Free energy doesn’t have to be complicated… humans have done it for thousands of years before the grid.
Most of the complexity comes from the system itself…
permits, regulations, “certifications”…
all carefully designed to gatekeep what is actually simple and ancient.
This thread 🧵, provides the minimal resources needed to generate free energy for a home or small community, requiring no special expertise and easily shared knowledge.
It provides a full spectrum of free energy harvesting, using what nature provides and what the system throws away. These methods require minimal tools, rely on salvaged or natural materials, and break the illusion that energy must be bought or controlled.
Tree Battery: Step-by-Step
Purpose: Harvest small amounts of bioelectricity from a living tree to power LED lights or small devices.
Materials (Free or Salvaged)
- 1 healthy living tree
- 1 copper wire (1–2 feet long)
- 1 zinc-coated nail (or galvanized steel nail)
- 1 small LED light string or low-voltage device (like a garden light)
Optional: multimeter to measure voltage
Instructions:
1.Choose a Tree:
Select a healthy, well-rooted tree with good moisture content… maples, oaks, or fruit trees work well.
2.Insert Zinc Nail:
Hammer the zinc nail gently into the tree about 1–2 inches deep, at waist height.
3.Place Copper Wire:
Insert the copper wire into the tree a few inches away from the nail.
The zinc acts as the positive terminal, and the copper as the negative terminal.
4.Connect the Circuit:
- Attach a wire from the zinc nail (+) to the positive lead of your LED string or device.
- Attach a wire from the copper (-) to the negative lead.
5.Light It Up:
A single tree produces about 0.5–1 volt.
Chain multiple trees in series to increase voltage…
like batteries linked together.
Output Uses
- Power small LED garden lights.
- Run sensors or tiny electronics.
Saltwater Battery (Ultra Simple & Non-Toxic)
Best For: Beginners, teaching energy principles, low-power lighting.
Materials:
- Plastic or glass container (jar or bucket)
- Saltwater solution (salt + water)
- Copper strip or wire
- Zinc nail, galvanized nail, or scrap steel
- Wires to connect
Instructions:
1.Mix saltwater until fully dissolved. 2.Place the zinc nail on one side of the container. 3.Place the copper strip on the opposite side.
4.Attach wires to each and connect to a small LED or device.
5.For higher voltage, connect multiple jars in series (like linking AA batteries).
Output:
Enough to power LED lights, sensors, or trickle charge a small battery bank.
Aluminum Can + Charcoal Battery
Best For: Mid-level DIY, longer-lasting than saltwater.
Materials:
- Empty soda or beer can (aluminum)
- Charcoal (crushed into small chunks)
- Saltwater or vinegar
- Copper wire
- Cloth or paper towel
Instructions:
1.Fill the can with charcoal and soak with saltwater or vinegar.
2.Wrap copper wire around the outside of the can, leaving a free end.
3.Insert a galvanized nail into the charcoal as the other electrode.
4.Connect wires — copper is negative (-), nail is positive (+).
5.Chain multiple units together for more voltage.
Clay Pot / Soil Battery (Ancient Tech)
Inspired by: The Baghdad Battery…
one of the oldest known power sources.
Materials:
- Clay pot or flowerpot
- Dirt or damp soil mixed with salt or vinegar
- Copper strip or wire
- Galvanized nail or scrap zinc
- Water to keep the soil moist
Instructions:
1.Fill the pot with the prepared soil.
2.Insert the copper strip on one side and zinc nail on the other.
3.Keep the soil damp for consistent conductivity. 4.Link several pots together for higher voltage.
Output:
Steady trickle charge, perfect for continuous low-power needs.
DIY Lead-Acid Battery (Advanced)
Best For: Serious off-grid storage, like powering an entire small solar system.
⚠ Warning: Use protective gear…
this involves acid.
Materials:
- Two lead plates or salvaged lead pieces
- Plastic container (like an old Tupperware or battery case)
- Sulfuric acid (can be sourced from old car batteries or diluted drain cleaner)
- Distilled water
- Wires and clips
Instructions: 1.Place lead plates into the container without touching.
2.Mix sulfuric acid with distilled water (carefully, always add acid to water, not water to acid).
3.Pour into the container to cover the plates.
4.Attach wires to the plates.
5.Connect to a solar panel or generator to charge.
