Monday, April 16, 2018

Modem Scripts and The Dress

The Dress Modem Scripts
The Dress Modem Scripts
Remember "THE DRESS?"  The real point of that exercise was to discover the calibrations of peoples' systems then, in some cases, get them to change them.  It may have been used to determine who was using which system and OS, but the larger operation was to embed system files as though they were color files.

These are Modem Scripts posing as color files.  I don't know how they work, but they may have something to do with KEXT files and RAID servers (military).  This was all done under Obama, not Trump, and under Obama's direct orders (and a lot of it really was).

This leads to something known as the Five Divisions, or Five Eyes.  Allegedly a law enforcement agency, Five Divisions is an Old Testament reference leading directly to AIPAC/CFI-backed, far-right, paramilitary units -- including the EDL and JDL.  Five Eyes operatives were also found to manufacture and distribute child pornography, and several have been arrested in conjunction with cryptocurrency crimes, and the Silk Road fiasco.

These are War Crimes constituting Sedition and High Treason.

© Copyright 2018, The Cyberculturalist


Wednesday, April 11, 2018

Variety.com Returns the Following

Variety.com
Variety.com
We don't work for Variety, nor have we ever.  About a year ago, maybe more, we found that someone working for or contributing to Variety (or possibly just hacking their RSS and/or system, in general) had hacked TheWeirding.NET.  I don't know any contributors or "tipsters" for Variety (that I'm aware of), nor have I ever commented on its site (that I recall).  I didn't even know Variety was a WordPress site.

The DNS re-routing, or IP blocking, is similar to that we experienced when we tried accessing the "official" Sandy Hook report.

We don't own TheWeirding.COM, nor have we ever -- it was hijacked by a Chinese firm which tried to extort us going back some 10 years or more.  The only thing we've ever seen on there is a picture of a dollar sign, but I haven't checked it in years.  The ownership reverted to a firm out of Texas, then Arizona, a few years back -- that may have been Integrated Systems, or ISIS, but we can't confirm that.

In the last few years, Variety has become a vocal mouthpiece for the Democratic National Committee, and Hillary Clinton in particular.  Its primary focus has been on politics, especially politics that have nothing to do with showbusiness.  It is often an extremely vocal advocate for "diversity" in all sectors, not just showbusiness.

I have no idea why my IP address would be blocked from Variety, but it may be for the best...

© Copyright 2018, The Cyberculturalist


Monday, April 9, 2018

Time of Day.applescript

MOAR Federal gangstalking techniques.  This appears to be a method by which they can change the Time of Day remotely using a VoiceOver Time of Day.applescript found in Library/VoiceOver.  Another possibility is that it merely does as it states, and speaks the time of day for recording devices planted in the house or on other electronic devices.

Watch Deerfield, Illinois in coming weeks for a false flag event.  One of their schools is literally DHS-media.org!  Another is named South Park (Church of Scientology, though this may be a red herring, as Federal agencies are directly and specifically involved).

Both the DHS and FBI are orchestrating these events, and there appears to be some kind of rift in their communities.  But make no mistake about it: Elements within both organizations are directly responsible for all of this, from the bombings blamed on children wearing fright wigs to illegal aliens to mosque bombings to mail bombs and beyond.

ALL of this comes back to the US military, mostly out of District 7 (Miami).  This is Debbie Wasserman-Schulz' land (Ft. Lauderdale).  The Austin, TX mix is a mess of CIA "cults" and ANTIFA-style "militias" run and infiltrated by FBI, DHS, CIA, and other Federal agencies.  It also has ties to gang activity, most of whom were responsible for the burnings of historic black churches in the run-up to the 2016 election.

Disregard the Democrat/Republican Hegelian Dialectic; most of their marks suffer from psychiatric issues, and are easily controlled.  The rest (also crazy AF) are either gang-related or being directed through an adherence to identity politics.  This is more specific to black gangs and organizations, but not isolated to them.

(* 
 Speaks the  date and time of day

 Copyright 2008 Apple Inc. All rights reserved.

