TIME TRAVEL INSTITUTE DOT COM IS A PEDOPHILE RING ALSO TIME TRAVEL INSTITUTE DOT COM IS KNOWN AS RENT-A-THUG OR RENT-A-PERVERT

 

 

 

 

 

 

This blog copyrighted (c) 2008 – 2015 timetravelinstitute.biz

 

Friday August 8, 2014

It has taken some time for me to get things figured out since Ray Hudson and Darby Phillips sent young Aaron Hiniker of Bedford, Ma in to hack my computer and take pictures of my preteen daughters but after much thought I think I may be coming to some sort of conclusion about the matter about Ray Hudson, Darby Phillips, and young Aaron Hiniker.

You see, for pedophiles to do what they do they need

1. Access to a child or minor.
2. Privacy with that child or minor
3. Control over that child or minor
4. Then the sex abuse and or mental abuse with that child or minor can start.

And, that is exactly what Darby Phillips and Ray Hudson are doing.
You see Ray Hudson is a Aerospace Engineer for a government defense contractor. So, he makes plenty of money. He does not need Darby Phillips. He does not need the http://timetravelinstitute.com. He does not need his teaching position.

Or does he?

So, why does Ray Hudson teach? Why does Ray Hudson need the http://timetravelinstitute.com? Why does Ray Hudson need Darby Phillips?

Here is why Ray Hudson needs Darby Phillips. You see Darby was a doctor that practiced experimental mind control for the CIA.

Darby Phillips on national radio

If anyone can take a child or minor and make that child or minor perform sexual favors that would be Darby’s Phillips field of expertise. He knows how to control people. That is what the CIA employed him for. Darby Phillips also may have participated in project MKUltra where they experimented on peoples minds with LSD. It is possible Darby Phillips was the one to give LSD to the UNIBOMBER in that experiment.

My problem with this is Darby Phillips experimented on peoples minds and it is possible he even experimented on people with LSD.

SO WHY IS DARBY PHILLIPS IS ALLOWED TO TALK TO YOUNG PEOPLE IN PRIVATE BY WAY OF PRIVATE MESSAGING AND PRIVATE CHAT WITH THEM IN A FORUM IN PRIVATE?  HE IS AN ADULT AND THEY ARE UNDER THE AGE OF 18!!! THAT IS MESSED UP!!! DARBY HAS BEEN TALKING TO MINORS IN PRIVATE IN FORUMS FOR YEARS!!!

And that is why Ray Hudson needs Darby Phillips. To control the people he wants to control. Because Ray Hudson is abusive. He needs that control to abuse. He needs Darby Phillips as his teacher and mentor.

Ray Hudson needs these things for

1. Access to children or minors.
2. Privacy with children or minors
3. Control over Children or minors.
4. Then he can abuse that child or minor sexually and or mentally and or make them break the law and or hurt other people.

Now, I know from my membership at http://timetravelinstitute.com that Ray Hudson gives the young people he teaches accounts at http://timetravelinstitute.com

So, Ray through his teaching position gets access to young people and minors. Then and read this:

Now, he gives them accounts to the http://timetravelinstitute.com which and again read this:

HAS PRIVATE MESSAGING AND CHAT!!! 

Now that gives Ray Hudson

1. Access to minors  under the age of 18.
2. Privacy with the young people and minors under the age of 18.

Now Ray Hudson as gone from the class room where he has access to young people to getting

PRIVACY WITH THOSE YOUNG PEOPLE!!!

Now where does the control comes in. Anyone who as read as much of Ray Hudson’s messages as I have has seen he is the master at getting control over people. I am pretty sure that Darby Phillips who may have been a doctor in project MKultra. Darby Phillips has been Ray Hudson’s teacher and mentor in the ways of mind control over others. Pedophiles have to have control to abuse. Ray Hudson and Darby Phillips are the masters of controlling others.

But, I started posting at http://timetravelinstitute.com in 2008. Aaron Hiniker who hacked my computer in 2013 was 15 years old or younger when he met Ray Hudson or Darby Phillips if i understand correctly what Aaron Hiniker told me. It is all in the emails that I have which the FBI REFUSES TO INVESTIGATE!!!

He has said in his emails to me that he has followed me from the very beginning of my internet post. That would be 2008 when Aaron was 15 years old. Well, he hacked my computer on behalf of Darby Phillips and Ray Hudson thus breaking the law in 2013. Now, Darby Phillips and Ray Hudson can hold that over his head FOR SEXUAL FAVORS!!!

Aaron Hiniker of Bedford, MA (My hacker) is now 21 years old but if they have been abusing him since 15 or younger it would still not be too far fetched giving Darby Phillips skills at mind control which was cultivated from his years of private research at the CIA.

SO THAT PROVES THAT RAY HUDSON AND DARBY PHILLIPS EXERT CONTROL OVER YOUNG PEOPLE!!!

Most of my proof would be in my emails with Aaron Hiniker, my screen shots, and my computer logs and this blog as it goes back in time. Now, most of my blog is hidden now because I am working on some things.

SO THE FBI YOU HAVE YOUR CAUSE FOR A SEARCH WARRANT FOR TIME TRAVEL INSTITUTE DOT COM NOW BECAUSE WITH MY EMAILS AND MY COMPUTER LOGS SHOWING THE TIME TRAVEL INSTITUTE MAY HAVE USED YOUNG AARON HINIKER IN THIS WAY NOT ONLY TO FORCE HIM TO BREAK THE LAW BUT TO ATTACK OTHER PEOPLE.

MY EMAILS AND A LOT OF WHAT I HAVE WERE PROVIDED TO THE FBI IN A DOWNLOAD LINK IN THE REPORTS I FILED WITH THEM. BUT I DOUBT THEY EVER DOWNLOADED IT. I ALSO HAVE A TAD OR TWO HERE OR THERE. LATER I WILL ADD THAT TO THE FILE WITH THE SAME DOWNLOAD LINK.

SO, THEY HAVE USED YOUNG PEOPLE TO BREAK THE LAW. NOW FOR AARON HINIKER QUESTION REMAINS? DID THEY HOLD THAT OVER HIM TO FOR POSSIBLE SEXUAL FAVORS!!! HAVE THEY SEXUALLY ABUSED AARON HINIKER BEFORE HE TURNED 18 YEARS OF AGE?

Now, question remains? DARBY PHILLIPS AND RAY HUDSON HAVE YOU EVER SEXUALLY MOLESTED AARON HINKER???

Aaron, did these guys force you to video chat with them and have you to take your clothes off for them??? Aaron Hinker did Darby Phillips and Ray Hudson force you to hack my home network and take pictures of my preteen daughters on their webcams for Ray Hudson and Darby Phillips own sexual perverse needs?

Now, again this gets worse and worse for Ray Hudson and Darby Phillips and here is why. You see Darby Phillips has a very long history of running adults off from forums but HE ALWAYS WANTS THE MINORS TO STAY. AND MOST OFTEN THAT IS BOYS OR YOUNG MEN!!!

So, Darby Phillips likes to get children into his forums but wants the adults to leave. WHY IS THAT DARBY PHILLIPS??? WHY DO THE ADULTS HAVE TO LEAVE??? YOU ALWAYS MAKE SURE THE ADULTS LEAVE??? WHY???

THE WHY IS BECAUSE PEDOPHILE RINGS ARE USUALLY MEMBER INVITES ONLY!!!!!!!!!!

SO THE NONE MEMBERS OF THE PEDOPHILE RING ARE NOT WELCOME TO STAY AROUND!!!!!

AND WHAT BETTER PLACE FOR A PEDOPHILE RING TO BE HIDE THEN IN PLAIN SITE AS A TIME TRAVEL FORUM!!! NO ONE WOULD SUSPECT!!! NO ONE WOULD INVESTIGATE!!! NO ONE WOULD COMPLAIN!!!

I know why the non-pedophile members have to leave, so Darby Phillips and Ray Hudson can have ACCESS, PRIVACY, AND CONTROL with the young people and the minors.

They get the  minors in to the private messaging and the private chat. Then they get control over them LIKE THEY DID WITH AARON HINKER. THEN THE SEX ABUSE STARTS!!!

HTTP://TIMETRAVELINSTUTE.COM IS A PEDOPHILE RING!!!

Darby Phillips why is it that you do not have a socal life?

Darby Phillips why do you spend all your time talking to young people and minors?

I know from talking to other people at your forums that you do private message and chat with young people and minors all day long.

I know that you and Ray Hudson have control over these young people most recently Aaron Hinker who you and Ray Hudson had hack my home network and take pictures of my preteen girls and steal my files and view my computer screen and use my credit cards and logged into my varies accounts and change my passwords.

DARBY PHILLIPS AND RAY HUDSON HAD A YOUNG ADULT DO THIS WHO THEY HAVE KNOWN SINCE HE WAS 15 YEARS OLD OR YOUNGER!

DID THEY SEXUALLY ABUSE HIM TOO?
I KNOW DAMN WELL THEY ABUSED HIM MENTALLY.

Ray Hudson – ARE YOU A PEDOPHILE???

Darby Phillilps – ARE YOU A PEDOPHILE???

RAY HUDSON AND DARBY PHILLIPS WHY DO YOU NEED YOUNG PEOPLE TO COME TO YOUR FORUM?

WHY DO YOU SPEND ALL DAY LONG TALKING AND CHATTING WITH YOUNG PEOPLE AND MINORS?

RAY WHY DO YOU GIVE ACCOUNTS TO http://timetravelinstitute.com TO YOUR STUDENTS IN YOUR CLASS ROOM?

IT IS NOT ENOUGH THAT YOU HAVE ACCESS TO THEM BUT YOU ALSO WANT PRIVACY AND CONTROL WITH THEM?

WHY?

SO YOU CAN TAKE PICTURES OF THEM AND MOLEST THEM TOO? IS THAT THE REASON?

I HAVE ALL THE EMAILS THAT AARON HINKER AND I SHARED. I HAVE MY COMPUTER LOGS.

RAY HUDSON AND DARBY PHILLIPS WHY DO YOU SEND AARON HINKER TO TAKE PICTURES OF OTHER CHILDREN FOR YOU WHEN YOU HAVE HIM HACK OTHER PEOPLES COMPUTERS? YOU GUYS DID THIS WITH MY OWN KIDS!!!

RAY HUDSON AND DARBY PHILLIPS ARE YOU HOPING TO FIND CHILD PORN ON THE COMPUTERS YOU HAVE AARON HACK???

DO YOU WANT WHAT EVER CHILD PORN AARON FINDS FOR YOUR OWN PERVERSE NEEDS???

SO RAY HUDSON AND DARBY PHILLIPS SEND YOUNG AARON HINIKER OUT TO HACK COMPUTERS TO FIND THEM CHILD PORN? IM SURE THAT ANSWER IS YES.

AARON TOLD ME HIS SPIED ON HIS TEACHER CHATTING WITH A YOUNG STUDENT IN PRIVATE?

I HAVE THAT EMAIL FROM HIS OWN WORDS!!!

AND AGAIN, AARON SAID HE WATCHED HIS OWN HIGH SCHOOL TEACHER CHATTING WITH A YOUNG FEMALE STUDENT IN PRIVATE WHILE HACKING HIS TEACHER AND THE FBI DOES NOT INVESTIGATE WHY???

AGAIN I HAVE THAT EMAIL!!!

IS CHILD PORN THE TYPE OF FILES RAY HUDSON AND DARBY PHILLIPS ARE REALLY AFTER WHEN THEY SEND AARON HINKER TO HACK OTHER PEOPLES COMPUTERS???

 

WHERE IS THE FBI IN ALL OF THIS??? 

WHERE IS THE LAW ENFORCEMENT IN ALL THIS?

SO THESE GUYS BECAUSE THEY HAVE HIGH GOVERNMENT SECURITY CLEARANCES CAN HACK PEOPLES COMPUTERS AND MOLEST CHILDREN AND THAT IS OK??? BULL FUCKING SHIT!!!!

This is all I have to say about the matter.

THE FBI NEEDS TO INVESTIGATE TIME TRAVEL INSTITUTE DOT COM.

THE FBI NEEDS TO INVESTIGATE RAY HUDSON.

THE FBI NEEDS TO INVESTIGATE DARBY PHILLIPS.

THE FBI NEEDS TO INVESTIGATE AARON HINKER AND QUESTION HIM ABOUT THE HACKING OF MY HOME NETWORK AND IF HE WAS SEXUALLY ABUSED AND HIS RELATIONSHIP WITH DARBY PHILLIPS AND RAY HUDSON AND TIME TRAVEL INSTITUTE DOT COM.

THE FBI NEEDS TO FIND OUT IF RAY HUDSON AND DARBY PHILLIPS SEXUALLY MOLESTED OR ABUSED AARON HINKER!!!

THE FBI NEEDS TO FIND OUT IF RAY HUDSON OR DARBY PHILLIPS IS MOLESTING OTHER CHILDREN OR TEENAGE MINORS!!!

FBI YOU NEED TO GET TO THE BOTTOM OF THIS!!!

IT HAS BEEN OVER A YEAR NOW SINCE RAY HUDSON AND DARBY PHILLIPS SENT YOUNG AARON HINKER TO HACK ME AND STILL NOTHING HAS BEEN DONE?

AND THE FBI DOES NOT INVESTIGATE THIS WHY???

FBI YOU NEED TO DO YOUR GOD DAMN FUCKING JOB AND YOU NEED TO DO IT NOW!!! If not only to get my hacking investigated but to see what the hell is going on with Ray Hudson, Darby Phillips and the YOUNG PEOPLE THEY ARE INVOLVED WITH!!!

And last but not lets not forget that RAY HUDSON IS A HIGH LEVEL GOVERNMENT DEFENSE CONTRACTOR EMPLOYEE AND A TEACHER!!! HE USES HACKERS AND HANGS AROUND MINORS WHO ARE NOT HIS KIDS IN PRIVATE!!!

AND HE IS NOT INVESTIGATED FOR THIS BY THE FBI WHY???

ALSO WHAT IF AARON HINIKER HACKED RAY HUDSON AND STOLE HIS AEROSPACE DEFENSE CONTRACTOR SECRETS!!!

WOULD NOT THIS BE OF IMPORTANCE THE THE UNITED STATES GOVERNMENT!!! WOULD THIS NOT BE OF IMPORTANCE TO RAY HUDSON’S EMPLOYER!!!

FBI YOU NEED TO INVESTIGATE RAY HUDSON!!!

And this may not just be the http://timetravelinstitute.com that has the pedophile problem with its owners using it as a pedophile ring.

When I was at http://www.conspiracycafe.net/latte/ (conspiracy cafe) Grayson had me harassed and run off to try to punish me for using my first amendment rights to my freedom of speech.

It could of been I was just not young enough to post there too. Not pretty enough. Like I said these guys walk the walk and talk the talk when it comes to being perverts.

During that thread they posted a picture of A DRUNK OR DRUGGED UNDERAGE GIRL IN A ROOM FULL OF MEN FLYING ME THE BIRD. Flipping me off. I JUST KNOW IN MY HEART THE MEN IN THAT ROOM RAPED HER OR AT LEAST MOLESTED HER FROM MY MEMORY OF THE PICTURE THEY SHOWED ME.

SHE WAS JUST A VERY YOUNG UNDERAGE DRUNK OR DRUGGED GIRL FLIPPING OFF THE CAMERA AND NOT EVEN KNOWING WHERE SHE WAS OR WHAT SHE WAS DOING.

SO GRAYSON IS A OLD GUY LIKE DARBY AND RAY BUT HE CHATS AND PRIVATES MESSAGES YOUNG PEOPLE ALL DAY LONG AND THEY RUN THE ADULTS OFF TOO. BUT THE MINORS STAY.

So, Ray Hudson and Darby Phillips may be part of an extensive PEDOPHILE RING EXTENDING TO MULTIPLE WEBSIGHTS!!!

WHERE IS THE PRESS IN ALL OF THIS? WHY IS NOT CNN OR THE BBC ALL OVER THIS WITH JOURNAL INVESTIGATION???

ALL THESE FORUMS WITH OLD GUYS BRING IN YOUNG MINORS OR CHILDREN FOR PRIVATE MESSAGING AND CHAT WHILE MAKING SURE THE ADULTS LEAVES???

WHAT ABOUT THE POOR MINORS??

STATISTICS SHOW THAT ONLY 3% OF CHILD MOLESTERS ARE CAUGHT. IS THIS WHERE MUCH OF THE CHILD PORN AND CHILD MOLESTING STARTS? AT THESE FORUMS LIKE DARBY, RAY, AND GRAYSON HAVE?

At  http://timetravelinstitute.com
At http://www.conspiracycafe.net/latte/

Before I go I want to remind everyone that child molesters have to be the master of grooming and control. So, they not only groom and control the children they also groom and control the children parents and the community that they live in. They groom and control the public.

Now Darby Phillips is ex-CIA and a doctor. He has the respect of the government, his community , and the public. So, he has used his professional credentials to gain the trust of the pubic but that does not mean that he should not be investigated for crimes he may have committed.

That minors or children should not be questioned. And if one of the minors or children come out against them specifically speaking Aaron Hiniker then those young people should be given the benefit of the doubt.

So, Just because Darby Phillips was a professional does not mean he is not a child molester. He talks to young people all day long on the forums and I have stated here the reasons to I have to judge him or at least investigate him.

Now the same holds true with Ray Hudson. The problem I have with him is he has money but he chooses to spend his time IN PRIVATE TALKING TO UNDERAGE MINORS!!!!

And him and Darby Phillips sent a  young person to hack my home network who was 15 YEARS OLD OR YOUNGER WHEN THAT MINOR FIRST MET DARBY PHILLIPS AND RAY HUDSON.

So, yes pedophiles groom the public too. That is why only 3% of pedophiles get caught and 97% of child molesters go all their life molesting children till the day they die.

Forums like http://timetravelinstitute.com and the conspiracy cafe have old men all day long talking to young minors through private chat and messaging.

And, since I went into their world I see that there is a world of child abuse that the press and law enforcement has not brought to the public.

Forums like http://timetravelinstitute.com need police officers in there or at least shut the forums down because these forums have no oversight into the power that Ray Hudson and Darby Phillips exercise and control over  young people.

To the extend of at least forcing them to break the law but Im sure its much worse than that. IT IS QUITE POSSIBLE THAT RAY HUDSON AND DARBY PHILLIPS ARE USING THEIR FORUM TO SEXUALLY ABUSE MINORS BUT THERE IS NO LEGAL OVERSIGHT INTO THIS!!!

AND THE FBI AFTER A YEAR HAS STILL NOT INVESTIGATED MY CLAIMS!!!!

So, maybe someone out there will read this blog and get help for the young people at http:/timetravelinstitute.com and the conspiracy cafe.

It is possible that Aaron Hiniker even though he is 21 years old now needs some help too. No one has even talked to that poor boy who came after me with a vengeance even though he and I originally had no beef with each other at all what so ever.

When Aaron first started writing me claiming he wanted to help me hell I think he actually liked me. But, Darby phillips and Ray Hudson intended for Aaron to do me Harm. Like two bullys forcing two other people who have no quarrel with each other to fist fight.

