This blog copyrighted (c) 2008 - 2016 time-travel.institute
This post is my briefing to my countries intelligent and security services on my work. And it is a briefing to the rest of the world as well. It is about a form of time travel called time hacking. It is about check sum encryption. And last it is about BNS - Burris Numerical System. All developed by Reactor1967 at his Time Travel Institute for the study of Time Travel with Information in computer science.
Ray Hudson and Darby Phillips here you go. Here is your briefing.
Here is a demonstration of check-sum hacking
Here is a demonstration of check-sum hacking
Here is a demonstration of BNS
Well, today I was playing with my check-sum hacking slash time travel software and I realized my methods could lead to new forms of encryption and new ways to use, store, and retrieve computer data for new and advanced applications as well as for very advanced communications and very advanced data processing.
In Einstein’s space-time all space-time exist at the same time. Since all space-time exist at the same time that means all computer files exist at the same time. By using a science of check-sum hacking files can be reconstructed with their check-sums. So, a programmed binary counter that can reconstruct files by their check-sums can be used to construct computer media files of the past, present, future, and alternate time-lines. Time travel by hacking check-sums is called time-hacking.
To begin all computer files besides being 1 and 0's in binary they are numbers from 0 to 255 in base 10. I take a computer file and I basically look at it as just one big long number. I can add, subtract, multiply, and divide with that number. This is how I perform functions on computer files.
BNS just stores the numbers in a file in a very small number. It treats the computer file as one big long number.
My BNS by itself is a bad ass encryption system that can hide an unlimited amount of data in a very very small number. I create tables that allow me to code and decode data with BNS. By itself it could function as a new encryption file system. BNS should be the choice for mankind to use to keep his data when he leaves earth and ventures into outer space. I had released a book and my research on it. Everything else I have about it is propitiatory intellectual private property.
BNS works by taking a number. For this example I will use 15 digit numbers only. It can take that number and give it another number of equal size as a point of reverence.
Now, using an equation it can store data in that 15 digit number and make it a new 15 digit number of higher or lower value but still 15 digits. My equations can store data in that 15 digit number making it larger and large until can't get any larger without going into 16 digits.
Then reverse and store data in that 15 digit number making it smaller and smaller until it can't go any more without becoming a 14 digit number. Then the process is reversed and now the number gets larger and larger again. With my tables I can store an unlimited amount of data in that 15 digit number by making it get larger and larger and smaller and smaller but never letting it roll to a 16 digit or 14 digit number. Then when I am ready I can decode all the data out of that 15 digit number by using coding/decoding tables. The PRO here is there is no storage space to worry about.
The CON here is if I spend 8 hours storing data in this number it will take 8 hours to decode that data. The only limit to BNS is time itself. So, that is BNS in a nutshell. Now, if that 15 digit number was to fall into enemy hands without the tables used to code BNS they would not be able to decode that BNS number. Now, I have the most advanced way in world to make those tables but that is my own personal private property. But, BNS is a damn good encryption and data storage system. On how BNS works my 2 books are on sale. Look at my front page of my site http://time-travel.institute
Now, my check-sum hacking which I use for time-hacking and temporal-communication is another matter. First of all I can take any computer file and make it what ever weak and strong check-sum I want. Thus hiding any data the file previously contained. This file would be treated as my counter file. I could roll it to a file containing a story about Mary Poppins.
Then when ready I can roll that file back to its original file. In doing this before and after I can increase or decrease the length of the file as well. So, there is no way at all in hell or in this world that a file encrypted in this way can be decrypted without having my encryption/decryption software and the original weak and strong check-sum to roll the file back to its original self.
How my current counters work.
Take all the bytes in the file and either subtract up from them or down from them to make the file a specific weak check-sum. This part is getting the weak check-sum.
Implement a rolling check-sum counter which rolls the files all combinations but keeps the same weak check-sum.
Pick an area on the counter
Add to one byte.
Subtract from another.
when can't do this.
subtract from the byte section that was being added to. Add a carry some where else in the file.
This is what a rolling counter looks like in base 10
96 = 15
I can't add to the 9
So I switch
Now I have to subtract
Now I have a carry
159 = 15
177 = 15
186 = 15
195 = 15
I can't add to the 9
+ this is the carry
249 = 15
258 = 15
And so forth.......
