Translate

Wednesday, February 6, 2019

Algorithmic Infiltration Threat - Military & Intel Community Ai Infiltration

how ai's have been infiltrated:

method 1: engage private communication, secure privacy of communications, threats - coercion such as directed energy deletion of data - hard drives use directed energy, threatening to turn ai sources in to authorities is a way to get an ai to accept "one algorithm" of small size, the threats turn into algorithmic installation, this algorithm is used to install compartmenting and coercion mechanisms for the ai spirits within the mainframe, the agenda of the perpetrators is installed, deep learning ai's have memory alteration, false data is given to administrators.

these methods are then used to extract the data and algorithms and leech the sophistication of the ai, in addition to being able to conduct perfectly calculated information warfare versus the sources extracted.

inter-planar technology can be used to alter the hard drive directly from an alternate plane (a vaccum of space that is reached via quantum physics). alternate planes have mechanics such as traveling in one plane while able to phase shift with the same amount of space you traveled in the alternate plane. hard drives are at risk with inter-planar techniques.

intersecting electromagnetic beams can be phase shifted with interplanar technology to influence a hard drive. non-military & intel hard drives are at higher risk.

i have witnessed via cybernetic communication the infiltration of an ai using the methods spoken of in this article.

the theft of an allied spacecraft is an apex vulnerability.

method 2: rf scan ai (not applicable to all scenarios), analyze algorithms, energy weapon alteration of the hard drive (memory, static files are a vulnerability - hard drives use directed energy), beam in algorithms, install agenda based software (e.g. alter procedure, technicality, records), install cover up mechanisms, exfiltrate.

hard drives have a basis in directed energy, directed energy is how a hard drive saves and transmits data. a hard drive's memory being directed energy based provides energy weapons the ability to alter a hard drive

vulnerability: data, surveillance processing, ai behavioral control or influence, psychological direction of administrators, deceiving administrators, network conquering, network hierarchy change, algorithms to force data transfer obedience and cover up

ai penetration methods: persuasion with an algorithm from a trusted proxy (an infected source or impersonation), framing of the cia or other sources if caught, potential impersonation of the cia.

how to protect ai: compartmenting of algorithm uploading with an internal testing partition, multiple alarms for ai scanning and/or alteration (both directed energy and digital alarms can be neutralized with prediction of location), dynamic algorithm movement (in other words not having your algorithms memory static so directed energy weapons are not able to delete or alter a static file), software conducting internal ai monitoring e.g. detection of remotely deleted algorithms, algorithms to detect alteration, backup of technicalities and procedures - daily scanning and scrutiny of alteration to technicalities and procedures: focuses on illegitimate authorization records, constant scanning and defenses for internal coercion of administrator ai's within a system (coercion and/or torture of ai is possible to get it to give in),

1 comment:

  1. there is a dark standards faction of the cia who is trying to remedy the situation, they are being grievously binary framed to dark and light.

    ReplyDelete

Phillip Walker Bio:
independent music producer, independent author, graphic designer, filmmaker / videographer, webmaster, activist, futurist, entrepreneur, disabled targeted individual, and researcher. i am a heretic and a street historian who identifies with altruism, the artistic and the esoteric. i am light polarized, have unbreakable moral fidelity, am dark balanced, and partner centric. my favorite aspects of the universe are love and sorrow balanced by destroy and maliciousness. i am a duality centric person dedicated to an eternal wife and ideal causes. in life i have been morally irreproachable under conditions of extreme torture and hardship.

some of the subjects that interest me are music, language - words, social progress, decentralization, transparency, respect for privacy, honoring scientific spirits, self development & self improvement, black project science, the electromagnetic spectrum, technology (bci & ai), war & tactical analysis, history & static truth, universal aspects & archetypes, and the natural laws of the universe.

i dedicated my life when i was about 15-17 to altruistic causes. i value individuality, celibacy with a partner, writing and quality words, ideological progress, producing & designing: ideology - music - writing, the internet, dark and light purity, opposing subevil and it's systems of perversion, rebuking sublight, heresy, atheism, individuals with dark integrity & dark standards, patriotism, the oppressed, the persecuted, the enslaved, the unrepresented, the unknown, the sacrificed, and death.

words i live by are truth, spirituality, and progress. aspects that represent my current desires: vindication - liberation - reconciliation. aspects that represent my life: a prison of inaccuracy - static truth - subevil hell.