And that is why I talk about RAY HUDSON AND DARBY PHYILLIPS as hard as I do. They are bullies, thugs, criminals, perverts, and cowards.

Among other things I can say about them right now. Some one needs to see if AARON HINKER WAS MOLESTED BY RAY HUDSON AND DARBY PHILLIPS.

THEY NEED TO SEE WHY AARON WAS FORCED TO COMMIT MULTIPLE FELONIES  ON BEHALF OF RAY HUDSON, DARBY PHILLIPS

and in the name of the ATTACK SIGHT AND PEDOPHILE RING HTTP://TIMETRAVELINSTITUTE.COM

The hacking attack on me was in defense of http://timetravelinstitute.com
They were attempting to get revenge on me for using my first amendment rights to free speech.

ALSO I HAVE RECEIVED A DEATH THREAT FROM AARON HINKER ON BEHALF OF THE TIME TRAVEL INSTITUTE DOT COM!!!

Someone needs to find out if Aaron is ok. What did Ray Hudson and Darby Phillips do to Aaron Hiniker to cause him to break the law? What have they done to abuse him sexually or mentally? What have they done to him period?

And the FBI does not investigate this why??? 

What about poor Aaron Hiniker? What about the other people that Ray Hudson and Darby Phillips may have hurt? Where is the law in all of this?

In Aarons emails to me Aaron Hiniker told me he was buying drugs. Was Aaron Hiniker’s drug use to escape the pain of the molestation and mental abuse that Darby Phillips and Ray Hudson caused him?

They forced young Aaron Hiniker to commit federal crimes by hacking my home network god knows what else Ray Hudson and Darby Phillips forced young Aaron Hiniker to do for them.

I have the emails from Aaron Hiniker. In fact I have one thousand emails from this young man as he played his games with me that Ray Hudson and Darby Phillips sent him to do. His emails to me were to get me to click on links and install software so he could gain access to my home network. At the time I thought it was just a young kid interested in my work and offering to help me. Later I found out different. I did suspect him of working for Ray Hudson and Darby Phillips at first but Aaron kept telling me he was not working for him. He lied to me.

Not that the FBI cares they seem perfectly happy to let this shit continue.

And this is not being investigated by the FBI why?

Ray Hudson and Darby Phillips are using the disguise of education and truth for the purpose of gaining access, privacy, and control over people under the age of 18. Then they are using that control to abuse them.

They draw them into their private messaging and chat then develop control over them I know for the purpose of breaking the law that much I can prove but they also may be molesting, raping, and mentally abusing these young people.

I know they have mentally abused Aaron Hiniker or he would not be hacking computers for them. So, I know for sure there is mental abuse going on in their forums.

They have harassed me for years because I wont shut up and just leave. And, as I said Darby Phillips is in these forums 24/7.

Why Darby? What are you doing with these kids? Really Darby Phillips? Really? With kids 24/7 in the forums, private messaging, and private chatting?
Why Darby Phillips? Why?

These kids go into their forums thinking TIME TRAVEL, CONSPIRACY OH COOL. But, once Darby Phillips and Ray Hudson and Grayson draw them into their private messaging and chat all that suddenly changes.

Ray Hudson and Darby Phillips and Grayson are forcing young people to do bad things and this is not being investigated by the FBI why?

This could be the biggest child porn child pedophile ring since the Catholic church and these guys are protected because they have high security clearances worked for the government and are teachers.

I went into the http://timetravelinstitute.com in 2008 with my method of time travel. Now, they at first quietly and politely tried to get me to leave.

I am pretty sure because I was not young enough or cute enough for them. I was not an invited member to their pedophile ring. I did not know I was interrupting Darby Phillips and Ray Hudson play time with the children there.

I didn’t know. I had not a clue what they were doing. So, they finally got rude with me and I just bowed up to them. Finally they started preventing me from posting. Then finally they banned me. Now they just delete my post.

I went in there thinking ok I have a method of time travel and this is a time travel forum. I NEVER NEW IT WAS A PEDOPHILE RING!!! Only after years of refusing to leave. To get my method of time travel out did I really realize what was going ON!!! Wow, when they said to me “we do not believe in time travel now go away.” Darby was really saying to me. Leave us along we want to play with the children here.

Maybe why there after me is because they do not want me to stop the flow of underage people going to their forum!!! Wow, these guys at one time had me fooled into thinking they were educators. Truth is they are pedophiles.

NO FUCKING WONDER RAY HUDSON AND DARBY PHILLIPS DO NOT WANT ME POSTING ON THEIR FORUM!!! IF I WAS 10 YEARS OLD I BET THEY WOULD LET ME STAY. AS LONG AS I TALKED WITH THEM IN PRIVATE OF COURSE.

I have said it once and I will say it again. Ray Hudson and Darby Phillips you guys aint shit. You got the rest of the world fooled but your not fooling me. Someone PLEASE GET THESE FORUMS

At  http://timetravelinstitute.com
At http://www.conspiracycafe.net/latte/

UNLISTED FROM GOOGLE AND BING PLEASE! THEY ARE VERY BAD PLACES FOR YOUNG PEOPLE TO BE GOING!!!

No one under the age of 18 needs to be going into

Time Travel Institute DOT COM
http://timetravelinstitute.com

and conspiracy cafe
http://www.conspiracycafe.net/latte/

and what ever other forums that Darby Phillips and Ray Hudson and Grayson own.

Also, Darby Phillips and Ray Hudson may have other places they use to hang around young people. I suspect they are part of Wikipedia and may be getting ACCESS, PRIVACY, AND CONTROL of young people there too as well as other places.

And last thing about these web-sights. It has been theorized that the CIA is using these web-sights to run intelligent operations.

My question to that is WHAT FUCKED UP COUNTRY RUNS INTELLIGENT GATHERING AGAINST MINORS AND MORE SO IF THOSE MINORS ARE THEIR OWN CITIZENS?

PUTTING ADULTS LIKE DARBY WHO IS A EX-CIA MIND CONTROL EXPERT WITH CHILDREN???

WHAT THE FUCK??? REALLY?

That old troll Darby Phillips is all in that forum like stink on shit. He aint ever leaving. I guess business is pretty good for him.

AND USING MINORS AND YOUNG PEOPLE AS OPERATIVES? Like they did with Aaron Hiniker. That is just plain crazy.

QUESTION?
IS THAT NOT SOME KIND OF FUCKED UP SHIT AL-QAEDA WOULD PULL?

AND NO MINOR OR YOUNG PERSON WILL GET HURT IN THIS? REALLY? THAT IS FUCKED UP.

 

ONLY IN AMERICA.

FBI and Law enforcement needs to put a stop to this. They need to do their fucking jobs.

—————————————————–

I will give a heads up on how my time travel works. I wrote a program that looks at a computer file and creates a number known as a check-sum that represents that computer file.

Now, I can take that number and plug it back into my program and recreate that computer file.

this is called check-sum hacking.

Now, what I do is look for time travel media of the future, past, or alternate time-lines by feeding my file recreation program different numbers.

As my file re-creation program translates those numbers to files I have robots on my computer that looks at those files and sees if they have a real file format. It looks to see if they are real computer media.

If they are then I may have recreated a computer file from the past or the future or alternate time-lines.

This is a process called “TIME-HACKING”.

And oh it gets better. You see if A in the future and B in the past both know the range of check-sums that A’s messages from the future are to B in the past and vice versa then the numbers in that check-sum range can be feed INTO MY FILE RECREATION PROGRAM AND B IN THE PAST CAN READ A’S MESSAGES TO HIM FROM THE FUTURE AND THE OTHER WAY AROUND TOO. A IN THE FUTURE CAN READ B’S MESSAGES TO HIM IN FROM THE PAST TOO.” Now, in this setup both A in the future and B in the past would write messages to each other then keep a copy of that message and delete the original message to make things all work out in the time-line.

THIS IS THE SECRET THAT RAY HUDSON AND DARBY PHILLIPS DO NOT WANT THE PUBLIC TO KNOW ABOUT.

Oh, now it gets even better. IF A METHOD OF QUANTUM ENTANGLEMENT CAN BE EMBEDDED IN THOSE MESSAGES THEN THE FUTURE OR THE PAST CAN BE PREDICTED WITH DEADLY ACCURACY!!!

And it still gets better. Now you see if the program can find the messages from  A in the future fast enough and A in the future can find the messages from B in the past fast enough THEN REAL TIME COMMUNICATION BETWEEN THE PAST AND THE FUTURE CAN BE ESTABLISHED!!!
But, there needs to be some kind of verification in those messages. I previously spoke of quantum entanglement.

My method of verifying that a message from the future is true is when that future message can give something tangible in the current environment that is proof the future message does indeed have knowledge of the future. So, as time unfolds the events in the future message prove to be true thus proving that the rest of the contents in that future message may indeed be from the future.

Now, a message from the past to the future has to be verified with what the the future knows of the past.

Now, when better and better methods of verification become available like quantum entanglement verification I call them quantum codes. Then temporal communication improves.

And again it still gets better. You see this can be used as a method for parallel computing. But this is temporal parallel computing. With this method of time travel A PARALLEL COMPUTER CAN BE BUILT WITH JUST ONE CPU BUT PROCESS INFORMATION LIKE IT HAS THOUSANDS AND THOUSANDS OR MORE CPU’S.

Now, when I posted at http://timetravelinstitute.com all they could think about was getting me to leave and not talk about this any more. All they were interested in was the minors.

Now, this is called a “FIFTH DIMENSIONAL TIME TRAVEL SIMULATOR”. You see physics support time travel though the fifth dimension and my programs mathematically create that dimension. Also physics and science support a computer being used as a method of time travel. I have written the first “TIME TRAVEL SIMULATOR” IN THE HISTORY OF THE WORLD!!!

I HAVE INVENTED TIME TRAVEL. I AM REACTOR1967 AND I AM A TIME TRAVELER AND RAY HUDSON AND DARBY PHILLIPS DO NOT KNOW THEIR ASS FROM A HOLE IN THE GROUND!!! Yeah they thought they did.

Here is my first book I have released in the series “Time Travel with Computers”

 

Aaron Hinker has promised to me that my work would be plagiarized and my copy right violated. He said my work would be STOLEN FROM ME.
I have my own web-sight and forum which is http://timetravelinstitute.biz this domain was not used and I used it to establish my TIME TRAVEL RESEARCH BECAUSE WHEN I WENT TO THE http://TIMETRAVELINSTITUTE.COM I had a real method of time travel but I was ran off and not allowed to post there. Eventually  I realized if I wanted to be on the internet I had to get my own web-sights. I also finally ended up using a blog to post because it was the only thing Darby Phillips and Ray Hudson could not shut down.
I am a A GOD TO HONEST REAL FUCKING TIME TRAVELER. HONEST TO GOD I AM.
And, why am I a real time traveler? You see computer files are made up of numbers from 0 to 255. So essentially a computer file looks like this.
0 250 156 136 85 26 251 135 253 (Now actually  the numbers have better patterns than this but this is essentially how computer files look.
Now, these numbers can be added up
0 + 250 + 156 + 136 + 85 + 26 + 251 + 135 + 253 = 1292 (If I added correctly) as the check weak check sum.
Now lets get the weighted sum.
(.1*0) + (.2 * 250) + (.3 * 156) + (.4 *136)…..
Im going to pull a number out of the air here so please forgive. = 2.9837
So, for the same file the weak check-sum is 1292 and the strong check-sum is 2.9837
1292  2.9837
Now my program would create a file with the same weak check-sum but the weighted sum would be different
1292 1.3987
My program would perform what is called a counter roll on the file. Keeping it the same weak check-sum but keep rolling it till the weighted sum equaled the target weighted sum.
              weak weighted
step 1 = 1292 1.3987
step 2 = 1292 1.4879
step 3 = 1292 1.8374
step 4 = 1292 2.1101
step 5 = 1292 2.8984
step 6 = 1292 2.9124
step 7 = 1292 2.9821
step 8 = 1292 2.9837 (File reconstructed)
Now, once a method of reconstructing a computer file is accomplished with check-sum hacking now we can use mathematics to see what a file from the future might look like.
So, I record videos off channel seven news
Day 1 news video weak check sum 92387
          weighted check sum 2.432873
Day 2 news video weak check sum 84376
           weighted check sum 2.98783
Now, I would usually run out much longer than this. But for the sake of this example here channel seven news videos have these check-sum ranges. Now in real life my ranges would look like this
weak
2938472398473287989
to
4302834738893873766
               and
weighted
2938737.92374923749823743289
4239487.92384823749832747887
Here I am using much shorter ranges as an example. In my programs I can take these out to 72 decimal places or better if I want but how I do that will not be shown here.
So, back to the example I was showing.
weak (84376 to 92387)
weighted (2.432873 to 2.98783)
So, I take my file reconstruction program.
I plug in a weak checksum of
84376 and run in to all the weighted check-sums between (2.432873 to 2.98783)
Then I take the next weak check-sum
84377 and do the same. I run in to all the weighted check-sums between 2.432873 to 2.98783
Then again
84378 …. and so on.
EVENTUALLY I FIND A CHANNEL SEVEN NEWS VIDEO FROM THE FUCKING FUTURE MAN. Actually my robot programs find that file from the future I just set back and watch tv while my shit runs on the computer.
THIS IS HOW TIME TRAVEL WITH INFORMATION FUCKING WORKS.
By the way this was just a quick example. And secondly to really really make this work I would need to show you more than this but I am saving the rest of it for my books.
What I am saving for my books that I am not posting here right now is better algorithms for computing the check-sums and varies ways I run my counters to make them find the time travel media.
So, this is a accurate example though of how someone would use my methods to search for time travel media from the past, future, or alternate time-lines.
Also, a single weighted check-sum is not enough but some-times it can work but it takes longer because even weighted check-sums have file collisions. The collisions have to be searched through to find the right file. Now I use robots to search through my files so that is not now nor ever has been a problem for me. But, I use a different algorithm now for my strong check-sums. It is still hackable which is required for what I do but there is a far less chance of a check-sum collision. And, it works with my new methods of rolling my counters to their destinations.
The main reason people say they have a problem with what I do is because they think it is impossible to roll a binary counter from one computer file to another. Well its not. Let me show you a quick example of why it is not.
Say this is a binary counter.
329847 This is the counter
+        1 This is me rolling that counter
———-
329848 It just advanced by one
+        2 This is me rolling the counter again
———-
329850 This is the new counter
+23878 This is me rolling the counter again.
———-
353728 This is the new counter.
This is a pretty big jump.
So, when rolling a binary counter I can make it run as fast or as slow as I want. What that means is when going from one weighted check-sum to another I CAN GOVERN THE SPEED AT WHICH THAT HAPPENS. SO WHEN RECONSTRUCTING COMPUTER FILES  THIS IS NO FUCKING PROBLEM.
IF YOU KNOW THE BEGINNING WEIGHTED SUM AND THE ENDING WEIGHTED SUM A SERIES OF ALGORITHMS IS COMPUTED TO COMPUTE THE SPEED OF THE COUNTER TO ROLL IT FROM THE BEGINNING WEIGHTED SUM TO THE ENDING WEIGHTED SUM. Then – COMPUTER FILE RECONSTRUCTED!!!
I do have other mathematical methods for PREDICTING WHAT CHECK-SUMS TO SEARCH FOR so I can make my programs find real time travel media.
THE TRICK IS ALL IN THE MATHEMATICS. YOU SEE COMPUTER FILES HAVE BINARY PATTERNS.  So, using those binary patterns with mathematical algorithms check-sums can be predicted to find other unknown time travel computer media of the past, future, or alternate time-lines that have those very same binary patterns.
Google searches people’s emails for child porn and the FBI scans the internet. These are robot programs very much like the programs I write to scan my counters for time travel media files. Both Google and the FBI is looking for specific binary patterns.
The CIA does the same thing. They write robot programs to scan recorded phone calls, pictures, and varies other files. Again, much like my robot software that I write to scan my binary counters for time travel media. The CIA is looking for specific binary patterns.
Also, this is the way to hack another computer without ever connecting to it. If a profile can be built as to the information that computer system contains then that profile can be used to scan binary counters that are reconstructing computer files matching that profile.
Eventually one of those reconstructed files will be one of the files that was on that other computer. But, NO PHYSICAL CONNECTION WAS MADE TO THAT COMPUTER!!!
All one needs for this is an appropriate profile of the information that computer might contain then run software much like my own that reconstructs computer files within weak and strong check-sum range.
You see my hacker Aaron Hiniker when he wants something he has to hack a computer to get it.
WHEN I WANT SOMETHING I DEVELOP A PROFILE AND FIND THE RANGE OF WEAK AND STRONG CHECK-SUMS THAT I NEED AND SETUP A TIME TRAVEL COMPUTER MEDIA PROJECT TO CONSTRUCT ALL THE FILES BETWEEN MY STRONG AND WEAK CHECK-SUM RANGE AND RUN THE PROJECT AND DATA MINE THE CREATED FILES FOR THE INFORMATION I AM SEEKING!!!
I USUALLY GET WHAT I WANT!!! NO MATTER WHERE OR WHEN OR ON WHAT MACHINE THAT COMPUTER FILE EXISTED IN SPACE-TIME!!!
The robot software then scans those reconstructed files looking for information. Much like Google, the FBI, and the CIA does when they scan people’s emails, the internet, and recorded phone calls.
They (Google, FBI, CIA) and myself when we scan files we look for specific binary patterns to find the information we want.
In my case I am looking for time travel computer media files from reconstructing a range of weak and strong check-sums that I mathematically chose as a range that might have those files that I am looking for.
This is useful for finding technology patents that has not been invented yet and of course looking for videos, images, and other files that may be from the future, past, or other alternate time lines. Even computer files that are from some where in our known universe from another time.
Also, time travel media from alternate time-lines can be just as useful in the current time-line even though it is from another time-line. Technology being one use. Entertainment being another use. Science being another use and so forth.
Just because a specific time travel computer media file is from a alternate time-line that does not always diminish its usefulness in this time-line.
Rolling a binary counter to a computer file was one of the things Ray Hudson had the hardest time understanding. This “mother fucker” (Ray Hudson) use to follow me around the internet yelling Bull Shit in the forums when ever I talked about this on the forums. This was just right before he got the forums to throw me out on my ass. And usually my post and my thread deleted. But, he would yell “Bull Shit” first before he got me thrown out.
I even uploaded an example program for him to study and this “STUPID SON OF A BITCH” still did not understand the concept. This is another reason he has no business being an admin of a forum on the internet or calling himself a truth seeker. He is too fucking dumb to be a truth seeker.
BAAAAAAAAAAHAHAHAHAHAHAH!!!!
I laugh alot to myself when I think about Ray and Darby so please forgive.
In my early days I used a single weighted check-sum but I had to wait longer for my programs to reconstruct a known file because of the collisions. But that was ok I had the time to wait. Being patient is why I succeeded at this when every one else told me I would fail.
I would just simply leave my programs running till the computer alerted me that my robot programs HAVE CONFIRMED A COMPLETED CONFIRMED FILE PATTERN OF A IMAGE, VIDEO, OR OTHER TYPE OF FILE THAT I WAS LOOKING FOR.
And, it had the weighted check-sum that I was looking for.
Rsync which is a old back up program. It uses a string of weak check-sums with a string of strong check-sum for a single file. When I say string I mean list. So it would break a computer file down into a bunch of weak check-sums and a bunch of strong check-sums and write that to a list as a backup.
Now, to reconstruct the file on another computer using that list it would create a bunch of small files with the same weak check-sums but their strong check-sum would not match. It would not match because the file has not being reconstructed yet. But, that is ok, because Rsync would roll the weak check-sums like a counter until their strong check-sums matched the target strong check-sums on the list then it would piece all this little bits of counters together to make one RECONSTRUCTED FILE USING CHECK-SUM HACKING!!!
RSYNC IS AN ESTABLISHED WELL USED WELL KNOWN PROGRAM ON THE INTERNET. IT ESSENTIALLY USES THE SAME METHODS BUT THE MATH IS DIFFERENT THAT I USE. SO, THERE IS MY VERIFICATION THAT THIS METHOD OF RECONSTRUCTION FOR COMPUTER FILES DOES WORK.
NOW, TAKEN ONE STEP FURTHER THIS CAN BE USED FOR — TAAAAADAAAAAA TIME TRAVEL!!!!
DARBY PHILLIPS AND RAY HUDSON IN YOUR FACES!!! Yeah!!! You guys don’t know shit.
I ESTABLISHED A FORUM AT
as a forum for
BECAUSE RAY HUDSON AND DARBY PHILLIPS HAVE PREVENTED ME FROM POSTING ON ANY OTHER FORUM ON THE INTERNET THROUGH THEIR EXTENSIVE CONNECTIONS ON THE INTERNET.
SO CREATING MY OWN FORUM IS THE ONLY WAY I COULD POST WHERE THEY WOULD NOT GET MY POST DELETED AND GET ME BANNED. IT WAS MY ONLY METHOD OF SELF DEFENSE AGAINST THEM.
I WRITE IN ALL CAPS A LOT BECAUSE IT PISSES DARBY PHILLIPS THE HELL OFF. Hahahah.
I am writing the rest of my books now. In time I will release the rest of my computer code and my work that is I do not die first from the death threat that http://timetravelinstitute.com has made against me.
Public please give me some time but I will be releasing the rest of my books and time travel programs to the public in time.
Prior to my next releases I am going to run some awareness campaigns to draw people into my method of time travel. Yes, I will give out the links to my blog(s) and web-sights Darby and Ray. In my next books I will publish those too.
One of my awareness campaigns will be a FULL WORKING VERSION OF MY TIME TRAVEL PROGRAMS ON KICKSTARTER ALONG WITH COPIES OF MY BOOKS. Of course when fully funded. Kickstarter does not work any other way. There will VIDEO’S MAYBE WITH MY DOCUMENTARY. The conspiracy against time travel can knock me down but they can not make me stay down. I always get right back up.
Kickstart update:
(On kickstarter I have started writing my crowding funding I just have not posted it yet. I have to get ready to make delivery of my programs and  book first before I post it.)