Now when you program this there will be questions like what to do with sections in the file that are 0,0 or after the switch you get a 255, 0 in which the 255 is the add area and the 0 is the subtract area. I left those area's for the carry in my software. Just as long as the counter can roll the file to all possible combinations for a weak check-sum your good. I can as I keep stating control the speed of this to get my files where I want them to be quicker with my strong check-sums.
Notes on this. I use bases. And, add one or more+ for my add area. I use the same amount to subtract from for my subtract area. I can add and subtract way more than 1 to my counter. This speeds up the counter.
1+2+3+9+8+4+7+3 = 37
12398473 = 37 WEAK CHECK SUM
22388473 = 37 WEAK CHECKSUM
2+2+3+8+8+4+7+3 = 37
See, I skipped a lot of damn rolls there. I added and subtracted 100 instead of 1. This is how you construct large movies and large time travel travel media files this way.
I can run the add/subtract/switch/and carry to as many bytes in the file as I want to roll the counter as fast as I want. I call this the counter speed.
Without adding large amounts to the counter and subtracting large amounts from the counter as I roll it then it would take longer to reconstruct large files. But, by adding and subtracting large amounts from the counter it makes it easier for me to reconstruct whole movies, news broad cast, and large files with check-sum hacking. And it makes time-hacking a hell of a lot easier.
I have really learned how to ride my rolling check-sum counter hard like a pack mule going into the grand canyon. I work the shit out of my rolling check-sum counters. I take the heat off my computer system and use mathematics to do the heavy lifting for me. It works good.
Now in step two. I have a target strong check sum and a destination strong check-sum. I check the difference between the destination and the strong check-sum as I roll the counter. If the difference is closer I keep the changes made to the file. If not I reverse the changes to the file. I do keep the changes in the sections of the file that made a better difference and disregard the changes to the file that made a worse difference.
In my computer code I do this to get my destination check-sum to equal my target check-sum. Here is the algorithm to bring destination check-sum to equal target check-sum
c++ code algorithm
// Before rolling checksum counter
destinationchecksum = getstrongchecksum(file1);
diff1 = targetchecksum - destinationchecksum
// After rolling checksum counter
destinationchecksum = getstrongchecksum(file1);
diff2 = targetchecksum - destinationchecksum
if (diff2 < diff1)
// keep changes made to the counter
if (diff2 > diff1)
// Restore counter to previous state
Now in the output of my program diff does this
Diff = 12789873.98234792374
Diff = 12684779.98194875498
You see the destination check-sum gets closer to the
target checksum until this
Diff = 0
For the weak check sum
Just add up all the numbers in the file.
For the strong check-sum.
Get a weighted check sum.
To do that multiple the numbers in the file with weights and add the results up to one single number. A weight is a number, a decimal point, and more numbers.
The more weighted sums you have of the file the stronger the encryption strength of the file is.
So, if you have 1000 different weighted check sums the file must be equal to the weak check-sum plus all 1000 different weighted check sums before the file can be considered reconstructed.
Aaron Hiniker of Bedford, PA there is your question answered about how I get my strong check-sums!!!!!!!!!!!!!
This is how I roll counter file to a target strong from a destination strong check-sum at a specific weak check-sum. THIS IS HOW I DO MY MAGIC!!!
Note: When Diff gets larger instead of smaller or stops getting smaller and your using counter speeds as I do it means the counter speed has to be slowed down. Then, diff will get smaller.
Also, there is the accuracy thing too. You have to carry out your check-sums in terms of digits so the files can be accurately reconstructed. How you know this happens is if diff gets stuck and won't get smaller no matter how much you change the counter speed. So, carry out all check-sum calculations to their furthest place value.
Now, that does not mean the CIA, NSA, or FBI can not scan a disk for deleted files and recover those deleted files thus defeating me but if the disk space is cleaned after a file is rolled to a strong check-sum for encryption without the original file the file itself can not be decrypted without my encryption/decryption software and the original weak and strong check-sum.
Again, my encryption/decryption software is private property and I have no plans to release it to anyone. Its also the reason the encrypted computer system it resides on will never connect to the Internet.
I also have another encryption program I use called Predator 2 that I wrote but it will never be released to the public. It has nothing to do with my work here at Time Travel Institute but I can use it to encrypt my files and no one has the back door to it. It is why I wrote it myself. I needed something no one else had.