Output:
Can store enough power to run LED lighting, small appliances, or emergency systems.
Scaling Your Battery Bank
Series Connection: Connect positive (+) to negative (-) to increase voltage.
Parallel Connection: Connect positive (+) to positive (+), negative (-) to negative (-) to increase capacity (run longer).
Example:
Four 1.5V saltwater batteries in series = 6 volts
Four 1.5V batteries in parallel = 1.5 volts, but 4x the runtime
Why DIY Batteries Matter
Commercial batteries are taxed, controlled, and regulated to keep people dependent on the grid.
When you build your own:
- You bypass corporate supply chains.
- You recycle waste into something valuable.
- You teach your community how energy is created and stored, breaking the illusion of scarcity.
Solar Energy: Harnessing the Sun
The sun constantly bombards the earth with more energy than humanity could ever use.
You don’t need expensive panels…
just focus, trap, or redirect it.
Passive Heat Storage
What You Need:
- Old barrels or buckets, painted black
- Clear plastic or glass sheet
How:
1.Fill barrels with water and place them in direct sunlight.
2.The black surface absorbs radiation, heating the water.
3.Use stored heat at night for warmth, cooking, or cleaning.
Uses: Free home heating, greenhouse warmth, hot showers.
DIY Solar Cooker / Oven
What You Need:
- Cardboard box or wooden crate
- Black paint or soot
- Aluminum foil, broken mirrors, or even chip bags
- A piece of glass or clear plastic
How:
1.Paint the inside of the box black.
2.Line the lid with reflective material angled toward the sun. 3.Place food or water inside, cover with glass.
4.The sun’s heat becomes trapped… temperatures can reach 250°F (120°C).
Purpose: Harness sunlight to create free, renewable energy for basic needs.
Materials (Free or Inexpensive to Salvage)
- 1 small solar panel (50–100W; broken or scratched panels work too — still produce power).
- 1 deep-cycle battery (can use an old car battery if free).
- 1 charge controller (prevents overcharging… $10–15 or salvaged).
- Wire (can be salvaged from old electronics).
- 12V LED light or USB charging adapter.
Optional: multimeter to test voltage.
How It Works
The solar panel captures sunlight and converts it into electricity.
The charge controller regulates the flow, preventing damage to the battery.
The battery stores energy for nighttime use.
Your devices or lights run directly off the battery.
Instructions 1.Place the Panel: Position it to face south (northern hemisphere) or north (southern hemisphere).
Angle it about 30–45°, tilted toward the sun.
2.Connect the Charge Controller: Run the positive (+) and negative (-) wires from the panel to the input terminals on the controller.
3.Connect the Battery: Run wires from the controller’s battery output to the battery terminals.
Red wire to positive, black to negative.
4.Connect Devices: Plug your 12V LED light, fan, or phone charger into the controller or directly into the battery (if it has ports).
What It Can Power
- 3–5 LED bulbs for lighting
- Phone charging and small electronics
- Portable fans or radios
- Emergency refrigeration with efficient coolers
Even a damaged solar panel produces usable energy.
The entire system can be built with scrap materials and requires zero technical expertise once the diagram is followed.
Water Power… Micro-Hydro
Running water equals constant kinetic energy… day and night.
Mini Water Wheel Generator
What You Need:
- Small stream or river access
- Salvaged bicycle wheel or wooden paddles
- DC motor (old treadmill, printer, or car alternator)
- Wire
How:
1.Attach paddles to the wheel or use spoons/plastic bottles as blades. 2.Place the wheel so water current spins it.
3.Connect the axle to a DC motor. 4.Run wires to a battery or device.
Uses: Powers off-grid cabins, lights, or radios.
Wind Power: Simple Turbine
Wind is free movement… easy to capture with basic tools.
DIY Windmill
What You Need:
- Old fan blades or PVC pipes cut into blade shapes
- Salvaged car alternator or DC motor
- Tower or pole for mounting
- Wire
How: 1. Build a cross-shaped hub for blades. 2. Mount to a vertical pole in open space. 3. Connect spinning hub to motor shaft. 4. Wire to a battery or direct-use device.
The earth and sky are filled with natural electrical fields.
