Premium Only Content

FUSION CENTERS USE ‘CRYPTONYMS’ TO IDENTIFY COMMUNITY BASED AGENTS, INFORMANTS & PERPETRATORS
Cryptonyms are code names or code words used by Fusion Centers to secretly refer to or covertly identify projects, operations, personnel, etc.
Each cryptonym may contain a single or multiple character prefix called a digraph, which designates a geographical, operational or functional area of operation or expertise
The rest of the word or words they use in the Cryptonyms are either arbitrary syllables and vowels or occasionally the digraph and the cryptonym combine to form a single word (e.g. AEROPLANE) or can be read out as a simple phrase (e.g., WIBOTHER, read as "Why bother!") to designate the sequence of those operations, projects, personnel, and so on
The cryptonym 'COEXIST' is a good example of many such call signs and code words that are used by Fusion Centers to help identify their informants, provocateurs, perpetrators, etc., and to help those perpetrators identify each other without giving away their status as a perpetrator to legitimate victims or the public at large
Proceed with extreme caution with the group organizers, moderators, etc and so many others who inject constantly into the support groups or activist groups attempting to always keep talking and thereby control the narrative or activities of other targeted individuals.
You will know them by their fruit. You can most certainly judge a book by its cover. Ask yourself why its the same people always talking, or directing the activities of the situations & conversations of targeted individuals? Why don’t they ever shut up? Are they a cognitive researcher? Do they he have a background in Psychology, Cognitive Research, etc?
The government contractors which are targeting innocent people must keep their victims inside a controlled environment, either tangibly (Floating Box) or electronically. This means they must constantly be the ones who are the nexus and generator of the conversations and situations with support group and activist meetings of targeted individuals.
They are good examples of those perpetrators and provocateurs who are constantly setting themselves in place to tangibly or electronically continually inject into the center of each and every targeted Individual group meeting, conference call, situational & conversational scenario, etc..
This is exactly what the government perpetrators must do or their technology fails. They must always be the center of attention as moderators, coordinators, etc,, because the technology demands VERIFICATION of the synaptic responses of each victim which can only be achieved when the targeted Individuals in the conversation or situation are inside a controlled environment.
If the cognitive researchers don’t directly inject into the support group then they use others to do so, like the support groups in other European Countries which are totally overrun with perpetrators, like Warsaw Poland
So they will use specific people to do this as they must be the ones to constantly capture the attention of targeted Individuals. They cannot allow random and chaotic circumstances or events to repeatedly control the conversations and situations that are developing. It disrupts their technology by disrupting the VERIFICATION PROCESS
Without the victims response to their specific stimuli, conversational or situational, integration completion between the victims Brain and the RNM Supercomputer is hindered which causes VERIFICATION to fall apart and mind control technologies fail.
All the Targeted Individual support groups around the world are either controlled or infiltrated from the top down by government informants and perpetrators.
The fact that certain people are constantly placing themselves at the center of attention in each targeted Individual protest, conference, meeting, etc., is very bad news for victims of this technology. Something is very wrong. Repetitive Patterns are bad news for targeted Individuals. Very bad news
They use these pseudo-independent advocates of to control, infiltrate, and manipulate information and to 'WARP' online or active discourse and online or real time activism through Disinformation (lies) and Misinformation (half-truths) by engaging in cyber offensive” techniques and tactics against those who try and expose the truth
The Shadow Government monitors and influences the internet communications of online groups and covertly infiltrates online communities with Government Informants and Perpetrators turned into Provocateurs in order to sow dissension and disseminate false information
With Mind Control technologies the objectives are not only to sow dissension and disseminate false information but to 'cognitively infiltrate” online groups for the purpose of training research and development and to discredit anyone who speaks out that it is happening
-
1:02:26
The Nick DiPaolo Show Channel
9 hours agoPOC Murders Another White Woman | The Nick Di Paolo Show #1790
42.3K57 -
2:04:29
Inverted World Live
5 hours agoNew UFO Hearing Testimony: Lockheed Martin Has Alien Technology | Ep. 105
55.6K8 -
LIVE
Akademiks
3 hours agoYNW Melly MIGHT BE COOKED! Co-D TELLLING? 6ix9ine vs Young Thug . Drake vs Kaicenat? HOLLY
1,390 watching -
LIVE
Drew Hernandez
9 hours agoHORRIFYING: FULL FOOTAGE OF IRYNA ZARUTSKA MURDER HAS BEEN RELEASED
970 watching -
2:42:09
TimcastIRL
5 hours agoNATO Scramble Air Force Over Russian Incursion Into Poland, HIGH ALERT Reported | Timcast IRL
156K86 -
25:46
Man in America
9 hours agoALERT: Gold Prices FLASH OMINOUS WARNING for the Dollar—Are You READY??
21.3K15 -
58:27
Sarah Westall
5 hours agoWar Exploding Around the World: Nepal, Israel, Qatar, Venezuela, Thailand, more... w/ Michael Yon
27.6K10 -
LIVE
SpartakusLIVE
7 hours agoThe Most INSANE Snipes EVER || Solo to Duos w/ StevieT - PUBG or Mordor Later?!
354 watching -
1:11:40
Flyover Conservatives
15 hours agoThe Truth About Israel & End Times Nobody Wants to Say - Phil Hotsenpiller | FOC Show
31K10 -
LIVE
GritsGG
4 hours agoSweaty Ranked Grind! Most Wins in WORLD! 3600+!
161 watching