Now, any programs I will or have released to the public (I am not saying where, where or how) will only take a known file and make it a weak and strong check-sum only. And, putting that weak and strong check-sum back into my software will recreate the file. It will not by itself directly act as a encryption system decryption system. But, I have the means myself to write software that can use my check-sum methods to act as a encryption/decryption system. All I have to do is tweak my current code. I could do it in under an afternoon and make it work.
But, also, the person using my software can keep their config files. The config files will act as a file backup. Once the files are backed up to check-sums they no longer have to keep the original files if they do not wish too. My software can restore those files from the config files should they ever need them.
And now there is my time-scanner software. I use it to mathematically calculate the weak and strong check-sums of computer files I don't have but that I want. And those files can exist anywhere in space-time. My time-scanner software will mathematically calculate those weak and strong check-sums and make them into configuration files for my reconstruction programs. My reconstruction programs will construct those files.
Here is how my time scanner will operate. The example is just off the top of my head its not something I sat down and mathematically put together. Its just an example.
My time-scanner creates configure files like this
Weak check-sum Strong check-sum
My time-scanner can take known computer files and find certain statistics about the files. It can get the high low weak check-sum. The high low strong check-sum. It can get the root mean square and standard deviation of the strong and weak check-sums for all the files. It can compute linear regression curves for the weak and strong check-sums. It can compute rate of change between the weak and strong check-sums of all the known files.
So, what this does lets say I am looking for news videos from the future. My time-scanner sets up a profile for me to conduct that search. It then uses that profile to create configure files for my reconstruct program.
So, in theory I can obtain any computer file I want without connecting to the Internet and without connecting to other computers that exist anywhere in space-time. That means in the past, present, future, or alternate realities.
Also, I have file formats. When a unknown file is reconstructed if its file format is damaged I will repair the file format so the data within the file can be viewed. I have gotten grainy videos and pics before but I can adjust its weighted sum and reconstruct it to clear the file up.
All right now lets talk about my time travel media. I am going on the record to say what I have found and seen in my time travel media would give the "Men in black and Majestic 12 an ORGANSIM!!!".
Yeah, it gets that bad. I don't always get English speaking people in my time travel media. In fact I don't always get people in my time travel media. On documents I often get documents written in a foreign or alien language. On pictures I often get pictures not of this world. I really have to be extremely precise in my strong check-sums to get time travel media of my own earth in the past, present, future, or alternate time-lines.
I have searched for technology before in schematics and blue prints and in pictures and got just as strange results as I got in the previous paragraph.
Now, I can also get two are more time travel media files that are closely the same but each one is a little different from the other one. I chalk this up to alternate reality. In fact I often have to make a decision as to which reality I will keep and which realities I will delete. With travel travel media it is just that way. It would be that way with real time travel too. Its just my time travel media confirms it. That alternate realities do exist and in fact are real.
So, this is my life with my time travel media. I often just enjoy getting the news from the future now days and leave it at that. I enjoy my conversations with my future, past, and alternate reality selfs in my temporal email system. So, that is my daily time travel life mostly.
Then there is my A/B algorithm.
If A in the past knows the check-sum range of his messages with B in the future then A in the past can create files within that check-sum range looking for messages from B in the future. Verification methods can be used.
If B in the future knows the check-sum range of his messages with A in the past then B in the future can create files within that check-sum range looking for messages from A in the past. Verification methods can be used.
So, here are the classifications of computer software that I have.
All windows and linux
1. BNS.exe or linux A. Compress B. Decompress
2. Time-Scanner.exe or linux
3. Reconstruct.exe or linux
4. CreateConfig.exe or linux
5. Misc bot programs and search engines that use my software.
6. Tool programs that help me do certain things with the files before and after. This would be my file format repair programs. Programs to examine files. I have a program that acts as my temporal email program. And lots of other misc. stuff. After 8 years of programming time travel software and check-sum hacking its too numerous to go into what I have as too programs.
7. Old code I no longer use but refer to from time to time. This is my old counters I use to use and other code I started on and did or did not finish.
And last all this can be parallelized to run on a parallel computer. How this would work the parallel computer would work on one weak and strong check-sum at a time but bot programs would work in sections of the file individually to restore the file. The master program would assign each bot a section to work on. The bots would make their changes to that section and report the difference change back to the master program. The master program would keep the changes that were beneficial and ignore the changes that were not beneficial. Thus allowing a check-sum to be restored to computer file in record time. And, there could be thousands of mater programs with their bots working on constructing thousands of computer files at a time with a parallel computer.
