Sunday, May 20, 2018

Yanny or Laurel, It's to Hack Your Voice Controlled Devices

Bibi
Bibi
Just like "The Dress," the Yanni/Laurel audio file helps Media Intelligence Agencies (MIA) better hack your voice controlled devices.  Keep in mind that the ISraeli US Intelligence Services (US IS) are actual supervillains, intent on capturing, detaining, and murdering those who dissent.

Keep this in mind, because they are not recording your conversations so much as your voice.

Not that there aren't super shitbags from every nation, corporation, and country, working overtime to help them out.  For example, the latest outbreaks actually were from Chinese-speaking operatives... who work in the entertainment industry, and also for the US Federal Government.  Recently, they forcibly removed one of these heinous, tiger bitches from a plane, then forced everyone on board to sign a NDC (No Death Certificate).

They put another into office.

Everything bad leads full circle back to ISrael the US.

© Copyright 2018, The Cyberculturalist


Monday, April 23, 2018

New Item Alert - Folder Scripts

This script was found in /Library.  Apparently, it alerts a remote user as to when a new item has been added in a folder, and what that item is:


(*
add - new item alert

This Folder Action handler is triggered whenever items are added to the attached folder.
The script will display an alert containing the number of items added and offering the user
the option to reveal the added items in Finder.

Copyright © 2002–2007 Apple Inc.

You may incorporate this Apple sample code into your program(s) without
restriction.  This Apple sample code has been provided "AS IS" and the
responsibility for its operation is yours.  You are not permitted to
redistribute this Apple sample code as "Apple sample code" after having
made changes.  If you're going to redistribute the code, we require
that you make it clear that the code was descended from Apple sample
code, but that you've made changes.
*)

property dialog_timeout : 30 -- set the amount of time before dialogs auto-answer.

on adding folder items to this_folder after receiving added_items
try
tell application "Finder"
--get the name of the folder
set the folder_name to the name of this_folder
end tell
-- find out how many new items have been placed in the folder
set the item_count to the number of items in the added_items
--create the alert string
set alert_message to ("Folder Actions Alert:" & return & return) as Unicode text
if the item_count is greater than 1 then
set alert_message to alert_message & (the item_count as text) & " new items have "
else
set alert_message to alert_message & "One new item has "
end if
set alert_message to alert_message & "been placed in folder " & «data utxt201C» & the folder_name & «data utxt201D» & "."
set the alert_message to (the alert_message & return & return & "Would you like to view the added items?")
display dialog the alert_message buttons {"Yes", "No"} default button 2 with icon 1 giving up after dialog_timeout
set the user_choice to the button returned of the result
if user_choice is "Yes" then
tell application "Finder"
--go to the desktop 
activate
--open the folder
open this_folder
--select the items
reveal the added_items
end tell
end if
end try

end adding folder items to

Keep in mind that many of these pernicious intrusions target system files that are supposed to be there, and are otherwise innocuous.  This one came to my attention as it had been recently accessed.  That may be normal, but I've never seen any of these commands or options before, during, or after adding anything to a folder, so I cannot say.  I also don't use Scripting, but this may have been installed by a third-party program for reasons unknown.

Calls to Apple Customer Support were continually re-routed by the automated system, which kept prompting me to enter a contact number.  I eventually reached a voice mailbox, and have not received a return call.

© Copyright 2018, The Cyberculturalist

Monday, April 16, 2018

Modem Scripts and The Dress

The Dress Modem Scripts
The Dress Modem Scripts
Remember "THE DRESS?"  The real point of that exercise was to discover the calibrations of peoples' systems then, in some cases, get them to change them.  It may have been used to determine who was using which system and OS, but the larger operation was to embed system files as though they were color files.

These are Modem Scripts posing as color files.  I don't know how they work, but they may have something to do with KEXT files and RAID servers (military).  This was all done under Obama, not Trump, and under Obama's direct orders (and a lot of it really was).

