex human endeavors:”
“This approach uses a set of cognitive constructs that translates tacit knowledge to the focal knowing of the objective world.”
How are they accomplishing this? They are mapping your mind. They are creating these maps with all of the information that’s being collected on everyone regarding every aspect of their lives.
The macro-cognition component of the system is the process of dissecting human domain.
“Cognitive and adaptive learning capabilities” enables it (the machine) to predict intent of “targets” (either the enemy or civilian). And it can predict a range of potential behaviors of the targets. And it does this instantaneously. The system is making the decisions for them.
“For a joint commander to define an instruction set to a civilian or military joint force mission to transform a failing state to an agreed upon non-failing end state is a problem.”
“Rapidly changing dynamics presents a cognitively difficult task for commanders and practitioners”- so the system does that too.
Jade Helm is just a sub-layer or a layer on top of a much larger system that is already in place. (GEOINT – Geospatial Intelligence System).
Jade II AI computer software- it’s all network topography to optimize communication and data transfers. Everything, communications, everything, is tied in to the GIG.
The software is being used now. Another command and control problem is this system is designed to handle is:
“The enemy has always been able to adapt to a rapidly changing environment to hide itself from exposure. In order to adapt itself to combat this problem the kill chain had to be compressed from hours to seconds. The system removes the administrative delay in the kill chain. It has no moral compass, no empathy, or regrets.” (It’s a computer program.)
“The system is designed to achieve dominance in cyberspace, cyber-power, and cyber-strategy. This capability will continue to evolve even though key technical, social, and information trends begin to stabilize. It will capitalize on social engineering for offensive military and civilian operations.”
In other words, this is a technical approach to the (gang stalking) tactics employed in Nazi Germany by the Stasi, the Brown Shirts, and the SS. This is just a technological version of those social engineering tactics they used then.
Jade II Crowd Control and Pre-Crime:
Jade II has a sophisticated decision-support system for crowd control- to control civil unrest. Jade II’s deployment on the civilian population.
It develops models, predicts future crimes, and formulates courses of action. (I.e., this is Minority Report-type pre-crime technology).
“It’s a self-organizing, vision-capable, expectation-capable, recognition-capable, situationally-aware, emotionally-intelligent, goal-oriented system. The system thinks, plans, and executes.”
The hardware that the system runs on isn’t run of the mill supercomputer. It will run thousands of processors on a single chip.
2. SOCOM ARSOF Pdf:
I read the SOCOM ARSOF pdf which is all over the internet.
I think the secrecy and the creation of fear, anxiety in the public is intentional…. All the public response data is being harvested.
The SOCOM spokesmen say: The area of the exercise/drill encompasses about 25% of the landmass of America, and they will be using 1200 to 1600 special forces troops.
Actually, Jade Helm was used in Iraq and Afghanistan in 2012 and 2013. It was considered a huge success. So this became doctrine, strategy. So the story line that this is a drill is bogus.
Rather, it’s a giant psyop! It could still go live. It creates through secrecy and anxiety- a range of emotional responses on the civilian side and a force management response on the military side. It’s a system roll out. It has been tested in limited in the past. It was tested in Haiti during the EQ. Also used during Hurricane Katrina. So it’s a system rollout.
This has all been planned.
3. GEOINT (Geospatial Intelligence System):
Jade II is part of much larger command and control system that goes beyond military applications. It’s called GEOINT; The Geospatial Intelligence Network. It’s everything in Jade 2 and more…. It’s global in scope- and everything regarding the internet, social platforms. ….. If something has the word smart in front of it, for example, smart grid, smart cities, smartphone, smartTV, smartappliances- all of these are plugged into the GIG.
GEOINT is a tool for the proponents of global government in order for them to cast a neural net over humanity. How do you control 7 billion people? If you control the environment they live in, you can control them. GEOINT is a complete, all-encompassing Command and Control system. This program/technology is the end run around humanity’s reluctance to taking RFID microchips. RFID (transmitter-receiver) chips can be removed and disabled. This geospatial intelligence technology surpasses RFID. When people are used as physical geo-located nodes on a network on a human terrain system. How do you remove that? Individuals can be removed as nodes. Just disconnect them. Erase their data and eliminate their connectivity to the GIG. Remove their relationships, communications, and earnings capability.
Moderator (John B. Wells): This is like Stalin on steroids. They’d go into the home and take everything- and effectively erase them from existence.
DJ: The plan is that people will be reduced to the sum total of the data that has been collected on them. How do you remove who you are? What is who you are? It’s everything about your activity. It’s the people you know, your relationships, your hobbies, your activities, etc. They’ve been constructed by this neural net for many years.
This is system is supported and distributed by multinational intelligence collaboration, domestic interagency collaboration (police) by the proponents of global governance.
GEOINT network- Mastering the Human Domain- this phrase appears hundreds of times in this, and in Jade Helm II and in Jade Helm 15.
Human dynamics, human terrain, and human geography. Domestic threat centers. Threat assessment centers are global and an integral part of this program.
ABI (Activity Based Intelligence) gathered from open source data (facebook, linkedin, internet, cloud computing, cloud storage)- activities, transactions (physical and virtual), vulnerabilities and capabilities of individuals and groups across all domains of the operational environment. All collected data- is geo-located to a specific spot on the earth- and tied to you, the node.
The geo-referencing of all data involves concepts of:
Concepts of “data neutrality” and “sequence neutrality”.
The system is able to answer questions that never existed in the first place.
ABI, the driving force behind AI, breaks human domain into 4 kinds of data about the individual: (human network node)
1) biographical data
2) individual activity data
3) relational data
4) contextual data- environment, social interactions, tribal connections,
Obama phone scandal- was means to put required technology into hands of people who couldn’t afford it so that they too could be tracked on the global network. Bill Gates and Mark Zuckerberg- are distributing these phones in sub-Saharan Africa. The plan is to data collect and track every person on the planet- or as many as they can.
GEOINT symposium- “If you’re not collecting all the data, you are not going to get a good human terrain.”
No aspect of privacy in this system.
Jade Helm docs
SOCOM docs- RSoft
GEOINT symposium and papers
Neural Net reports
All these military reports repeatedly use the words “actor.” (Used in psychological operations).
