2young badazz Profile picture
Jun 18, 2021 129 tweets 28 min read Read on X
timesharing:
here we will examine an interesting puzzle within the larger puzzle, and though there is no neat and tidy conclusion to be drawn just yet it has been bothering me since utility computing came up and i think it is worth documenting here.
as mentioned in the thread on 'cloud', the state of computing in the 1950s and 60s was such that computing resources were centralized in large mainframes and accessed in a slow card-based batch system Image
the solution to this problem was to develop methods of 'time sharing', where users could access these central resources via 'dumb' terminals and the central computer could queue up the processing requests of many users fluidly Image
during the 60s several of these systems were developed and commercialized, including the notable and influential effort Project MAC and its multics operating system. Image
so the story goes, after bell labs dropped out of the project - yes, bell labs again playing a curious role in another story - some of its disgruntled engineers wrote their own operating system. this became UNIX, one of the most important and influential developments in computing Image
the unix origin myth is worth touching on briefly, we see again the 'it all just came to the engineer in a flash' trope as with shockley and kilby. Image
then the rogue bell labs team 'tricked' management into buying a minicomputer for their 'secret' efforts, which allowed them to complete the first release of their OS by 1971. ImageImage
we wont dwell on this story or unix, but i think this is another case of research and development obfuscation using patterns and devices that have by now become familiar to us.
eventually these obfuscating measures will be examined specifically and in detail, إن شاء الله, along with the rest of wwii, and until then we may simply add this to the list of suspicious post-war technology origin stories
back to the puzzle of timesharing - division of a central processor amongst several users, ImageImage
with each user having access to certain memories, managed by the operating system and accessed via passwords, Image
with commands, passwords, and instructions delivered via telephone line ImageImage
now this certainly will be ringing alarm bells for some people, but for the uninitiated what this very much sounds like is the abuse-driven personality fracturing used in mk and project monarch.
this is the puzzle - what to make of this bizarre synergy between project monarch and this era of computing development.
lets examine a video that came up in broader discussion recently:
the paul bonacci testimony, which can be found at y**t*b* here 'haEEnHEPjjg' or at archive here *rchiv**org/details/compressed_20210617
i will embed smaller clips, along with their timestamps relative to the longer video that can be found in either of the above addresses.
the goal of this thread is not a comprehensive overview of timesharing or project monarch, other than to say that i do believe paul bonacci is a victim of whatever project monarch may be
at 1:38 we see a 'user switch', i do not know what personality from, to paul bonacci.
and we may note, and i think that we should be critical in our digestion of this video, that this very visual switch does not seem to occur again when there is a switch from paul to west lee who identifies himself at 11:27
note, a very useful trick i learned with this video is that you can open the autogenerated transcript of a yout*be video by clicking the three dots after the save/like buttons, and you can use the normal ctrl+f search functionality to find the timestamp of something within it.
at 3:10 there is discussion of what happens if too many users try to access the system at the same time
this is very similar to the problem of thrashing, in time-sharing systems Image
12:10, west lee explaining why the lawsuit had to be filed under paul bonacci's name, because he is 'the body'
this brings to mind the concept of the 'kernel' in operating systems, which mediates between the users and the hardware ImageImage
this and other operating system principles were formulated and solidified during this timesharing era, in the 1960s and 70s Image
17:42 the mention again of 'mikey' and of 'poppy the jungle boy', i note this because while the 'mikey'reference to michael aquino who is mentioned by name in the testimony is to be expected, this george hw bush reference is something we can ponder upon -
because ghwb is less 'directly' connected, except through cathy obrien's book which ill return to later. but for some reason, the 'audience' is 'supposed' to make this connection between monarch and ghwb with him in a sense being classed in the same tier as aquino ImageImage
i have to note i find the 'gampy' and 'shamby' connection here a little strange too, and so i will mention a couple of other interesting naming phenomenon that came up -
for one, in one of the documents related to bonacci's testimony elsewhere it mentions a childhood friend 'john camp' Image
now this is strange because his attorney and one of the leading figures in 'exposing' this scandal is named john *decamp*, i believe he is the other male voice in this video mediating between the woman and paul.