This leads to something known as the Five Divisions, or Five Eyes.  Allegedly a law enforcement agency, Five Divisions is an Old Testament reference leading directly to AIPAC/CFI-backed, far-right, paramilitary units -- including the EDL and JDL.  Five Eyes operatives were also found to manufacture and distribute child pornography, and several have been arrested in conjunction with cryptocurrency crimes, and the Silk Road fiasco.

These are War Crimes constituting Sedition and High Treason.

© Copyright 2018, The Cyberculturalist


Wednesday, April 11, 2018

Variety.com Returns the Following

Variety.com
Variety.com
We don't work for Variety, nor have we ever.  About a year ago, maybe more, we found that someone working for or contributing to Variety (or possibly just hacking their RSS and/or system, in general) had hacked TheWeirding.NET.  I don't know any contributors or "tipsters" for Variety (that I'm aware of), nor have I ever commented on its site (that I recall).  I didn't even know Variety was a WordPress site.

The DNS re-routing, or IP blocking, is similar to that we experienced when we tried accessing the "official" Sandy Hook report.

We don't own TheWeirding.COM, nor have we ever -- it was hijacked by a Chinese firm which tried to extort us going back some 10 years or more.  The only thing we've ever seen on there is a picture of a dollar sign, but I haven't checked it in years.  The ownership reverted to a firm out of Texas, then Arizona, a few years back -- that may have been Integrated Systems, or ISIS, but we can't confirm that.

In the last few years, Variety has become a vocal mouthpiece for the Democratic National Committee, and Hillary Clinton in particular.  Its primary focus has been on politics, especially politics that have nothing to do with showbusiness.  It is often an extremely vocal advocate for "diversity" in all sectors, not just showbusiness.

I have no idea why my IP address would be blocked from Variety, but it may be for the best...

© Copyright 2018, The Cyberculturalist


Monday, April 9, 2018

Time of Day.applescript

MOAR Federal gangstalking techniques.  This appears to be a method by which they can change the Time of Day remotely using a VoiceOver Time of Day.applescript found in Library/VoiceOver.  Another possibility is that it merely does as it states, and speaks the time of day for recording devices planted in the house or on other electronic devices.

Watch Deerfield, Illinois in coming weeks for a false flag event.  One of their schools is literally DHS-media.org!  Another is named South Park (Church of Scientology, though this may be a red herring, as Federal agencies are directly and specifically involved).

Both the DHS and FBI are orchestrating these events, and there appears to be some kind of rift in their communities.  But make no mistake about it: Elements within both organizations are directly responsible for all of this, from the bombings blamed on children wearing fright wigs to illegal aliens to mosque bombings to mail bombs and beyond.

ALL of this comes back to the US military, mostly out of District 7 (Miami).  This is Debbie Wasserman-Schulz' land (Ft. Lauderdale).  The Austin, TX mix is a mess of CIA "cults" and ANTIFA-style "militias" run and infiltrated by FBI, DHS, CIA, and other Federal agencies.  It also has ties to gang activity, most of whom were responsible for the burnings of historic black churches in the run-up to the 2016 election.

Disregard the Democrat/Republican Hegelian Dialectic; most of their marks suffer from psychiatric issues, and are easily controlled.  The rest (also crazy AF) are either gang-related or being directed through an adherence to identity politics.  This is more specific to black gangs and organizations, but not isolated to them.

(* 
 Speaks the  date and time of day

 Copyright 2008 Apple Inc. All rights reserved.

 You may incorporate this Apple sample code into your program(s) without
 restriction.  This Apple sample code has been provided "AS IS" and the
 responsibility for its operation is yours.  You are not permitted to
 redistribute this Apple sample code as "Apple sample code" after having
 made changes.  If you're going to redistribute the code, we require
 that you make it clear that the code was descended from Apple sample
 code, but that you've made changes.
 *)

on isVoiceOverRunning()
set isRunning to false
tell application "System Events"
set isRunning to (name of processes) contains "VoiceOver"
end tell
return isRunning
end isVoiceOverRunning