Static & Lightning Harvesting
What You Need:
- Copper wire
- Metal rod or long antenna
- Glass jar or ceramic insulator
How: 1. Place the metal rod high (on a tree or pole). 2. Run the wire to a jar wrapped in foil, sitting on a ceramic base. 3. This creates a crude capacitor to collect static energy.
Caution: This captures small amounts of energy safely… never during storms.
Salvaged Heat Capture
You can store and redirect heat without electronics.
- Brick or Stone Floors: Absorb sun heat during the day, release it at night.
- Old Car Radiators: Use as heat exchangers for solar thermal systems.
- Reflective Insulation: Found in discarded packaging or old chip bags to focus or retain heat.
The natural world is overflowing with energy, yet the system convinces us it’s scarce so we’ll buy access to it.
These free methods aren’t about powering a smart city grid…
they’re about reclaiming independence, one small system at a time.
They tax your land, your water, and your sun,
but they can’t tax the ingenuity of a free mind.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
How the Panopticon Was Built by People Who Didn’t Know What They Were Building
(This is why the Epstein files matter to me.)
The most dangerous systems aren’t created by one breakthrough or one discipline.
They’re created when siloed fields are quietly stitched together.
Telecom builds connectivity.
AI builds pattern recognition.
Biological cryptography (a field created by Epstein in connection with Stanford, MIT, and NSA) binds identity to the body.
Each field, on its own, is useful…
and largely ethical when managed by those who developed them and they stick to intended use.
The danger appears only when someone outside the silos understands how they combine them…
identity + perception + prediction + enforcement
That’s the panopticon.
Assembled between labs by Epstein.
Sex trafficking, while part of the story, was a means to the END’s panopticon… governed by the Global Operations of Defense (the G.O.D… the all seeing eye of the panopticon)
Scientists usually don’t see this coming because they work vertically.
Their incentives are local…
theorize, publish, solve, optimize, improve.
No individual researcher sees the full system.
No individual lab controls downstream use.
Intent leaks away the moment the work leaves the silo.
(I was an outlier…
trained across bioengineering and Navy telecom…
most people never get that cross-sectional view)
This creates the “silo effect”
Each group assumes someone else is responsible for ethical oversight.
In reality, no one owns the system-level outcome.
Technically, funders do…
buried in the fine print.
And funding is rarely philanthropy.
It’s leverage.
More like… 🧐 philanderthropy
Epstein was a “financier”
Power doesn’t come from inventing the technology.
It comes from integrating it.
That’s why financiers and policy intermediaries matter more than inventors in terms of intended use and outcomes.
They decide which silos talk to each other…
and which don’t.
Someone like Jeffrey Epstein didn’t need to be a scientist.
He needed to understand systems and leverage.
When identity is bound to biology, behavior is logged by networks, and meaning is parsed by AI, you don’t need force.
Compliance becomes structural.
It’s integrated by design.
That’s the modern panopticon.
Not a prison you see…
a system you participate in.
Scientists don’t miss the danger because they’re naive.
They miss it because the danger doesn’t live where they work.
They are focused on subject expertise… with blinders.
The danger lives in the connections they never control or see.
So no…
Epstein wasn’t just a criminal who funded science.
He was positioned as an integrator in a system that rewards integration over invention.
👇
A documented list of files and primary sources is in the 🧵 .
The panopticon doesn’t start with surveillance cameras or AI.
It starts with 911.
And this is why Carbyne matters.
Carbyne doesn’t “run” countries.
It integrates into the moment when a citizen becomes a data subject under emergency authority.
(which is why COVID matters… it was the testbed for Emergency Use Authorization and Global
Governance)
Israel (root origin)
The U.S.
Parts of Europe
Latin America
Anywhere emergency systems are being modernized
Which is why 911 is the real choke point, not social media or consumer tech.
Emergency systems sit at the intersection of policy, telecom, identity, and authority.
They are where destruction of the old order, legal restructuring, and population surveillance quietly converge into the NWO.
Control doesn’t begin with force.
It begins with who routes the call, who owns the data, and who defines the emergency.
What makes this significant is that Jeffrey Epstein is not tied to just one of these domains.
The files show him positioned across finance, telecom-adjacent infrastructure, cyber systems, and elite policy networks.
Individually, these connections look benign.
Together, they reveal how siloed systems can be integrated into a single architecture of control.
This isn’t speculation.