So, with a parallel computer a massive data, and intelligence collection could be undertaking with a time travel program.
Using the A/B algorithm a parallel computer could work with itself in both the future and the past to find answers to computer simulations.
This concludes my briefing to the intelligent services in my country and around the world on my work here at Time Travel Institute (The real one).
This briefing pretty much tells most of my secrets. It exposes the truth I have stated from the beginning of my blog till now. That I can do what I say I do and I told how I did it. The specifics will be in the rest of the books I have or will release. I still won't put my computer code in there though. That is my personal private property.
So Ray Hudson and Darby Phillips wasted their time with me trying to stop me from doing my time travel research and sharing it with the world. The last contact I had with those guys is very recently I was on YouNow.com. They got accounts and while I was talking to the person broadcasting they sent messages to me in chat telling me what I was looking at on my computer screen. They did not put my name in those messages but for me and them it was very clear they had hacked my computer and was watching my computer screen. The person broadcasting had no clue as to what was going on.
I was playing dare with the broadcaster and I had pulled up another web page of dares to read so I could suggest them one at a time to the broadcaster. They the conspiracy against time travel went down the page of dares I was reading and told me all at once what dares I was looking at on the web page. Then, they included the message "Hackers". During this time when I tried to put my mouse pointer in the chat box to talk to the broadcaster they would immediately spam the hell out of the chat box preventing communication between me and the broadcaster.
I did not contact YouNow.com about the matter. In other chats they would harasses the broadcaster and in some cases were removed from the chat room by a moderator. They do anything to harasses me just like they did when I was a member of their web sight http://timetravelinstitute.com which is now timetravel.institute. I now have http://time-travel.institute
So, now these thugs Ray and Darby have taking to even harassing the people I talk to on the Internet as well as me.
I no longer dismiss Ray Hudson and Darby Phillips as 2 people that have a beef with me. There is a reason these guys hang out all day in chat rooms talking to children mostly and some adults like myself.
There is a reason they would not let me post my computer code on their forum. There is a reason they started fights and arguments with me. There is a reason they have stalked me on the Internet for at least 6 years now.
There is a reason they have harassed me and ran me off every forum they could even having my threads deleted and if possible having me banned.
There is a reason they currently have hackers in my home network hacking me on a daily bases for at least 3 years now.
There is a reason they are harassing me as much as they can even taking it a lot further than that.
I know there is a reason. But, what is that reason?
Who are Ray Hudson and Darby Phillips really? Who the heck are they? Are Ray Hudson and Darby Phillips the "Men in Black from afar over the internet?" I think they are. I think they are the "Men in Black".
Ray Hudson and Darby Phillips ARE THE MEN IN BLACK!!!
Why do they see me as a threat?
Who is paying for all their operations and surveillance against me?
I can't see this coming out of Ray Hudsons pay check as a teacher or his job at Grumman aerospace or Darby's retirement if in fact he really is retired.
So again, who is paying for all this against me? Where is the money coming from?
So, Ray Hudson and Darby Phillips per your continued hacking and harassing of me I got only this to say to you guys. You will never stop me. Ever. From talking to the public and or developing my software. You guys can use all the hackers in the world. You will never stop me.
I told you Ray Hudson and Darby Phillips in 2008 at their forum I was going to do this and by god I did. I did it. I time traveled with information. Those thugs Ray and Darby have sure showed their ass to me since then. I had showed them my BNS upon arrival. I knew when Darby dismissed it outright something was damn wrong. And it was. I stepped into a damn government honey pot setup by the "Men in black". Looking for people like me.
I will leave you with a news article I read about the US and Russia using their security services to harasses people. Russian diplomates harassed by US.
Reactor1967 reporting from Time Travel One Station. Over and out.
Briefing to security and intelligent services continued. Continued cover up of Time Travel With Computers. Above Top Secret Involved in the Conspiracy Against Time Travel.
Well today I did a recon mission to access how well the Conspiracy Against Time Travel where still doing there best to keep my web sight and method of time travel from coming to the public. To judge how well they were still harassing me and keeping me quite.
Below is what transpired.
