Important intelligence information release 
James Roger Brown
<[email protected]>


  
Dear reader, 
This is the first of which I hope becomes a regular column by James Roger 
Brown, Long time readers, and I mean really long, know Roger's work, many moons 
ago. His take on the really important issues of the day are like no one else on 
the Internet. Please join me in welcoming Roger back.
Rich Martin
 
  
 
Important intelligence information release 
 
There is one thing worse than war, starting a war with no concept, intention, 
or plan for achieving victory. Using the standard of real world performance, it 
appears that no one in the United States Military or Government has a clue 
regarding what must be accomplished to achieve victory in war. Perhaps they are 
too preoccupied with sustaining a state of crisis for exploitation by 
politicians and maintaining corporate profitability of their future 
post-military and post-government employers. Engaging in war for any purpose 
other than achieving victory is torturous long term national suicide and evil.

            The ability to defeat another military force on the battlefield is 
necessary, but not sufficient to achieve victory in war. As demonstrated by the 
United States in Vietnam, Iraq and Afghanistan, you can have military 
superiority, win all the battles, and still lose the war. More is required than 
military superiority on the battlefield. There are three historically 
demonstrated means of achieving complete victory over your enemy.

            Integration was the solution used in Babylonia. The Babylonians 
defeated their enemies on the battlefield then destroyed their social 
organization by putting the entire population in chains, marching them all to 
Babylonia and integrating them into Babylonian society where they could be 
directly supervised.

            Extermination was the Mongol solution. When Genghis Khan defeated 
his enemies on the battlefield, he left nothing behind. His soldiers killed 
everything down to the last farm animal after raping each and every one of them.

            Assimilation was the Roman method. The Romans defeated their 
enemies on the battlefield, then assimilated the surviving population into the 
Roman Empire by appointing a local political figure Roman Administrator who was 
held personally responsible for local behavior that would inconvenience Rome.

            No one at the Pentagon, or elsewhere in Washington, is actively 
engaged in achieving any of these three means of defeating our enemies anyplace 
we currently have “wars” going on, including the “war on drugs.” Losing the war 
on drugs is particularly telling because drugs are inanimate objects with no 
central nervous system or ability to fight back. The current war on drugs 
insanity is an example of what happens when policy is based upon legal fictions.

            Degenerating to these historical success models is highly 
undesirable. To avoid the destructive consequences of using these three methods 
of defeating enemies, it is important to understand why each of them work and 
create more effective means of accomplishing the same thing. To do that, we 
need a precise objective description of what social processes are.

            Human beings are biological computers with central nervous systems 
consisting of neural structures fabricated from the sensory life experiences of 
the individual. These resulting neural structures are biological programs. 
Meaning occurs when a biological program (neural structure) is built that 
processes repeated sensory experiences in the same way. Some key types of 
neural structures we need to take notice of are simulations of external reality 
(reality simulations), simulations of individual network memberships, 
simulations of self and metaprograms that organize and control other programs, 
language skills for example.

            Reality simulations are extremely important because they determine 
the survivability of each individual. Each reality simulation must have 
sufficient goodness of fit with external objective reality that an individual 
can interact with changes in objective reality in a way that sustains their 
existence. For example, someone under the influence of LSD who jumps off a 
building believing they can fly is acting upon a reality simulation with a 0% 
goodness of fit with external reality. Investors who trusted Bernie Madhoff 
operated under poor goodness of fit reality simulations that resulted from a 
conflict between survival metaprograms and greed metaprograms.

            Another important aspect of reality simulations is that network 
members (such as Congressmen and Senators) can have a specific reality 
simulation in common. The survivability of a network depends upon the shared 
reality simulation goodness of fit with external reality. If a network is 
destroyed by reliance upon a reality simulation with a low goodness of fit with 
external reality, all networks that rely upon that network can be destroyed. 
The reality simulation that it does not matter how much money the United States 
borrows might be an example of a Congressional reality simulation that has a 
low goodness of fit with objective reality.

            The Babylonian method of separation and integration was successful 
because it destroyed or limited the ability of former network members of the 
captive population to activate the stored programs, metaprograms, and reality 
simulations of one another that identified them as members of the former 
nation-state networks. How reality operated was altered to the extent their 
collective survival programs no longer had sufficient goodness of fit for their 
nation-state to exist.

            Extermination works because the biocomputers containing all the 
programs, metaprograms, and reality simulations are destroyed. Everything is 
permanently deleted. As it turns out, this is the only solution that actually 
requires use of violence.

            The Roman method of assimilation worked by keeping the networks, 
programs, metaprograms, and reality simulations intact, but making them 
subservient to a larger network structure with different metaprograms and 
reality simulations. Extermination was a last resort used when specific 
networks refused to be assimilated.

            With this understanding, it is possible to identify more precise 
and sophisticated sets of strategies and tactics to defeat enemies large and 
small in number. 

            If an individual, network, society, or nation-state is sufficiently 
inflexible, it should be possible to alter external reality sufficiently that 
their survival programs fall below the level necessary to sustain their 
continued existence or level of attainment. This method should be effective 
against small groups of elites who can only survive in a narrow set of 
circumstances. For example, a group of elites who remain in power by 
controlling gunpowder-based weapons could be disadvantaged if the population 
developed electricity-based weapons which did not have the same production and 
use choke points controlled by the elite group.

            Additional methods of defeating an enemy revolve around the direct 
elimination or removal of key biocomputers that would cause the collapse of a 
network or the direct alteration of programs and metaprograms. A little thought 
by astute individuals should identity effective strategies and tactics for 
implementation. Running amok in the streets does not rise to this level of 
sophistication. I will elaborate on the import of this.

            The most successful liars are those who activate your own ideology 
and belief programs to have you act against your own best interest. When 
someone jerks you around by your emotions, watch your back. Once you identify 
this happening, you may alter your own programs to better fit objective 
reality. When you do that, the person manipulating your programs has lost power.

            An important set of programs everyone needs to acquire is the 
ability to determine the truth. For example, there is a reason for the high 
error rate in our intelligence apparatus and judicial systems. Both of them 
rely on contrary hypotheses testing which has an inherent high error rate. 
Contrary hypotheses have the logical properties that all cannot be true, but 
all can be false. You only have a chance to identify the truth if you guess 
correctly and include the true statement among the contrary statements you 
test. Guess wrong and you have zero chance of identifying the truth.

            The most advanced intelligence analysis truth finding protocol is 
contradictory hypotheses testing. If you learn how to use contradictory 
hypotheses testing, no one should be able to deceive you again. 
Contradictory hypotheses have the logical properties that both cannot be true 
and both cannot be false. Use of contradictory hypotheses testing has the 
additional benefits of rendering evidence falsification, deception, 
incompetence, malice, and professional misconduct transparent.

            It is a mind boggling intellectual power tool that will have you 
wondering why fewer than probably ten avant-garde professionals even know it 
exists and use it. Surely it could not be because few people want to know the 
truth and even fewer people want you to know or be able to find the truth!

            A criminal charge provides an excellent example of how to apply 
contradictory hypotheses testing. John Doe is accused of violating State 
criminal code 204.9. John Doe is either guilty or not guilty. This can be 
stated as two contradictory hypotheses:
 
            H1: John Doe is guilty of violating State criminal code 204.9.
            H2: John Doe is not guilty of violating State criminal code 204.9.
 
            Both statements cannot be true. Both statements cannot be false. If 
evidence is put forth in support of both statements, you immediately know that 
one set of evidence is false. You merely do additional tests to determine which 
set of evidence has been falsified, determine who falsified the evidence and 
determine their motive. I have used this methodology to analyze evidence in 
criminal cases in which police officers and prosecutors have falsified evidence 
and tampered with witnesses. I developed evidence analysis matrix methodology 
to specifically analyze criminal case evidence. It works. 

            Paired contradictory hypotheses testing is very powerful, but must 
be done correctly. The contradictory statements must be crafted so there are no 
other possibilities. If you have difficulty constructing contradictory 
statements, you may use the criminal code and see if there is an issue of law 
violation regarding the area in which you are attempting to determine the 
truth. If so, construct contradictory statements like the two examples above to 
test. If it is a complex situation, you may have to test many sets of paired 
contradictory hypotheses.

            This analysis and commentary was written as an aide to help people 
get through the next two years of:
(1) more intentionally committed small and major acts of malice and evil;
(2) political, judicial and economic malfeasance;
(3) greed and corruption;
(4) and human pure evil deeds committed in desperate acts of self-preservation 
by our Professors Moriarty.

            This is NOT about Mayan or Hopi prophecies. This is about warnings 
collecting dust in various government and corporate offices, some of them 
classified, from New Orleans to the Green Zone in Iraq. It is also about 
warnings probably collecting dust in your own home that you did not believe or 
understand when you first read them.

            What we have to survive will probably not begin improving until 
early 2013. (The Mayans may have had the crisis timing about right, but I do 
not know what information they used to draw conclusions so I cannot address 
that.) It will not be the end of the world unless we let ourselves be 
sacrificed for the benefit of a few true evil villains.

            There is another set of important information necessary for 
everyone to understand certain aspects of the evil we will be contending with 
the next two years. It is about government black projects.

            I am merely pointing out how reality currently works. For myself, I 
would prefer a reality where I die in an extended outbreak of peace of natural 
causes at an advanced age. My reality simulation metaprogram does not contain 
this as a likely outcome.

            For those who desire to operate with a more complete and accurate 
reality simulation regarding the various current “wars” and black projects, 
begin with the posthumously released disclosure video of William Pawelec. Mr. 
Pawelec was a good friend and as close to an insider a normal honest person can 
get and still be alive. The video may be viewed at the Disclosure Project link: 
 
http://www.youtube.com/csetiweb#p/a/u/0/yytSNQ2ogD4 
(or do a Google search for “William Pawelec interview”).

 
            The supplemental details necessary to understand the “black 
projects” and “deeper than black projects” Mr. Pawelec refers to, relate to who 
is behind them, why they need them, and why billions of dollars in PRIVATE 
wealth are being funneled into GOVERNMENT black projects.

            The aggregate Professors Moriarty of this planet are desperate for 
technology with which to defend themselves. Some seriously seething folks have 
traveled a long, long, long, long, long, long, long way to put a permanent end 
to evil enterprises originating among the Professors Moriarty on this planet 
that have harmed them greatly in extremely ugly ways. These justifiably angry 
Travelers are here with the “man power” and technology required to implement a 
permanent solution. There is an optimum point in time they await when the 
Professors Moriarty are all assembled here and sorted out from the rest of us.

            Although the angry Travelers and the rest of us who are not a 
Moriarty share a common enemy, the Travelers are not here on a mission from God 
to save our souls. That is our individual responsibility. In point of fact, 
they probably have no more collective concern for us than a Moriarty does. 
Whether we suffer damage or benefit when they complete their mission plan, the 
consequences will be collateral. It would be in our long term best interest if 
we remove or render the Professors Moriarty powerless ourselves. We have not 
been effective at that so far. Perhaps it is time to contemplate what you 
should say to a scum sucking sewer fish if it asks you to sacrifice your life 
to protect it.

            The Travelers are here in pursuit of the perceived military, 
political, and social interests of those who sent them, at incredible cost. A 
multi-species expeditionary force in the millions needing to be housed in 
hostile planetary environments with mission specialized operational 
transportation is not going to show up in another solar system for cow 
delicacies or genes. It would be far cheaper to make them from scratch at home.

            In preparing their defenses, after having been warned numerous 
times to stop, as have we, the Professors Moriarty want to organize and exploit 
all of us as a human wall of protection for them. They are pouring our tax 
dollars, the stolen future of our children and their own money into government 
black budget programs solely to develop weapons technology sufficient for their 
protection. They have no concern about any or all of us being collateral damage 
when the Travelers come for them, as long as they survive and continue in their 
permanent chosen state of evil. The basic attitude of the Professors Moriarty 
is ‘If we go down, everybody on the planet goes down with us.”

            If you are tempted to think the Professors Moriarty are running all 
these black projects to benefit mankind, do not. These people predominantly 
operate in one of two modes, fear or greed. If the black projects were to 
benefit their greed, we would already be trading with the Travelers and the 
Professors Moriarty would be raking in the profits. Funding government black 
projects with their own personal wealth is an example of them operating in fear 
mode.

            Happy 2012 eve. Let us plan on celebrating New Year 2013 together. 
Come on over to where I plan on being then, but call first so I will know who 
is coming.
 
©Copyright 2011 by James Roger Brown and Emily Catherine Brown. All rights 
reserved.
  
  
  
 Is the Constitution the Supreme Law of the Land or not?  



  
George Soros is a major stockholder of Goldman Sachs investment bank. Goldman 
Sachs is one of the banks that owns the Federal Reserve. ~ Rich Martin 
  
  
  
If a link above does not work, cut-and-paste to your browser. 




Please be aware that Barack Hussein Obama’s grandfather was a highly respected 
witch doctor with the Luo tribe. His white grandmother was VP at the Bank of 
Hawaii and she worked with and for Peter Geithner on other projects, Peter is 
the father of Timothy Geithner, Obama's choice of Treasurer of  the US.



  




We the People
http://www.youtube.com/watch?v=JVAhr4hZDJE
 


I am a sovereign 
http://www.freedomsphoenix.com/Find-Freedom.htm?At=0095721

  
Join a TEA Party. Google tea party [name of your town] 
  








This email is archived at 
http://groups.google.com/group/richsrants?hl=en 

I'M MAD, AND I'M NOT GOING TO TAKE IT ANY MORE
 
http://bighollywood.breitbart.com/bprelutsky/2009/07/05/im-mad-as-hell/




 
.
  


      

-- 
To join RichsRants, send email to: 
[email protected]

For more options, visit this group at
http://groups.google.com/group/richsrants?hl=en

Reply via email to