and the other that immediately comes to mind is that a supposedly distinguished figure in MIT's computation program during the time sharing era was allegedly named philip morris - Image
this is from a robert fano lecture called "The Birth of Time-Shared Computing", fano being an important figure in this history Image
note this does not appear to be a 'typo' for phillip morrison, also an MIT figure. because "morris" was supposedly setting up computing resources in the 50s, whereas "morrison" was not active with MIT until 1964. ImageImage
this is not the first time ive seen a supposed figure who has a name like this, i believe it came up in the silval research as well. i will document these going forward
here at 19:30 west lee describes his creation as having occurred in 1974, and cannot yet elaborate
lets hold off on analysis of whether or not we should believe this testimony, and just take in the details. by 1974 large timeshared computer systems and computer networks were maturing and spreading across industry, academia, and military organizations
by the time of west lee's creation, the technology of project monarch had apparently also reached a degree of maturity and stability of process. so its a point of curiosity when these two strands began development and what was the relationship between them
and of course, in computing we 'know' these ideas emerged in the late 1950s though we can extrapolate that they were probably developed somewhat earlier and laundered out according to a schedule.
when pressed further, at 21:32, west lee is given the 'password' and is able to reveal that his creation was the product of a government program along with further details
passwords for computers became necessary with the advent of multi-user systems, and were purportedly invented by one of the key timesharing figures fernando corbato ImageImage
and so, at 22:47, with the password entered, we finally get to the answer to the question 'what is monarch', and now i think we are due for a critical evaluation of the proposal and the testimony video itself
and according to west lee, monarch is a program to create spies with compartmentalized memories by fracturing the personalities of children - this fracturing and the hypnotic methods of control are accomplished with horrific abuse.
he later elaborates that victims are used to blackmail politicians including a politician who controlled a significant slice of the drug trade that 'monarch' was interested in, and that the plan is ultimately to 'take over the government of the united states'
these are both in my opinion massive red flags. regarding the drug trade, and actually ill mention another aspect as well - that the drug trade was used to fund 'their program', timestamp ~54:50,
while i indeed believe that local politicians and figures control the local drug trades, no doubt, the positioning here is a little funny. how small and weak is the monarch clique supposed to be that they need to 'compromise' a politician to 'take over' his drug biz?
who is supposed to be controlling the *supply* in this equation? rather i think that abusive programs and drug trafficking are both part of some reasonably stable chain of command, and both rely on military infrastructure and logistical support.
and the idea that 'monarch' and indeed all kinds of 'black operations' need drug money for support is imo a deception. the drug trade is not run by 'intel agencies', its run by more or less the entire government for the sake of weakening the masses and getting rich.
the funding for monarch and 'covert' operations can come from more or less anywhere. it doesnt need to come from illicit trade at all.
as for the plot to "take over the united states government", this is where we can firmly say that this presentation of things is wrong and suspicious, even if west lee genuinely believes it.
and this is the obvious meaning of the name 'monarch', right? 'monarch' is a plot to subvert and 'take over' the "democratic" system. now interestingly, recall that unix is one of the operating systems analogous to the minds of pm victims -
here there is an element of wordplay, re: 'eunuchs'. this kind of wordplay features very heavily in cathy obrien's book on project monarch.
anyway, there is no small clique trying to take over the united states government - every major player and stakeholder is more or less aligned with the larger mission outlined in previous threads. this is certainly a deception.
so then, what to make of the testimony? lets finally divide into the two scenarios: paul bonacci is an actor knowingly lying, or he "believes" in some sense in what he is saying and doing.
in the latter case, we can divide further into two more scenarios: that the monarch programming, the password triggers, all of the computer-like features, all of that is real and works more or less as described.
or, to borrow a phrase that came up during discussion of the video, that its some kind of 'magicians trick'. that some form of hypnosis is guiding bonacci, but that what he is describing - though he is hypnotically coerced - is not accurate wrt the capabilities of the program.
but i think all of these roads lead to the testimony being in some sense manufactured as a psyop. important followup questions then, include:
when/why was it produced and how was it leaked or otherwise made available to the target audience? what was the state of 'conspiracy theorizing' at time of release? what were the circumstances surrounding successive 'rediscoveries' of the video or the preservation of awareness?