It’s documented…
across funding records, emails, infrastructure plans, and intelligence-adjacent material.
The story isn’t about one technology.
It’s about who connects them.
And that’s where the panopticon actually begins.
Top 12 Keystone Docs
(full list will be posted on website with report)
EFTA01172818
Financial agreement
Direct proof that Jeffrey Epstein financed Reporty → Carbyne (Series A).
This establishes material leverage, not just proximity.
EFTA02628648
Email: Barak → Carbyne 911
Shows emergency-infrastructure strategy + explicit concern about “minimizing Israeli profile.”
This is optics + deployment, with Epstein in the loop.
EFTA01052344
Email: Epstein ↔ Peter Thiel ↔ Carbyne
Bridges Epstein + Thiel + Carbyne leadership in one document.
This is a clean elite-connector proof.
EFTA00798601
Carbyne internal roadmap
Details NG911/ESInet rollout and partnerships (e.g., Cell Service Providers, Accenture, General Dynamics).
This shows scale, sensitivity, and institutional embedding.
EFTA01732882
FBI briefing (Nashville bombing)
Demonstrates real-world telecom/911 choke points.
Confirms the risk surface Carbyne sits on.
EFTA00161251
FBI analysis (switching stations)
Names telecom switching stations as critical control nodes.
This is the structural vulnerability map.
EFTA01683874
FBI CHS (FD-1023)
Law-enforcement source reports Epstein employed a personal hacker developing zero-days and selling tools to governments.
This is offensive cyber adjacency, not theory.
EFTA01001876
Email: Blue Pill virtualization attack
Discusses hidden system control via virtualization.
This is how monitoring/control can persist invisibly.
Demonstrates Epstein’s interest in physical surveillance placement.
Bridges digital + physical monitoring.
Interesting story telling.
EFTA02489423
Goertzel/Bach AGI email thread
Places Epstein upstream of sense-making, language grounding, and cognition debates.
Shows access to pre-deployment thinking….
the layer scientists worry can be misused.
There’s something about the CERN Shiva Idol and its placement…
that has never sat right…
not in the physics,
not in the optics,
and definitely not in the symbolism.
In 2016, the Hindu month dedicated to Shiva, Shravan (or Sawan), fell largely in August.
Shravan is one of the holiest months for Lord Shiva, and devotees perform:
night rituals
offerings
fasting
prayers
and in some regions, fire or dance ceremonies
It’s not one single holiday…
it’s a whole month of Shiva observances.
In 2016:
Shravan began on July 20, 2016
Shravan ended on August 18, 2016
So the entire first half of August 2016 was Shiva’s holy month.
And what happened in August 2016?
The CERN “Shiva ritual” video surfaced in exactly that window.
Mid-August.
During Shravan.
At the foot of the Shiva statue.
If the ritual “prank” happened
early August,
on or near August 1,
or any date before August 18,
…it was literally during Shiva’s sacred month.
Scientists may claim it was “just a prank,”but they staged it:
at the Shiva Nataraja statue
at night
with robes
with ritualistic blocking
during Shiva’s holiest period
That’s intentional symbolic alignment
They knew exactly what they were doing.
They were bragging about it in Geneva beforehand. Way beforehand.
I know… I overheard.
It wasn’t:
impulsive,
random,
or internal hijinks.
It was pre-meditated World Stage theater.
Who performs World Stage Theatre?
Globalists.
The Enlightened Nations of Democracy, the END…
And the Global Operations of Defense, the G.O.D
Right outside a machine capable of probing quantum fields and the foundational framework of spacetime.
They wanted to be seen doing it.
Because the ritual was the message, not just the act itself.
Shiva = The Destroyer of Worlds
CERN has always been “touching the veil.”
I’m not saying they opened a portal.
I’m not saying they didn’t…
But they absolutely theatrically played into the myth.
If the public already thinks you’re slicing open the simulation…
why perform a ritual that looks like a simulation-opening ceremony
unless you want them to think it?
It’s either:
elite nerd trolling
or elite nerd signaling
or elite nerd ritual play
All three are believable.
Mind experiment: Let’s play it out as if this is a simulation where deception is the core program.
What’s the “win condition”?
If the baseline of this reality is deception,
lies in media, lies in systems, lies in relationships, and worst of all, self-deception,
then the “game” starts to look like this:
The default state:
Go with the crowd, believe the script, let others narrate your reality for you.