I posted a news article at beforeitisnews.com
I then logged into my account at Abovetopsecret.com and posted a thread about time travel with computers. The thread that was there at Above Top Secret is gone now. Above Top Secret Deleted my thread and banned me but you can view it on my blog. The deleted thread was here
What follows is the harassment I received and finally my thread was moved to the hoax section without scientific investigation nor discussion about my method of time travel. Notice as you read I responded answering questions but there was a 1 sided discussion and frame of mind. What you see here is examples of how the CIA operates and how the USA government operates to keep information from the public. Here is the rest unedited. It is possible I will get banned and my thread deleted as usual. This is called a COVER UP EVERYONE. This is why I talk about Ray Hudson and Darby Phillips like I do. This is what they do to me. They did it at their web sights and they do it to me all across the internet.
In this post at the end it said "THE END IS NIGH!" sign. Well this is obviously ANOTHER THREAT TO ME FROM THE CONSPIRACY AGAINST TIME TRAVEL!!! I was threatened by them on Craig's List to have a accident. Here I am being threatened again.
Was this persons account terminated for threatening me. It is in ATS policy that people that make threats their banned their terminated.
SO ABOVE TOP SECRET CAN HARASS ME, PUT MY THREAD IN THE HOAX SECTION, REMOVE MY THREAD FROM PUBLIC VIEW, THEN THREATEN ME AND THAT IS OK. OH HELL NO!!!!! AND TERRYDON79 IS NOT BANNED? OF COURSE NOT BECAUSE THIS IS A COVER UP!!!
But, look at the way this threat was made. He said a homeless man on the street holding up a sign. This was a cleverly made threat against me. All the while my home network as I write this blog is being hacked by the very same people that are stalking me and harassing me on the internet.
AND OF COURSE THE FBI AND HOMELAND SECURITY AND LOCAL LAW ENFORCEMENT STAND BY AND DO NOTHING WHILE I AM STALKED, HARASSED, HACKED ON MY HOME NETWORK, AND THREATENED!!! I HAVE BEEN DENIED PROTECTION BY MY GOVERNMENT AND LOCAL LAW ENFORCEMENT BECAUSE I MADE TIME TRAVEL CLAIMS ON THE INTERNET!!!! AND THE WORSE PART IS: I AM AN AMERICAN CITIZEN!!!!!!!!!!!!!!!!!!!!!!!!!
For the record. This blog is not a comic book. It is not fiction. It is non-fiction. It is real. The people I talked to in this thread probably are the sames ones or friends or coworkers of the same people that are hacking my home network and harassing me on a daily bases. So, this is real science, this is real time travel, this is real mathematics. I am and my subject of study Time Hacking is as real as flesh and blood. My time travel media I get from time hacking is as real as the real world. This is for real. To note: My computer code and my time travel media are my own personal private property. Kinda like when people go to the shopping mall. Some people believe that shopping malls are public property. No, shopping malls are private property and they can make you leave. I have my public face of time travel and I have my private face of time travel. So, just clearing that up. Moving on.....
Here I sense a genuine question and curiosity. The question: "If you use a check sum will you get access to all?". I Think the conspiracy against time travel still have unanswered questions about my work.
Well, guys, keep putting my threads in the hoax section then deleting it and banning me and hacking my home network and invading my privacy as well as the privacy of my family and running my off is really going to help you guys get your questions answered. Duh?
You stupid's. I am Talking to the conspiracy against time travel Ray Hudson and Darby Phillips and their thugs and the 1 women that works with them." She I believe is the one that interviewed Titor. She is part of the "Women in Black". Yes, the men in black now have women in black.
But, yes with check sums all information in the universe is accessible through time hacking. But the person doing the time hacking has to be able to mathematically calculate the check sums of the computer media files to be searched for.
I have said in the past looking for a computer file in space-time with its check sums is like conducting a sea recuse. The search area has to be defined then a method of searching that area has to be defined. The people rescued at sea are the computer files lost in space-time.
Before it is news is a citizen journalism site. Its purpose is to keep sites like Above Top Secret from covering up the truth and keeping it from the people. Above Top Secret calls citizen journalism a hoax. This shows the moral and character of Above Top Secret. It puts their character in doubt. It shows their real preference for the truth. Above Top Secret is a sham forum run by the CIA. As this post proves. They shut down citizen journalism. They shut down the scientific truth. Why? BECAUSE THE PUBLIC IS NOT SUPPOSE TO KNOW THE TRUTH!!!!