and id rather not get into all of that at this time. but that is how i would approach investigating the testimony and evaluating its production as a limited hangout. again, our purpose here is just to surface the issue of coupling between computer development and the mk programs
the last thing i will say for now is that i believe one of the most fundamentally deceptive aspects of the entire description of project monarch is the use of 'unwitting participants'
so much effort is expended to make people think that gladio, spying, all kinds of operations are carried out by unwitting or semi-unwitting or 'mentally ill' or 'confused' participants and i think this is deeply wrong.
at 25:51 west lee reveals that his programming took place on offutt airforce base in nebraska. again, this would be around the early 70s, with west lee's creation occurring in 1974
amongst other things offutt is notable for its role in early wireless packet switching experiments - where a central minicomputer coordinated between several smaller mobile sites, Image
as well as being an early arpanet node - on the map since at least as early as 1973. ImageImage
offutt was also mentioned specifically in cathy obrien's book as being a monarch programming site. obrien's book is ostensibly *the* resource on project monarch so it is worth a cursory discussion, though again the purpose here is not a comprehensive evaluation of monarch - Image
nor timesharing, nor of the evidence. the purpose is to outline this relationship between two phenomena and leave it at that, for now. but some examination is okay, as long as the expectation is that it will be brief and that fuller treatment is merited at another time
this is i believe the only mention of offutt in obriens book, "trance formation". again for the uninitiated, this and other puns figure heavily in the entire book so i am being very serious when i suggest the relationship between monarch and unix/'eunuchs' is not a coincidence Image
the picture of monarch painted by trance formation has overlap with west lee's testimony, though much more detailed and in many ways i think more realistic. that i think is all i will say for now, the book is very traumatic and its hard to think of what to say about it.
we may note the 'wizard of oz' reference for later, but before moving on i will note the description of mount shasta: Image
i have personally met, briefly and in passing, on the street or bus etc, upwards of three people who appear to be victims of mk programming at mount shasta when i was younger. this was definitely a recurring mystery to me,
to the point where if i was talking to someone who seemed, for lack of better terms, like an mk victim i would always ask them about mount shasta. at least one of these specifically shasta-related victims(?), had a dolphin focus reminiscent of the programming described here: Image
at the time i had no idea really about project monarch, so it was simply a mystery. it was interesting to see this explicitly validated in the book, regardless of whether or not it is a form of limited hangout.
this is a very interesting book, and an interesting subject, but for now we will move on. at 31:22, west lee describes being threatened by 'the eagle' -
specifically, the eagle would call and deliver 'triggers' via phone that would access certain programming. again, this is more or less the exact model of timesharing as shown earlier - executing code, sent by 'terminals' over phone lines, on a remote computing resource
remote computing via telephone lines was actually first demonstrated in 1940 by, of course, bell labs Image
at 47:58, west lee describes leaks in the segmented memory where paul and other personalities started to remember things that he had previously dismissed as 'hellish nightmares'
this is a very interesting part of the narrative, the suggestion that the rigid and computerlike phenomena are unstable and may break down over time
per earlier i think this testimony is *some* kind of limited hangout product, albeit a mysterious one, and arguably the main goal is to overstate mk abilities and the ability to program humans like computers. in that context this reads like a controlled 'concession' -
as well as a convenient way to get paul 'out of the program' and onto the stand. it advances the narrative forward.
at 51:20 west lee describes more military infrastructure where he underwent an attempt at reprogramming in 1989. he also mentions aquino, who we must note *was* a psyops officer -
i think this is where we need to tread very carefully and in my opinion while this testimony, obriens book, may in some sense be 'limited hangout' products i do not at all believe that means the abuses described are not real.
cathy obrien's descriptions of ronald reagan, dick cheney, hw, etc, as far as im concerned are accurate to the characters of those individuals. and her description of the ruling class is i believe in many ways organizationally and functionally accurate.
but we can return to these matters another time. at 56:16 paul 'accesses memory', in another striking display of 'computerlike' behavior
and indeed he says explicitly (57:09) that he sees his thought process as analogous to a computer,
even making a 'slip' at 1:05:54 where he stumbles using the phrase 'the computer' instead of the phrase 'my mind'.