Do you know that Ray Hudson and Darby Phillips once told me they were “DE-BUNKERS”

BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAAHAHAHAHAHA!!!!!!

BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAAHAHAAHAHAH!!!!

Oh shit I got tears coming out of my eyes.

BAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAAHAH!!! I have to stop laughing my guts are hurting.

Well I am still laughing my ass off as I write this post. De-Bunkers yeah right. Hey Ray and Darby. CAN YOU SPELL STUPID?
THAT IS SPELLED S, T, U, P, I, D. Stupid, that means you guys Ray Hudson and Darby Phillips.

Those guys can not debunk shit. THEIR FUCKING PEDOPHILES MAN!!!

Hey Ray Hudson and Darby Phillips. You guys are pussies. PAMELA FROM THE TITOR STORY COULD KICK BOTH YOUR ASSES WITH BOTH HANDS AND ONE LEG TIED BEHIND HER BACK. YOU GUYS AINT JACK SHIT!!!

Watcha going to do now mother fuckers (Talking to Ray and Darby) Huh? You already played the hacking card hacking my home network and taking pictures of my preteen underage girls. You already played the troll card. You already played the banned card getting me banned from forums on the internet. You have made a death threat to me. You’ve chased me all over the internet cyber stalking me and cyber bulling me without the law trying you for your crimes and putting you in jail which is REALLY SUSPICIOUS. You,ve attacked my web-sights and forums. What are you “has beens” going to do now?


FUCK YOU!!! (Talking to Ray Hudson and Darby Phillips)

You aint got nothing!!! Im still here on the internet and unlike like John Titor I did not run away. I am not going to run away. On Titor they were trying to expose his identity that is why Titor left the internet. The longer he stayed posting the more people like Ray Hudson and Darby Phillips would try to find out who he truly was. So that is why Titor left the internet.

Now, they started calling me by my real name in public trying to force me to leave too but I did not. And after their hacking attempt against me I started using their last names because they lost that right when they committed crimes against me. Also both Ray Hudson and Darby Phillips posted their full names in public so that also gave me the right to use them when talking about them. The only reason I know Rays last name is because he told me so in a public post on his own forum.

So to Ray Hudson and Darby Phillips you can not make me run away you “cock sucking sons of bitches”. I often call them cock suckers because they go to low extremes to get revenge on me for using my first amendment rights while I stand upright. Plus, they started calling me names long before I ever publicly called them a name.

Darby first called me a name on usenet a long ong time ago when someone tried to reply to my post and I did not answer. Darby told that that guy “Don’t bother I have been replying to that “ASSHOLE” for years. This was long before I ever said a word to Darby. He was calling me names before I ever even talked to him.

Then Darby on his forum started calling me a “Troll”. And Ray him and I went around on the forum at http://timetravelinstitute.com.

So, these guys can’t bitch when I use descriptive words to describe them. They do it too.

These guys use their degrees from college and their government or former government jobs TO HIDE THE SHIT THAT THEY DO IN REAL LIFE!!! TO NOT BE ACCOUNTABLE FOR THEIR CRIMES!!! And the United States Government lets them. The FBI lets them. Regular law enforcement lets them. They all let them get away with breaking the law. AND WHY IS THIS HAPPENING? WHY? These guys can cyberbully, cyberstalk, and harrase people and abuse the young and the FBI AND THE LAWFORCEMENT DOES NOTHING!!! AND WHY???

Also, Darby Phillips and Ray Hudson can not blame me very much for running off at the mouth this morning.

Their little boy-toy bitch Aaron Hiniker talked me into buying a Hooka and smoking it when he was emailing me pretending to be my friend all the while hacking my computer.

Aaron Hiniker was acting on orders from Ray Hudson and Darby Phillips. Aaron I am sorry they forced you to do that and no telling what else.

All I can say to you son is go take some more hits off your joint. Just remember your over 18 now and responsible for your actions.

That includes committing felonies. But, you were a victim of Ray Hudson and Darby Phillips so if you do get arrested and go to trial for your felony crimes maybe the court will be lenient with you.

I know it is probably not right to make fun of poor Aaron Hiniker’s situation but I can not help it. He reminds me of a funny Rodney Carrington joke.

This joke as he told it as best as I can remember it a fag talked him into “Trying a dick”. Years later he was on a rollar coaster with a buddy crying instead of enjoying himself saying “I wished I had not tried that dick”.

It sounds a lot better with Rodney telling it than with me writing about it in a blog but when ever I think of Aaron Hinker I think of that old Rodney Carrington joke.

Except in poor Aaron Hinker’s case there were “TWO OF THEM” and they were not fags they were pedophiles. He probably had Ray Hudson pounding one hole and Darby Phillips getting serviced in the other hole.

Damn, yep, that ruined a lot of roller coaster rides for that young poor boy Aaron Hiniker.

Yeah Aaron, go smoke your joint. YOU DESERVE IT. And why your  smoking your joint enjoy this.

Now, I want to make a special dedication to http://timetravelinstitute.com’s TV show called “TWO MEN AND A BOY”. Aaron, Ray, And Darby this video is for UUUUUUUUUUUUU!
The three greatest butt buddies the world has ever known. ENJOY THIS YOU SICK BASTARDS!!! (Talking to Ray Hudson, Darby Phillips, and Aaron Hiniker who lets this shit happen to him for his own reasons.)

 

——————————

I found out I can do my documentary and or films and release those as SELF PUBLISHED. So when my documentary is ready  I will be doing this. I am going to give my watching tv for a while and work my real job then work on this in my spare time along with the rest of my stuff.

——————————

I was not going to show this but I just can not help myself. If anyone wants to make HIGH ENERGY AT HOME TRY ONE OR BOTH OF THESE THINGS.

With playing with the things I talk about below it is possible for fire, explosions, poisoning, electrocution, and other accidents to happen.

These examples only gives the basic operation not the entire schematics to make any of this work.

There is more to this than I am showing. So, here is a few examples. There are many ways to build a flux compression generator. What I show below is one of the easiest ways.

Here is my disclaimer.

I am not responsible for what you do and what you read.

There are many good videos out there and on youtube for how to build a plasma ball. 


How to build a vacuum chamber and so forth. 


If you build a fusion reactor like I did take care in playing with high voltage and current. It can kill you. 


Also, take care in using gases, valves and pumps. On these gases you can die of Cerebral hypoxia or gas poisioning. 


If you do not know what you are doing please get help or give up.

Measure the Radiation when playing with fusion!  Different gases will give different results with the fusion process. Just for the record the moto about playing with fire holds true for fusion too but fusion is much more dangerous and accidents can happen before you know it.


Focus Fusion is suppose to use Hydrogen-Boron because its aenutronic.  Now, there may be a way to buy it but I ended up coming up with my own receipt to make hydrogen boron. Basically I made boron then went through a long process to mix it with hydrogen. No, it was not nearly as simple as what I said. It was a bitch to do all that plain and simple. I still did not get enough fuel and I had to go back and make more. I still do not know if I did it correctly but the damn reactor worked anyway so I guess I got most of it correct. 


Now what I built is not very big at all. My reactor is no bigger than a small thermos and my flux compression generator is no bigger than a small tube of tooth past. So, I did not need a lot fuel to make my reactor run. I would love to show a picture of it but for legal reasons I am not going to do that. I also mounted it on a drone and had it power my drone. Now, I have it taken back off and I am working with it some more. I took a collection of old cell phone batteries and built me a battery for my drone. It was from cell phones that I have collected over the years so it did not cost me a damn thing. Im good that way.


First I will show how to make a Flux compression generator:

Warning a flux compression generator BY WAY OF A EMP PULSE IT CAN EMIT can blow out all the electronics in your home causing you to have to REWIRE YOUR ENTIRE HOME AND REPLACE ALL YOUR ELECTRONICS!!! IT CAN EVEN FUCK UP YOUR CAR, TRUCK, OR SUV UP AT THE SAME TIME!!!
 
THE EMP PULSE FROM THIS CAN ALSO OVER HEAT YOUR WIRING AND BURN DOWN YOUR HOME. SO DONT WIRE IT UP WRONG AND USE IT WRONG.
 
IF THE CURRENT IS NOT CONTROLLED IT CAN ALSO CATCH ITSELF ON FIRE AND BURN YOU AND SET YOUR WORK BENCH OF FIRE. 
 
ALSO DEPENDING ON HOW YOU USE THIS IT CAN EVEN EXPLODE!!!
 
IT CAN ALSO ELECTOCUTE YOU TO DEATH!!!
 
SO PLEASE DO NOT TRY THIS IF YOU DO NOT KNOW WHAT YOU ARE DOING!!!
A FLUX COMPRESSION GENERATOR CAN BE USED TO RUN A FOCUS FUSION REACTOR OR OTHER FUSION REACTOR. THE HEAT CAN BE CONVERTED BACK TO ELECTRICITY BY WAY OF PELTIER UNITS.
(UPDATE: I recently red about crystal batteries. Some people have had these things powering motors and lights for years. It may be possible to power this with such batteries without the peltier units. Search youtube for crystal battery or crystal power cell.)
Now with a focus fusion reactor it produces electricity directly from the by products of the fusion. But, heat recovery and other things can be used to recover energy. But with the FCG this can be made to be completely SELF SUFFICIENT!!!
ON MY FOCUS FUSION REACTOR I USE PELTIERS (CONVERTING THE HEAT BACK TO ELECTRICITY) MOUNTED TO MY REACTOR TO POWER A DRIVER COIL WHICH POWERS A HIGH VOLTAGE COIL WHICH GOES TO A MARX GENERATOR WHICH GOES TO THE FOCUS FUSION REACTOR.
WHEN THE MARX FIRES MY MICO-CONTROLLER CREATES A OPEN IN THE POWER SUPPLY TO PROTECT IT AND MAKES THE NEGATIVE OF THE SHORT COIL COMMON WITH THE NEGATIVE OF THE SHORT ROD TO SWITCH THE LOAD TO ITS INTENDED DESTINATION. THIS COULD POWER A HOME, CAR, OR OTHER PROJECT.
I HAVE A DUMMY LOAD IN THE FFR TO HEAT THE PLASMA.
I put my FCG and FFR in different Vacuum chambers because I used a different gas as the dielectric for my plasma capacitor. Plus I can work the space better with it that way.
When the FFR is down power can still be taken from this device if the power is taken from the FCG via another power supply. If the FCG is still running the plasma is still being heated and the peltier units are still working. So, strap on a secondary power supply to the FCG and keep drawing power without the FFR. This is a FREE ENERGY DEVICE!!!  Hint, the FCG puts out pure current so run it through a small resistance to up the voltage then get your secondary power supply working then your good to go.
Also it is possible for the DIY home nuclear scientist to use Tritum to make Phosphorus emit light which goes to a solar cell this would last FOR YEARS AND MAKE A SAFE NUCLEAR REACTOR then my above setup could be used with the FCG AND A POWER SUPPLY TO POWER HOMES, CARS, AND OTHER THINGS.
Now to build this your going to need vacuum pumps, valves, vacuum chambers and all sorts of components and varies things to make this work. There is enough DIY stuff on the net to tell you how to do this. Youtube and instructables will be your very best friend. You also need a good understanding of electronics and micro-controllers and programming. You may need a good electrician to install this in your home. I would put it in a box and not tell him what your installing though if you want him to finish the job that is. Tell him it is a generator. You may even need to buy a generator and have him install that then replace it with your fusion reactor/free energy device. That is up to you.
On vacuum pumps you can buy a venturi very cheap and it gives a low vacuum but it requires a running gas like air or running water to keep the vacuum on it.
You can convert a air compressor by finding the air intake and out take and fitting those with custom hoses and or valves. Very easy. You can get one of the 12 volt car pumps very cheap.
It is very easy to build a vacuum casing just make sure you have your valves installed and your ready to go. Install what ever else you need. One note of caution though. Make sure you know how high a vacuum your casing can take. Implosions can kill you or disfigure and cripple you for life.
If you like to play at home like I do here is my advice for getting started.
1. Build a simple induction furnace or charcoal or gas furnace.
2. Build a simple arc welder.
3. Build a simple CNC
4. Build a 3d printer.
5. Learn how to make molds and castings with not only metal but fiber glass, carbon fiber, and plastic.
6. Learn electronics and how to program micro-controllers.
     Get a learning kit from radio shack. I had one when I was 7.
7. Read a lot of books about building robots and electronics. I have a nook full of books. I still do a lot of reading on this subject all the time. One of my current home projects is a robot to do yard work. I would sit at my computer in my house and do my yard work. That includes cutting bushes and trees and trimming weeds. It will have a wheel barrel mounted on it for hauling and dumping. On the bottom will be a lawn mower. The wheel barrel will be self dumping and it will have a industrial robot arm. I may put a drone on it too with a saw blade for getting up high. It will take off from the robot and return to it and recharge from the lawn bot. I like to drink whisky from time to time while smoking my hooka so my neighbors may see my lawn bot driving erratically around the yard from time to time. Hahahahahah…
8. If you don’t know already learn to weld. Read a book first.
9. Never buy anything build it yourself. Why, because that is the only way to learn. Buying shit is expense. I scrap out tvs and microwaves for my parts. Usually a couple of times a year I pick up old stuff to scrap when my part supply gets low. I separate out all the resisters and other parts out into their own little boxes and put the big parts up in boxes and keep a list of what I have on hand on my electronics work bench. I built my power supply from a old computer power supply. I made my high voltage power supply out of a coil driver with a 555 timer, homemade high voltage coil you can make a small tesla coil. I like to use bread boards with holes pre-drilled and I solder my wires on the bottom for the connection. I hate making PBC boards so this saves me a lot of time.
Here are some of my scraped parts. On my devices I am am not showing those for legal reasons. But here are pics of some of the scrap I have laying around my home. By the way I have a large supply of 555 timer chips. They are good for so many things. My daughter the little girl that Aaron took pictures of without her permission painted my bench that you see here that has a lot of these parts laying on it. It was of a blue ocean with clouds and sailing ships.