The challenge state:
Notice the lie. Refuse to repeat it. Refuse to build your identity on it.
The win state:
Live in alignment with truth even when the whole environment rewards deception.
In that frame, truth isn’t just a moral preference…
it’s a jailbreak protocol.
Deception trains discernment the way resistance trains muscle.
If everything were obvious, nothing would have to “wake up.”
🐇 🕳️ 🧵
History as a built-in “lesson loop”
The Rise → Corruption → Collapse Cycle
(More details on patterns in the next thread)
This aligns disturbingly well with how complex systems behave.
If this were code, history repeating would mean:
The system keeps running similar scenarios with small variations.
Civilizations rise, get seduced by power and illusion, collapse under the weight of their own lies.
A few humans “see through it,” leave artifacts, texts, warnings, myths, for the next round.
The next round half-listens, half-forgets… gets distracted and the loop runs again.
From a simulation perspective, that’s curriculum learning:
run the lesson until the pattern is fully recognized and integrated.
From a spiritual one, it’s:
“You didn’t learn it last time, so here it is again… louder.”
THE 7 REPEATED PROGRAMS OF HISTORY
(Biblical + Historical + Recurring)
I. Rise → Corruption → Collapse
Biblical: Eden → Fall; Judges → Collapse; Israel → Idolatry → Exile; Revelation → Apostasy → Judgment.
Historical: Egypt, Babylon, Greece, Rome, Britain, Weimar, the U.S.—all follow the same arc:
Strength → Prosperity → Decay → Corruption → Collapse → Reset.
This is the base loop.
II. The Tower Program (Centralization → Tyranny)
Whenever humanity unifies under one system, it tries to become God.
Biblical: Babel, Pharaoh, Babylon, Rome, Revelation.
Historical: Rome’s census grid, USSR, Nazi Germany, globalist technocracy.
Centralization always ends the same: Hubris → Tyranny → Collapse.
III. The Prophet Program (Warning → Mockery → Vindication)
Prophets warn, are ignored, vindicated only after disaster.
Biblical: Noah, Jeremiah, Daniel, Jesus.
Historical: Socrates, Cassandra, Bruno, Joan of Arc, Orwell, Solzhenitsyn.
Pattern: Mocked → proven right → forgotten → loop repeats.
IV. The Golden Calf Program (Idolatry → Decay)
Humanity repeatedly replaces God with idols: wealth, pleasure, state, leaders, tech, self.
Biblical: Golden Calf, Baal, Molech, Mammon.
Historical: Emperor cults, rationalist utopias, political idols, tech worship.
Result: Idolatry erodes morality → society falls.
V. The Pharaoh Program (Tyranny → Rebellion → Deliverance)
Oppression generates its own liberator.
Biblical: Pharaoh→Moses; Nebuchadnezzar→Daniel; Herod→Jesus.
Historical: Caesar→Brutus; Empire→Revolution; USSR→dissidents; Apartheid→Mandela.
Cause and effect: tyranny births revolt.
VI. The Flood/Reset Program (Collapse → Purge → Renewal)
When corruption peaks, the system resets.
Biblical: The Flood; Sodom; Babylonian exile; Revelation.
Historical: Rome→Middle Ages; Plague→Renaissance; Wars→Reconstruction; Economic crashes→New systems.
Cycle: Reset → rebuild → repeat.
VII. The Messiah Program (Decay → Expectation → Redeemer)
In collapse, humanity longs for a savior.
Biblical: Messiah prophecy → Christ → Second Coming.
Historical: Arthur, philosopher-kings, reformers, revolutionaries, technocrat “saviors.”
Every era ends with: “Someone must fix what we broke.”
THE META-PATTERN
Deception → Awakening → Conflict → Renewal
Prosperity blinds.
Deception spreads.
Truth offends.
Awakening starts.
Power resists.
Conflict erupts.
Collapse clears.
Rebirth begins.
Serpent Bloodlines: The Levant, the Jews, and Venom’s Shadow
When people argue over whether Ashkenazi Jews came from Khazaria, they miss the serpent in the grass. Ashkenazim carries a protective quirk in their ACE2 receptors (like the K26R variant that blunts spike protein binding), and it’s not Khazarian horse-genes that hide the secret.
