|
Meet your new god! Â AI
Â
Â
Â
Hagmann & Hagmann - 26 June 2015 - Explosive Findings About The Purpose & Scope Of Jade Helm 15
Â
https://youtu.be/Vx6Z7T5MYMs
Â
ALERT, ALERT, JADE II A COMPUTER AI TO FIGHT A WAR AGAINST THE FREE OF THE EARTH!
Â
What is Jade Helm? The Jade II system is an AI quantum computer system technolgy to colect data to identify or eliminate rebels, insurgents, in a network warfare environment. So it is a battle being run by a computer. Jade II is a network centric software based AI program at the Helm!
Â
(So this is why nobody knows what is going on or the purpose of Jade Helm, as a computer will be fighting a war against the global dissidents!)
Â
At the core of these military exercises going on is a computer network - a TOTAL COMMAND AND CONTROL SYSTEM!
Â
THE MARK OF THE BEAST IS A COMPUTER RUNNING THE EARTH?
Â
https://www.youtube.com/watch?v=Vx6Z7T5MYMs
Â
The Jade II system is capable of the following:
Â
It uses vast sums of information collected on individuals, groups, from population centric regions, large geographic areas and/or countries. It then dumps that information into a module called the (HTH-O?), which then analyses the data to develop and HTS, or Human Terrain System. (Mastering the human domain). Once the HTS system is established, it determines behavioral parameters or "norms" of individuals, groups, population centric areas etc...the establishment of these formulated parameters over air, sea, land space and cyber space, knows as the "human domain". Once it establishes these parameters, it can then identify, extract or eliminate perceived threats or targets based deviations from these norms. Jade can also examine the human terrain system over time, with the use of thousands of remote sensors, both audio and visual, as well as real time communication monitoring and other HTA toos to change or re-write itôs own program parameters in a particular human domain. A new template or program template as well as previous scenarios is then stored in what is called itôs prodigy module - which is actually the battle planning suggestion module, and it can be retrieved at any time, for any intended purpose.
Â
This is a type of human inventory system. It is a knowledge based, data driven artificial intelligence system that conforms to a mixed initiative - being military or civilian itôs able to generate complex deployment and battle plans in seconds, instead of hours, days or weeks. It can create holographic battle field simulations on the fly. The deployment planning, the military aspect, starts with the receipt of a mission statement, which is then run through what is called a CBR (case based reasoning module) to produce an ACOA (adaptive course of action) - key word - adaptive. Adaptive to what ? Adaptive to the human domain. That would be us. It adapts its plans based on the changing terrain of human activity, or ABI. (Activity based intelligence). Now what are some of the elements classified as activities? Some examples would be your communications, financial transactions, travel patterns, behavioral patterns, social media content and emotions. And yes, this system can read and measure human emotions. As this activity can change rapidly in a crisis event or warfare scenario, itôs able to change or re-write itôs own COA or course of action on the fly. The system is aware - it has total awareness, even in a rapidly changing environment. The format module, or the Force Management Module, was developed by the Miter Corporation and is used to support knowledge acquisition - data collection - that is what the NSA is performing on everyone, not just identify threats, but everyone. Why? Because this government now foresees the American people as itôs greatest threat and it will use a computer driven military to clamp us down! Patriots will be classified as terrorists and the true terrorist, the US puppet government, who receives itôs directives and agendas from the ruling elite will be deemed "patriots", to be protected at all cost.
Â
Series on tv called "Revolution" - pretty close to what is going on...
Â
The Miter Corporation - John. P Wheeler the III and Miter Corporation - discovered dead in 2010 - a homicide. This is a Virginia NGO with authentic connections to the Jason group, a front for Government research and things like this. (His death is still unanswered.)
Â
The third module of this system is called PARKA - it is able to handle extremely complex structured quaries against large data bases or large data dumps. Has anyone every asked the NSA why they are only collecting meta data or meta tags? That is because they ARE collecting EVERYTHING. Meta tags contain virtually no information or data, in and of themselves. Meta tags or meta data only have value if they are indexed to a much larger information source or file in these immense data bases. (According to the opinion this video, it is just another example of deception and misdirection.) They are collecting phone call information. Jade II is a self-reactive, self adaptive self modeling program for predictive force deployment. In other words, it can predict conflicts before they occur and react in a pre-emptive manner. It not only thinks in the present, but it can predict future events based on standard deviations of human activity. And these conflicts are not confined to a warfare scenario - the predict and pre-emptive capabilities can also be applied in cases of pre- eminant social unrest. This is not opinion - this is stated right in the document.
Â
These abilities of this computer are so futuristic - immense capabilities here - far beyond anything that many have knowledge to exist. If you are typing something on a smart phone, for example, it automatically assumes what word you are trying to type and puts it in there... that is the very small piece of technology they let us have...
Â
Some of the other key functionalities or capabilities of the system Jade II are:
Â
To perform high level trade determination - it makes decisions regarding casualties and targets in line with the overall mission objective. It has total command and control in an information intense society. (From a military point of view, someone is held accountable.) The Jade II system displaces the accountability of the individual commanders and places it on itself. It takes the human accountability element out of it!
Â
Have you ever wondered why the Obama administration has fired so many high ranking brass ?
Â
Jade II performs machine interpretations of commanders intents - what does that mean?
Â
For example, a minor objective in a mission to obtain medical supplies - in the machine interpretation of the commanderôs intent, it looks at this in a couple of different ways - do you rob the pharmacy of what you need or do you select the item, go to the register, and pay for them ? It is going to make an expedition decision, in that case, depending on the urgency of the mission.
Â
The system sits on a Global Information Grid.
|