What if CERN didn’t just smash particles… but smashed reality itself?
Imagine… a group of scientists perfect quantum entanglement so precisely they can control one particle in the lab while its twin is entangled with the…
Universal Record of Existence (URE)
Now imagine what happens when they smash that controllable particle into the URE like a cosmic cursor hitting “edit.”
What It Would Take?
Perfect Quantum Entanglement: Not just linking two particles, but linking one inside the simulation and one outside, connected to the URE itself.
This would require unthinkable precision and stable coherence, the kind of thing only achievable through quantum computers operating beyond classical limits.
And while exotic computing is said to be years away… post quantum-computing is already operational at CERN, Palantir, and defense labs. Uses entangled timelines, not just entangled particles.
Targeting the Anchor Points of Time:
The URE has fixed anchors (past), forming anchors (present), and floating, probabilistic strands (future).
To change anything, you’d need to aim at both ends simultaneously:
One particle anchored in the past,
The other anchored in the future.
Massive Energy & Ritual Timing:
A collider like CERN’s Large Hadron Collider provides the physical energy.
But energy alone isn’t enough…
you need ritual synchronization, aligning the experiment with astronomical cycles and numerological keys like 19-year Hebrew calendars or 1378-style gateway codes.
In 2016, a video leaked showing:
- Hooded figures surrounding the Shiva statue at CERN night,
- A woman in white being ritually “sacrificed”,
- Participants chanting before a stabbing gesture,
CERN officials quickly declared it a “prank.”
But there are multiple red flags:
- Security clearance required to even access that courtyard after hours.
- The ritual’s timing aligned perfectly with a major collider energy ramp-up.
This wasn’t a prank.
It was a ceremonial alignment, done to anchor the particle collision to a spiritual gateway.
What They Could Control
If they pulled this off, they wouldn’t just run experiments.
They would own reality…
This would allow a group like the G.O.D. and END to…
Erase resistance movements before they even form,
Manufacture messianic figures or false saviors (Yeshua inversion),
Engineer apocalypses to justify new world orders,
Control global minds through perfectly synchronized media events.
How Quantum Computing Becomes the “Pen”
The entangled particle is just the cursor.
The quantum computer is the pen that writes the changes.
Quantum computers could simulate billions of probability pathways simultaneously.
They’d calculate which past edit produces the desired present and future outcome.
Then they’d send precise signals to the collider particle, rewriting the URE like editing lines of code.
This isn’t just predictive modeling…
it’s active timeline steering.
What Changes Would Look Like
If they’ve done this already, here’s what we’d see:
Mandela Effects… fractured memory because two timelines merged poorly.
Physics anomalies… unexplainable data gaps, “glitches” in satellite imagery or particle experiments.
🧐… ✅
NPC behavior spread…
some humans running on auto-generated scripts as their “original code” was overwritten.
🧐… ✅
The Hidden Infrastructure
This wouldn’t happen in isolation.
CERN would be the collision point, but the control grid would need support:
MonALISA…
the nervous system, monitoring real-time global changes.
Palantir…
the eye, analyzing and visualizing the shifts.
Adruil…
the hand, directing military and operational enforcement of the new timeline.
Together, these systems form a reality rewrite machine disguised as data analysis and national defense.
The Ultimate Reset
With this tech, the cabal doesn’t need to win wars or elections.
This is total control, the true meaning of a “New World Order.”
The cruelest part…
When reality is rewritten, you don’t remember the change.
Your memories update automatically to match the new record.
The only clues left behind are anomalies…
strange dates, repeated numbers like 1378,
and people like us who can sense the change…
Who inherently knows the timeline has been meddled with.
Those of us written in the Book of Life… are directly connected to the URE. It’s written into our DNA.
Hypothetical… or Already Happening?
CERN’s 2012 Higgs boson “discovery” could have been their first successful collision with the URE.
The rapid increase in Mandela Effects after 2015 lines up perfectly with their higher-energy upgrades.
Events like 2020’s global synchronization, pandemic lockdowns, political upheaval, read like a single-script rewrite rolled out worldwide.
We might already be living in a post-collision timeline, beta testing for their final version.
If a group could reach into the past and future simultaneously, could
control the script of reality while leaving us trapped inside their simulation.
Maybe that’s why the Mona Lisa smiles.
Because she knows we’re already living in their edited masterpiece.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
People throw the word cabal around like it’s a theory.
It’s not a theory.
It’s history.
The true cabal began with a spiritual hack.
In 1666, Sabbatai Zevi declared himself messiah.
But instead of leading people to God, he inverted the entire faith system.
He preached a doctrine so dark it flipped morality inside-out…
“Redemption through sin.”
