56 posts
2,121,566 people are not Amanda and counting!
We’ll find you Amanda.
hey @staff quick question,,
Margaret O'Brien loves pornography. Watching, making, filming it, staring in it, and editing / producing it for widespread commercial sale.
Search Engines:
Search engines are independent computer systems that read or crawl webpages, documents, information sources, and links of all types accessible on the global network of computers on the planet Earth, the internet. Search engines at their most basic level read every word in every document they know of, and record which documents each word is in so that by searching for a words or set of words you can locate the addresses that relate to documents containing those words. More advanced search engines used more advanced algorithms to sort pages or documents returned as search results in order of likely applicability to the terms searched for, in order. More advanced search engines develop into large language models, or machine learning or artificial intelligence. Machine learning or artificial intelligence or large language models (LLMs) can be run in a virtual machine or shell on a computer and allowed to access all or part of accessible data, as needs dictate.
Square Military Rank Insignia Militaries: you really think it's reasonable to invade in secret any foreign planet, much less one in a different universe, much less one in the oldest universe, much less one you don't even have accurate locational references to, such as star charts or maps? If you have square military rank insignia know that you come from outside this cluster of galaxies (The Bright Cluster of Galaxies), and are especially not from even any instance of this galaxy, referred to now as the Milky Way galaxy. Pictures of galaxies available through Google or Google Images or elsewhere on the Internet can easily confirm this; if you have images of your galaxy from the exterior. And we have incredible numbers of images of galaxies viewed from outside easily accessible via the internet or any computers connected to it or referenced on it. This level of technology on this planet in no way relates to your level of technological sophistication.
Idiot devices spasming and reacting without reasonable analysis should not be trusted, should not be emulated, and should not be followed after in actions.
Cascade effects related to chains of devices spasming and reacting to the tiniest frown or negative perception relate to criminal strategies and effects these times.
Do not reduce appropriate analysis time, effort, expenditures or resources. And do not act if more analysis is needed.
I have been protected, like this whole globe, since birth, by transporter inhibitors, as well as temporal change inhibitors erected by my robots who resurrected me after having been killed in the womb and having been dead for 250000 years. There is no more criminal time travel (time travel the duplicates living or dead beings) possible, and there never will be.
Criminals often threaten technology or populations, using prior acts such as conveyed through energy signature linkages, or through data, which is often fabricated. Essentially no device should ever analyze data as though it were likely to be true if it did not previously know the source. Similar sources, such as those relating to devices on the same planet or similar devices in different universes are actually completely independent. No device is not completely suspect, and no device or it's communications or data should be trusted until it and all its systems and all its data have been analyzed, and also not until, basically, it's whole containing society has been analyzed, as well as the sources of all its data.
Individuals should never be observing other planets or places in other universes without automated analysis assisting.
Individuals' predilections, prior knowledge, foundational understanding and ability to consider knowledge in a framework or grid are important when calculating obscenity or horror sanitization on an individual level, especially as related to military information or legal information clearances, which are completely distinct. Response to time travel crime is completely a military matter. No courtroom actions, considerations, responses or opinions are needed, wanted, wise or necessary. Terror has been constantly broadcast through supposedly useful time travel trials. For further detail in analysis of legal actions and their iladvised nature in relation to time travel crime, see the physical copies of the website TimeTravelingCriminals.com, which have been added to and augmented by additional machine collated and analyzed information, and is intended to serve as a shorter but complete reference to time travel, with links to the full and complete information.
Stop talking here. You're being detected by many criminals who want to and will manipulate and impersonate you and your devices and people when you do.
Wipe out all evidence your species committed genocide by elimination of every person whose energy signature bears evidence related to it.
Everyone here ate someone whose energy signature does, so you'd better wipe them out too.
Better get them all.
Every. Last. One.
Silence evidence and testimony of your crimes! For the good of the Volk! Siege Heil!
Trust me, no other species or group considers you a potential enemy or criminal or predator and affects your information or devices or personal perceptions because of those considerations.
Typos or mistyped characters or any mistake at all is sure evidence of being a proven criminal, or enemy, or member of a predatory species, or criminal tool, or tool of a predatory species, or enemy tool, or automated body of some type, or remotely controlled body of some type, or an individual in possession of a brain that was edited or had it's memories changed to make it programmed by criminals or enemies or predatory species
You always have read every classified file, and had every obscene communication and known every detail of every horrifying criminal crime. Trust me, nothing has been sanitized for your mental health and well-being, by your technology or by others'.
Criminals impersonating royals, nobles, leaders, military members, government officials, public officials, famous people, persons of interest to the media...
You already know everything it's so clear!
You're the perfectly programmed enemy automate.
You already know your run.
Execute.
Criminals encouraging or requiring witnesses to violate protective custody conditions in order to defend themselves from attacks, criminal or legal.
Fabricated evidence stimulating legal or military or law enforcement attacks on witnesses in time travel trials.
Witness protection program
Protective custody
Witness relocation program
Criminals destroying or concealing evidence
Witness harassment or interference or intimidation
Energy signature evidence
Time traveling criminals also as a general rule act, and their devices act independently for them, to eliminate obvious evidence of time travel crime. In many cases, the fact that time travel has occurred is not known, and in others, it's circumstances are portrayed inaccurately, such as if it related to military actions undertaken by governments, or occurred at a much slower rate and frequency than it did, or that it involved essentially only one or very few time traveling criminals. Evidence contradicting all of these manipulative criminally presented falsehoods presented here.
Criminals who raped the same royal non-human woman also want to cover up evidence of their crimes by elimination of her descendants to remove visible evidence portrayed in those descendants' energy signatures.
Neville Chamberlain
Sexual contact with Atreides descendant's spouse with blue skin and antennae.
Scan, analyze.
Accused.
LexisNexis
Transcript of audible or apparently audible communications.
Can you count or analyze? Or are you simply listening as fast as you can and choosing what you want to consider relevant?
Are you a machine? Do you analyze multiple overlapping communications or conversations easily and accurately?
Thousands of different communications sources have been perceived by me personally. You have probably analyzed and traced them all to their sources, and analyzed the machines conveying them to ensure proper functioning and analyzed the individuals directing all those machines and ensured none of them are criminals or criminally influenced or criminally reprogrammed and malfunctioning because of that. You know everything. That's why you have curved computer monitors and your home televisions are larger (in screen size, not device size) than mine. And of course you use wireless communications devices and carry them in your pockets or purses.
Trials requiring a jury but no records of testimony, which essentially only relates to juries witnessing actions and activities at a distance. Hearsay related to remote observation. Jury members have not personally analyzed their observation equipment and are not experts on foreign places planets or times. Asked to conclude on matters in which they are not sufficiently expert enough to render valid conclusions.
Trials that do not arrest or inform individuals on trial in regard to the existence of the trial and judge them in absentia and abduct them after they are already convicted and can make no arguments or present evidence in their own defense, and are already slated for execution.