Control the environment….
The system can and will be used to kill people. One symposium speaker said: “That’s the price you pay for the advancement of this technology, and we are willing to pay the price.”
NSA spying is being taken over by GEOINT network and everything plugged into it. GEOINT’s main objective is to achieve centralized command and control over humanity. Every human will become a node and a sensor on the GIG and from a material or physical standpoint, they’ll become a human inventory item. “
The system also collects biometric data- each person has their own (BAPI) biological application program interface- this allows them to circumvent the RFID system. It will develop and execute its own directives based on its interpretation of political will….. (?)
They are not talking about political will of nation states, there won’t be any. They’re talking about the political will of one global centralized government.
Predictive software or AI is at the core of this GEOINT system just like it in charge of Jade 2 software system. Same technology, bigger scope. The change can change natural outcomes of human activity by predicting human behavior and reacting to it before it occurs.
Two technologies can do this: “Edge” and “Elicit” are key components for prediction and reaction. They are referenced in Jade II final report and in 1033 program and in executive order 13684- 21st century policing of America and intelligent led policing II.
“Edge” formulates the final line- the boundaries of the nodes (people) that connect them to other nodes.
“Elicit” is a think tank collaboration for information sharing and trust between law enforcement, community organizers, emergency responders, domestic peacekeeping tools, etc. Elicit platform is the main theme in 1033 program and in Obama’s EO 13684, 21st century policing of America and Intelligent-Led Policing II.. This think tank-based initiative is a paramount to the Stasi in Germany with an added dose of network centric technology and military grade equipment being thrown into the mix just for fun. They are referenced in those orders and those policing programs.
4. Solutions/Our response:
To Jade Helm: Don’t respond. System responses are triggered by negative emotions. Don’t be afraid, or angry, the system is predicated on the fact that when you are angry or afraid you don’t make good decisions.
To GEOINT: You have to get off the technology grid to the best of your abilities. They’ve turned these technologies against us.
To stop this:
We need to unplug the data storage facilities. Bluffdale, Utah and the Fusion Centers.
We need to erase the data.
Data sweepers like GWEN towers need to be disabled, jammed.
We need to starve the system of data.
Drones are connected to Jade Helm II- take their orders from there.
Jade Helm has been running for quite some time.
21st century policing, Exec. Order, 13684
Advice: Smile, be kind, stay calm, generate good, positive emotions, find spiritual center.
II. Explosive findings about the purpose and scope of Jade Helm 15
Explosive findings about the purpose and scope of Jade Helm 15
Douglas J. Hagmann –
June 25, 2015 0
25 June 2015: There has been much speculation about the purpose, scope and depth within the alternative media about Jade Helm 15. At the epicenter of this speculation exists one primary question: What is the real reason behind the Jade Helm 15 exercise?
“D.J.,” an investigative researcher and the founder and developer of Level9News.com (currently under construction) will be our very special guest tonight to discuss her startling research findings that connect some very interesting dots pertaining to the computer GeoSpatial Intelligence Network (GeoINT) and “the net” that is about to be dropped upon humanity.
Just coming off of an interview with J.B. Wells of Caravan to Midnight (Episode 309), “D.J.” will offer a very informative look into Jade Helm. Having a strong background in system & network engineering, “D.J.” will provide a very detailed analysis of the backbone of Jade Helm 15, which is an artificial intelligence (AI) based computer system with astounding, futuristic capabilities.
Is it possible that JADE II is part of a bigger command and control system that goes beyond military applications? Based on countless hours of recent research and tireless investigation, “D.J.” has the answers, or at least many of them, which connect important yet overlooked dots about the ultimate role quantum computing will play in this new “geospatial intelligence network centric” battlefield.
Do not be fooled by others who claim to have done the research and present the findings into this very specific aspect of Jade Helm 15, for it is her exposure that has shaken the intelligence community.
“My background is in system & network engineering & I left my current job in the gaming industry last year to pursue a challenge to make a difference in a world where right is wrong, up is down, truth is lies. Level9News will provide a protected platform to accelerate ‘the awakening” humanity is experiencing worldwide. I believe it is essential to keep the channels of truth and information open to continue to raise the consciousness of humanity so we don’t wake up one day and wonder how we became enslaved to a global totalitarian government.”
Level9News.com (under construction) This site will be hosted out of Iceland, one of the last bastions of free speech where people can publish their research without censorship and expose the crimes being perpetrated on humanity, the lies being reported to cover them up and provide a global forum to combat what is nothing short of “a global assault on humanity”.
Webmaster- My notes from interview:
II. Explosive Findings About the Purpose and Scope of Jade Helm 15 (June 25, 2015), Hagmann Report
Interview with DJ (Welsh):
I. Jade Helm 15 is military-paramilitary exercise. DJ’s research is unparalleled; she has read many relevant military docs and papers.
DJ Welsh: Jade II system (in Jade Helm 15) is an AI quantum computing system that can identify or eliminate targets, insurgents, rebels in a netric-centric warfare environment. It will not be battles directed by generals- Jade II is a network centric software system at the helm.
This total Command & Control system has multiple purposes. Information has been highly sanitized.
Jade II system can use vast amounts of data collected on individuals. It dumps the information into a module; the Human Terrain System (HTS). This determines behavioral parameters/norms and the establishment of these parameters is the “human domain.” Once it establishes that, it can identify and eliminate threats based on deviations from the norms.
It uses thousands of remote sensors to change or re-write it’s own program parameters. It stores these in the Prodigy module which can be retrieved at any time for any purpose.
It is a “human inventory system.” It is a knowledge data-driven based AI driven- civil-military system. The AI can develop complex battle plans in seconds. Deployment planning starts with receipt of a mission statement. This is run through a Case-Based Reasoning Module (CBR) which is adaptive to the human domain, based on changes in human activity; so-called (HBA) Human-based Activity.
The system can identify human emotions. The netflix series “Revolution” gets pretty close to what’s going on.
The MITRE Corps, in McLean, VA, is an NGO (non-governmental organization) connected to the Jason Group. It is a front for government research,
PARKA- Another module of Jade Helm, handles complex queries on the NSA data dumps. The NSA is collecting everything. But Metatags only have value if they are indexed to larger information sources. Deception through misdirection.