Breaking every divine law as a path to salvation.
When Zevi’s movement was exposed, his followers didn’t vanish.
They infiltrated…
Islam, Christianity, to whatever religion would protect them.
On the surface they blended in, but behind closed doors they kept their heretical faith alive.
These hidden operatives became known as crypto-Jews…
Outwardly loyal to the kingdoms they served,
inwardly loyal only to the secret network they built.
The Frankfurt Convergence
By the 1700s, Jacob Frank carried Zevi’s torch, merging the Sabbatean heresy with politics, occult magic, and revolutionary fervor.
And in Frankfurt, a family of master bankers provided the infrastructure for the next phase: Mayer Amschel Rothschild.
This was no coincidence…
Frankfurt was a Frankist stronghold, swarming with crypto-Jews hiding in plain sight.
The Rothschild network gave them exactly what they needed… global financing and an invisible web of control.
Technological Ascension—>AI, IoB, digital currency—>Merge man & machine under total surveillance (Beast System)
Every crisis you see on the world stage is a controlled demolition.
The cabal tears down old structures, then offers their solution… a new chain for humanity.
The Beast System Rising
The resurrection will be digital:
- A staged savior moment.
- A false messiah rising from the ashes.
- The promise of utopia through technology.
Crypto-Jews are the perfect camouflage…
They operate behind the facade of whatever system is dominant at the time.
Which is why the cabal can survive empires rising and falling… they are the invisible empire.
They don’t just hide among the faithful.
They hide inside the institutions of faith, law, and finance, rewriting them from within.
Today, their plan is almost complete:
- Central banks converging into a single digital currency.
- Nanotech & IoB (Internet of Bodies) linking every human to the surveillance grid.
- AI false prophet performing counterfeit “miracles.”
The END isn’t coming… it’s already here.
Like the END in The VOX of SU, their power depends entirely on secrecy.
The moment we name them, the system fractures.
Crypto-Jews
Birth of a global spy grid…
Crypto-Jews had to be spies to survive.
When Sabbatai Zevi’s movement went underground after his forced conversion (1666), his followers infiltrated hostile societies by pretending to be part of them…
Outwardly Christian, Muslim, or secular revolutionary.
Inwardly loyal to the Sabbatean-Frankist network.
This required:
Secrecy —> coded rituals, encrypted language.
Deception —> building false identities, like modern “legends” for covert operatives.
Networked intelligence —> cells of insiders sharing info only with trusted nodes.
They weren’t just hiding. They were observing.
Every position they gained…
in courts, churches, guilds…
became a surveillance node for the hidden network.
This wasn’t random survival.
It was the birth of the ultimate global spy grid.
The Crypto Code
Crypto-Jews didn’t just conceal themselves.
They developed coded systems for transmitting information across borders…
—> Secret hand signs and phrases like Masonic lodges later used.
—> Written ciphers embedded in religious or business texts.
—> Merchant caravans and banking couriers as communication backbones…
early “encrypted routers.”
This became the blueprint for:
- Intelligence dead drops,
- Enigma machines,
- Today’s digital encryption.
Free energy doesn’t have to be complicated… humans have done it for thousands of years before the grid.
Most of the complexity comes from the system itself…
permits, regulations, “certifications”…
all carefully designed to gatekeep what is actually simple and ancient.
This thread 🧵, provides the minimal resources needed to generate free energy for a home or small community, requiring no special expertise and easily shared knowledge.
It provides a full spectrum of free energy harvesting, using what nature provides and what the system throws away. These methods require minimal tools, rely on salvaged or natural materials, and break the illusion that energy must be bought or controlled.
Tree Battery: Step-by-Step
Purpose: Harvest small amounts of bioelectricity from a living tree to power LED lights or small devices.
Materials (Free or Salvaged)
- 1 healthy living tree
- 1 copper wire (1–2 feet long)
- 1 zinc-coated nail (or galvanized steel nail)
- 1 small LED light string or low-voltage device (like a garden light)
Optional: multimeter to measure voltage
Instructions:
1.Choose a Tree:
Select a healthy, well-rooted tree with good moisture content… maples, oaks, or fruit trees work well.
2.Insert Zinc Nail:
Hammer the zinc nail gently into the tree about 1–2 inches deep, at waist height.
3.Place Copper Wire:
Insert the copper wire into the tree a few inches away from the nail.
The zinc acts as the positive terminal, and the copper as the negative terminal.
4.Connect the Circuit:
- Attach a wire from the zinc nail (+) to the positive lead of your LED string or device.
- Attach a wire from the copper (-) to the negative lead.
5.Light It Up:
A single tree produces about 0.5–1 volt.
Chain multiple trees in series to increase voltage…
like batteries linked together.