this concludes our analysis of the video itself, and i know the subject of monarch and mk deserves a full treatment but its such a large subject that this has to be done separately.
so, the coupling between monarch/mk and the timesharing model of computing. what are we supposed to make of this?
i will admit i remain skeptical of the purported capabilities of segmenting and programming human beings in this way and of bonacci's computerlike behavior. so i do at this time believe that this is a 'psyop', working backwards from the computing model instead of the reverse.
but i do of course believe in mpd and that the abuses described here and elsewhere are real and in abusive mind conditioning and manipulation in general.
i think its hard to follow the 'thread' of this coupling further, but lets try and accept that this is very loose analysis. the goal is not to solve the puzzle here, but to at least catalogue and document it.
monarch as described is most heavily influenced by the timesharing era of computers, which is when single computing resources began to accommodate multiple users. timesharing eventually gave way to microprocessors and personal computers, though some of the principles remained.
i think the 'coupling' in a sense breaks down and there is no neat metaphorical continuation between computing and mk "technology", however - lets note some aspects of the development of the two programs after the timesharing era:
personal computers brought computing to the mass market, weaker than comparable large central computers but mass produced. these computers then became the platform for a lower-grade mkultra - also weaker, but mass produced.
the internet became the platform for distributing trauma and programming - again, smaller trauma, weaker programming, on smaller and weaker computers, but nonetheless still traumatic programming and on a previously impossible scale.
so from a 'mirror' relationship between the pre-internet mk programs and computers, two parallel strands, the two phenomena rather merged together over time to become a single program, one strand.
in our examination of electronics history, and indeed in the shift from timesharing to personal computers, we see the obsessive miniaturization of technology being a key driver of progress. i believe we can extrapolate that this was pursued also with hypnotic cues and control
in recent years, i think the combination of bursts of pornography and hyperviolent trauma that has become the staple formula of 'television' serves really as a form of low-grade traumatic programming,
and that in some sense ads have become miniaturized triggers for that programming - banners and popup images, 5-second youtube clips, these things are not designed to actually sell products.
this is not to overstate the efficacy of this model, but just to suggest that it does exist and we should be aware of and cautious of it. again, not overstating these capabilities was our big takeaway from the testimony earlier, right?
we dont want to fall prey to another pernicious form of programming which is, a hypersensitization to *anything* that could be a hypnotic cue simply because we know they are attempting to program us, resulting in an unpleasant mindstate. then we give that to them for free.
that being said, we must note and be aware that the entire modern internet *is* the mkultra program. even the name of the tik tok app is an explicit monarch reference -
obrien makes repeated note of the use of wizard of oz theming for her programming, and tik tok is of course a reference to the oz character - we may note that predictably wikipedia *emphasizes* the mk red flags because we are *supposed* to connect these dots. ImageImage
but we also cannot get too far into the thinking that all of this stuff works flawlessly.
with that, i will consider this puzzle surfaced and we can move on for now to other subjects. like many things we have examined, perhaps the payoff will come later. unanswered questions aside, this lens serves as a useful way to approach mk and its evolution
wait
no, there is something else
bear with me as we briefly look over monarch cues from 1980's 'the shining' -
the resource that sparked this train of thought can be found here: idyllopuspress_com/idyllopus/film/sh_monarch.htm
this is a painfully large rabbit hole i am realizing, please consider this a stripped down treatment purely in the context of this thread Image
beyond doubt, the film is in some sense coded to refer to project monarch. the signals are repeated reference to the number 237, and a ski poster with the word MONARCH, and the film's in-story location of the mountains of colorado - all of which point to the monarch ski lodge Image
this is the appearance of the poster in the actual movie Image
here is the author's analysis of the monarch poster and its twin poster, the minotaur seen through the door. strangely the author does not seem to indicate the second poster directly but it looks to me undeniably to be a minotaur and i assume this is their implication Image
now, this is what sparked for me - earlier i referred to timesharing and project monarch as being presented as mirror images but lets instead see them as twins
on the left side of the room in the image, there is one table and on the right side, on the other side of the twins, it has become two tables. on the left side of the wall containing the doorway, a single poster which becomes two posters on the other side of the twins.
left, a single machine. right, two machines. outside the room, the minotaur - inside the room, the twins.