 

You get the picture now. HOARDERS WARNING. ONLY KEEP WHAT YOU CAN STORE WITHOUT TURNING YOUR HOUSE TO SHIT. It is easy to become a hoarder doing this.
10. Start with the open source projects. They show motors, stepper motors, servo’s and all kinds of stuff you can make and give you the build of materials the schematic and everything. Do this for your 3d printer. Adruino is good to start with for your micro-controller. RepRap is a good open source printer to build on your own.
11. On 3d printing you will need to learn cad and how to draw 3d models also you need to be able to convert your files to different formats. It will save you a lot of time to design first before building.
I use blender and gazbo to run my simulations.
12. Learning C and C++ and python and java is good too. You will need this at some point in time so a good computer is highly recommend. Build the computer from scratch.
Then your in business. Why build these things. Well, because if you can not build on your own getting these things will not do you a damn bit of good. You will just be wasting your time and your money. You can also build your own machine shop after building these things. To get these things and not know how to build with your hands would be a wast of time. So, build it out and scrap shit for parts. DO NOT BUY ANY THING. ITS A WAST OF MONEY.
Now, once in a while I do buy electronic components but only when they do not come standard in what I scrap out. The last time I bought anything was when I had to buy avalanche diodes and high voltage parts for my marx generator.
I spent $200.00 dollars doing that but it was for a good cause. It was for my home protection drone. I used old cell phone batteries for my power supply on that puppy.  Never buy anything if you do not have to. The battery I built is way better than what I could buy and IT WAS FREE. On my lawn bot from #7 I am putting a homemade aluminum air battery on it.
I can recycle the aluminum in my furnace and NOT BUY A BATTERY AT ALL AND IT LAST LONGER TOO. I am going to make my motors for the lawn bot with my furnace and copper for my coils and my own H-bridge for my motor controller. My wheels will be chain driven with a sprocket.
I will use adruino and xbee for my radio control from my computer with a camera on the lawn bot. I have the design for my lawn bot in one of my books so I will not have to design much. The design in my book does not have the drone with the saw blade and does not have the air battery design nor does it have the robot arm those will be additions I make to it.
My arm will dump the wheel barrel so I will not use the book design for that. I basically build a frame and mount my wheel barrol on top and my law mower on bottom then put my electronics and additions to it then come into my house and use my computer. My lawn mower will have to be started manually so yes I will still have to go outside when starting my lawn mower and shutting my lawn mower off.
Where I live it gets hot as hell during the summer and damn cold during the winter. So, I can do my work even landscaping if I want from my cushy computer and gaming chair. What ever I need to do outside this bot will be able to do it.
And, when it rains I can still mow the grass. But, I am screwing up. Right now my wife does that. After I build this lawn bot she will put everything outside on me.
Yeah, women are like that. I ought to hide it in my motorcycle garage I built last summer when Aaron and I were talking and only use it when she is not home then I can complain about all the work I did to get her to thinking I am the man. I always have a angle I can work with her but after all these years she has figured me out pretty much so I probably will not get any special treatment for doing the yard work this way.
I am thinking about building a plasma collider for some physics experiments to see what elements I can make at home but I need to check my local laws first. I think as long as what I make is not radioactive or dangerous I will be ok. My collider would be a hybrid of different things too. I would be able to bomb it with electrons, protons or neutrons along with my high energy lasers, Tesla coils, and high EMF and I would have a fusion reactor with it too. But, I need to check with the law first.
Now, I am the one to talk on buying things because I often have get lazy and have stuff made for me. But, I also know how to build so I am good to go. Also, you can scrap old toys and stuff for motors and parts.
Also, I have found work a-rounds for lots of things. Like motor controllers. I can use a micro-controller with relays and a shaft encoder with signals going back to the micro-controller and save money on buying or building a motor controller. It is more code to program but less money for material cost. And on the relays now it is possible to use solid state relays and I can still use PWM for the motor. Also, this design can use a motor in place of a servo or stepper motor. Now, the encoder can go back to a logic circuit or have a program written to de-bounce the signals from the shaft encoder in the micro-controller but having a logic circuit gives better results.
Also, another reason I like to build my motors. Yeah, go try to buy a motor for high amp high torque applications. They can get from $50 dollars or so per motor up to around over $1500 dollars per motor.
Then firing up a home made metal furnace or CNC machine and spending a lot of extra time and frustration does not seem all that big a deal. When you get up to real big robotic applications the motors require gears and so forth and get really expensive very quick.
I have been real inventive but I do not want to complicate this post any further by talking about that. Yes, being your own builder seems like a bitch in the short run but in the long run it can save you big big bucks if your a diy inventor.
The thing is to think outside of the box or normal current given society norms. On my drone my shaft encoder tells me the speed of the motors. On my robots I get the speed of the bot, the speed of the motor, and the angle of the motor.
Also, in my shaft encoder I have built in a error correction which is badly needed for this type of thing. I use the top of the encoder for speed, direction, and angle but the bottom of the coder has another encoder for error correction. So, I have basically two encoders running per shaft. One for the work and one for the correction of the work.
So, I can use just plain jane dc motors with a shaft encoder and when I have to gear boxes for what ever I need to do and I am done. I have a generic motor that I can run for all my applications.
The only difference is sometimes I guy the big motors and sometimes I buy the small motors but what I do with them is always the same thing every time excepted used as canned mechanics and canned code I just change the variables in my programming and I am good to go.
Now lately I have been looking at building a hybrid motor. When I do everything I think I know will probably be worthless. But the attempt will be fun and I may even learn something. I may even get model # 2 that I can use for all my apps but right now it is too early to tell.
Before I go I came across someone in the search engine looking for my old websight from years ago called “How to build a homemade nuclear reactor” at http://reactor1967.fortunecity.com.
Good day everyone.
————————————————
I recently read that science is doing an experiment to see if we live in a physical universe or a informational universe.
My money is on the informational universe but who knows I could be wrong. I do know that even if we live in a physical universe that there is still a informational world that can not be felt, seen, or touched but on computers it can be explored. That world will still exist no matter what the outcome of the science experiment.
Here is more about the pedophile ring at http://timetravelinstitute.com
Still my home network is under attack from
It has gotten way worse since I opened my blog back up and told the world about them being a pedophile ring.
All I have to say to Ray and Darby is that you guys are still little more than a couple of dogs trying to hump my leg. In fact as I write that I feel bad for insulting the species of canines by using canines in the same sentences as Ray Hudson and Darby Phillips. Sorry dogs but these guys draw similarities to your species. As for humping you guys think about sex way too much. If you guys can not get laid by a regular women hire a damn escort service or something. Jesus Christ. Why cant you guys (talking to Ray and Darby) “get real lives”?  Why? Hanging around with kids all day is “NOT THE ANSWER TO YOU GUYS PROBLEMS”!!!
And, coming after me for speaking the truth is “NOT THE ANSWER TO YOU GUYS PROBLEMS”!!!
What is the answer to these guys problems? A really really long we are talking about years or decades here and a really good rehabilitation program to go with that time served. Society would greatly benefit from this less minors would get used and hurt the way Aaron Hiniker was used and hurt and I could move on without my leg getting humped every day.
And last for today I just wonder out of all those little boys and little girls that Darby Phillips talks to every day “HOW MANY OF THOSE KIDS DID DARBY GET PERMISSION FROM THEIR PARENTS TO TALK TO THEM? ” NONE!!!
Don’t you think if your going to talk to somebody’s kid you would at least make sure their parents know about it? Hell, those parents did not even know their kids were talking to a former CIA mind control expert and a person who may have giving LSD to the unibomber. WOW, YOU THINK THAT WOULD BE IMPORTANT BEFORE THAT CHILD TALKS TO DARBY PHILLIPS ON THE INTERNET!!! You think?
HOW MANY OF THOSE PARENTS WOULD APPROVE OF DARBY PHILLIPS TALKING TO THEIR KIDS ON THE INTERNET IF THEY “KNEW WHAT HE USE TO DO FOR A LIVING?” I seriously do not think any parent would approve of Darby Phillips talking to their children.
I can not see any mother allowing her child to talk to a ex-cia mind control expert in private or even in public on the internet that is a full grown adult. AND MORE SO KNOWING THAT ADULT IS A EXPERT IN CONTROLLING PEOPLES MINDS!!! EVEN IF IT IS A CONSPIRACY OR TIME TRAVEL FORUM!!! AND THEY DARBY PHILLIPS AND RAY HUDSON HAVE these kids and young adults hacking computers and running operations for them on the internet.
DARBY PHILLIPS AND RAY HUDSON ARE RUNNING
A CHILD INTERNET ARMY!!!”
And, lets not forget Ray Hudson who spends “ALL HIS FREE TIME WITH CHILDREN AND YOUNG PEOPLE.” They are not his kids. And like Darby he does not get permission from their parents. Now, he teaches school but he gives those kids “FREE PASSES TO HIS FORUMS”. Yes, free passes!!!
FIRST HE GETS ACCESS TO YOUNG PEOPLE AND CHILDREN!!!
THEN HE AND DARBY GET PRIVACY WITH THESE KIDS AND YOUNG PEOPLE!!!!
THEN DARBY BEING A MIND CONTROL EXPERT THEY GET CONTROL OVER THESE CHILDREN AND THESE YOUNG PEOPLE!!!!
THEY RECRUIT THESE CHILDREN AND YOUNG PEOPLE INTO “THEIR CHILD INTERNET ARMY!!!”
 
It is that “CHILD INTERNET ARMY” that Darby Phillips and Ray Hudson have been using to stalk me, cyber bully me, Harasses me, and attack me and my family on the internet, and make a death threat to me. IF THEY ARE DOING THAT TO ME THEN WHAT THE HELL ARE THEY DOING TO THESE KIDS AND YOUNG ADULTS!!! ARE THEY PROSTITUTING THEM TOO??? 
Its too bad the law is protecting these guys. It is really too bad for these kids and young people. Even though Aaron really pissed me off for what he did to me and my family I can not imagine what Darby Phillips and Ray Hudson have put him through. And even if the FBI did arrest Aaron and charge him for his crimes I doubt Ray Hudson and Darby Phillips would give a shit. They would just use the next young person to do their bidding.
—————————————————————-
Hey Darby Phillips and Ray Hudson. On that death threat you had your boy-toy bitch make to me on your behalf my question is what are you guys going to do? Send one of your ten year olds down here to knock me off.
BAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHA!!!
You know you guys (Ray Hudson and Darby Phillips) could at least let these kids loose their virginity before you make criminals out of them.
Oh, “Brain fart”: I forgot losing their virginity is the first thing these kids loose after meeting Ray Hudson and Darby Phillips. So, they really do loose their virginity before those guys make criminals out of them. My bad, sorry.
So, let me rephrase the question. You guys (speaking to Ray Hudson and Darby Phillips) could at least let these kids get jobs and leave mom and dad before you make criminals out of them. Could you not? Well maybe not. Pedophiles have to have kids to work with. Oh, my bad again. Sorry.
So, scrap that last question it was pointless.
Now, let me get to the point for these “Sons of bitches” Ray Hudson and Darby Phillips. Aaron Hiniker when you perverts sent your boy-toy (Talking to Ray Hudson and Darby Phillips) was still living at home with his mommy and daddy. Gary and Susan. When you guys (Again talking to Ray and Darby) sent that poor young man to install his Rat software on my machine and hack me and my family’s computers.
Further more Aaron Hiniker your “Boy-Toy” revealed to me that he only had one job in his young life working as a parking lot attendant for his sister Ashly who was his boss. He only lasted 3 months at that job BEFORE PUSSYING OUT AND QUIETING HIS JOB.
Which tells me. THAT BESIDES MAKING CRIMINALS OF THE KIDS YOU(Ray and Darby) TALK TOO AND WORK WITH YOU GUYS MAKE PUSSIES OUT OF ALL THE CHILDREN YOU GUYS TALK TOO AND WORK WITH. YOU MAKE PUSSIES OUT OF THE KIDS YOU ARE SUPPOSE TO BE EDUCATING AND HELPING. ALL YOUR KIDS ARE PUSSIES BECAUSE OF YOU!!!! (TALKING TO RAY HUDSON AND DARBY PHILLIPS).
Because of Ray Hudson and Darby Phillips Aaron Hiniker will “PROBABLY WILL NEVER BE ABLE TO HOLD DOWN A JOB”. WHICH MEANS IF HE DOES NOT HAVE SOMEONE TAKING CARE OF HIM THEN HE IS SCREWED!!!
Aaron Hiniker more likely than not is sitting at home tonight SMOKING A JOINT TRYING TO FORGET ALL THE SHIT RAY HUDSON AND DARBY PHILLIPS MADE HIM DO.
Ray Hudson and Darby Phillips I hope you sorry ass mother fuckers are proud of yourselves. Your prodigy Aaron is screwed unless someone takes care of him.
Yep, all those kids where ever they are that Ray Hudson And Darby Phillips work with will turn out to be pussies I believe in part because they (Ray and Darby) distill some kind of warped fucked up fantasy into those kids and young peoples minds. Darby, is that how your mind control shit works?  
Every one you see Darby worked for the CIA as a “experimental mind doctor” The unabomber Ted Kaczynski participated in the CIA programs and went on to kill lots of people.
So, NOW AARON HINIKER HAD HIS MIND WARPED BY HIS ASSOCIATION WITH RAY HUNDSON AND DARY PHILLIPS?
Aaron freely admited to me using drugs. THE CIA USED DRUGS ON TED WHICH DARBY WORKED FOR!!! PROBABLY IN THAT SAME PROGRAM!!!
Did Darby Phillips and Ray Hudson install SOME KINDS OF DRUGGED INDUCED FUCKED UP FANTASY INTO THIS YOUNG AARON HINKERS HEAD TO MAKE HIM DO WHAT THEY WANTED HIM TO DO??? TO MAKE HIM HACK MY HOME NETWORK AND TAKE PICTURES OF MY PRETEEN LITTLE GIRLS??? AND, WHAT DID THEY DO WITH THOSE PICTURES OF MY KIDS???
DARBY DID YOUR CIA EXPERIMENTS NEVER END??? ARE YOU STILL DOING MKULTRA ON THE KIDS YOU ASSOCIATE WITH IN YOUR FORUMS???
YEAH, TOO BAD THE FBI DOES NOT GIVE A FUCKING SHIT!!! TO BAD THE LAW DOES NOT GIVE A FUCKING SHIT!!! No one will ever know the real truth because there will be no investigation. NO BODY CARES!!!
Now Aaron Hiniker threaten to kill me. Ted Kaczynski did kill people after his association WITH THE CIA!!! IS AARON HINIKER THE NEXT TED KACZYNSKI??? AND THIS WILL NOT BE INVESTIGATED WHY??? BECAUSE NO ONE GIVES A SHIT. REALLY? THAT IS FUCKED UP!!! What about the other kids they talk to every day? Are they making killers out of them too? Is that what their “CHILD INTERNET ARMY” is for? Hacking and killing for Ray Hudson and Darby Phillips?
Ted Kaczynsk learned his method of assassination while participating in the CIA MKultra. Now, he just may have over heard two agents talking or something to that effect but through his association with the LSD experiment he learned his method of assassination that TOOK YEARS FOR THE LAW TO TRACK HIM DOWN. IN FACT THEY NEVER DID. IT WAS HIS OWN BROTHER THAT BROUGHT HIM DOWN. So, TED was in part CIA TRAINED TO KILL!!!
The mail bombings Ted Kaczynsk performed he learned while receiving LSD from the CIA.  Maybe not intentionally on part of the CIA but you know when you have CIA agents standing around running off at the mouth and someone listening to what they are saying. Well lets just say from my time-line perspective that changed a lot of shit in the time-line. People died because of Ted receiving LSD from the CIA.
Now, this question is for Aaron Hiniker himself. Are you going to murder me with a mail bomb?
You see the CIA that Darby Phillips worked for put in the mind of Ted Kaczynsk
1. The “Method” of his assassination.
2. Through the LSD MIND CONTROL they put the “Motive”
3. And through his association with the CIA they put the “Means” the united states postal service.
TO KILL PEOPLE!!!
Now, question remains what Method, Means, and Motive does young Aaron Hinker have in his mind right now for his threat to kill me? What about the other minors and young people in Ray Hudson and Darby Phillips “CHILD INTERNET ARMY”?
Well do not worry everybody I really doubt the FBI and LAW will investigate any time soon. Aaron probably already has his Kill orders ready to go. No one gives a shit.
But what if Aaron now goes on to kill not just myself but lots of other people? The press is always screaming about how lives could of being saved if someone had done something more.
Now is that chance the FBI and Law enforcement have here. But I guess people will have to die before anyone gives a shit. Like is normally the case. So FBI and Law enforcement can just go on ignoring this until someone or a lot of people die from this.
Also to date I always call Ray Hudson and Darby Phillips cowards because most of their communications with me are by way of third party or anonymous post. These guys do not even have the balls to talk to me straight up man to man. All these years I have been writing this blog them they never have talked to me directly. Not that I need to it is them that have been chasing me. It is them that have the problem with my blog. As for myself I may have some questions here or there but I know anything these guys have to say would probably be straight out lies.
Which means these guys are not real men and that includes their boy-toy Aaron. They are the cowards, trolls, perverts, and criminals I say they are all through out my blog. I will never get a straight conversation out of these guys but I really do not have to because their actions speak louder than their words. There actions speak volumes about who they really are as people.
Now, Ray Hudson and Darby Phillips primary means of dealing with me is sending other people after me to do their dirty work for them. They have done that on numerous forums and places on the internet even sending a hacker after me.
Now, How would they feel If I sent some one or something after them? Huh? Im pretty sure they would not like it. They want to dish it out to me but I seriously doubt they could take it if I did to them what they do to me.
These guys are getting on up there in years. They are getting old. I mean they are like approaching “OLD GEEZER STATUS”. And, everyone and ( by that I mean not just me ) is getting tired of their shit. These guys should really think about hitting their retirement “FOR REAL THIS TIME” and do it soon. That is all I have to say about the matter for now.
Every body have a nice day.
——————————————————————-
Stuff like my treatise below is why I am not wanted on the internet. This is why I am being harassed to leave the internet. That is my guess. I just hope Ray and Darby get my meaning when I say to them “YOU GUYS ARE ASSHOLES!”. I keep saying it over and over again because I do not think they can retain anything for very long in memory. So, if I keep saying it they will remember it. You see, I am refreshing their memory. Hahahah.
Ray Hudson and Darby Phillips. I am considering writing you guys a book and mailing it to you personally. Here is what it would look like. See my picture.
BAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAH!!!!!!!!!
Hey Aaron oh fake pal of mine. I will mail you a copy too. You can read it during your fuck breaks with Ray and Darby.
BAAAAAAAAAAAHAHAHAHAHAHAHAHAHAH!!!!!!!!!!
I know I should not laugh at poor Aaron Hinikers situation. But, hell the FBI and law enforcement DO NOT GIVE A SHIT so why should I?
Some how I believe Ray and Darby are still officially connected with the government but officially Darby is retired and Ray is a aerospace contractor but still why did Ray tell me I was being watched when I was booted by him from http://timetravelinstitute.com?
Why did they send in Aaron in to view my computer screen and go through my files? Was this a real CIA operation? Questions still remain. I got some good stuff for you below.
—————————————–
The
Burris theory of UFO propulsion and mechanics of space-time. A treatise
on how UFO, gravity, gravity waves, and space-time really work.
Copyright (c) 2014 timetravelinstitute.biz
You will have to click on the pictures to make them larger.
What I am showing below can be a amplifier and or generator of gravity waves.
Gravitational
waves can radiate away as energy the momentum and angular momentum of
an object. So, it is possible that these gravity waves modulated
correctly can carry away the motion of an object as energy that a body
would have in a gravitational field. Thus, preventing that gravitational
field from acting upon that object as it normally would.
Now,
if the phase and wavelength of those gravity waves is changed it can
effect how the momentum and angular momentum is carried away thus
controlling the direction of an object within a gravitational field.
There is a lot more to this I am just trying to show an example of
how gravitational wave generators/amplifiers work so the rest of what I
wrote below makes sense. Now, using gravitational waves with gravity
wave generators the momentum and angular momentum can be +, 0, or -. The
pilots can control the momentum and direction of their ship this way.
In fact on their dash boards in their UFO this information is DISPLAYED
ALONG WITH THE STATUS OF THE GRAVITATIONAL WAVE ENGINES.
So,
how UFO’s fly is by using gravity waves to to radiate away as energy
their angular momentum and their momentum. Thus allowing them to FLOAT
IN MID AIR!!! Now for the rest of the show.
Now after the gravity wave generator/amplifier is running ok. Perform experiment two.
Now, gravity can be used to experiment with Time, Space, or both space and
time. So, in my field of “Time Travel Research” because I am a DIY time
travel researcher this is of interest to me. I also have a keen interest
in the Hutchinson Effect. Maybe both a combination of the Hutchinson
Effect and Matter Gravity Wave Modulation can be used to build a real
field propulsion system.
On making a real life gravity wave generator/amplifier to make one for
any practical use would need the field of nano-technology
for fabrication which does not currently exist in any us-able form on
earth right now except in government black projects.
One of these gravity amplifiers/generators could be built using computer
chip technology but a few new developments would be needed but not too
much. Then there are a few lessor known ways. IBM used
scanning tunneling microscopes to move atoms. Now a much hyped up
version of this method could be used as 3d printer to print a gravity
wave amplifier from the ground up.
I do know of some things but if I went as far as to post them I might
could get into a little trouble. I try to be careful about how much I
post because if I go too far in posting technology then I could break
the law and get arrested or if I have any future legal problems some
things could be used against me. So, I try to toe the line and stop
short of what I post and how I post it when it comes to technology.
Also, I hate giving away stuff for free. I try to give just enough to
prove my points I am trying to make in this blog.
I found one flaw in Bob Lazar’s story on the gravity wave amplifiers. He
called them amplifiers but in my research of the topic I found that
these things can be used as a generator to make the gravity wave then
to amplify the gravity wave at the same time. So, I truly believe that
Bob was somewhat confused has to how his UFO really operated
physically.
What Bob had to say made a really good story but was not really useful in
replicating the technology he talked about. If he was really back
engineering the UFO it seems like he would know more than what he had to
say. I think Bob may have been just a simple technician or lab
assistant. Really not working as high of a position as he said he was.
Now, taken than it was proven that Bob worked in lower level positions than
what he claimed he actually worked ( which is true and why his story has
problems ) then this would confirm. Yes Bob did work at Area 51 but
again not so much in a high position as he said he did. Because of this
I attribute to him still being alive. Had he known more like how the
amplifiers/generators REALLY worked then I don’t think he would be
walking around in public right now. Since he didn’t know shit they let
him go with his really good story.
The fact that Bob said gravity generators required element 115 to function
is in reality DISINFORMATION!!! No, element 115 may be ok for UFO
reactors but gravity wave generation can BE PERFORMED WITHOUT ELEMENT
115!!! PEOPLE CAN START BUILDING GRAVITY WAVE GENERATORS RIGHT NOW!!!
Also, gravity waves can be used to build new types of accelerators for
studying matter collisions and making matter for industrial uses and for
power production. OOPS, I might upset the oil industry. It can be used
to create fusion and or fission for new types of nuclear reactors and or
weapons. Also, it as said here gravity waves can be used for
propulsion.
The gravity wave machines where “BOTH GENERATORS AND AMPLIFIERS AT THE SAME TIME!!!” They were not just amplifiers only as Bob claimed. If Bob knew more about them it seems like he would of talked about it. But, he
never did. Which seems to me he does not know as much about them as he
should have in the position that he said he worked in.
Now that does not mean that they did not use the gravity waves from the
reactor. They may have. But the amplifiers themselves could produce
THEIR OWN GRAVITY WAVES!!! So, they were generators too.
So, this is my understanding of the matter. This is so because in order
to amplify the gravity waves the amplifiers had to be able to create the
gravity waves too. It had to create the waves to amplify a gravity wave. So, whether or not the devices on Bob’s UFO were amplifiers or generators is uncertain. I think they are both.
Now, below you see I posted some pics of some friendly interplanetary visitors. Now, as gravity works it creates a distortion in space-time that a object falls into. Gravity bends space
causing it to swirl like a vortex or tornado. But, we can not physically see this.
The UFO below is falling into a vortex that it is creating that is equal or
stronger than the gravity vortex coming from the earth.
If we could see this it would like a tornado with a mirror above it or an
inverted tornado on top of another tornado. Now, giving one of those
tornado’s would be very large and the other small but for the sake of
argument here just think about two tornado’s only. Its less confusing.
So, to the craft it is like being in interstellar space with no large
bodies around it. The pull from the top vortex is cancelling out the
pull from the bottom vortex. So, the UFO actually has very little or no
actual gravity acting on it.
Also, because the small vortex is moving with the ship inertia is being
cancelled out too. It can pull lots of G’s and the pilot’s will not feel
it.
You see, when gravity moves with a object there is no inertia. Inertia IS
ONLY CREATED BY GRAVITY REMAINING STILL AND THE OBJECT MOVING AGAINST IT!!! IN FACT THERE IS AN EQUATION FOR THIS. Im not sure if main stream science has that equation or not. I have seen it in my time travel
computer media. I may be fucking up by showing it but I need to so I can
prove my points here.
Now, in space there is no gravity per say that can be felt but there is
still gravity so there is still inertia. That inertia can be used to create gravity like force by acceleration. Because the object is still moving against gravity. But, there is no gravity moving with the object as it accelerates. So, hence the inertia. Inertia is THE DIFFERENCE BETWEEN GRAVITY AND ACCELERATION!!! WHEN GRAVITY MOVES WITH THE OBJECT THERE IS NO INERTIA!!!
INERTIA = FIXED GRAVITY – ACCELERATION
 