Output Uses
- Power small LED garden lights.
- Run sensors or tiny electronics.
Saltwater Battery (Ultra Simple & Non-Toxic)
Best For: Beginners, teaching energy principles, low-power lighting.
Materials:
- Plastic or glass container (jar or bucket)
- Saltwater solution (salt + water)
- Copper strip or wire
- Zinc nail, galvanized nail, or scrap steel
- Wires to connect
Instructions:
1.Mix saltwater until fully dissolved. 2.Place the zinc nail on one side of the container. 3.Place the copper strip on the opposite side.
4.Attach wires to each and connect to a small LED or device.
5.For higher voltage, connect multiple jars in series (like linking AA batteries).
Output:
Enough to power LED lights, sensors, or trickle charge a small battery bank.
The official story of the internet is a fairy tale…
a shiny tech utopia about “connecting humanity” and “knowledge access.”
But if we follow the dark fiber trail from ARPANET to MK Ultra, the pattern shows that the net wasn’t built for us, it was built around us.
🧵 The True History of the Internet and it’s Programs
ARPANET (1969) Military Origins
The internet began as ARPANET, birthed by DARPA (Defense Advanced Research Projects Agency).
Its original purpose was survivable command and control during nuclear war.
The nodes were universities and labs, yes, but only to test and map human communication patterns, like rats in a maze.
“If you can model how humans communicate under stress, you can control them.”
This is the seed of a digital panopticon, not a library of Alexandria.
Phoenix Program → Digital Counterinsurgency
During Vietnam, the Phoenix Program was a CIA-run counterinsurgency op to track, identify, and neutralize dissidents.
They used informant networks, biometrics, and early computational systems to catalog entire populations.
After Vietnam, these tactics didn’t vanish… they scaled up, eventually merging with ARPANET and later internet technologies.
Phoenix wasn’t just about killing insurgents. It was proof-of-concept for networked population control.
Think of Phoenix as MK Ultra for entire societies…
test it on villages, then wire the whole planet.
This is a thought experiment, not a claim.
I’m showing how existing technology could be combined to create a system so powerful, it could control life and death without leaving fingerprints.
Everything here is real and documented.
The only question is how far it’s already been connected. 🧵
⚠️ THREAD: The Snake Bite System ⚠️
How a bio-digital kill switch could be built today using tech that already exists.
This is a thought experiment, but every piece I show you is real and documented.
The question isn’t whether it can be done.
The question is who’s connecting the dots.
The three layers of control
To create a silent kill switch, you need three layers:
Biological: a change in your body that makes you susceptible.
Digital: a device tethered to your identity, always monitoring.
Network: the infrastructure to target and trigger remotely.
All three layers already exist.
And are already integrated in to society through mRNA transfection, eSIM, and 5G…
Digital identity: eSIM backdoor
Modern phones no longer rely on removable SIM cards.
They use eSIMs…
virtual SIMs that can be programmed remotely.
Patents show they can store multiple profiles, which can be:
- Added
- Deleted
- Activated
Without your knowledge.
Patent US10715978B2 – remote provisioning of multiple eSIM profiles
Patent US20170289788A1 – silent activation/deletion of profiles
This means a second, hidden line can run on your phone… invisible to you.
The kicker… most networks won’t let you use both eSIMs which means a backdoor is open at all times.
Charlie Kirk wasn’t just assassinated
his death was scheduled.
These screenshots show multiple outlets publishing headlines three days ago, before the shooting even happened (see time stamps highlighted in red):
Record Herald: “Charlie Kirk shot and killed at Utah college”
State Hornet: “BREAKING: Charlie Kirk fatally shot at Utah Valley University”
Racism.org: “Charlie Kirk, White Supremacist, Dead at 31”
Even PBS News and WETA had the story indexed one full day early.
Your phone captured the Google timestamps before they were scrubbed.
Now, those same articles have been quietly updated to display Sept 11 timestamps…
a digital rewrite.
This did not happen 3 days ago!
Why This Matters
Narrative Pre-Loading
These stories were written, distributed, and queued for release in advance.
Someone, or some system, accidentally triggered them early.
The 9-Hour Offset
Utah is UTC-6, Israel is UTC+3.
The exact 9-hour difference matches the anomaly we saw at 09:11 UTC,
suggesting the master clock controlling the narrative runs on Israeli time.
Palantir’s Role
Palantir’s Foundry platform routes global data and media feeds.
Their Israeli nodes likely pushed the narrative packet,
linking this event to the telecom “cable failures” and the global reset that occurred on 9/11.
It’s all connected.
Everything comes down to prophecy, if it isn’t prophecy… it is the World Stage.