one becoming two, as if representing the fracturing of a single human into multiple personalities.
this is mirrored in our assessment of project monarch - the two twin strands, timesharing and the 'human computer' model, becoming a single system that encompasses all of computing and the internet and mk altogether.
in the book, the grady twins are not actually 'twins' they are eight and ten and i will press the button on these ages for being close enough to the numbers one above them. Image
Image
recall the relation between the rise of the internet and 9/11
in order to merge the 'twin strands' of mkultra the twin towers were destroyed, and the twins became one - a splitting in reverse ImageImage
uPJQ-1Y8jfY this is the youtube id for a video that addresses 9/11 symbolism in back to the future
when marty pulls up to the twin pines mall the clock is on 1:15, and on-screen it changes to 1:16 which of course is upsidedown 9:11 ImageImage
later the 'lone pine mall' Image
recall 'the eagle' described by west lee as the one who calls in the middle of the night to deliver coded triggers via the phone -
'the eagle makes phonecalls that initiate hypnotic suggestive personalities, which are not real personalities, that were programmed in by monarch'

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with 2young badazz

2young badazz Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @2youngBadazz

Jan 16
zionism:
its been awhile since i've done a proper thread on here, so i thought it was about time to get back to the old ways and just let it rip with no capitalization or editing. i will post the result, properly edited into "article" form, after this is done.
naturally, there have been a lot of comparisons lately between zionism and nazism. and this is of course a correct comparison - but to what degree do we understand the depth of the relationship between these two phenomena?
Read 188 tweets
Jan 18, 2023
a brief review of the war in iraq:
id like to start by apologizing for the long gap between the previous entry and the current, it was a busy year for me. i wouldnt like to give the impression that these longer-form explorations - which represent a massive improvement from say the earlier threads - take an entire
year to produce, or that such massive delays are necessary. hopefully, i will be more productive with regards to these threads in 2023. i havent finished writing this one, but i think it is time to get started anyway. i am not going to shorten any aspect of it, so bear with me.
Read 1267 tweets
Oct 10, 2022
@apollosthirdeye to this i would say "yes" with some major caveats. the first one being that "intel" is a label that is imo applied incorrectly here - the fortunes of the drug trade belong to individual members of the ruling class, not to the agencies that work on their behalf. these agencies
@apollosthirdeye simply perform administrative work as a service and extract some kind of fee. not only does the label of 'intel' narrow the scope of the agencies involved - the entire state apparatus is involved - but it confuses the principals of the trade itself.
@apollosthirdeye and this view is very popular of course by design. "military" would be a more appropriate label in terms of the amount of executive burden that they bear imo. but to get back to the point - there *is* something that these elons and fronts are covering up, right? surely. so,
Read 39 tweets
Jun 6, 2022
i challenge anyone who is promoting the 'competing factions of the ruling class' to actually outline and explain and substantiate what the factions are and how are they competing and why
and ill be clear on what i mean here because these are vague and unfortunate terms and imo vague and unfortunate framing. 'ruling class' is itself a nebulous term the way it is often used, so lets put a very specific set of definitions on it that can be examined:
definition 1: "terrorist" attacks and mass shootings.

definition 2: root-level decisions such as to run the covid operation and how to shape covid policy, or the "supply chain shortage", or how to manage isis and drug cartels

definition 3: management of police and military
Read 18 tweets
Mar 12, 2022
seeing people gear up to defend russia against false flags despite their obvious complicity in the entire show, that imo is the big iteration here from say syria.
non-rhetorical question, what *is* the value of exposing the millionth painfully obvious paid actor, the beauty blogger in the hospital? it can be instructive to people who are less familiar with psyops, to demonstrate in real time how the news works -
particularly, i think the speed with which they had an actor ready and on the scene is food for thought re: the mechanical process of producing this sort of fodder
Read 6 tweets
Mar 9, 2022
ill try to get back to business soon but meanwhile i think that people tended to miss the point of the nato black sun post -
there is a broader psychological goal of erasing and reframing that nato of course *is itself* a nazi organization - and that the political block it represents are in fact nazis, true nazis. and that this is the real nazi problem facing the world, not mere "neo" nazis -
Read 14 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(