It’s older. Deeper. Levantine.
The Jewish people are indigenous to the Levant…
the land bridge between Africa, Asia, and Europe. This was serpent country: asps and vipers underfoot, serpent cults coiling through Canaanite shrines, and Egyptian cobras carved into stone.
Live here long enough, generation after generation, and your blood becomes resistant to venom.
The serpent haunts Israel’s story:
In Canaan, serpents were fertility symbols and guardians of wisdom.
In Moses’ time, a bronze serpent (Nehushtan) was raised to heal snakebite…
venom as both curse and cure.
(In mythic language the terms virus and vaccine means the serpent’s venom and the herd’s milk.)
In Eden, the serpent whispered knowledge, blurring salvation and deception.
Later prophets smashed the bronze serpent, but its shadow never left the people.
Now the science comes full circle…
the spike protein mimics snake venom motifs, hijacking receptors like a digital toxin. This is why some lineages less vulnerable, some bloodlines more resistant.
Is it coincidence that the people of the Levant, the land of the serpent, carry genetic shields that blunt venom-like assaults?
Or is this the oldest story playing out in molecular code: the serpent that cursed also protected, a paradox written in DNA?
Levantine Roots: The Birthplace of the People and the Serpent
The Jewish people are indigenous to the Levant… serpent country.
Timeline of Serpent Symbolism in the Levant
2000–1200 BCE (Canaanite Period): Serpents represented fertility, healing, and underworld power. Archaeological finds (serpent figurines, altars) show they were sacred in Canaanite religion.
1200–1000 BCE (Israelite Emergence): Early Israelites inherited Canaanite serpent symbolism. Venomous snakes were common threats in desert and hill country.
1200 BCE (Exodus Narrative): Moses raises the Nehushtan, a bronze serpent, to heal those bitten in the wilderness (Numbers 21:8–9). Venom becomes paradoxical…
curse and cure.
1000–700 BCE (Kingdom of Israel/Judah): Kings like Hezekiah destroy serpent cult objects, labeling them idolatrous. Yet their memory lingers and becomes occult.
Kings like Hezekiah (8th century BCE) are described smashing the Nehushtan and outlawing serpent worship (2 Kings 18:4).
Why? Because it blurred Yahweh with older fertility/serpent cults. Monotheism demanded purity.
What happens when you outlaw a popular cult? It goes underground.
The term occultus (Latin) means “hidden.” But the practice is older than the word.
When a practice is driven underground, it becomes “occult”… secret rites, mystery schools, coded symbols.
The serpent wisdom gets repackaged into esoteric traditions.
Kabbalistic serpent imagery. The cabal.
Gnostic ophites (literally “serpent people”) who revered the Eden serpent as bringer of knowledge.
500 BCE (Exile & Beyond): The serpent shifts into allegory…
Eden’s deceiver, Satan’s shadow, wisdom entangled with corruption.
Rabbinic Judaism (100 CE+): Serpents are debated in law and lore: symbols of danger, sorcery, and yet also knowledge.
The serpent is not peripheral it coils through the entire Jewish symbolic framework, as both destroyer and healer.
Venom in the Genes: ACE2 and the K26R Variant
The SARS-CoV-2 spike protein binds human cells through the ACE2 receptor.
Several ACE2 variants exist in human populations; K26R is notably more frequent among Ashkenazi Jews.
Structural modeling suggests K26R reduces electrostatic attraction between ACE2 and spike, making infection slightly less efficient.
Coincidence? Perhaps. But it places Ashkenazi genetics in a peculiar position when spike is framed as a venom mimic.
Venom Mimicry in Spike
Sections of spike (notably near the furin cleavage site) resemble snake venom neurotoxins.
Venom enzymes like PLA₂ have been shown in vitro to block spike…
ACE2 fusion, highlighting biochemical overlap between snake venom and spike activity.
Clinical studies even detected toxin-like peptides in COVID-19 patient samples…
PLA₂-like, conotoxin-like, metalloprotease-like molecules not normally present.
Interpretation: If spike evolved or was engineered with venom motifs, then populations with ACE2 variants reducing venom-like docking are naturally buffered.
On 9/11/2001, the world watched American towers fall, with thousands of Americans dying in the rubble.