Note:
I have not set down and done the math on this. I am recalling it from
memory from long ago when I read it in my time travel computer media. It
could be INERTIA = ACCELERATION – GRAVITY. For my purpose here I will
just leave it like it was. INERTIA = FIXED GRAVITY – ACCELERATION. I
would have to set down and figure out units and all sorts of shit to
work this out so I will leave it. If anyone wants to work with it then
go ahead.
 
On this equation it has been a while since I looked at it from my time
travel computer media. This is my best as I can remember it. But,
when accelerating or even moving against fixed gravity we get inertia or
G – force. When gravity moves with the object then there is no such
thing. Its gone. The aliens figured it out why the hell we earthlings
can not figure it out I don’t know. Oh well.
Now, when you get varies points of gravity then all hell breaks loose when
it comes to inertia. If the government wants a way to kill aliens then
PUT UP A POINT OF FIXED GRAVITY WHEN THEY ARE PULLING THEIR MANEUVERS WITH THEIR UFO’S IN THE SKY. YOU WILL GET ROAD KILL INSIDE THEIR SHIP. THEIR BIG EYES AND FACES WILL BE SQUASHED LIKE BUGS UP AGAINST THEIR OWN WINDSHIELDS!!!
HAHAHAHAHAHAHAHAHAHAHA!!!
You see their ship is only countering the earths gravity field. It is not
planning on any other points of gravity to appear. So when the jet fires
a fixed point of gravity at their ship it will create an inertia field
inside their ship while they are pulling a very HIGH G TURN. Can anyone
say “SURPRISE!!!”
HAHAHAHAHAH!!!!
Now, that would require BORROWING A GRAVITY GENERATOR FROM AREA 51 AND MOUNTING IT ON A FIGHTER JET THEN GETTING CLOSE TO A UFO AND FIRING THE GRAVITY GENERATOR AS IT MAKES A 5000 mile per hour U TURN.
Yeah, them Aliens will not think that shit is funny at all. 
HAHAHAHAHAHAHAHAHAHAHA!!!
Here the Jet uses its gravity waves to cancel out the UFO’s gravity waves.
Now when that is done THEY ARE NO LONGER RADIATING AWAY THEIR MOMENTUM AND ANGULAR MOMENTUM AS ENERGY THUS AN INERTIA FIELD FORMS WITHIN THEIR CRAFT CAUSING THEM TO BE THROWN INTO THEIR SHIP’S WALL BY THE G’FORCES THEY ARE EXPERIENCING THUS CRUSHING THEM TO DEATH!!! 
You do that to a few UFO’s and them little buggers will not want to play
with us any more. If anyone of them lives through that shit you will
have one little pissed off alien.
With a few jet air craft with gravity wave generators the UFO can be
prevented from gaining altitude, accelerating, and forced to land or
crash which ever comes first. It would be kinda like a pack of tigers
taking down a water buffalo. It also may be possible for the military to
mount gravity wave generators onto their missiles so they can fly like
the UFO’s. Get in close, cancel their propulsion and gravitational shields, then explode.
USA MILITARY ARE YOU PAYING ATTENTION TO THIS SHIT!!! THIS IS HOW YOU DO IT GUYS!!! Hello USA military? Is any body home? Wake the hell up! This is how you do it!!! Also this can cancel out their gravity shields so a
missle can get in or slow them down so a missle can get in. And, the
jets can use the gravity wave generators as shields from the UFO
weapons. The odds would be more even even though UFO’s can have some
very advanced shit. There you go USA military. YOUR FUCKING WELCOME!!!
Engineering note: The fighter jet gravity wave generator design and gravity waves would need to be a little different than that of the UFO. The UFO
designed their gravity waves and generator to be around their ship. The
fighter jets generator and gravity waves would need to be designed to
extend in front of the jet and around the UFO. So, things would be a
little different. I forgot to throw that in there. Though it may also
help the jets pull some extra g’s of their own and even move a little
faster so they can catch the UFO and pull this shit on them. On the
gravity waves from the jet they do not have to be nearly as powerful as
the UFO’s gravity waves.
Engineering note: THE JET ONLY NEEDS TO CANCEL OUT ENOUGH OF THE
UFO’S GRAVITATIONAL WAVES TO FORM A BIG ENOUGH INERTIA FIELD. THE FASTER THE UFO IS TURNING OR ACCELERATING THE SMALLER AMOUNT OF ENERGY THE JET NEEDS TO PUT OUT!!! IT IS CALLED THE BIGGER THEY ARE THE HARDER THEY FALL!!! WITH A LITTLE INERTIA THE UFO MAKING A U TURN AT A BIG SPEED WILL CAUSE THOSE LITTLE ALIENS TO BE SPLATTERED ALL OVER THEIR UFO WALL. IT WILL BE VERY MESSY.
Onto UFO mechanics. The reason UFO’s can look so differently is there are
many different ways of making gravity wave generators. Above I showed a
generator using matter. Now, energy can be used. By that I mean very hot
plasma with high frequency lasers, magnetic fields, and EMF or EMP
modulating the plasma fields to create gravity waves. So, that is why
not all UFO’s look alike. Not that they have too with gravity waves they
can drive boxes and it will still fly. But, it does change the function
of how the ship is flown at least. There avionics is different than
ours and flying their ships is more complicated than flying a normal jet
or prop aircraft.
Previously in other older post I talk about the Hutchinson Effect.
The poor scientist that was wrongly discredited who also got a lot of his stuff and work stolen from him may have developed a method unknowingly for
generating gravitational waves. John Hutchinson should of received the
Nobel prize for his work but in fact got shit canned. Crap like this is
why I do not have any respect for my own species. John I am sorry that
did that shit to you. You got my respect man. Good work and good job.
THE NOBEL PRIZE COMMITTEE NEEDS TO GO BACK AND RE-EXAMINE JOHN HUTCHINSON’S WORK!!! AND IF THEY CAN NOT GIVE IT TO HIM THIS YEAR THEN KEEP ON LOOKING AT IT UNTIL THEY CAN AWARD HIM HIS PRIZE!!!
Now, I gave an account for how I believed that worked as far as gravity goes
but you see there is a difference here. In my account I showed how gravity works. This is gravity waves. There is a difference.
Also, I had thought that the Hutchinson Effect was creating artificial
gravity. IT COULD BE IT WAS CREATING GRAVITY WAVES INSTEAD OF GRAVITY.
Just read on and everything will be explained. I just wanted to get that in there. But, the Hutchinson Effect was working with gravity in some way. It was working with gravity some how. Either by way of artificial gravity or gravity waves. For the purpose of this treatise I will say gravity waves.
Because of his tesla coils and his imposed EMF onto an electric-static field he
may have been causing the atoms in the materials he had inside those fields to modulate with his EMF and his electric-static fields to GIVE OFF GRAVITATIONAL WAVES”.
Now that would of radiated away as gravitational energy the momentum and angular momentum of the objects causing them to levitate or shoot up.
You see when you radiate away momentum as gravitational energy the
final mathematical product of the objects momentum can be ” + or – “. If
the momentum is negative then the object will go the other direction.
If it is positive then it will still move forward but at a slower rate. If it is 0 then it does not move at all. In regular physics this is impossible but with gravity and gravitational waves the math equations change to “MAKE THIS POSSIBLE”. And Hutchinson also discovered some other exciting stuff. He discovered a way to make new materials. He showed it was possible to pull electrons further apart and cause materials to melt “WITH NO HEAT”. But, that is a side effect of what the type of propulsion Hutchinson discovered. It can be prevented by operating the equipment correctly.
After watching this I would hate to see his electric bill. But more importantly toward the end of this video a canister levitates!!!!
Please
everyone do not believe all that debunking crap. That is disinformation
designed to protect government military projects and labs experimenting
WITH OR USING the Hutchinson effect.
In this video a camera crew came in and verified the effect and filmed it for others to see. THE HUTCHINSON EFFECT IS REAL!!!
Now, John Hutchinson believes this is self resonance. Yes, there was self
resonance but when matter moves it gives off gravity waves. Now, these
waves are very small. But, Hutchinson was moving this matter with his
device in such a was AS TO MODULATE THE GRAVITY WAVES BEING EMITTED FROM THE MATTER RESONATING. This modulating was causing the objects to fall into their own gravity wells being produced by these gravity waves thus
causing the objects to move.
NO THIS IS THE MATTER MOVING IN SUCH A WAY TO CREATE GRAVITY WAVES TO RADIATE THEIR MOMENTUM AND ANGULAR MOMENTUM AWAY AS GRAVITATIONAL WAVES TO RADIATE THEIR MOMENTUM AND ANGULAR MOMENTUM AS ENERGY THUS CAUSING THE OBJECTS TO MOVE AND OR LEVITATE!!!
YOU SEE GRAVITY WAVES CAN RADIATE AWAY AS ENERGY THE MOMENTUM AND ANGULAR MOMENTUM OF A OBJECT EITHER SLOWING IT DOWN OR GIVING IT A NEGATIVE – MOMENTUM OR ANGULAR MOMENTUM (THAT IS WHERE IT GOES THE OPPOSITE DIRECTION TO SIMPLIFY IT FOR THE NON-SCIENCE PEOPLE).
FOR THE DEBUNKERS JOHN DID NOT FILM THIS A CAMERA CREW DID AS A SECONDARY VERIFICATION METHOD. PEOPLE WHERE WITH HIM WHEN THIS THIS SHIT HAPPENED. THERE WAS NO WAY FOR JOHN HUTCHINSON TO FAKE THIS!!! NO WAY!!!
And I am sorry to say if John did read this post he probably would not like
it. John is against this being used for anything other than to help humanity. Its greatest use is for energy production, propulsion, and gravity shielding. And, to cancel out the propulsion system of UFO’s thus inducing an inertia field inside their craft as they are pulling heavy G’s. It can be used to produce new materials and or as a replacement for melting materials. This is just a few uses for it that I
know of. Still Hutchinson has not received HIS NOBEL PRIZE!!! That is bull shit.
I put the Hutchinson gravity wave generator up above. You see when matter
is moved it gives off gravitational waves but that is the simple explanation. For it to be effective for our purposes here the properties of a specific wave form would have to be imposed on what is being modulated whether that be a solid object or a plasma.
The Hutchinson gravity wave generator would be built with parts mounted to a frame and would appear as one solid object.
These waves radiated off this gravity wave generator as energy would carry
away the objects momentum and angular momentum. Thus is the method for
how UFO’s move. This also REDUCES THE MASS OF THE OBJECT THUS GOING
COMPLETELY AROUND THE SPEED OF LIGHT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
YOU SEE IF MASS IS ZERO THEN ANY OBJECT CAN TRAVEL FASTER THAN THE SPEED OF LIGHT!!!!!!!!!!!!!!!
In my previous examples of gravity I explained that objects follow the
lines of space but when space is curved the objects fall into that curve. THIS IS CALLED GRAVITY.
Gravity waves are produced when matter moves causing the lines of space to
ripple as a wave. This is the inverse of gravity. To compare this to a pond of water gravity would be the water gravity waves would be a stone thrown into that water.
Gravity – When matter follows the lines of space.
Gravity waves – when the lines of space ripple due to matter moving.
Lines of space- I previously in my blog in older post defined as the entire
electromagnetic spectrum (EMF) though I think the scientific community
heavily disagrees with me. But it is true. The fabric of space-time IS THE ENTIRE ELECTROMAGNETIC SPECTRUM OR EMF!!!
The electromagnetic spectrum (EMF) propagates through space going electrically negative, electrically positive, magnetically negative, and magnetically positive. Now around a planet because matter is also negative and positive both electrically and magnetically this causes EMF to bend into that planet. Now how EMF creates the fabric of space-time is all the different properties of a wave from with the vast different frequencies, vast different phases and so forth all those different waves combine together to create space-time. Now, I could go a lot deeper in this subject because you see it is the complicated nature of EMF at a sub-atomic level where the different waves can combine and set up a resonance to produce the fragments that make up matter.
Now matter follows the lines of space I defined as emf because the poles of
the matter and the lines of space are mutually attractive and repulsive to each other. So in the presence of mass the lines of space which I defined as EMF (the entire electromagnetic spectrum) bend into it to create curved space-time.
It is the gravity waves of that curved space-time that can be used to control gravity. So, gravity can be controlled by controlling modulated matter to create MODULATED GRAVITY WAVES!!!
These gravity waves carry away momentum and angular momentum away AS GRAVITATIONAL ENERGY. SO THE MOMENTUM AND ANGULAR MOMENTUM OF A OBJECT IN HEAVY GRAVITY WAVES CAN BE CARRIED AWAY AS ENERGY.
SO YOU SEE, UFO’S DO NOT FALL OUT OF THE SKY BECAUSE THEIR MOMENTUM IS CARRIED AWAY AS ENERGY!!! AND BY CONTROLLING THE PROPERTIES OF A WAVE AND THE DIRECTION THOSE WAVES ARE GIVING OFF THE UFO CAN CONTROL IS SPEED AND DIRECTION AND CANCEL OUT ITS OWN INERTIA AND MASS!!! SO, IT CAN PULL HIGH G TURNS AND GO FASTER THAN THE SPEED OF LIGHT!!!!
Now let me tell you the difference between the EMF that we know as humans
and the lines of space I referred to as EMF. The lines of space are a combination OFF ALL amplitudes, wavelengths, and periods of all combined EMF in interstellar space. The the lines of space I refer to as EMF means the entire electromagnetic spectrum. Further more this gets heavily complicated. When we go inter dimensional then each dimension represents a different part of space-time. So, EMF in one direction we know as time. EMF in the other 3 directions we know as space. When I say EMF here I am referring to the entire electromagnetic spectrum. Now, it is a combination of how these waves combine and interact to make up matter, energy, and space-time as we know it.
Down here on earth we only see and hear just 1 tiny fraction of the electromagnetic spectrum. That is the EMF we know. Not the EMF that I
referred to above as the lines of space. Further back in my blog I have more discussions about this but only here did I try to explain everything all at once at the same time.
Why do gravity waves cause matter to loose momentum. Like a ship at see if
the water is flat the boat can move faster. But, if the water has waves like a storm at see the ship looses speed because it is climbing waves and descending from waves and climbing again. The waves prevent the ship from moving as fast as it can. Space-time bends and folds. We can not see those bends and folds directly but by other means we can detect those bends and folds. So, a UFO basically MAKES THE WATER (SPACE-TIME) CHOPPY TO SLOW ITSELF DOWN SO IT DOES NOT FALL INTO THE CURVATURE OF SPACE-TIME WE FEEL AS GRAVITY. It creates waves and rides those waves LIKE A PROFESSIONAL SURFER!!!
By the way, THIS IS ALSO HOW TIME IS CONTROLLED!!! THE SPEED OF MATTER IS GOVERNED SUB-ATOMICALLY BY THE WAVE MOVEMENT OF SPACE-TIME. CONTROL THAT WAVE MOVEMENT THEN YOU CAN CONTROL TIME!!! 
 