 You may incorporate this Apple sample code into your program(s) without
 restriction.  This Apple sample code has been provided "AS IS" and the
 responsibility for its operation is yours.  You are not permitted to
 redistribute this Apple sample code as "Apple sample code" after having
 made changes.  If you're going to redistribute the code, we require
 that you make it clear that the code was descended from Apple sample
 code, but that you've made changes.
 *)

on isVoiceOverRunning()
set isRunning to false
tell application "System Events"
set isRunning to (name of processes) contains "VoiceOver"
end tell
return isRunning
end isVoiceOverRunning

on isVoiceOverRunningWithAppleScript()
if isVoiceOverRunning() then
set isRunningWithAppleScript to true
-- is AppleScript enabled on VoiceOver --
tell application "VoiceOver"
try
set x to bounds of vo cursor
on error
set isRunningWithAppleScript to false
end try
end tell
return isRunningWithAppleScript
end if
return false
end isVoiceOverRunningWithAppleScript

set currentDate to current date
set amPM to "AM"
set currentHour to (currentDate's hours)
set currentMinutes to currentDate's minutes

if (currentHour ≥ 12 and currentHour < 24) then
set amPM to "PM"
else
set amPM to "AM"
end if

--  make minutes below 10 sound nice
if currentMinutes < 10 then
set currentMinutes to ("0" & currentMinutes) as text
end if

--  ensure 0:nn gets set to 12:nn AM
if currentHour is equal to 0 then
set currentHour to 12
end if

--  readjust for 12 hour time
if (currentHour > 12) then
set currentHour to (currentHour - 12)
end if

set currentTime to ((currentDate's month) as text) & " " & ((currentDate's day) as text) & ", " & (currentHour as text) & ":" & ((currentMinutes) as text) & " " & amPM as text

if isVoiceOverRunningWithAppleScript() then
tell application "VoiceOver"
output currentTime
end tell
else
say currentTime
delay 2

end if

© Copyright 2018, The Cyberculturalist


Sunday, April 8, 2018

http://162.114.1.6/beastweb/webprelog.dll/0735rkj1y7mk2x1gpplur0b4sp5c/

We Don't Need Warrants
We Don't Need Warrants
Keep in mind that these people are under indictment, but obviously not surveillance.  We'll have a list of Russian fly-bys by Russian, Iranian, and Chinese helicopters over the last several years coming up eventually (before or after we're disappeared, incarcerated, or dead) because it was definitely North Koreans and Russians and Chinese and Iranians who did all of this -- not at all "rogue" Federal agents working in tandem with "rogue" Federal agencies and "rogue" operatives out of Ft. Lauderdale, FL on behalf of the Democratic National Committee.

These "rogue" Iranians, Russians, Chineses, and also North Koreans are also responsible for the BitCoin heist (activist bitches), as well as the Skripal poisoning, the Austin bombings, Holly Bobo's disappearance, and a host of other terrorist acts.

No one has contacted us about any of this -- why would they?  They're the ones doing it, and they're the ones covering it up.

http://162.114.1.6/beastweb/webprelog.dll/0735rkj1y7mk2x1gpplur0b4sp5c/
(The purple only shows when you go directly to the site; the rest is all that appears in the browser.)
https://pastebin.com/Dwu7C2kH
file:///Library/WebServer/share/httpd/manual/server-wide.html

Some interesting search results include, "What Happens if You Get a Felony Conviction?" and "What Happens When You Act as Your Own Lawyer."  

I understand a full, written confession was made on Medium.com earlier, then endorsed by Twitter (which suspended our account after it said it "may have been accessed by third parties"), but I haven't read it because I don't read terrorist manifestos.  I have hardly used Twitter in the last 10 years because it endorses and enables Federal gangstalking, but I have had at least two Twitter accounts for 10 years and only been the victim of this kind of terrorist activity, never the instigator.

The tire track in the front yard may come in handy one day, and it will lead directly back to Federal officers -- ahem, "rogue" Federal officers -- and construction companies whose bridges have a bad habit of failing.  

The AL address may be a red herring, as the actual address all of this leads back to is US-1 out of Ft. Lauderdale, FL.  If we aren't dead or worse, we'll explain all about Austin, TX, too.