on isVoiceOverRunningWithAppleScript()
if isVoiceOverRunning() then
set isRunningWithAppleScript to true
-- is AppleScript enabled on VoiceOver --
tell application "VoiceOver"
try
set x to bounds of vo cursor
on error
set isRunningWithAppleScript to false
end try
end tell
return isRunningWithAppleScript
end if
return false
end isVoiceOverRunningWithAppleScript

set currentDate to current date
set amPM to "AM"
set currentHour to (currentDate's hours)
set currentMinutes to currentDate's minutes

if (currentHour ≥ 12 and currentHour < 24) then
set amPM to "PM"
else
set amPM to "AM"
end if

--  make minutes below 10 sound nice
if currentMinutes < 10 then
set currentMinutes to ("0" & currentMinutes) as text
end if

--  ensure 0:nn gets set to 12:nn AM
if currentHour is equal to 0 then
set currentHour to 12
end if

--  readjust for 12 hour time
if (currentHour > 12) then
set currentHour to (currentHour - 12)
end if

set currentTime to ((currentDate's month) as text) & " " & ((currentDate's day) as text) & ", " & (currentHour as text) & ":" & ((currentMinutes) as text) & " " & amPM as text

if isVoiceOverRunningWithAppleScript() then
tell application "VoiceOver"
output currentTime
end tell
else
say currentTime
delay 2

end if

© Copyright 2018, The Cyberculturalist


Sunday, April 8, 2018

http://162.114.1.6/beastweb/webprelog.dll/0735rkj1y7mk2x1gpplur0b4sp5c/

We Don't Need Warrants
We Don't Need Warrants
Keep in mind that these people are under indictment, but obviously not surveillance.  We'll have a list of Russian fly-bys by Russian, Iranian, and Chinese helicopters over the last several years coming up eventually (before or after we're disappeared, incarcerated, or dead) because it was definitely North Koreans and Russians and Chinese and Iranians who did all of this -- not at all "rogue" Federal agents working in tandem with "rogue" Federal agencies and "rogue" operatives out of Ft. Lauderdale, FL on behalf of the Democratic National Committee.

These "rogue" Iranians, Russians, Chineses, and also North Koreans are also responsible for the BitCoin heist (activist bitches), as well as the Skripal poisoning, the Austin bombings, Holly Bobo's disappearance, and a host of other terrorist acts.

No one has contacted us about any of this -- why would they?  They're the ones doing it, and they're the ones covering it up.

http://162.114.1.6/beastweb/webprelog.dll/0735rkj1y7mk2x1gpplur0b4sp5c/
(The purple only shows when you go directly to the site; the rest is all that appears in the browser.)
https://pastebin.com/Dwu7C2kH
file:///Library/WebServer/share/httpd/manual/server-wide.html

Some interesting search results include, "What Happens if You Get a Felony Conviction?" and "What Happens When You Act as Your Own Lawyer."  

I understand a full, written confession was made on Medium.com earlier, then endorsed by Twitter (which suspended our account after it said it "may have been accessed by third parties"), but I haven't read it because I don't read terrorist manifestos.  I have hardly used Twitter in the last 10 years because it endorses and enables Federal gangstalking, but I have had at least two Twitter accounts for 10 years and only been the victim of this kind of terrorist activity, never the instigator.

The tire track in the front yard may come in handy one day, and it will lead directly back to Federal officers -- ahem, "rogue" Federal officers -- and construction companies whose bridges have a bad habit of failing.  

The AL address may be a red herring, as the actual address all of this leads back to is US-1 out of Ft. Lauderdale, FL.  If we aren't dead or worse, we'll explain all about Austin, TX, too.

Chaseville, NY was rerouted through Holladay, TN for several months.  It was spoofing out of the Ukraine, as well.  We mentioned this -- and the fact that all of the Twitter ISIS accounts lead back to the UK, and a couple of burned buildings over there -- the day before our account was suspended.

From the files of tinfoil hat black helicopter conspiracy theorists.

© Copyright 2018, The Cyberculturalist