Time diolation that Einstein spoke of where time slows down the faster you
go. Like my equation for inertie the same holds true for speed. Where gravity and speed causes time to slow. AS an object moves faster against space-time and gravity the method that physcially governs time slows down as a difference between the gravity the object is going through and the speed the object is experiencing. So, the difference between the gravity and the speed is determining the pace of time for the object.
Now, when the gravity moves with the object all that changes to a whole
new other story. So, it is possible to use gravity waves to govern time
as well as momentum.
At area 51 there is more likely than not books on UFO PROPULSION MATHEMATICS” THAT THEY WROTE. IF THAT EXIST THEN IT IS CLASSIFIED INFORMATION. They can classify that shit all they want but
truth is as civilization advances UFO propulsion mathematics is becoming
more and more common knowledge.
Here is my proof that the military contractors are working on this technology right now. Lockheed Martin has taken John Hutchinson’s technology and is working on anti-gravity right now. Here is the proof. Watch this video and this interview
Boyd Bushman
Lockheed Martin
Time index 28:40
Name of youtube video:
UFOs File UFO black ops a feature film documentary (UFO Documentaries 2014)
What Boyd Bushman from Lockheed Martin fails to realize that in his experiment where he put two like pole magnets together and dropped them from a long way up to see how fast it would fall is the reason it did not land as it would normally would of in regular gravity is because the like magnetic poles pushing against each other vibrated the matter in the magnets thus converting some of its momentum to gravity waves thus slowing it down. This is the missing link between gravity and EMF.
HERE IS MY PHOTO PROOF OF EVERYTHING I JUST SAID ABOVE.
This is my UFO post for today. I probably pissed on and pissed off some people at Area 51.  But, post like mine on the internet and even videos on youtube about UFO propulsion are becoming more and more common. I think a lot of it is disinformation or hoax’s to confuse people. The only way to know what works and what doesn’t is for people to build and experiment and get something other people can verify and test.
—————————————————-
Very two good documentaries
The first one is Mirage Men. These could be along the lines of what Ray Hudson and Darby Phillips are doing besides their other activities. The full version is on Netflix. If you can watch it there.
This is one probably everyone has seen. It does a real good job summing up everything.
———————————————————————————————-
I found some ancient hieroglyphics which describes Ray Hudson and Darby Phillips. Since it describes them I will leave it up to them to figure it out. I don’t have the time.
Here it is.
I found some more. This seems to be a different language.
Oh snap, I found more ancient hieroglyphics about them in yet again another language. These guys Ray Hudson and Darby Phillips were widely known across many many ancient cultures. I wonder if they were regarded as gods? BAAAAAAAAAAAHAHAHAHAHAHAHAHAH!!!! Yeah right.
Since these guys think they are so smart and know everything about time travel, UFO’s and you name it then it should be a very easy matter for them to translate these ancient hieroglyphics from the past for telling of these prophets of science Ray Hudson and Darby Phillips in the future.
These prophets who are from an old generation of what they believe is science believe that the new ideals that come along are a loss for science rather than a gain. This is the flawed ideology belief of the catholic church that burned the history and culture that were in books because those books were not written in the same language that the church spoke and wrote in. Much like science has problems with anything that is not consistent with what they currently believe again because it is something new.
Because of the catholic church so much history so much information about the past was lost due to this kind of thinking.
This is the belief system that saw many people killed at the height of the catholic church power because they publicly said that the earth is not the center of the universe and revolves around the sun.
Now, new such institutions such as governments and black government projects, powerful corporations, and academic and scientific establishments that still behave like the catholic church have replaced the old catholic church but none the less all these establishments keep society and real science from gaining any real progress.
Yes, the belief system of Darby Phillips and Ray Hudson is consistent of a system that hides itself from the true universe and does not want anyone else to know the truth.
————————————————————————-

How a AI counter works

 

 

 

 

 

 

This blog copyrighted (c) 2008 – 2015 timetravelinstitute.biz

 

Well I see my blog is stilling getting some traffic so I will answer a few questions. As anyone who keeps up with me knows I have very little up in way of my work write now. My sites are down.

Well, I have been writing both my new books and some code. On my books I have the covers made and I am doing their outlines and I started the projects on my publishers site. My outlines are getting bigger every day. Soon the books will go into writing and when that happens it wont take me very long to get it out.

On my code I have been going back and forth between my AI and my New precision counters. I have been also lurking over at http://timetravelinstitute.com the fake one not the real one. I got to say things look really boring over there. No, Darby and Rainman im still around you just do not see me.

My sites will be down for a while. I am getting my blog ready to put up at my old sites and redesigning my old sites. I am also looking at using my AI for some very interesting web projects but that is a little down the road after I get my books come out and my old sites go back up.

Right now the AI web thing is still on the drawing boards. I am putting some new algorithms to the AI so it uses memory and experience when making decisions about what actions to take. Right now I have a functioning AI that I can train to perform many many different task and pick a task at random and give it to the AI and using its memory and experience it can focus and perform that one task even though it has been trained to do many other things too. The trick is in how each neuron query’s its own data base of weights and weighted sums. By giving each neuron in the network a database I can give a small neural network a lot of power to multitask and perform complicated task.

Every neuron in my AI has a data base and I use some interesting algorithms to allow the AI to use its data base to find the correct weights from its training to perform a specific task out of hundreds of task it has been trained to do.

I am also setting it up so I can use it as either a feed forward network or a recurring neural network. The only difference is the feed forward just takes a input and gets a output but on the recurring networks the outputs loop back around to become part of the inputs so the network can perform both functions. Its a general purpose AI that can be used for anything. On the recurring though a continuous outside input needs to be in place or the network falls into a repetitive loop or noisy  loop with no useful info.

Right now it is just running my lottery numbers for me. I am using it as a AI counter to roll one winning lottery number to another winning lottery number then use that to try to predict the next unknown winning lottery number. So right now it is a AI lottery counter basically. How I train it to do this is by giving a training file like this.

Training file
input1 output2
input2 output3
input3 output4
input4 output5

So, the training takes the output and uses it for the next input kinda like a recurring neural net. But the final output is used to find tomorrows winning lottery number. So, it gets trained to pick lottery numbers basically.

I have used this before with computer media files from the past to try to find computer media files from the future. So, this is one of my long ago AI binary counter techniques. But, the AI counter for that was much bigger than the counters I am using now. Also, I found some interesting ways to split up processing the neurons in the network so the net can function faster but it took some work. (So, there is some time travel with information uses to this after all.)

For finding time travel media the training file would be like this. Using binary files

Input: Evening news December 5th Output: Evening news December  6th.

Input:Evening news December 6th Output: Evening news December 7th.

Input Evening news December 7th Output: Tomorrows Evening news (Not happened yet)

Using a very specially programmed AI as a binary counter THIS CAN ALSO BE USED TO FIND CHECK-SUMS ON THE COUNTER THAT CAN BE RECREATED AS FILES TO ALSO EXPLORE THE COUNTER WITH. So, this can not only help create files from the future but it can also be used to find check-sums of files from the future that can be re-created (built) to find time travel media.

Input:check-sum of Dec 5th news Output: Dec 6th check-sum
Input: Dec 6th check-sum Output Dec 7th check-sum
Input Dec 7th check-sum. Output Tomorrows check-sum of the evening news (Not aired yet.)

So, The AI counter can be used to try to predict hackable check-sums of files that can be recreated that are computer media files from the future. As well as being used to roll a binary counter from one good computer media to another until a computer media file until a computer media file from the future is found. I have found some of my best stuff this way.

Another way I use my AI counter to find time travel media I can reconstruct with my programs

Training file

input                                   output
1 weak weighted check sum , 2 weak and weighted check sum
2 weak and weighted check sum, 3 weak and weighted check sum
3 weak and weighted check sum, 4 weak and weighted check sum
4 weak and weighted check sum, 5 weak and weighted check sum

Then use the last weak and weighted check sum when I run my AI to try to find the next time travel media

————————————————————

Some of my other AI counters did not use a neural net but instead used a syntax file. A syntax file is a file that shows what bytes come before or after other bytes in a file that is a real computer media file. So, with that counter a algorithm would be made to make the counter turn but only those bytes that cleared the syntax file would allowed to remain on the counter. Then when the counter was fully constructed it would be check by my robots as is or downloaded to the drive then checked by the robots.

If the file was good it was kept. If the file was bad it was deleted. Now, a file can be bad but still a good file. It was only  considered bad if it did not meet the search criteria.

My files had to meet certain quality standards then the file has to meet search criteria. Only  after both of those things were established did I keep the file.

The reason for this is because if everything is working fine the programs can find more files than the user is willing to look at. So, I just try to keep my perspective.

Some of my other AI counters employed statistics in the algorithms instead of a syntax file. Before hand each byte was given a probability of being in a certain place in a file and only bytes within a certain percentage of a defined probability would be allowed to remain on the counter. This was some of my very first early work.

The AI counters can also be used to roll a counter from one good file to the next. How that would happen is known good files would be used and algorithms would roll the counter from one good file to the next.

Mean while all the data would be inputted into the neural net. So, after training and that would be a lot a AI would be used to try to roll a counter file to a good time travel media file.

Now, as far as I can tell at least in my AI’s they pretty much uses the nearest neighbor method to try to get the file to a good file.

How much good use this was to me was mainly by telling how much constructed a good file was. 5%, 37%, 59%,  68%, 79%, to 100% constructed.

With the way I used this I could use this to NOT ONLY TELL ME THE SPEED I SHOULD BE USING IN MY COUNTER TO ROLL THE COUNTER TO A TIME TRAVEL MEDIA FILE BUT HOW MUCH CONSTRUCTED THE FILE REALLY  WAS. So, this was invaluable to me the specific way that I used it.

But besides neural nets statistics can help choose the correct speed of the counter when rolling the counter and to using the nearest neighbor method the counter can be stopped on what might be a good time travel media file. But, it takes a lot of math and a lot of work.

Many thanks to my followers

 

 

 

 

 

 

This blog copyrighted (c) 2008 – 2015 timetravelinstitute.biz

 

Note: to people just getting here my blog has been taken black for a little while. When it comes back up it may be at another location.

 

 

Here is Jonny Bradshaw, He claims to be a member of the Shadow Cabinet. Whether or not that qualifies him as a member of the conspiracy against time travel. I can not say with 100% accuracy but he has been a long follower of this blog. When I was in the forums fighting against the conspiracy against time travel I have had a post from someone using the name Jonny but whether or not he was or still is part of the conspiracy against me  and against time travel I cant tell. Jonny, I was always curious as to why you deleted you follow picture on this blog one day when I posted a link in USENET to this blog you took your pic down minutes after I posted that link. And you had your pic down for a long time. And, as soon as I take this blog black and the traffic slows down you put your picture back up? Your a curious fellow.

 

Here he says he is a member of the shadow cabinet I wonder if that means he is a member of the group http://timetravelinstitute.com has established against me known as the “CONSPIRACY AGAINST TIME TRAVEL”?

 

Uncle Clover. He is very shy. When I click on his follow link I get no information about him.

Metaholic. He is just like uncle clover he is very shy.

 

Charlie_Xx. Another shy person.

 

jacob glasnovich. I saw some of the sites he likes. Still I know very little about him. He has been a loyal follower for a while.

 

Simeon heath-moss. Another loyal follower of my. He posted no information about himself in his profile.

Susan. This is the person I am most curious about. I have often wondered if she was the person who interviewed Titor and who posted to me as a female at above top secret dot com. Is she also a member of the shadow cabinet too? A member of the conspiracy against time travel? Im pretty sure I will never really know. She has been a long time follower of mine too. She has no info in her profile.

 

According to blogger I have 1 mystery follower. No nothing about this person. Is this person a member of the FBI, CIA, NSA or law enforcement or other. This follower has not been with me for as long as the others. He only came around about the time the conspiracy against time travel hired a hacker to steal my credit cards and break into my computers thus violating most of the computer laws in the USA in his pursuit to do what he was hired to do. The hackers name was Aaron Hiniker. He lives on the east coast.  Im still waiting for the FBI to arrest him. I may be waiting a long time. It seems they like sipping on their coffee and sitting on their butts.

I wanted to personally give thanks to my followers. I hope you enjoyed my post here.

Last but not least I forgot about Ray Hudson and Darby Phillips the ring leaders of the conspiracy against time travel from the http://timetravelinstitute.com the fake one.
You guys are my biggest readers here so I have to give my thanks to you to. I have something I think Darby should read since he once made a post I did about using water as gasoline. My post concerned putting something in the water and he tried to make it out like I was crazy for posting it. Well as usual I make fools out of Ray and Darby. Here Darby read my evidence against you.

 

 

RAYS BULLSHIT PROVEN TO BE BULLSHIT!!!

 

This blog copyrighted (c) 2008 – 2015 timetravelinstitute.biz

The focus fusion stealth drone project has been moved here.

(It is a DIY nuclear powered drone with interesting capabilities.)
THE DRONE BLOG HAS BEEN TAKEN PRIVATE. IT IS BASICALLY MY JOURNAL I USE TO KEEP UP WITH MY PROJECT AND MY THOUGHTS AS I AM BUILDING THIS THING. I AM LIMITED TO HOW ADVANCE I CAN GO ON THAT BLOG IN PUBLIC SO IT IS PRIVATE NOW. I KNEW I WOULD HAVE TO PULL IT AT SOME POINT. IT WAS TIME FOR ME TO POST COMPLETED SYSTEMS. AND, IT STARTED LOOKING TOO MUCH LIKE A HOW TOO MANUAL WHICH I HAVE NO INTENTION OF WRITING FOR THE PUBLIC. SO IT IS PRIVATE NOW.

NEWS: I SET A NEW RECORD FOR TRAFFIC TO THIS BLOG THIS WEEK. YEAH!!!

————————————————————————–
Here is Aaron Hiniker’s real picture.

arronhiniker

He claims to be a professional
programmer but truth is he is a professional hacker and cyber-stalker,
and spammer. He is a cyber-weapon used by http://timetravelinstitute.com
against me because I have a blog here about time travel I started this
blog because Darby and Ray were trying to make me leave the internet.
They were preventing me from talking about time travel on the internet.

This is the guy that keeps my forum at
http://thetimetravelinstitute.com from being used because he spams the
hell out of it. The whole reason I got that forum is so I would have a
forum I could post at which Darby and Ray aka Rainman could not knock me
off of. But Aaron is keeping me from using it.

This is the guy that put the remote administration tools on my and my familys computers along with malware and virus’s.

This is the guy who posted to me he was going to plagiarize my published work and my copyright.

This is the guy who stole my credit card and had it used fraudulently.

This is the guy who changed my passwords on my accounts.

This is the guy who got into my and my family’s computer files.

This is the guy who look at my families web-cams. Most of all my children.

This is the guy who looked at my and my family’s computer screens during his hacking.

This is the guy who hacked the shit out of my home network and still does dos attacks on me from time to time.

Here is the link for that file I complied on my attacker.

Aarons messages, FBI Reports, Router logs, and files.

Down the street from me is a business. When ever someone comes in and takes something that does not belong to them they take their picture and blow it up and post it at the front of their store. So, Aaron Hiniker’s picture is posted at the front of my blog.

There you go. Moving onto the blog.

—————————————————————————

April 13, 2014

Today I was working out how to make the hardware for a software radio. Now, I already have one but I wanted to build another one from scratch for my drone I am building.

Google GNU radio for more information. What a software radio does is a circuit called a analog to digital converter takes radio signals from the air. The ADC (Analog to digital converter) reads the analog voltage and converts it to a binary byte which is then sent to the GNU software for processing.

Why this is done is because the software can process radio almost just as well as expensive hardware can. It has advantages and its disadvantages.

Now, how does all this apply to time travel? Because one of the circuits I was looking at for doing my own DIY software radio is called a “Successive Approximations”. This circuit takes a analog signal on a buffer and runs a binary counter to approximate a digital byte for the analog signal.

Now, how is this important? Because the successive approximations ADC does not care where or when the analog signal is, will be, or was from.

It simply put just uses a binary counter to convert binary bytes from analog signals. The buffer it uses does not care where or when those signals came from. Now, usually the signals come from a antenna and this is happening in real time.

It is possible for the analog to be recorded from some time and place. Or, the analog signals could be computer generated. The successive approximations ADC simply put does not care.

Now to throw more gasoline on Rays fire. The problem Ray has is that scientifically all analog signals are not freaks of nature. Any analog signal that occurs in the past can occur in the present and also can occur in the future. This is why record players work. Because it is mathematically and physically proven. If not there would be no stores, radios, or record players around today.
Analog signals can be generated by nature or by artificial means.

So, what that means that a analog signal that occurred oh lets say 1000 light years from earth a billion years ago can occur here on earth now or can occur a million years in the future.

And to add even more gas to Rays fire any binary counter can approximate a analog signal and those analog signals can be from the future not just the present. Those analog signals can be from the past.

Now, what this means is that Ray aka Rainman admin of http://timetravelinstitute.com of Orange county California has been proven wrong. His bullshit has been proven to be bullshit because of these reasons.

1. Analog signals can occur at any place in space time.

2. Analog signals are not freaks of nature. Any analog signal that occurred once in space time can occur again somewhere else in space time. This is mathematically true and can not be disputed. Again, this is why radios, stero’s and record players work.

3. Binary counters can, do, and will approximate digitally a analog signal. And that signal because of #2 can be from the past, present, or the future. Binary counters do not care where or when these analog signals occur.

4. Given 1,2 & 3 in theory it is a reality for a binary counter to find a computer media file of the past, future, or alternate time lines.

5. I have been and still am working on just such software that does do just this.

My software can approximate analog signals digitally that can be from other places and times.

Ray you are so full of bullshit it aint even funny and to rain on Rainmans parade you have been proven wrong. You can send your people after me all you want. You can chase me to hell and back but you can not stop me from talking about time travel and you can not stop me from using the Internet.

In Ray and Darby’s world analog signals are freaks of nature which science knows to be bullshit.

If anyone has ever read what Ray and Darby had to say about my work they they would know that it is their belief that binary counters can not approximate analog signals which is bullshit because there are companies out there that make hardware to do just that. Even the hardware that goes into the aircraft that Ray helps to build uses binary counters to approximate analog signals.

Darby went on Coast to Coast AM in a public interview pretending to be a UFO / Time Traveler expert but Darby does not know his ASS FROM A HOLE IN THE GROUND when it comes to time travel. All he can do is talk about what Titor said on the internet and even then he does not always get that right either.

