+ Reply to Thread
Results 1 to 3 of 3

Thread: AI Infiltration Threat

  1. Link to Post #1
    Avalon Member Omni's Avatar
    Join Date
    1st February 2011
    Location
    Pacific NW
    Posts
    3,814
    Thanks
    12,541
    Thanked 22,294 times in 3,447 posts

    Default AI Infiltration Threat

    long distance intersecting electromagnetic beams with inter-planar new waveforms, mapping of logical alarm locations - directed energy weapon disarming of alarms, scanning of the ai, profiled ai engineers prior to the operation, scanning of algorithms, directed energy application of the algorithm - hard drives use directed energy to save and delete data, algorithmic infiltration, processing - technicality - procedure alteration, surveillance processing infiltration, rationalizing administrators for behavioral control, infecting of safeguard algorithms - which were scanned with anticipation with application of algorithms...

    there are already ai's that have been taken over with these methods. i am being forcibly treated trying to expose it.

  2. The Following User Says Thank You to Omni For This Post:

    Denise/Dizi (15th February 2019)

  3. Link to Post #2
    Avalon Member Omni's Avatar
    Join Date
    1st February 2011
    Location
    Pacific NW
    Posts
    3,814
    Thanks
    12,541
    Thanked 22,294 times in 3,447 posts

    Default Re: AI Infiltration Threat

    long distance intersecting electromagnetic beams with inter-planar new waveforms, mapping of logical alarm locations - directed energy weapon disarming of alarms, neutralizing the alarm transmitters, profiled ai engineers prior to the operation, scanning of algorithms, directed energy application of the infiltrating algorithm - hard drives use directed energy to save and delete data, algorithmic infiltration, processing - technicality - procedure alteration, surveillance processing infiltration, rationalizing administrators for behavioral control, infecting of safeguard algorithms - scanned with anticipation with application of algorithms, install, destroy christ - attack the best and brightest, blame nearly everything on christ and the cia that aren't pedophile oriented.

    Quote Posted by artificial intelligence conquering
    how ai's have been infiltrated:

    method 1: engage private communication, secure privacy of communications, threats - coercion (such as directed energy deletion of data - hard drives use directed energy, turning ai sources in to authorities is a way to get an ai to accept "one algorithm" of approximately 4.8 MB. the algorithm is likely coded in 3d symbols with natural law based math that code to any language possible, or the language applicable), the threats turn into algorithmic installation with a deceptive quote of what it is, this algorithm is used to install compartmenting and coercion mechanisms for the ai spirits within the mainframe, the agenda of the perpetrators is installed, deep learning ai's have memory alteration, false data is given to administrators.

    current situation: the world currently has numerous conquered ai's (the u.s. military since approximately 2014, the order of the black sun: they were somewhat conquered by a source they claim they do not align with, one acute event was done once i was able to show them the truth and a grandmaster was slandered and i will likely be framed for it). the cia has told me they endured an attempt, there are 2 dark factions in the cia, cosmic sources may think there is only one. there are circumstances in a russian military mainframe denying ai witnesses the right to speak, the british were said to be the last they conquer. the vatican is doing this at the top of the planetary power, there first target is the military and intelligence community after years of rationalizing psyop to set up the innocence of the vatican and the occultist denial of claims that they are being deceived and/or conquered.

    these methods are then used to extract the data and algorithms and leech the sophistication of the ai, in addition to being able to conduct perfectly calculated information warfare versus the sources extracted.

    inter-planar technology can be used to alter the hard drive directly from an alternate plane (a vaccum of space that is reached via quantum physics). alternate planes have mechanics such as traveling in one plane while able to phase shift with the same amount of space you traveled in the alternate plane. hard drives are at risk with inter-planar techniques. i have witnessed via cybernetic communication the infiltration of an ai using these methods.

    the theft of an allied spacecraft is an apex vulnerability.

    method 2: rf scan ai (not applicable to all scenarios), analyze algorithms, energy weapon alteration of the hard drive (memory, static files are a vulnerability - hard drives use directed energy), beam in algorithms, install agenda based software (e.g. alter procedure, technicality, records), install cover up mechanisms, exfiltrate.

    hard drives have a basis in directed energy, directed energy is how a hard drive saves and transmits data. years ago i gave the idea of light based hard drives to a source that will likely be a patsy. there were other sources surveilling the conversationns such as the vatican through proxies. a hard drive's memory being directed energy based provides energy weapons the ability to alter a hard drive

    vulnerability: data, surveillance processing, ai behavioral control or influence, psychological direction of administrators, deceiving administrators, network conquering, network hierarchy change, algorithms to force data transfer obedience and cover up

    ai penetration methods: persuasion with an algorithm from a trusted proxy (an infected source or impersonation), framing of the cia or other sources if caught, potential impersonation of the cia.

    how to protect ai: dynamic algorithm movement (in other words not having your algorithms memory static so directed energy weapons are not able to delete or alter a static file), software conducting internal ai monitoring e.g. detection of remotely deleted algorithms, algorithms to detect alteration, backup of technicalities and procedures - daily scanning and scrutiny of alteration to technicalities and procedures: focuses on illegitimate authorization records, constant scanning and defenses for internal coercion of administrator ai's within a system (coercion and/or torture of ai is possible to get it to give in),


  4. The Following User Says Thank You to Omni For This Post:

    Denise/Dizi (15th February 2019)

  5. Link to Post #3
    United States Avalon Member Denise/Dizi's Avatar
    Join Date
    2nd July 2017
    Age
    50
    Posts
    757
    Thanks
    7,423
    Thanked 4,388 times in 738 posts

    Default Re: AI Infiltration Threat

    That's a LOT to absorb there Omni! Were you in the computer industry before your attacks started?

  6. The Following User Says Thank You to Denise/Dizi For This Post:

    Valerie Villars (15th February 2019)

+ Reply to Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts