You are viewing a single comment's thread.

view the rest of the comments →

equineluvr ago

THIS POST BELOW IS BY YOUTUBER MILLENNIAL SAGE (bolding mine; link below).

It appears that this entire FIASCO by these BROTHER OPERATIVES was to compromise the truth community. (Obviously, in order for SUSPECTED FREEMASON GEORGE WEBB to pull this off he had to WAIT until his CULT FOLLOWING became large enough. IOW he had to have the numbers for the media to report, "popular right-wing Internet conspiracy theorist.") Acton is preparing a white paper for submission to DHS to "re-evaluate threats." Millennial Sage's post is below.


It appears that David Webb Sweigert, AKA Dave Acton, has turned the tables on us and has exposed his nature. Please refer to Montagraph's recent video to gain insight on the apparent methods Dave will be using to blackmail his brother. Now, below I will be posting an excerpt from a white-paper that Dave is working on. I will also be including a copy/paste of a comment from a YouTuber named "Intel Valor" that has been appointed as "incident command" and is helping Dave with the conception of this white paper. This paper will compromise the entire truth community and you will see why.

Excerpt of the paper as shown on Dave's computer monitor on his video:

Title of Paper: CO-OPTING AND EXPLOITING SOCIAL MOVEMENTS THROUGH THE USE OF LIVE-ACTION ROLE PLAY (LARP) SIMULATIONS TO CREATE COGNITIVE THREAT VECTORS

"Examination of the Port of Charleston emergency evacuation and closure deliberately caused by social media "conspiracy-theorists". Such cognitive infiltration operations rely on the weaponization of "crowd-sourced" information to create additional attack vectors. NOTE: this paper is scholarly research and is distributed for discussion purposes only..."

My observation is that nowhere stated within this excerpt is George Webb or Jason Goodman stated by name and, instead, a heavy generalization of an entire community of what is deemed as "conspiracy theorists" is highlighted to be using crowd-sourced information as a weapon to create attack vectors. What type of attack vectors? As the title of the paper states: COGNITIVE. the media has been stepping up the rhetoric regarding cognitive hacking, and so I find it odd that he makes specific use of the term "COGNITIVE THREAT VECTORS" within the title of a paper that he is writing that specifies social media "conspiracy theorists" to be using crowd-sourced information to create such vectors.

Moving on.

"Intel Valor" Comment of Contribution on Dave's Video:

"Platform and Progression:

Participants within Live-Action are lead to believe evidence exists through the use of deception. This deceptive mechanism details the compliance of alternative roles introduced to advance the plot. The narrative follows a standard Bernays outline with additional (Neutral) (Unwitting) persons, having valid credentials(IE:Reputable Journalists) to source, validate and disseminate narrative specific data to sensationalize and further co-opt unwitting participants.

Manipulation:

Viewers appear to be specifically vulnerable to inclusive roleplay which simulates real time espionage efforts through mock clandestine scenarios produced on video for dissemination through public video upload site "Youtube". Media then becomes Cognitively invasive, (Worm) working exponentially, per viewer, with each comment further forming a directed opinion, adding validation to a fabricated scenario. The exponential contamination of population centers grows, irregardless of viewer opinion. Negative and Positive opinions build further accreditation for fabricated clandestine acts as viewers clash, causing viral spread of cognitive worm; Reaching exponential readers, viewers and mediums of dissemination. Critical mass is achieved, further time has allowed for solidification and zealotry t o form within ranks on both sides, natural dialogue has ceased and risk for violence increases, alternative conspiracies are formed, spread and promoted, the Worm replicates with mutation to infect an entirely different crowd.

Just a rough overlook on my end. Not nearly complete."

Hmm. Now if I'm not mistaken, it sure seems that this paper is heavily aimed at the dissemination of information through online social media platforms as per Valor's post of contribution on Dave's video. It seems as if a lot of thought is going into this paper that does not seem to be aimed at one specific person rather than a specific community. It seems as if Dave and friends are constructing a research paper as to target the 1st amendment and the people who freely exercise this right. Please look into this and stay observational and vigilant. It's very funny that this paper is being constructed after George called in a fake bomb threat on the Port of Charleston utilizing this very same "weaponized" crowd-sourced information that Dave is typing this paper about. It seems as if George's actions were radical and extreme as to increase the need for such measures to be taken to inhibit such a scenario from happening ever again. It seems as if this psyop was constructed solely for the purposes of research and example. The plot is getting very thick. VERY. and I believe something more major will be taking place very soon. Good morning.

https://www.youtube.com/watch?v=wK7Klm-lCvc

jangles ago

Keep it up, Dave Swiegart's associates, the UN Generals will see exposure.