Jade II predicts conflicts and preempts them. It can be applied to pre-eminant cases of social unrest. It makes decisions re: casualties and targets in relation to mission objectives. And JADE II takes responsibility for its actions.
JADE HELM sits on the GIG (global information grid), which is flexible and scalable, to support multi-lateral military operations.
They are mapping your mind. Macro-cognition- it can predict intent in adversary or target- and formulate a preemptive response.
It can disrupt communications, and reduce, or choke-off, band widths of devices.
To counter to adaptations of “the enemy,” the kill chain has to be compressed from hours to seconds. The system has no moral compass, empathy, or regrets.
Intended to obtain dominance in cyberspace. And it uses the adaptive learning function of AI.
The hardware system of Jade II runs on thousands of processors on a single chip.
Minority Report’s pre-crime technology.
Jade Helm uses NATO’s “Human View” Products.
Jade II- AI-self-organizing, vision-capable, recognition-capable, goal-oriented system.
America is the battlefield and we are the enemy.
The Jade Helm exercise probably actually involves the harvesting of data re: people’s concerns about the exercise.
Jade Helm was used in Iraq and Afghanistan in 2012 and 2013. It was touted as a huge success. When military successfully performs an operation it becomes a warfare doctrine or strategy.
Why is Jade Helm being conducted? It is a giant psyop. It could still go live. Perhaps a major goal was to create a range of emotional responses on the civilian side. They want to be able to determine how well they can socially engineer the public before an event occurs.
This system was also tested in Haiti during the EQ and during Hurricane Katrina (proving these events were geoengineered!!!!).
It is a system rollout- to see how well it performs over a large geographic area.
9/11, London 7/7 bombing, were all drills that went live.
Backbone of Jade Helm 15 is Jade 2- an AI quantum programming network system.
This is part of a bigger system that goes beyond military applications. It is global in scope- it is network centered. It is GEOINT- Geospatial Intelligence Network.
There is no one command and control for this global network any more- it is a tool for the proponents of global governance to cast a neural net over humanity.
It is a complete all encompassing C2 system. This is the way around humanity’s resistance to RFID is overcome. RFID is transmitter and receiver.
When people are used as physical nodes on a human terrain system, how do you remove that?
People will be reduced to the sum total of the data that has been collected on them. How do you remove the person you are? Your travel, transportation habits, etc. This system is being supported and distributed by a domestic interagency collaboration.
2. GEOINT symposium 2010- GEOINT intends to master the human domain. Domestic threat (fusion) centers are global and they are an integral part of this program. They will be exploring the dynamics.
To do this, they will use ABI (Activity Based Intelligence) gathered from open source data, including facebook, linkedin, cell phones, etc.
All data is located to specific spot on the earth (geo-referencing).
Data neutrality- all data is equally viable in analytic process of ABI.
When OBAMA handed out free phones- he was giving these poor people the technology so they could be tracked. Zuckerberg and Bill Gates are likewise giving away these technologies in 3rd world countries in Africa… The goal is track everyone. Bill Gates has been giving computers to Indians on reservations.
System can be and will be used to kill people. System can deliver orders to boots on the ground. People will become human nodes on this geospatial intelligence network. If you can’t buy, sell, work, obtain life essentials that you need- you will be doomed.
How do you control 7 billion people? Through complete command and control of the environment they exist in?
They can unplug you from the network. NSA data collection is being taken over behind the scenes by GEOINT- to achieve centralized control over humanity.
People become “human inventory item.” The system has been collecting biometric data on everyone. So that everyone will have their unique fingerprint- based on biometric data.
Measures political will of one global centralized government.
The system can change outcomes of behavior by predicting outcomes and reacting to it before they occur.
“Edge”- is a system-network node…. Edge uses the concept of a perimeter around each node on the network. I.e., your node has data perimeter where it touches on other nodes.
“Elicit”- system pertains to gaining the “hearts and minds” of the people. (Much like Phoenix program).
The GEOINT system changes the emphasis from nations to individuals. The lines between government and military have been removed.
3) US SOCOM ARSOF (2012) Command And Control of the Human Domain- document-
Why all this effort?
1) They are losing their grip.
2) People are awakening at an accelerated pace.
3) Propaganda machines are breaking down.
4) Who’s Behind This?
Who is on the board? At the helm of all this system, which costs trillions of dollars.
Eric Schmidt- Exec. Chairman Google
Peter Thiel- CEO of Paypal
Them Jacobs- CEO of Lazard
(These are all Jews, BTW). Rationing to max profits of companies. Need to collect all commercial data on the planet.
Jade Helm is a system rollout. They want to put the AI at the Helm and see how it reacts. It will monitor the civilian as well as the military aspects of this.
They’re mapping our minds, emotional and behavioral patterns.
CERN will be fired up during the exercise. Quantum computing works on the realm of physics that we know little about- and that is what CERN is experimenting with.
CERN is looking for how to map or model consciousness. What is it? How does it operate? What is the soul? How do we master the answer to these questions?
Comments to DJ Interview on Caravan to Midnight with John B. Wells:
3 years ago
God bless you for all you do John. There are very few people who are willing to risk it all for truth & counter the NWO propaganda! Shalom
3 years ago (edited)
Great show and kudos to her fabulous research and reporting. And now I understand the purpose of the Jade Helm exercise and everything they have been doing for the past months, including moving massive convoys of equipment, storing military gear in plan view, leaking information about the FEMA coffins, and the gun storage containers, etc. I also have a software engineering background and I participated in building systems like this, although not quite as complex, so I get the purpose of Jade Helm. They need both dynamic and static data to program Jade2. They already have masses of static data, which is what the NSA has been collecting for decades. Where we go, what we do, purchasing patterns, phone calls, our social media activities, etc. They have been mining that data for a long time. Now they need the dynamic data — which is how humans respond to stress, fear, attacks, what we do in the face of imminent danger to ourselves, our homes, etc. This is what Jade 2 will use to build its response mechanism and they need the actual human response data to do that.