Chaseville, NY was rerouted through Holladay, TN for several months.  It was spoofing out of the Ukraine, as well.  We mentioned this -- and the fact that all of the Twitter ISIS accounts lead back to the UK, and a couple of burned buildings over there -- the day before our account was suspended.

From the files of tinfoil hat black helicopter conspiracy theorists.

© Copyright 2018, The Cyberculturalist

Saturday, April 7, 2018

VoiceOver Screenshot to Mail.applescript

FBI, DHS, DNC
FBI, DHS, DNC
MOAR Federal gangstalking and illegal surveillance.  Add this to the many methods by which they are illegally accessing our network, system(s), and accounts.  This VoiceOver Screenshot to Mail.applescript was found under Library/VoiceOver and cannot be unlocked, so it cannot be removed.

This is how they were sending messages as though they came from the Ukraine, as well as the mail bombs.  Yes, US Federal agents under contract to the DoD are responsible for the bombings; they were sent from a USPS post office in Maryland, just across the river from Chaseville, NY.  This has to do with Silk Road, drugs, "illegal aliens," and a lot more other stuff in which high-ranking FBI, DHS, DoD contractors, and State-level actors are involved (specifically in and around Tennessee).

Earlier, they set a fire in Trump Tower as a false flag; they are trying their very best to blame all of this on "Leftists" who "hate Trump."  If the FBI were not directly involved in covering-up what happened in Las Vegas (OCT - Operation: Credible Threat by Honeywell), they would have spoken to us directly, as several of their message exchanges with someone who may or may not have been Stephen Paddock were routed through this system in a similar fashion.

Earlier in the week, local police staged an Active Shooter Drill at the Decatur County General Hospital, which the County sold to a private group out of Nashville, TN during an "Emergency Meeting" broadcast live on Nashville local news.  That private company is set to takeover the hospital this month, and may already have done so.  Footage from that ASD will be used later for media cover-up.  I may or may not be the target for the assassination.  

I don't own a gun, much less a cache of them, nor am I involved in any of this in any way -- other than that they have been routing this all through my and my familys' network and communications devices for years now.

The same State actors working under orders from District 7 (Miami, Ft. Lauderdale) kidnapped, and may have murdered, Holly Bobo.  See Debbie Wasserman-Schulz and the USAF base in Ft. Lauderdale for more information on her whereabouts.  The DHS did this, specifically.

1-55521-807-5


(* 
Takes a screenshot of what is in the VoiceOver cursor and adds the 
image as an attachment to a new Mail message

Copyright 2008 Apple Inc. All rights reserved.

You may incorporate this Apple sample code into your program(s) without
restriction.  This Apple sample code has been provided "AS IS" and the
responsibility for its operation is yours.  You are not permitted to
redistribute this Apple sample code as "Apple sample code" after having
made changes.  If you're going to redistribute the code, we require
that you make it clear that the code was descended from Apple sample
code, but that you've made changes.
*)

global screenshotPath

on isVoiceOverRunning()
set isRunning to false
tell application "System Events"
set isRunning to (name of processes) contains "VoiceOver"
end tell
return isRunning
end isVoiceOverRunning

on isVoiceOverRunningWithAppleScript()
if isVoiceOverRunning() then
set isRunningWithAppleScript to true
-- is AppleScript enabled on VoiceOver --
tell application "VoiceOver"
try
set x to bounds of vo cursor
on error
set isRunningWithAppleScript to false
end try
end tell
return isRunningWithAppleScript
end if
return false
end isVoiceOverRunningWithAppleScript

set screenshotPath to ""

if isVoiceOverRunningWithAppleScript() then
tell application "VoiceOver"
tell vo cursor
set screenshotPath to grab screenshot
end tell
end tell
else
display dialog "VoiceOver must be running with AppleScript support enabled"
return
end if

tell application "Mail"
set newMessage to make new outgoing message with properties {visible:true, subject:"VoiceOver Cursor Screenshot", content:"VoiceOver Cursor screenshot:" & return & return}
tell newMessage
tell content
make new attachment with properties {file name:screenshotPath} at after last paragraph
end tell
end tell
end tell

© Copyright 2018, The Cyberculturalist