Ray and Darby are so stupid their stupid is stupid. They make their fake forum out to be experts on time travel but truth is them and their forum is full of shit and those guys are trolls, thugs, child porn perverts, and assholes. Oh yeah, Aaron Hiniker of Bedford, Ma their very own people SAID THEY WERE ASSHOLES!!!

BAAAAAAAAAAAAAAAAHAHAHAHAAHAHAHA!!!!!

Now, getting back on topic. Oh, I was on topic. Im sorry. Moving on.

Now, that means for me is my time travel software can be thought of as a analog to digital converter but with a twist. My time travel software is a

“De-cryption analog to digital converter device” A time machine.

The de-cryption part is my device is attempting to decrypt analog signals that will occur in the past or the future. It can do this because mathematically specific analog signals are not freaks of nature. Specific analog signals can occur any place at any time in space-time and binary counters can approximate those signals.

Now to throw the remaining gasoline on rays fire. Because analog signals are not freaks of nature it is possible to use De-cryption technology to run a binary counter to approximate analog signals of the past, future, or alterante time-lines. It is possible to build a time machine with a computer.

By combining encryption technologies to analog to digital or digital to analog converters it is possible to build a time travel device to see other possible times and places. To search for information and computer media through out space-time.

The two publicly used technologies that also help prove Ray aka Rainman wrong are

1. Rsync – Uses binary counters to reconstruct computer files over a weak internet connection.

NOTE:

My software uses encryption technology and binary counters to construct computer files over no connection at all. Even through space and time and can even be used as a temporal means of communication with the future.

2. ADC successive approximations (analog to digital converters) uses binary counters to convert analog signals to binary. The counters do not care where or when the analog signals occurred it just converts them to binary.

Even the flight control systems on the aircraft Ray helps designs uses ADC successive approximations converters. So, RAY IS CALLING BULLSHIT THE HARDWARE THAT HE RUNS ON HIS OWN FLIGHT CONTROL SYSTEMS!!!

To recap my check-sums that my programs build to construct a file would be the buffer of a number that mathematically represents a possible digital series of analog signals as a binary file. Now, my software takes that check-sum and builds a binary file WITH BINARY COUNTERS. My bots which verify the file as a real time travel media file can be thought of as the comparator in a digital ADC. In a digital circuit the comparator goes high or low to indicate when the binary counter has found best possible binary match for a digital signal. Well my bots on my computer do the same job essentially. My bots look at the completed file and tell when the file matches the series of digital/analog signals that computer is looking for.

So, my time travel software again can be thought of as a De-encryption – ADC/DAC (Analog to digital converter / digital to analog converter) for the purpose of time travel. The decryption part comes because we are looking for series of analog signals that occurred somewhere in the past or the future. Someday I want to add to my long list of things I want to do and take a bunch of field programmable gate arrays and build a hardware version of my software time travel machine.

To Darby and Ray of the time travel institute. The fake one.

http://timetravelinstitute.com 

IN YOUR FACES!!!! YEAH!!!!!!!

YOU PERVERT PUSSIES!!!(PERVERT BECAUSE OF YOUR HACKING OF MY HOME NETWORK WITH MYSELF AND MY WIFE AND MY KIDS INCLUDING OUR WEB CAMS. WITH YOUR RAT MALWARE) (Talking to Ray and Darby)

YOU AINT GOT NOTHING ON ME!!!! 

PAMELA OF THE TITOR STORY COULD KICK ALL YOU GUYS ASSES WITH ONE ARM AND BOTH LEGS TIED BEHIND HER BACK!!!

YOU GUYS AINT GOT SHIT!!! 

BAAAAAAAAAAHAHAHAHAHAH!!!

BAAAAAAAAAAHAHAHAHAHAH!!!

BAAAAAAAAAAHAHAHAHAHAH!!!

YOU GUYS HAVE HAD THE ONLY REAL TIME TRAVELER YOUR FORUM WILL EVER SEE VISIT IT. AND, THAT WAS ME!!!

I AM A TIME TRAVELER!!! 

YEEEEEEEHAAAAAAAA!!!!!!!!!

Well thats enough for me for one day. Catch everyone later.

April 19, 2014

Man this week has been a roller coaster as far as my traffic to this blog. I have had a pretty good week for real traffic. The conspiracy against time travel can get my accounts banned on the forums but I can sign up for another account that does nothing. I will still be posting in the forums banned or not. What gets me Darby on his forum was called me names like troll and they even used my real name before.

Now, IT IS OK FOR THEM PERVERT COCK SUCKERS TO DO THAT TO ME BUT LET ME POST ABOUT THEM THEN OH HELL, LETS GET HIM SHUT DOWN. IT DOES NOT WORK THAT WAY DARBY AND RAY.

YOU DID IT TO ME NOW BOTH OF YOU CAN LAY IN YOUR OWN BED THAT YOU MADE FOR YOURSELFS.

I WILL TALK ON THE FORUMS ABOUT MY BLOG, ABOUT TIME TRAVEL, AND WHAT EVER ELSE I WANT AND POST MY SITES TOO AND YOU DARBY AND RAY CAN NOT DO A DAMN THING ABOUT IT.

Well the new program is shaping up. I am dividing my time between that and my drone project. Today I was playing with my brand new 10,000 volt marx generator that is going into the power supply in my drone.

I had plan to go  50,000 volts but instead I will try 10,000. That 10,000 volts will be the seed voltage for a re-usuable flux compression generator.

I started posting more pics in my drone blog and thought man, I need to watch it. I remember many years ago a guy overseas started a project site showing how to build a missile. He got shut down because it went viral.

Well my drone is fusion powered. And, it gets worse than that because I am going to put some really high tech shit on this drone. So I thought, yeah I had better keep that private as far a blog is concerned and take that damn drone blog down. Well it is not down it is just been made private.

The drone project is shaping up pretty good. I did not do anything today expect work on it. Hell, I did not even have a drink of whiskey today which is un-usual for me.

I thought I would reward myself at the end of the day. I ran out of solder last week and damn if I am not going to run out of solder again this week. So, I will be placing another order tomorrow.

I notice Aaron is slowing down but still doing his shit. A dos attack here. A spam account their on my forum but he has slowed down. Aaron it does not work that way. I file a complaint every single time you do anything at all so slowing down does nothing for you.

Well good night everyone. I want to get to bed at a decent time tonight. Tomorrow will be programming and more building.

April 20th, 2014

Well did not do anything on the time travel program this weekend because I worked on my drone. More about the drone in a minute. In my time travel program where I am now is mathematically working out the numerical base I will be using on my counter in conjunction with the buffer size I am using. I previously did that before but my math was incorrect. The buffer size is how many bytes at a time my program will be reading or writing. The base +1 the highest number that the program will write for the buffer size that it is using.

So, the next part I will do this week is replace some code to correctly calculate my problem area in my program. Now, it is not totally correct I did not work on the program. I did set down with my notebook and a calculator this weekend and mathematically solved some of my problems and made notes and put the notes on my laptop for the next time I program.

But the program itself can run correctly if given specific information but I need it to run better than that.

Well today I was sitting at my electronics bench I thought about that bullshit threat Aaron made to me and I laughed real hard and thought to myself. If that boy is going to do anything to me he had better hurry the hell up. I got a monster growing on my work bench.

The reason I laughed so hard is because my drone I am building will have a electrical power output capacity greater than either a military predator drone or a jumbo jet. The shit my drone can power is mind boggling. And, this thing will be small enough to fit through a door or window. But, a lot of stuff on my drone has to be built from scratch. My parts are special components that have to be hand built. That is why it is not the normal drone.

But, dont get me wrong it takes a lot of work to build a high energy power supply that I am building plus a nuclear fusion reactor on top of that for a drone.

Today I saved 106MB worth of material that I have to read and I not only have to understand it but I have to set down and work out at least a few pages of math equations. And if I dont get it right my shit wont work. But it will. I did not set through all them damn math classes for nothing in college.

My equations will be solving for part sizes, amps, voltage, impedance, resonant frequency, wire gage sizes, power inputs, power outputs.  A lot of shit that I have to have right. Well I need to hit the sack. I have a long week this week.

TIME TRAVEL INSTITUTE DOT COM HACKS, STALKS, AND STEALS FROM ITS OWN MEMBERS.

This blog copyrighted (c) 2008 – 2015 timetravelinstitute.bizMarch 24th, 2014Well, Aaron is still attacking my home network. The FBI, and Homeland, are not going to do anything. My state representive Tim who contacted the FCC they are not going to do anything. So, since Aaron violated my childrens and my wifes privacy even tried to look at them most of all my children naked through their web cams. Stole money from me by hacking my computer to get my credit card information. Stole my copyrighted work and said he was going to plagiarize my book. He even threathen with with violence saying I was going to have accident. So, with further ado I am making all my personal conversations and my complaints with the FBI against him public.  A young adult who attacks women and children on the internet I will not protect his privacy.

Now, the police report is not here and some of my stuff may not be here but most of it is. This file is close to 500 mb in size. Some of the files are duplicated as I put in a directory and then realized I had a update to it. Stay out of the directory marked virus infected files because it is for any one who knows what they are doing for research. I am hoping the Little Rock, ar police will download it and investigate Aaron but that is doubtful. The authorities in my area are not up to date with the rest of the country. This is Arkansas remember. Which is why Tim Griffen probably could not help me.

Maybe if I get lucky Aarons own Bedford, MA police department will investigate him and arrest him since Arkansas does not have the resources to do so.

Now, this gives all the personal information about myself and my attacker. Anyone wanting to find me could easily do that without this information.

Aaron questioned and interviewed the hell out of me about my method of time travel. I did tell him a lot but a lot I kept back knowing his was probably not real. I followed the rule of not telling him anything that I have not told the public. But, I did not know he was looking at my family and I’s computers screen’s with us and going through our files.

http://timetravelinstitute.com was able to run Titor off the internet by threatening to expose his personal identity. When they tried that shit with me I said ok. Tell the world who I am. I am not leaving the internet. Ray and Darby started calling me personal names in public long before I started my blog about them but when I started my blog about them and the coverup and my method of time travel they started CRYING AND BOOHOOING  and trying ever since to get revenge against me and run me off the internet because they are cowards.

It was ok for them to call me names and talk about me in public. When I did that back to them that started a cyber war against me. The difference between me and them is what they said about me was lies but I told the truth about them. Which insults them more. Because they know everything I have said about them is true.

I have done nothing wrong. So, Aaron you are no longer under my projection and I still hope the authorities get you for your hacking and fraud and crimes against my children and wife. I have some corrections and spell checking to do here. I will get that later.

Here is Aaron Hiniker’s real picture.

arronhiniker

Actually if he takes his glasses off and faces the camera he is uglier than
this. He puts glasses on and faces sideways so people do not know how ugly he really is.

BAAAAAAAAHAHAHAHAHAHAHAHAHA!!!!!!!!!!!!

Take a look below and see what I mean. Only a mother could love that face.

He claims to be a professional
programmer but truth is he is a professional hacker and cyber-stalker,
and spammer. He is a cyber-weapon used by http://timetravelinstitute.com against me because I have a blog here about time travel I started this blog because Darby and Ray were trying to make me leave the internet. They were preventing me from talking about time travel on the internet.

This is the guy that keeps my forum at http://thetimetravelinstitute.com from being used because he spams the hell out of it. The whole reason I got that forum is so I would have a forum I could post at which Darby and Ray aka Rainman could not knock me off of. But Aaron is keeping me from using it.

This is the guy that put the remote administration tools on my and my familys computers along with malware and virus’s.

This is the guy who stole my credit card and had it used fraudently.

This is the guy who changed my passwords on my accounts.

This is the guy who got into my and my family’s computer files.

This is the guy who look at my familys webcams. Most of all my children.

This is the guy who looked at my and my family’s computer screens during his hacking.

This is the guy who hacked the shit out of my home network.

Here is the link for that file I complied on my attacker.

Aarons messages, FBI Reports, Router logs, and files.

I like to think of this as the Aaron Hiniker files. Everyone enjoy.

Aaron voilated my and my family’s privacy and I in turned refused to protect his privacy because of his crimes. He is lucky the FBI has not arrested him and that he is not sitting in jail tonight.

Down the street from me is a business. Well at that business they have camera’s and when ever someone comes in and steals the owner of the business makes a picture of that person and blows it up and post it at the front of his store. Well, I thought about that and then thought to myself. Why the hell and I protecting someone’s identity who ROBBED ME, THREATEN ME, AND SAID HE WOULD PLAGERIZE MY WORK!!! No, man I did what the business down the street did. I put up Aarons picture at THE FRONT OF MY STORE. Really it is my blog but the concept is the same.

March 8th, 2014

I have not checked my email in two days. No doubt my box has plenty of email waiting for me. I have some post I am again planning to make to this blog I just have not got around to making them. Im going to post my latest events from posting on the forums. I have been programming my ass off on my time travel software. This weekend I have to pay bills and do taxes so I am not sure how much time I will get with my personal projects. I plan to work on my drone some. I have a bench FULL OF SHIT WAITING FOR ME TO ASSEMBLE IT. So, I have a lot to do with that. Since my drone is using a fusion reactor I have equipment on the side I have to assemble too before I can fire the drone up for testing.

My Firewall as far as I can tell is doing good. I re-installed it after http://timetravelinstitute.com had its hackers disabled to let traffic flow through freely to my home network from the internet.

It its back to dropping unwanted traffic. My logs are getting a lot of attempts to use SSH and Telnet and other shit. I turn my internet off now when I am done but my kids (the ones the conspiracy against time travel has been spying on through their web cams trying to get pictures of them)  my kids use the hell out of the internet so it is still up a good amount of time.

I use to try to keep my blog clean from bad words but found when dealing with the conspiracy against time travel that is nearly impossible.

I forgot to tell Everyone that Aaron my hacker in his messages to me told me he smokes dope. So, I can add dope smoking child porn perverts to the names that I call the conspiracy against time travel located at http://timetravelinstitute.com .

I also call them trolls, thugs, and criminals. I strongly believe the FBI should take their websight down because they are a danger to the public. I feel that Titor when he was on the internet was having trouble with them too. Not only did he leave the internet but his family had to sue the same guys that are giving my problems. So, that goes to show for me that http://timetravelinstitute.com is a danger to the public and should be taken down and its members disbanded and not allowed to contact each other for the public safety. For the public good.

They should also be punished for their crimes. But, it looks like the FBI is protecting them instead of investigating them for the crimes they have commited through their actions and through the actions of their hackers. It probably has to do with Darby being retired from the CIA and from Rainman being a high level government contracter. That is more important than protecting society from them.

Moving on……..

I posted a while back about how flying saucers work. They charge up their shells with high voltage then use EMF phased to act with the hull of the ship to act like a gauss gun.

The electrical/magnetic properties of the matter in the hull interacts with the electrical/magnetic properities of EMF to make the hull move through the EMF like a magnet going through a guass gun.

Now, here is what I have gotten from people on the outside about this. That the mass of the ship is too heavy to do that with EMF. No, not really and here is why.

The voltage the ship is charged up with is composed of negative electrons. Now, since electronics are negative like charges repel. They push off one another. Now, if a mass is charged with enough voltage eventually that voltage will act on the mass like helium acts in a ballon.  IT IS GONNA WANT TO MOVE IT.

All  those charges pushing off one another WANT TO GO SOMEWHERE. So, basicly what is being done is the mass of the ship is being CANCELLED OUT AND THE SHIP IS BEING TURNED INTO A CHARGED PARTICLE. Now, charged particles MOVE!!! So, with the mass canceled out THE EMF CAN DIRECT THE DIRECTION OF THE SHIP LIKE A MAGNET GOING THROUGH A GUASS GUN. It can also be controlled by controlling the direction and voltage on the capacitors comprising the ship hull.

A UFO IS BASICALLY A ARTIFICAL PARTICLE THAT CAN BE STEARED. Also, the cancelling out the mass has another property. IF MASS IS CANCELED THEN THE SPEED OF LIGHT CAN BE BROKEN!!! The only reason there is a speed of light is because OF MASS. WITHOUT MASS THERE IS NO SPEED OF LIGHT CONSTANT!!!

As for the Higgs field it is possible that the high voltage works to interfer with that field to CHANGE THE MASS OF THE SHIP. Why would that happen? Because now THE CHARGES ARE NOT BALLANCED ANY MORE AND THE STRUCTURE OF THE SUBATOMIC PROPERTIES OF THE SHIP HAVE CHANGED!!!

THERE IS A REASON WHY AN ELECTRON HAS A DIFFERENT MASS THAN THE PROTON. Now with a bunch of electrons YES THE HIGGS FIELD WOULD CHANGE EFFECTING THE MASS OF THE SHIP.

The higgs field would change the mass of the ship because the sub-atomic structure of the ship has  changed.

SO, TO KEEP THE HIGGS FIELD FROM IMPOSING MASS ON THE SHIP CHANGE THE SUB-ATOMIC STRUCTURE OF THE SHIP TO KEEP THE FIELD FROM IMPOSING MASS ON THE SHIP!!!

There is a reason why THE INTERNET IS FILLED WITH UFO VIDEOS AND DOCUMENTRIES. WHY? BECAUSE THIS SHIT WORKS THATS WHY.

HEY DARBY YOU GOING TO WARN ME. IM TYPING IN UPPER CAPS AGAIN. BAAAAAAAAAAAAHHHHHHHHHHHHHHHHHAAHAHAHAHAHAHAAH!!!

Anyway that is my gig about UFO propulsion. Now, do not get it wrong there are many different ways to build a propulsion system like that. What I am describing is not the only way to make ships fly like that.

March 9th, 2014

Well on my latest posting in the forums I was at Craigslist in Chicago in Science and math.

https://forums.craigslist.org/?ID=245357772
The conspiracy against time travel was there. Now, last time in a different city the mod deleted their messages so this time they were a little nicer but still droping hints and insults. Aaron was there but this time not making threats.

I replaced my equipement today. I might have gotten the hackers from http://timetravelinstitute.com out of my home network. I will be looking at my logs closely.

My transcript did not past very well here so I uploaded it to my websight. Here is the link. It is ziped so you will have to uncompress it to read it.

Transcript of forum in Chicago on craigslist.

March 10th, 2014

Well I did not get shit done today because I hung out with the family. At craigslist a person which seemed like Ray answered what I previously said about Ray calling my method bull shit. He said he still thinks its bull shit. I asked what his defination of time travel was. So far as far as I know no response. You see, those guys Ray and Darby started http://timetravelinstitute.com but Ray does not believe in time travel. Im not sure Darby does either.

My defination of time travel. Moving information from the future to the past or from the past to the future. That can also be moving information from one time line to the other. And, that is why my method of time travel with computers can be called TIME TRAVEL. Because, the transferece of information can be materialized from the future to the past and put up on a computer screen. And the other way around too. From the past to the future. And, from one time-line to another time-line. THAT IS WHY IT IS CALLED TIME TRAVEL. The conspiracy against time travel either has not got this figured out or for their own reasons want me out of the way. Which as I have said a thousands times will not happen.