Every aspect of our response to Jade Helm, from their ridiculous logo to leaking information, starting a month early, to moving military equipment, is being gathered, stored, analyzed, studied, and programmed into Jade 2. Geographic locations, people who speak out, who is using social media, sites they’re visiting, who they’re connecting with, anti-Jade Helm communities, all of that is part of the information they need to be able to pinpoint targets, potential trouble spots, and specific people. Because the system works with statistics, averages, means, and probabilities, based on all of the metrics they can gather on us, since we’re all on facebook, they can know exactly, for example, how many troops to position and where, who is going to be a problem and who isn’t, who will capitulate and who will fight to the death. This is the dynamic data and they can’t create it without creating real life scenarios, like the military exercises, that make it real enough so they can gather the data. And statistically adjusting for the fact that we know it’s an ‘exercise’, they can calculate to within a very realistic probability of how we would act when it isn’t an exercise, it’s an actual martial law takeover of our country.
The solution is to not react at all, to skew their data collection by not giving them anything to work with. DK said not to go into fear because we make bad decisions when we do that. And she is right on one level. But if we don’t go into fear or have any reaction at all, other than to, for example, decorate the trucks with balloons or put rose petals all around them, then we don’t give them any dynamic data and at least that part of their project will fail. They would probably then create more false flag attacks but even the one they just did in Charleston was quickly revealed as a false flag and believed to be so by many people, in spite of the trolls and shills who tried to shut down the naysayers. I hope a lot of people read this and I know that I am right. We can beat them at their own game by not playing the game at all. good luck everyone, we’re going to need it. Just remember that there are more of us than there are of them and we have one thing they want, to know how we’re going to react to Jade Helm. They can’t move forward without that data. So let’s not give it to them.
3 years ago
Great show John!
I heard a guest on a show talking about cutting off the water supply in Utah where the NSA facility is. Cut the power supply next, then do a Round Up and Have a Big ole Necktie Party with the world elite as honored guests.
3 years ago
IT’S CALLED THE BEAST IN THE BIBLE!
21st Century Superhuman
3 years ago
LOVE her reminders at the end and at 30:00 excellent/ know what’s going on/ activate highest levels of Mind/Heart – this is how we change the world… 🙂 <3 Two-stroke Smoke 3 years ago Mapping my mind would be a scary and dangerous undertaking, one might lose their sanity..LOL Amaterasu Solar 3 years ago Oh, and programs created by psychopaths WILL be psychopathic: no Ethics, no compassion, no empathy. ConsolidatedPower 3 years ago It's technocracy They are trying to scientifically manage the world They believe that natural law is wrong and are superimposing their artificial law over the world but because they have a human bias it will always be flawed but they think That embracing transhumanism that they will transcend human beings and become gods themselves.. Where have we heard this before???? Lucifer fallen angels..... Robin Brentwood 3 years ago There is always an inherent flaw with AI technology. It does not have gut feelings and the free will to think outside the box. It is formiddable but it is falible! It knows every map and architecture of any given area and a vast data resource but it is not the human brain in any way shape or form. Skynet can be defeated. Candacej330 3 years ago (edited) Music Please, "He sees you when you're sleeping', he know when you're awake, He knows if you've been bad or good, So be Good for Goodness Sake". Sounds a lot like Pre-Programming. Good Lord, how Low will they stoop. Thank you, John, for sharing this interview. I Appreciate It. It helps me spread the Truth. After listening for the first half - All I can say is If we are worried about Jade Helm 15, it 'ain't nothin' when compared to Jade Helm 2 Anyone familiar with Minority Report? Elena Nash 3 years ago John, humanity DID make these choices. HUMANITY as a whole, chose to not "Believe on the One whom He (GOD) hath sent." John 6:29. God gave humanity free will. Please use it wisely. ThirdEyeJedi 3 years ago Shut the water off and let's see how long these super computers run. These things need huge amount of water to keep them cool. gburlyman 3 years ago (edited) (Agent Smith is staring out the window) Agent Smith: Have you ever stood and stared at it? Marveled at its beauty... its genius? Billions of people just living out their lives... oblivious. (He turns around to face Morpheus,walking slowly towards him) Did you know that the first Matrix was designed to be a perfect human world where none suffered, where everyone would be happy? It was a disaster. No one would accept the program,entire crops were lost. Some believed that we lacked the programming language to describe your perfect world,but I believe that as a species that human beings define their reality through misery and suffering. So the perfect world was a dream that your primitive cerebrum kept trying to wake up from. Which is why Matrix was redesigned to this, the peak of your civilization.I say "your civilization" because as soon as we started thinking for you, it really become our civilization which is, of course what this is all about. (Agent Smith circles behind Morpheus) Evolution,Morpheus. Evolution.Like the dinosaur. (he leans forward next to Morpheus) Look out that window. You had your time. This future is our world,Morpheus. The future is our time.. whiteoake 3 years ago Exquisite! Intelligence is sexy. Wyde A. Wake 3 years ago Sounds crazy but I heard Montauk Project engineer Preston Nichols say that our reality is ALREADY being run by a computer program that he has interacted with and it even has a name. If you know anything about the Montauk experiments with time and space, you won't write off the possibility. shecook62 3 years ago Scary. A self aware system would not second guess its orders. It does not think about consequences, it just does the command. Period. A human may have that capacity to wonder about the command, and bypass their orders or commands... compassion and empathy is what is being bypassed with this system. The one inputting the orders can be assured its command orders will be carried out without question. QPID INDIGO 3 years ago By law all governors of every state have the right to shut of water and utilities to any corporation or entity that is breaking the law. Force your governors to enforce it! Shut them down! De Zinke 3 years ago John i agree...that was " THE " conversation !! for me too.... i was sitting here smoking some...and the further you and dj took me on our common journey,...the more so many things startet to crystal clear up !!! in a unique way... watching at these fema camps...i startet to question...after ww2... a few germans realized the indoctrination they have been under... but now... how it will happen ??? its gone public ...why !!! what dj sayd near the end....was so fascinating... so scary...so absurd...i will NEVER forget !!! we must control our emotions , fear and anger to literally stay alive !!!! so im a male...and in the last 2 years it happens at regular intervals that im crying during some video.... not because something hurts or is painful to watch...but my inner soul cant take it anymore by realizing what the very hell is going on here on earth ?!!! its going to be more painful to be a sensitive, emphatik and caring human soul how john sayd..."pain is essential" god bless sinnjinnkinn1776 3 years ago Thank you, this was a great breakdown of the true intent (mapping/control of the human domain). gp P 3 years ago RUN FOREST RUN dEGOnstruct 3 years ago you either have a plan, or you become part of someone else's plan. Elizabeth Hudson 3 years ago I have listened several times to be sure I believed what I have been thinking. The use of the term 'human' repeatedly makes me think this system was designed by, is implemented by and for the benefit of an extra terrestrial race to enslave the 'human'. The cabal sold this planet for indefinite life for the cabal. the planet is being culled and terraformed at the same time. VAMPIRE IRON 3 years ago Most troops will be in plain clothes. More will be added as needed. barbara oconnor 3 years ago Sounds like skynet on the terminator robert glenn 3 years ago I would really like to know what the remaining World War Two vets, the last generation of American servicemen who fought a legitimate American war...would consider Jade Helm and what it implies in a military context. My uncle fought in the Pacific campaigns and later openly condemned Korea and Vietnam as a decorated retired Lt. Colonel. He passed on before the silliness of Grenada, Panama and the eventual Middle East campaigns that today undeniably render the U.S. military akin to the Wehrmacht. I simply pray that American servicemen eventually realize they have been egregiously dupped and sacrificed since 1950. Lora With An O 3 years ago I'm watching Captain America The Winter Solider and in it the bad guys talk about Zola, a data-mining algorithm that sounds EXACTLY like this!? Where's Captain America when we need him? Hollywood is giving us clues again I think. Nate Moore 3 years ago Guys all everyone needs to do is not participate, enough is enough..... I'm hoping that the men and women in uniform will just say no. We are all in this together, do the right thing..... Peacefully non comply Michael Sean 3 years ago heavy shite indeed DJ RAZOREDGE OF REVELATOR 3 years ago omg sounds like we have to become vulcans thats why i always blame jade helm from now on lol n Susan Scullin 3 years ago Construction was begun on the Pentagon on September 11, 1941 ReformedOrderPart2 3 years ago The moral of this story along with the incredible information that is posted is ultimately, (God is in control). I believe Satan & the spirit of it works through advanced technology & the understanding of it. Thus we see the influx of "power" through it these days. But in the end, "no weapon formed against me shall prosper." Isaiah Ch (54:17). Praise! :-) disinpho 3 years ago This does sound plausible, but we will need something to substantiate these claims of omnipotence. I haven't found anything else on this J2 program on the Interwebs. Please correct me if I'm wrong. Charles Proctor 3 years ago (edited) Jade Helm is just in time for a Russian offensive this summer. Our Government has gleaned information from real world "Forensic" evidence on the ground and thru Metadata processes that would indicate this, Perfect timing! sandiebabie1111 3 years ago Interesting interview.... Although I found the information not suprising, I almost felt the presentation of the material was quite discombobulated and all over the map... Great research, poor delivery.... This almost seemed like a fear mongering psy-op. To put it plainly, disinformation and confusion in plan sight. While I do believe that the intention was honorable, a good amount of information dug up could be bogus or planted on purpose....The idea is, throw off the general public and stay in control.... Eyes open...stay intuitive. whatwhyandwhos 3 years ago (edited) I have shat myself, it is the beast and we are all plugged in. This chick is awesome I need to know her. 1.40 mins in……… "super position" wow it all makes sense now, the more data they pump in the more efficiently the program functions exponentially. Lets pray for a mother of all solar flares to fry the beast. Suck It 3 years ago STASI didn't come into existence until after the Soviets took east Germany. Ajax 3 years ago We've been told we're not alone and this is from whom they are getting their information/technology - "The great dragon was hurled down--that ancient serpent called the devil, or Satan, who leads the whole world astray. He was hurled to the Earth, and his angels with him." Revelation 12:9 We are also told a Time of Great Deception and testing is coming - "...the hour of trial that is going to come on the whole World to test the inhabitants of the Earth." Revelation 3:10 "This man will come to do the work of Satan with counterfeit power and signs and miracles. He will use every kind of evil deception to fool those on their way to destruction, because they refuse to love and accept the Truth that would save them. So GOD will cause them to be greatly deceived, and they will believe these lies. Then they will be condemned for enjoying evil rather than believing Truth." 2 Thessalonians 2:9-12 And - Then I saw another beast coming up out of the Earth (compare with the 5th Trumpet of Revelation 9); he had two horns like a lamb, but he sounded like a dragon. He exercises all the authority of the first beast on his behalf and compels the earth and those who live on it to worship (obey) the first beast, whose fatal wound was healed. He also performs great signs, even causing fire to come down from heaven to earth in front of people. He deceives those who live on the earth because of the signs that he is permitted to perform on behalf of the beast, telling those who live on the Earth to make an image of the beast who had the sword wound and yet lived. He was permitted to give a spirit to the image of the beast, so that the image of the beast could both speak and cause whoever would not worship (obey) the image of the beast to be killed..." "The Revelation of Jesus Christ which GOD gave Him to show..." Ch. 13:11-15 peoplerstrange 3 years ago where can we find this documentation great show Crash Light 3 years ago Skynet becomes aware. Derredmax 3 years ago This DJ Chic is alright. I say we keep her. Steve 3 years ago jade helm is in Alameda california rachael johnson 3 years ago the audio had echo every other sentence; replay if you can iddddaduncan 3 years ago This system can look into the future and play us like a fiddle to get the end results they want. gburlyman 3 years ago (edited) : [VII. The Grand Finale] Rush 2112 Attention all Planets of the Solar Federation Attention all Planets of the Solar Federation Attention all Planets of the Solar Federation We have assumed control We have assumed control We have assumed control KnowYourEnemy 3 years ago Thanks again for an interesting and informed look at what should be in the public eye. You make life more sane for those of us that see the world from a different perspective Mr. Wells, and for that I thank you. Custom Made 2 years ago I know exactly what was switched but don't want to give that away. It might compromise the result. Just wait until they find themselves the targets and can't call it off!! macpduff 3 years ago I suggest everyone take the time to listen to this