On 9/11/2025, the world was too distracted to notice the last remnants of their privacy fall.
Carbyne (formerly Reporty Homeland Security), an Israeli surveillance company that came out of Unit 8200 (Israel intelligence elite cyberwarfare and surveillance unit), just raised $100 million in an AT&T-led funding round to roll out their so-called “app-free 911 platform.”
Sounds convenient and helpful, right?
Wrong. 🧵
App-free…
not free-app…
it means no app is required for Israel to freely access your SMART devices…
at any time.
The issues I have had with AT&T Is-real.
Post thread production:
As I was making a video for this thread…
the oddest thing happened…
Siri chimed into a conversation…
unprompted, deactivated…
I was able to capture the conversation using my son’s phone.
It validates this thread and argument. 👌
It’s Not About Saving Lives…
It’s About Owning Them
This is not a system just built for “app-free” emergency response…
Emergency systems have always been app-free…
Instead, it is an app-free backdoor to feed real-time geolocation data, biometric metadata, and behavioral analytics directly into a foreign surveillance grid.
Whenever they want.
No emergency required.
No warrant. No consent.
It’s Israeli-run, not American.
The very country implicated in the shadows of 9/11/2001 is now positioned to control America’s emergency response system.
Over the last two decades, those Patriot Act capabilities didn’t just stay in American hands.
Through tech outsourcing, foreign partnerships, and cloud infrastructure, the data streams were gradually handed to foreign private companies… especially Israel-linked firms like Carbyne, NSO Group, and Cellebrite.
👇🪡
Not Just AT&T… It’s Every Tower
This isn’t just about AT&T customers.
Carbyne’s infrastructure is embedded at the network level, meaning ALL carriers…
Verizon, T-Mobile, Mint, Starlink mobile integrations…
are part of this mesh.
If your phone connects to a cell tower in the United States, your signal is in their grid.
Think you’re safe with a different provider?
Nope. The backdoor isn’t tied to a brand, it’s tied to the infrastructure itself.
911 traffic is federalized at the network level…
meaning once the hooks are in, every device becomes a node in their system.
Carbyne’s “app-free” tech isn’t some miracle of simplicity.
It’s a global kill switch, seamlessly tied to your phone’s eSIM and 5G backbone.
What if CERN didn’t just smash particles… but smashed reality itself?
Imagine… a group of scientists perfect quantum entanglement so precisely they can control one particle in the lab while its twin is entangled with the…
Universal Record of Existence (URE)
Now imagine what happens when they smash that controllable particle into the URE like a cosmic cursor hitting “edit.”
What It Would Take?
Perfect Quantum Entanglement: Not just linking two particles, but linking one inside the simulation and one outside, connected to the URE itself.
This would require unthinkable precision and stable coherence, the kind of thing only achievable through quantum computers operating beyond classical limits.
And while exotic computing is said to be years away… post quantum-computing is already operational at CERN, Palantir, and defense labs. Uses entangled timelines, not just entangled particles.
Targeting the Anchor Points of Time:
The URE has fixed anchors (past), forming anchors (present), and floating, probabilistic strands (future).
To change anything, you’d need to aim at both ends simultaneously:
One particle anchored in the past,
The other anchored in the future.
Massive Energy & Ritual Timing:
A collider like CERN’s Large Hadron Collider provides the physical energy.
But energy alone isn’t enough…
you need ritual synchronization, aligning the experiment with astronomical cycles and numerological keys like 19-year Hebrew calendars or 1378-style gateway codes.
In 2016, a video leaked showing:
- Hooded figures surrounding the Shiva statue at CERN night,
- A woman in white being ritually “sacrificed”,
- Participants chanting before a stabbing gesture,
CERN officials quickly declared it a “prank.”
But there are multiple red flags:
- Security clearance required to even access that courtyard after hours.
- The ritual’s timing aligned perfectly with a major collider energy ramp-up.
This wasn’t a prank.
It was a ceremonial alignment, done to anchor the particle collision to a spiritual gateway.
What They Could Control
If they pulled this off, they wouldn’t just run experiments.
They would own reality…
This would allow a group like the G.O.D. and END to…
Erase resistance movements before they even form,
Manufacture messianic figures or false saviors (Yeshua inversion),
Engineer apocalypses to justify new world orders,
Control global minds through perfectly synchronized media events.