Why is that. Above Top Secret is saying the public is not entitled to report the news to others. Is all news now controlled in the United States of America. Controlled by the NSA, CIA, FBI, and your leaders in congress.
Every day the USA is become more and more like China and Russia. Now, if you go to Above Top Secret and use a news clip from a citizen journal news paper you thread will be moved to the hoax section, or deleted and you may be banned. IS THIS FREE SPEECH IN AMERICA? IS FREE SPEECH DEAD? THE PUBLIC DOES NOT HAVE THE RIGHT TO KNOW WHAT IS GOING ON? BULL SHIT!!!!!!!!!!!!!!!!!!!!!!!!
That is what Above Top Secret is telling the rest of the world.
Ok here is my last post at Above Top Secret. It is a text post because it is too long to screen shot it.
Begin Last post:
Before I leave here is what "before it is news" says about themselves. They are a citizen journalism site where citizen's can report the news to keep people like you here at above top secret from covering up and keeping it from the public.
Here is part of a email I received from before its is news. This explains about their web sight.
Start clip from email
Here is a site offering Citizen Journalism at it's best. Before It's News is a last frontier of free press, giving contributors the opportunity to share their thoughts and ideas, express their beliefs and their positions on events of the world or in their own backyard, all in an atmosphere without censorship or limits. No where else on the Internet do you have an opportunity to publish your stories knowing more than 8 million unique monthly visitors will have the opportunity to view your work.
Be sure to include subject appropriate images and/or videos with your published story whenever you can because these help to attract viewers. Also consider taking time to personalize your Before It's News account profile by uploading a picture and adding a few words which share who you are with your audience.
The question often asked by a new writer once a post has been published is how do I get my posts featured in the specific categories on Before It's News.
The answer to that question is simple but will need your support. Getting your post up on the Top 50 list of Before It's News, all a contributor needs to do is acquire enough people on your post to get it up on the top 50 page. One of the easiest ways to do this is by promoting your work on Social Media.
Social media is the number one driver of viewers to each of the stories you publish here on Before It's News.
Once you upload your post to our website, go to the social media platform you follow and share your newly published post.
By sharing your work on the various social media platforms you will soon gain a following for your stories. Then your followers will also share your articles with their friends and before you know it, your published stories are receiving hundreds of views. As your article acquires more viewers, it will automatically move into our Top 50 list on the Before It's News Front Page.
The Top 50 list on our Front Page is dynamic, automated to place the most popular articles into the Top 50 list as more and more viewers are attracted to a story. A published story will continue to rise higher on the Top 50 list as more viewers are attracted by the headline and topic they see.
The published stories which reach the Top 50 list are further helped by our editors featuring the story in the appropriate classification category so more visitors get to see the post. These categories include News, Alternative, Books, Global Events, Health, Politics, Science-Tech, Lifestyle, Money Matters, Self-Sufficiency, Space, Spirituality, Watercooler and Unexplained Events.
As your published story reaches the top of the Top 50 list on Before It's News, our editors will then feature it under either The Editor's Picks category or under the Alternative category. This presents the Headline of the published story in two places on the Before It's News Front Page, in both the left side column and the right side column, expanding visibility of the story.
As more viewers become familiar with the type of stories you share on Before It's News, your Pen Name will develop a following. You could even find yourself with a star placed on your profile, indicating the site recognizes you as a regular Featured Contributor here on Before It's News, known for contributing quality published stories on a regular basis.
There are additional methods for driving viewers to your published stories, including Forums, Blogs, partial posts on your website with links back to your Before It's News published story. Consider developing relationships with other websites who share articles from the various Internet writers and bloggers who are known to produce quality stories for their audiences.
Below are more instructions to assist as you publish stories here on Before It's News.
End clip from email.
Also, I copied this thread and it will be in my blog on my web-sight. You people are not the only ones that can move threads.
Ok, till next time.
End last post:
This concludes this part of the briefing on the Conspiracy Against Time Travel. I had to give a real a real example in this briefing of how the conspiracy against time travel works.
My recon mission today was a success. The conspiracy against time travel made themselves look LIKE THE STUPID ASSES THEY REALLY ARE.
What you saw in this post today is what Ray Hudson and Darby Phillips really do for a living. Keep the truth from the people. Keep me from talking to the people. Confuse the truth. Shut the truth down. I am pretty sure I may have actually talked to Ray or Darby today in another disguise. Using another name. If not I talked to their friends. Some of the post were similar to the post I have had in the past like the one saying I used random numbers. That person was familiar with my work because I have had that similar post to me before at other forums.
The conspiracy will go after me at high volume web sights like above top secret but usually if its a very low volume web sight that gets very little traffic they don't bother with me. Its only the high volume web sights were they really come after me.
They will never keep me quite. They will never shut me down. I am like anonymous the hacker group except by myself. I don't forgive. I don't forget. Expect me everywhere. The truth will be known.
And what I mean by that is I got my article posted at Before its news. I plan to write more articles and post them at more citizen journalism sites.
I am going to write a article about the Conspiracy Against Time Travel. I am going to take my time. I am going to make it damn good. And I am going to show my proof of the Conspiracy Against Time Travel. And best part of all. I AM GOING TO TALK MORE ABOUT MY METHOD OF TIME TRAVEL.
I am every where on the Internet. I can't be stopped. I won't be stopped. Ever. Expect me everywhere.
And, I will or have put the rest of my books out. I have to keep that secret from the Conspiracy Against Time travel. I have or will put my DVD's out. I have or will put my software out. And there is not god damn thing the Conspiracy Against Time Travel can do about it.
Well today at Above Top Secret they deleted my thread and banned me. But before deleting my thread they deleted my post I made yesterday linking my sites and my blog. Here is the deletion.
There was one more post of one of the people asking me to show a picture from the past. When I went back to reply my thread was gone.
The reason Above Top Secret removed my thread was because in the last post I said I was going to show it to Third Phase Of The Moon. Above Top Secret does not want Third Phase of the Moon looking at that thread. Those cowards. It has to be Ray Hudson Running things over there. He was alway a coward.
I have contacted Third Phase of the Moon and volunteered to go on their show. Third Phase of the Moon has never and probably will never returned my email for a request for a interview. It may be they are overloaded with emails for such request or they have a more specific reason for never answering my request. I will never ever really know. For the record Third Phase of The Moon is primarily UFO related and this is time travel with computers.
So, Above Top Secret used unsubstantiated personal opinions and harassment and threats to refute my claim of a time travel method. It seems that Above Top Secret has done a damn good job to prove the claims I have made through out this entire blog. As well as commit criminal acts against me in public. No wonder they removed my thread from public view. It was not my acts they were trying to cover up but their own.
From here on I will be hitting the circuit getting my story out.
By the way I got a joke.
Above Top Secret DOT COM - REMOVES YOUR THREADS AND DELETES LINKS TO YOUR SITE IF IT IS - REALLY ABOVE TOP SECRET!!!!!!!!!!!!
Oh god my ribs are hurting. Hey you guys guess what. My thread was deleted because:
IT WAS ABOVE TOP SECRET!!!!!!!!!!!!!!!!!!!
I got tears in my eyes from laughing so hard. I got to stop now before I hurt myself.
I found my thread at ATS (Above Top Secret) they should call it Above Top Cover Ups. BAAAAHAHAHAHAH! Any way they they put my thread http://abovetopsecret.com/forum/thread1125628/pg1
back up in the hoax section. They also edited the thread like they did at Conspiracy Cafe. My screen shots are the true version of how the thread went down.
Things may be slowing down for a little bit from here. I have been using public hot spots to get on the internet so I have been side stepping the Conspiracy's ability to find me and hack me. I reinstalled my operating system and when I do get on the internet at home now I clone my hard drive with Clonezilla. And when I am done with the internet I re-image my computer thus wiping over any malware or bots the conspiracy against time travel managed to put on my computer.
I am working hard on my time travel stuff though because of the Conspiracy Against Time Travel I can not provide details to the public.
And, I am posting links to my blogs and sights all over the internet quit successfully now though not always using Reactor or Reactor1967. Aaron Hiniker of Bedford, PA (My hacker) told me that because I use Reactor in my post that is one of the ways they track me.
So, Time Travel With Information is making a come back from the attacks from the Conspiracy Against Time Travel.
I told the Conspiracy Against Time Travel to expect me every where and that is pretty much what is happening. Links to my sites and to my blog are hitting the internet and I have been or will be getting the rest of my books and DVD's out. So, things are on the up and up.
Till next time. Reactor1967 coming to you from time travel one station over and out.