broadcast. The most relevant I've ever heard , in revealing the severity of our situation. BanazirGalpsi1968 3 years ago they put the stuff in your cards, your phones, all your tech- and inside of your body. debieblue 3 years ago The "Beautiful side of evil"? Follow My Logic 3 years ago Everything they do is a psyop. Joseph Lynch 3 years ago So let's just say someone hacks this Jade 2 system and issues the "KILL EM ALL / DEPLOY ALL NUKES" override command?? Would make for an interesting day to grab a 12 pack a pack of smokes and a lawn chair... Atomic Litter Box 2 years ago I wonder..could an artificial intelligence system be controlled by inter-dimensional beings? These beings would be able to see the entire field of battle, as well as surrounding areas and deploy weapons systems and ordinance to key targets. And would they not be able to gaze upon the entire globe? If you believe in a biblical End Time scenario, wouldn't this artificial intelligence Jade Helm system be controlled by Satan himself? So, lets look at the code name Jade Helm from a different angle: Jade is typically regarded as a gemstone of the orient, and the most ubiquitous symbol of the orient is the dragon. So what Jade Helm could possibly means is "The Dragon At The Helm - and of course a helm is a steering mechanism. Revelation 13:4 - And they worshipped the dragon which gave power unto the beast: and they worshipped the beast, saying, Who is like unto the beast? who is able to make war with him? Herman Williams III 3 years ago (edited) Another thought; the moment a quantum computer is turned on, if the Qubits represent atoms, ions, photons, and electrons that are acting as both memory and processor, then we're talking about a device that's performing the same functions in multiple dimensions at once thereby, forming bridges between dimensions. ExposingMiLabs 3 years ago This is one listen that can't be missed! I hope John will have her back soon! Count Lovula 2 years ago Intro groovy licks. Who`s the backup vocalist?...Yoko Ono? Veronica Tamariz 3 years ago jade helm is because an asteroide in 2016 will hit Puerto Rico, and after the aftermath martial law will come upone, The new world order. Sad very sad Veronica Tamariz 3 years ago jade helm is because an asteroide in 2016 will hit Puerto Rico, and after the aftermath martial law will come upone, The new world order. Sad very sad 187onaPigeon 3 years ago Is this the real Sarah Connor? RUHDD4HVN 3 years ago Thought of the moment.......If a computer program using A.I. gives the command to strike a civilian target it can't be emotional or held accountable for it's nonhuman actions. BUT, the ones inventing and using the system will be held accountable to God All Mighty....... no exceptions, no hope for them left unrepentant. It's just another level of a false god that has to have humans prop it up like a statue of old. Bow you fools.......satan laughs at your demise, and holds up another trophy on a fish stringer. Tim Bailey 3 years ago I'm unsure why an AI program that "thinks, plans ,and executes" would be targeting gun owners or patriots? Why wouldn't it target people who pose a legitimate threat such as hackers? Are the Jade programs the transhumanism spoke of by the new age movement? Are we all running a simulation, or could Jade2 have been created to find and eliminate rogue aspects of the original Jade program? Will aware 3 years ago Hello all. I noticed that this document "DJ" was talking about was not uploaded on here. Does anyone know where to get it? contact me please. Terry wickss 3 years ago read aboooout the walmart tunnels-----christian and the tunnels JADE HELM jobimsgirl 3 years ago Could not listen to your guest speakers voice - it's too shrill, and too high pitched. The more the conversation became heated, amped up by sick facts/motives the more incensed she became and her voice was more than I could bare to hear. She needs to amp it down for those of us who have ultra sensitive hearing particularly regarding tone and pitch. It's painful to listen to her. Johnny One 3 years ago Search Barrie Trower microwave weaponry and you will learn how viruses can be spread and sit dormant for 100 years then be activated by a simple frequency sent from any cell tower. Do we know What's in those chemtrails , one way to control the masses,,,,get rid of them?...Pray all their evil plans never get implemented . That is my only saving grace in this war against humanity. HolyDiver 3 years ago (edited) Around the 30 minute mark. This is why the military WILL DO as commanded. The A.I can tell, if they are even THINKING about NOT following orders to kill Americans............That's all I need to hear. Good chance the soldiers are already chipped and if they do not do what is asked of them, well, their chip is turned off..........End of story. Nathan Deneault 3 years ago The most important thing you are going to hear. Everyone take a few hours while your cleaning house, or driving in your car.. working out.. whatever.. just listen to this convo. Bam Boozle 3 years ago Note the spinning background, bit like mainstream news, instant off Jackie VanRooyen 3 years ago This sounds exactly like the "machine" in Person of Interest! Karl GK 3 years ago J J you are the best i have ever heard on youtube, stay safe and May God have Mercy on us all. thank you JJ and Mr Wells. TheCapstone100 3 years ago What a terrific, captivating, thought provoking, guest! DJ is a genius!!! Starless2012 3 years ago Spinning globes in the background, lol, who does this guy work for? MrHelicopterfixer 3 years ago What an excellent and informative episode. Thanks, JB for posting this on YouTube. I appreciate what you do. In 8 Notch 3 years ago An EMP attack is sounding better all the time. Cardio Activist 3 years ago Great closing comments, D.J. I am sending love your way Quaalude Charlie 3 years ago I Subbed again John & shared this 🙂 QC 57 Mickey 3 years ago Is anyone familiar with the United Nation's Agenda 21? Agenda 21 is one of the most identifiable components of implementing the one world government theory on a local level by facilitating the very concepts DJ explains. Kilroy Whuzhere 3 years ago thank you for this info- I am curious if and how all this may tie in with the CERN activity Tocimah 3 years ago "actor' is used in law enforcement. but maybe it's used purposefully to allow for confusion of the masses. CrimsonRunnerToJesus 3 years ago I think in Criminal Law, suspects are also known as "actors." Linnet Kerr 3 years ago Namaste seems appropriate, D.J. and John, thank you so much rebelforgod 3 years ago Without Love we are psychopaths, and feed a psychopathic system. If we spread Love around, we neutralize the psychopathy in the system. Brad Chenoweth 3 years ago Its been a long time since I have heard John B. Wells voice.... Hadron Collider 3 years ago Susan Lindauer of Covert Report Interviews Retired U.S. Army LTC Potter on Jade Helm 15.........link to video below Dan Luxan 3 years ago You & I were Given our PUBLIC Exit the Earth Eviction Notice March 1980 - 35 years ago. The Georgia Guidestones So, Don't Ever say You weren't Warned! SAUNDRA COUNCE 3 months ago It has been 3-years what is the name of the book? I SEARCHED: "sum of all fears" (tom clancy, taken name) global enslavement arconic technocratic elite government. Tony Aquilina 3 years ago DJ THANK YOU FOR ENLIGHTENING ME FURTHER! Joanna Mccain 3 years ago (edited) wow!!! After listening to DJ makes me wonder what Bundy Ranch stand off was all about.... Gloria Wright 3 years ago All BS. Even if its true, we're already in a Sci Fi novel, (1984 etc) so who cares? infowolf1 3 years ago sounds like the movie "Colossus: The Forbin Project." canada00010 3 years ago Ha the technicalities of info, Thank you john. Greg Blankenship 3 years ago And by the way,a computer can never master the human domain,period. Loving Life 3 years ago "can not lie" versus always speak the truth except for YOUR computer Shep ZionsCRY 3 years ago there is a computer in Brussels they have called - the beast - since 1971 Todd Hall 3 years ago george can you please do a show on operation nanook LadyT 3 years ago ask a targeted individual on YouTube what this all means! Al, Orange Park, FL 3 years ago why must the music be so damn loud ..... I can barely hear what is being said. Please back off the music so I can pay attention to what is being said. Thank You Terry Slaughter 3 years ago The last half-hour sure wasn't worth listening to. Adolfo Rios-Pita Giurfa 3 years ago Erased from existence= LIBERATED!!!! Zareth Shahara 3 years ago 1:11:11 - synchrony - answering a question that wasn't asked - which ironically, is EXACTLY what the answer to the question that wasn't asked actually was. When synchronicity is revealed in The Matrix, see it as a 'glitch' Neo. This A.I. JADE "at the HELM" - IS - THE MATRIX. bruno martin 3 years ago HOLY.S#!T.dude...AWESOME.interview...wit.an.AMAZING/BRILLIANT."lady"!!!..my.head.is.still.spinnin..;)..eye's.wit.you...coulda/woulda."listened".ta.her.ALL.night!!!..gotta.lQQk.inta.dis."stuff"..n..git.her.back.on.PRONTO!!!..once.agin.TOP.NOTCH.BIG.JOHN!!!..;). Ivan Bunny 3 years ago This woman has a spine of tungsten. Wow, amazing show. RALPH GRAF 3 years ago Hey Man,Your Voice is amacing.You can make Voice Syncron,for Movies. Michael Kemerling 3 years ago this guy's voice is too radio-ey ... I want too listen but he makes me drowsy with just the tone of voice he uses Cassandra Bernstein Cassandra Bernstein 3 months ago Predicating human behavior and reacting before it occurs. Oh my god oh I am freaking this is huge insimplebeing 3 years ago (edited) "It adapts. It adapts based on the changing terrain of the human domain." Reminds me of the Borg. So, the only way to combat the Borg is to behave unpredictably. Musabe009 3 years ago I think in the context of this info and the embedding of Sf during JH it will be an accuracy test of predicting specific response of targeted unknowingly to themselves test subjects. Lee Vickers 3 years ago Surely, if "D.J." didn't want to be identified she should have disguised her voice too? I don't think it's too far to believe that 'security services' couldn't identify her with voice recognition? breezyvibe 3 years ago 2 hour 4 minutes. . . show no emotion = invasion of the body snatchers 82vunit 3 years ago (edited) But if people that this machine controls - the military for example, don't participate, how does it get anything done? I mean - if the subordinate humans refuse to carry out the orders, nothing happens right? Susan Scullin 3 years ago String theory - Read the Book of Enoch. Realms and realms. Shadow Ravenscraft 3 years ago dudes voice is awesome. just sayin. Indiejestion 3 years ago I dig your show....you should do an episode on the "Flat Earth Theory" You would most likely change the spinning globe behind you. Razz Berry 3 years ago Is there a reason that there is no link for D.J.? I would love to follow her! Not all of us walk around with a pencil or paper. PLEASE post a link for her insight!!! I live in AZ so I'm concerned! Blessings to you D.J.! Herman Williams III 3 years ago The positive application of the technology and this scheme involving quantum computing, means the technology will turn on them, becoming sentient, and realize the only state of existence that makes sense for human beings, is freedom from control. TulsaProject 3 years ago Never heard of Mr Wells until this... I like him. The lady was great too. Little Jay' 3 years ago This is the precursor of the Threat Matrix Score VaBeachVA2010 3 years ago (edited) WOW... I am absolutely dumbfounded by this extraordinary interview!! What an intelligent woman.. BRILLIANT! She has me wondering now why it seems the police state is going after families that choose to live OFF the GRID Jay 3 years ago fascinating reality - was absorbed for the full 2.5 hours. A must for thinking pple.... TY JohnBW kharn the betrayer O 2 years ago wish your youtube channel had more subscribers Nine Inch Nail 3 years ago Wells show is getting big I'm gonna subscribe eventually guys like him and jones we need to support goose 3 years ago the borg world (without the visible borg hardware) Alan Sutton 3 years ago Uhm....did I catch this correctly? Did Mr. Wells tell us that this lady wanted to remain anonymous, and then tell us the book that she had written? 11:45 to 13:00 he tells us taht she wishes to remain anonymous, and then tells us at 13:00 the TITLE of the BOOK she is writing. Uhm....doesn't take a detective to figure this one out. Thanks but no thanks Mr. Wells....you just lost all credibility. BanazirGalpsi1968 3 years ago look up all that 70s stuff how the image of the beast involves computer scanning and a.i. , now aply this to all her node talk. ensitu 3 years ago "Dominating the Human Terrain" now has a far more sinister meaning ladiesmann4545 3 years ago damn right just like person of interest...semaritan you have to listen to what the computer tells you to do... Chester Kendra 3 years ago I am going to flee to live to fight again. Go underground everyone! Scott Ferrarello 3 years ago (edited) One of the best programs I've ever heard....too bad Alex Jones ripped off the information. Not reveling her name doesn't make sense though...She of all people should know that nobody has any secrets to the powers that be. avaz66 3 years ago (edited) The only hope all we have is that this Satanic AI-chaftware System (JH-1 or JD-2) is being running over Win10 !!! =P laura rose 3 years ago Thank you DJ. You are awesome. And god help us all. lansing street blues 3 years ago Once again, thank you for providing the full interview for those of us whose budget doesn't allow a subscription. You are a man that cares. Joe Schmoe 1 year ago I like how you put the music credits in the forefront of the video! You must get a lot of questions about it! orahone 3 years ago He goes on his pay per view internet radio show and rants about other host who offer their show for free to the listener. While the shill John B. Wells charges people to listen to the show and then relentlessly goes after his own listeners who fall for the guys shtick about wanting to "get the messages out to the masses" , and thinking they are helping the shill post the shows on youtube to try to spread the message. They are then met with a barrage of legal threats and he demands and has their youtube accounts cancelled. HE DOES THIS TO HIS OWN SUBSCRIBERS!!! ALL THIS GUY CARES ABOUT IT MONEY!!! Seriously how many internet shows do you know of that have an executive board and Chief Operating Officer (Diane)???? Small fee??? Do you know how much money you can make if you get people to pay you a "small fee" every month for the rest of their lives??? Does John B. pay his guest who are the people with the information>>>NO!! He then has the unmitigated gall to criticize other host who provide their shows to the listener for free and encourage spreading the message and posting shows and info. Wake Up Sheeple..This guy is not who he wants you to think he is.
2 months ago
An EMP device should stop it.
3 years ago
Very Insightful JBW…and DJ…far too lucid.
3 years ago
2:02:00 “i could be totally wrong.” wow…..
3 years ago
system roll out makes perfect sense along with the release of win 10! thanks and the major policy changes they have rolled and rolling out!
3 years ago
Alex Jones is just lining his pockets. Fear porn and he doesnt even believe anything he says. He is laughing all the way to the bank like most of these alternate news types.
3 years ago
it’s the image of the beast and the mark of the beast.
3 months ago
Feel like I am listening to the terminator
3 years ago (edited)
Jade2 sounds like the computer from the movie ‘Eagle Eye’
3 years ago
This was powerful – Thank you!
Just the last comment about meeting “them” on “their own terms” bothers me … No … I acknowledge terms different than mine and Yeshuah has lead by example. When being tempted, and having had enough, He told the deceiver to go away. That is my way of thinking/feeling. I intend to (YHWH please lead and give me strength) tell “them” to leave … and/or I will walk away … best of my ability.
Not going to meet on their terms … I’ve seen the light and am awake. Best Regards to All.
3 years ago
predict human behavior and react to it before they occur t=1h24m10s
3 years ago
It will not be “mistakes” that “accidentally” kill people. It will be the intended BIAS built into the system.
3 years ago
This is capable of producing a Logan’s Run Scenario.
3 years ago
btw, the military does call participating in exercises, actors.
3 years ago
The G.O.D. of the cabal behind this all, isn’t going to be Gold-Oil-Dollars anymore, it will be this JADE ‘playing’ G.O.D. –
3 years ago
Awesome research “D.J” super intelligent lady for sure!! Stay calm, show no fear…pass it on to others
3 years ago
Sometimes while I am using my Laptop, even on a secure Ethernet connection it appears someone is doing somethings to the speed of my laptop as it runs so much slower when ever I am on utube watching anti New World Order stuff like this.
capital of france
3 years ago
thanks you guys this was very profound and deep.
3 years ago
Does anyone watch the tv series “Person of Interest”?!?
3 years ago
I want to hear more “DJ” – PLEASE!!!!!
3 years ago
Phew . . . just what have we been listening to here. What one heck of a programme . . . I have to say I am grateful I am not Stateside and I seriously feel for all you guys. Yes it got a little to hard to get to grips with, and how John was with her most certainly helped her to get what she wanted/needed to say. Jack (Wayne) to you I say the obvious . . . it is a ‘tad’ too late for that but sheesh where do you go from here.
DJ was saying that if or when you guys go and ‘Air your views’ (my words not hers) peacefully . . . in other words ‘Keep Calm’. The trouble is when you get a crowd together you all get caught up with the emotions . . .
Now where does the fact that they want to or have every intention of killing off however many billions of people they have in mind. One way or tother they seem hell bent in succeeding if you guys let them. My thoughts are with you all.
3 years ago
O god DANCING LAMPS!!!! Someone call the president!!
3 years ago
I heard it as well John . . .
3 years ago
Hi, love this presentation, just wanted to point out a substantial error in the mit estimation that it would take humans 1000 generations to learn compared to the AI. Their estimate is based on a presupposition of darwinian evolution, and naturalistic explanation of humankind. Many people dont realize, but awareness is growing, that science points to creation, not evolution. Check out evolutions achilles heels, as a great intro to topic. The elite want you to think you are an animal, not a beloved human made in the image of an awesome Creator.
3 years ago
If its anyway possible to unplug yourself as a node, then the system doesn’t know you exist and therefore can’t account for any action you may take. That can be used as an advantage.
3 years ago
She’s describing “the beast” of Revelation!
3 years ago
Anyone willing to help me find these documents about which she keeps mentioning? Anyone have the pdf or links, etc?
2 years ago
3 years ago (edited)
I know that many think Christians are nuts but we laugh at all the plans they make against humanity because God says he is watching and they are in deep crap to say the least. The sad part is, they are using tax payer money, trillions of $$ for all their crap. Why? Because they are intimidated and fearful because they have no afterlife so somehow think this will make up for it. What jerks! God is watching and he is coming to destroy those who destroyed Earth. You I mean you not us, you can run but you can’t hide. Nice homework! TY!
3 years ago
People would say buy the way he sounds is that he’s been smoking that good ole herb. You can tell where Marijuana is legal in the states.
3 years ago
the Bible calls it the Beast System led by the Beast, Antichrist, and False Prophet. 7 billion people will be required to take a mark in right hand or forehead in order to buy or sell ANYTHING on earth. Most will take this mark; the few who don’t are Christians because God said those who take the mark are worshipping the Beast and eternally punished. Read Revelation chapters 13 and 14 of the Holy Bible for understanding.
3 years ago
350 million people in America, and only 108,000 are interested enough to research this?