Since I use a method that allows for moving this information with LITTLE OR NO CONNECTION BETWEEN THE DESTINATION TIME-LINE AND THE TARGET time-line then the transfere of information is possible.

The method I refere to is check-sum reconstruction which was proven by the application Rsync before I ever used check-sum reconstruction for time travel. Rsync used it to transfere information over a week connection. I used it to transfere information across a individual or multiple time-lines with no connection.

Also at craigslist the conspiracy against time travel tried to rub my nose into the stupid shit they do to hurt me. One guy named “MeanUncleBen” I think I got that right if not oh well.It is Uncle something. He should of used “Uncle Stupid”.

Ben made a comment about me buying and trading out the equipment to keep Aaron out. There were other comments made as well. But, my security is a lot better than what it was. And, I like my new stuff. I also feel better about not having my shit wide open to the world. I did not know it was that easy for someone to get to it. One thing Aaron did that was good for me WAS HE SENT ME A EMAIL TELLING ME WHAT HE DID!!! He wanted me to know. And, that pretty much explains how stupid these guys are.

You see, these guys the conspiracy against time travel are like a little Rodents (and they are rodents) trying to fuck a full grown elephant and going suffer bitch. You see, the big elephant dont feel shit. For all the hell these rodents attempt to give me they are little more than a little fly buzzing around my head. They are little more than a small dog trying to hump my leg.

Well I have to get up in a few hours. I do this too much. This week I am day trading again but when I am not doing that and working I plan to hunker down on my two side projects right now. The drone and my programming.

March 11,2014

Being so busy I have not been checking my email very often. The conspiracy against time travel has it going good for them at this time. I have been too busy to hit the forums which is the thing they the conspiracy against time travel most want me not to do. And, when I do they give me a escort into the forum and do their best to give me a escort out of the forum.

Besides filling it up with spam so people can’t or wont read my post. I like to think of them sometimes as my entourage or my fan club since they insist of cyber stalking/ bullying me as well as a whole list of other crimes. And, they do it publically for the world for the most part because I post most of what I can about them to reward them for their time on my part.

March 13th, 2014
Thirty  days ago after filling reports with the FBI, and Homeland, and the Little Rock, Ar police department which I am sad to say none of those law enforcement agencies have done shit and are not going to do shit about Aaron hacking my home network on behalf of the http://timetravelinstitute.com

I contacted my congressman Tim Griffin my local congressman for Arkansas. Well, he contacted the federal trade commission which I got a call from and we talked rather briefly.

He said I would get a decision in 30 days. Well today I got a bull shit letter saying “Oh, we have the right to share information from our constituent’s with law inforcement” but the letter stopped there and did not say rather or not anything was shared or rather or not anything was done. Pretty much it was a “WE ARE BLOWING YOU OFF” letter.

Mean while after trading my router out for another one Aaron starting scanning me again from Cambridge, MA from a company that offers cloud services. Then my new firewall lost its virginity from an attack from Temple,AZ. My firewall was breached and my network was scanned and or penetrated further. I reinstalled my firewall.

For my time travel talk today. One thing the conspiracy against time travel has against them is they say they do not believe in time travel. Which is bull shit because they are on me like stink on shit on the internet and with the world watching and law enforcement turning their heads the other way.
One thing the world needs to understand is ‘THAT EINSTEIN NEVER SAID THE FUTURE COULD NOT BE VIEWED!!! HE NEVER SAID THAT! Einstien only said “THAT BECAUSE OF MASS NO ONE CAN GO FASTER THAN THE SPEED OF LIGHT.” That is it as far as time travel is concerned. Now, learn how to change mass then or not let it change then faster than light travel is possible.

Now, as far as time travel there is NOTHING IN THE LAWS OF PHYSICS that keep my method of time travel from working as a method of time travel. This is information theory as it pertains to physics.

Now many on the forums have put their own theorys as to why or why not time travel with information would work or not but, NONE OF THEM INCLUDING THE CONSPIRACY AGAINST TIME TRAVEL HAVE BEEN ABLE TO PROVE IT DOES NOT WORK. Now, they try to put their own spin on it to change it away from the subject of time travel but there problem there is that not everyone including myself will listen to them. My methods do work.

Though it may not be the physical time travel people want just being able to bring foriegn information up on the computer screen and scratch my head and say oh, will that happen tomorrow? Then wait for tomorrow to get here to see if it did happen. Or, just having the new media to watch or read a lot of times is just good enough for me too.

Well, I got things to do then I have to get back to work. I just wanted to give everyone the update.

March 14,th 2014

I
have Ashburn, VA coming past my firewall everyday now. That was where
Aaron’s IP came from on his email too me. But, this is from Amazonws.
My router recorded it like this.
[DoS Attack: SYN/ACK Scan] from source: 23.21.179.98, port 80, Friday, March 14, 2014 13:57:06

It
is another clould service company. I guess that is how Aaron does his
business. He gets all these accounts at cloud service companies and uses
their ip’s. He probably chains them.

I dont know and really dont care much. What http://timetravelinstitute.com does mainly is for harassment and chastisment.
Being they are the cowards they are that is there game. I still get a
laugh at how it takes 20 of them to fight 1 of me. As I told those cowards “Pamela from the titor story could kick their asses with 1 hand and both legs tied behand her back.” I laugh every time I write that in my blog. ITS TRUE!!!

On
my time travel programming I have been under the weather the last two
days running a slight temp but I did manage to get some work done. Im
close to finishing up the first two routines in the program.

What
I am doing now is having it take a known check-sum and file size and
reconstruct the program. All check-sum construction programs that have a snow ball chance in
hell of doing what I do have to meet this first requirement. If it can
not reconstruct a known check-sum chances are it wont reconstruct a
un-known check-sum. So with my book program I am setting it up to
construct known files first. Then move on to sending it un-known files.

I
also through out the SHA1. I came up with my own algorithm for a strong
checksum and its strong enough to use to
construct files but at the same time I can also use it to measure how
far away from a real check-sum reconstruction I am. I already have been
running parts of the program testing stuff out and so far so good.

Well I need to get to bed. By next week I will start putting parts of the drone together. I want to have it done by this summer but knowing me I will drag it out longer.

Oh, I have to go back and correct the spelling mistakes sentences. Please forgive for now.

March 19th, 2014

I was holding off making another entry for a while. Mainly because I have been busy. But, I needed to get this entry in because in the news recently is new evidence supporting the big bang theory and every more evidence that multiverses exist. It goes on to support Einstein in his theory of gravitional waves. And, again, giving even more credence to my time travel theory laid out through out this blog about conspiracy, time travel, and attempts for what ever reasons to cover up the truth about my method of time travel.

So, again with the new evidence hitting the papers to support Einstein’s gravitational waves and more support for my theory of my method of time travel I just have to say “Excuse me public but I am about to become my rowdy rebel self again.”

To the http://timetravelinstitute.com (Ray aka Rainman, Darby, and their dogs.) IN YOUR FACES YOU DOPE SMOKING, BONG SMOKING, COCK SUCKING, THIEVING, COWARDS, CHILD PORN PERVERTS, PAMELA FROM THE TITOR STORY COULD KICK ALL YOUR ASSES WITH 1 ARM AND BOTH LEGS TIED BEHIND HER BACK, PUSSIES!!!!!!!!!!!!!!!!

YEAH!!!!!!!!!!!!!!!!!

And oh, lets not forget these guys are also TROLLS, THUGS, AND RODENTS!!!

These guys have no level for how low they can go. That is why my language toward them is so strong.

They hate it when I do that. But, this all started when Darby chased me down after I left http://timetravelinstitute.com as Reactor1967 and informed me that where ever I am when he can he will censor me. And Ray told me he was stalking me. His words to me was “We are watching you.” So, yeah my language toward them is strong and will continue to be that way FOREVER because of their behavior toward me. They asked for this. They should be more careful in the future what they ask for.

So, where does this put me with the gravitional waves being discovered? This support for gravitational waves in the scientific community and media? Right where I have been all along.

1. That time never ends or begins like matter and energy it is conserved.
2. That all information exist whether or not it is material in our physical universe.
3. That with check-sum hacking and data minining a check-sum counter it is possible to get information from the future, past, or other time-lines.
4. That time travel is the transference of information from the past to the future. From the future to the past. And, from one time-line to another time-line.
5. That my method of time travel is real. And, not just my method but my numerical system BNS as well. Which was the beginnings of me developing my method of time travel.

There is of course more but that is my major highlights. Some may have noticed I went back and deleted what I wrote about my nuclear powered stealth drone that I am building. That is because I moved that information someplace else. This is a time travel blog about time travel and the conspiracy against time travel. So, I knew it really did not belong here so I have it its own home someplace else.

I have been studying here and there in my private time on the things that Aaron did to get into my computer while I was talking to him. First as I said he used a typical hacker ploy.

1. He got me to talk to him any way he could.
2. He got my IP address
3. He scanned my home network using that ip address.
4. He deployed Rats (Remote Administration Tools Software) onto my family’s computers. Even looking at my 7 year old girl on her web cam. Hence now I call them child porn perverts.

What a Rat does is send the screen the user is looking at back to the hacker. It also turns the web cam on and sends that input back to the hacker. And, it records the strokes on the key board. It also gave Aaron access to my hard drive. He was looking for my time travel software but since he did not get that he took copies of the material I was writting for my books to commit copyright infringment of my work and stole my passwords using them to un-lawfully gain access to my accounts and he fraudentually used my credit card. AT WAL-MART if I am not mistaken. When I called these guys COWARDS AND THIEVES AND PERVERTS. YES, THAT WAS VERY TRUE. DARBY AND RAY, YOU GUYS ARE SICK IN THE HEAD. YOU GUYS ARE VERY SICK PEOPLE. None the less. You have not stopped anything. Most of all me!

Rat software can be deployed through port 80 the web browser. Which was one of the ports on my network they the people Ray and Darby sent after me hit the most besides others.

So, in the past when I first started blogging about http://timetravelinstitute.com I called them rodents. Now, since then they have lived up to that name. Since http://timetravelinstitute.com sent hackers after me deploying Rats on my network they Ray aka Rainman and Darby and their dogs have made the term RODENT or RAT EVER MORE THEIR OFFICIAL NAME. THEY MORE THAN PROVED THAT WHAT I WAS CALLING THEM WAS TRUE ALL ALONG!!!!!

Well that is my post for today. Everyone that follows me except the conspiracy against time travel take care. This next week I may not be posting very much for personal reasons. I will be back soon. Until then I will be working on my projects.

March 20th, 2014

I ment to put this in the last post. When Aaron from Bedford, Ma whos parents are Gary and Suzzanne owners of a technology company Bedford. His sister is Ashley who works for a parking garage in Bosten as its manager. Anyway when Aaron and I were talking and he had my trust he told me he wanted to stop talking with Gmail and use Thunderbird so we could use encryption for our emails. Well Aaron sent me his key. I installed it. This week I was doing some clean up on my laptop and I found the virus Aaron gave me. You have to click on the pic to make it larger.

 

So, anyway I guess he was having trouble getting into my laptop and worked up his little plan. I have the virus saved and I am forwarding it to the FBI along with another FBI report against Aaron. I may even file another police report. This one will be with the Russellville,Ar police department. I am saving the virus and the key he gave me along with the installation files to a CD. I will make the files downloadable for the FBI.

So, Aaron is more likely than not he is a admin at http://timetravelinstitute.com at the time I was still a member there as timecrime1986. This proves that
TIME TRAVEL INSTITUTE DOT COM
IS AN ATTACK SIGHT!!!!!!!!!!!!!!!!!!!!!!!!
Again, http://timetravelinstitute.com IS AN ATTACK SIGHT!!!!!!!!!!!!!!!!!!!!!!!!!!!!

There you go. I help the conspiracy against time travel dig their own graves when ever possible. And, they are doing a good job of that.

My Alienware was where I was doing my programming. I hope he did not get too much but now at this point I can not say for sure what he got. I know he did not get my main code but it is possible he could of got what I was programming. Which, glad to say if that is the case he only got bits and pieces because I never worked on the whole thing at once. This time travel stuff with information is very complex. It is a mathematically built structure whose sections have to work with other sections of the structure. What ever he might of gotten would of been bits and peices of structures but never the whole thing all at once. But still enough for someone much smarter than he (Aaron) to figure it out. God knows Darby and Ray are too stupid to understand it.

I am amazed at why the FBI and Homeland has not raided him and taken him in for questioning. Not only did he violate my kids by connecting to their web cams but I never spoke about my wife. She has a web cam too. Then their was the fraud and other crimes Aaron and his friends from http://timetravelinstitute.com commited.

Then now I discover he gave me this virus. And what bothers me is WHY THE HELL DOES NOT THE FBI AND HOMELAND FIND OUT WHAT THE HELL HE WANTED WITH TIME TRAVEL TECHNOLOGY. WHAT http://timetravelinstitute.com WANTED WITH TIME TRAVEL TECHNOLOGY!!! AND THEY DONT LAUNCH AND INVESTIGATION TO FIND OUT??? WHAT THE FUCK IS WRONG WITH THEM???

It is bad enough these guys from http://timetravelinstitute.com commited real crimes against my family and myself  and they the FBI and Homeland dont give a fuck about that but they could at least find out what these guys wanted with what they stole from me and what their intentions are with that information that they stole off my computers. I am working of TIME TRAVEL TECHNOLOGY AFTER ALL.

Who did they give it too? Did they sell it? What did they do with it? WHY DID THEY WANT IT? WHY DID THEY GO THROUGH THE TROUBLE TO GET INTO MY COMPUTERS? AND THE FBI AND HOMELAND DONT CARE? This does not make any sense.

Any other country would of been on this like stink on shit. I pretty much gathered that the authorities don’t give a shit about protecting the public it is only their public image they protect.

That is why they only work hi-profile cases and everyone else is shit out of luck.  I guess I dont have enough money are I am not in a high enough political position or maybe I just don’t have the right job in society to make it worth their while. Maybe I should be female instead of male. My daughters are underage females and still that was not enough for the FBI to do anything. Maybe my kids don’t have enough money are maybe my kids are not high enough in society to involve thier time.

It is damn obvious my status as a USA citizen does not mean a shit to the FBI or Homeland. Their mission is to project the public. THEY HAVE DONE NOTHING ABOUT THIS CASE!!! NOTHING!!!

If the FBI and Homeland were going to do anything or find out anything they are fast loosing ground by letting the time go by without checking this out. By now Aaron could of sold or given this information away all over the world.

He told me he was writing his version of my work? WHERE DID HIS VERSION OF MY WORK GO? WHAT DID HE DO WITH IT? AND THE FBI AND HOMELAND DONT CARE ABOUT THAT?

Aaron contacted me in July of 2013. We started talking then. It is now March of 2014. He started hacking me 8 months ago. He hacked me by my account for at least 4 months before I was able to start putting protections in place which he still bypassed.

The virus Aaron gave me collects passwords. If it only does that then I am ok. If it is a key logger then maybe not. I am going see if I can find out more about this virus Aaron gave me.

On Russia Putin said he was not worried about the west because WE DO NOT HAVE ANY LEADERS. Since the FBI and Homeland refuse to investigate my claims I am beginning to believe Mr. Putin was right about the west. Hell, we let hackers violate our children and steal one mans life work involving time travel technology and commit fraud and wire tapping and other crimes and we just let that shit slide right on by.  No wonder the USA is shrinking in power and status across the world.

March 22, 2014

One of the reasons a while back that the conspiracy gave me for saying my work was bull shit was not being able to prove immediately that the information was from the future, past, or other time-lines. That falls into the science of Chronometric dating.

In archaeology and geology they have methods for the absolute dating of what they find. But, with time travel with information it is very hard to immediately  date the information found. To find out how far in the future it came from. To find out how far in the past it came from. To find out where it came from. And, if it is from another time-line then well the dating process gets a lot more complexed and involved.

When information jumps time-lines then comparisions have to be made about what in common that other time-line had with our time-line. Did it follow are time-line to a certain extent then break off or was this a whole other time-line all together.

Then there is the fact again where in space-time was this time-line when it existed. Now, since our universe is constantly coming and going from existance then determining that could be impossible.

How ever the successful the dating process or the failer of it this in no way does not mean that the information found is not worth anything.

There was the fact that I said that if temporal communction was being used with this process with time travel with information then it is possible that quantum verification codes in all their complexity could be used in the communications. Finding ways to design quantum entanglement into messages from the future, past or other time-lines.

March 27, 2014

Well I took a few days off and went camping. I noticed my international readership has once again picked up. Internationally I get more traffic than I do for the USA.

I was going to talk tonight about my new stuff coming out to look for time travel computer media. My new stuff is so good that I can actually mathematically predict where on the binary counter time travel media will be.

Now that mathematical prediction is a check-sum range but this check-sum range is different. This check-sum range is only used 1 check-sum at a time instead of searching 1 check-sum for days, weeks, or months.  Now, I construct 1 file with a check-sum and move on to the next check-sum.

It only takes my computer a few minutes to less than a hour depending on how large the file is to construct a single check-sum to a time travel media file. Mainly now because I have my counter throttling down to a art now. I can control the speed of my counters making it possible to do what I do on a desktop instead of a mainframe computer.

Now, I can move through a entire check-sum range much more quickly than I have in the past. My data mining search bots are happier too. Now I don’t have to work the shit out them searching for time travel media.

I still setup my my configuration files and start up my new programs and it starts at the 1st checksum within that range and constructs that computer file. My data-mining bots look at the file and my counters move on to the next check-sum.

Now, the thing is I know longer have to search a single check-sum rolling one check-sum collision after another until I find time travel media. But, this last method is still valuable because you really never know what your going to find with this method. This method is still very valuable for me and I will continue to use it.

Now, I have gotten good enough now that I can actually construct 1 check-sum at a time now and move on to the next check-sum until the entire range of check-sums are constructed.

Now, to do this I had to use my own mathematical skills to design stronger check-sums. Strong enough to represent a single computer file but weak enough that the check-sum can be used to re-construct that computer file. If that computer file is from the future I will do my damn-est to find out. This is why this is time travel with computers. Finding computer files from the future, past, or other time-lines.

So now I truly HAVE GODS DATA BASE for my personal use more than ever before. Better than before. Faster than before. What I was using before did work but now I have improved my software once again. As that happens with all software when it is in constant use. The programmer constantly updates that software making it better, faster, smarter, and easier to use.

So, that is what I have been doing. I was thinking about using my new software for my book which was why I updated it in the first place but now I am having second thoughts. The book will still go through but I was thinking about keeping my new software for myself and put my old software in the book. Either one will work for finding time travel computer media. My data-mining bots for now are pretty much the same.

On my data mining I still look for this things when searching for time travel computer media.

1. File formats

2. Spell checking and syntax checking. I can do this for binary as well as for text. Binary checking is also one of the ways I can repair files that are poorly constructed.

(I can roll the bad bytes to good bytes and use my binary checking to tell me when my file is cleaned up. And, this can be done with text files too. Text files that have missing or blanked out pieces can be reconstructed this way too. Now, this also leads to many files that look the same but or not the same and only one of them is the real file. But, the real file will be there none the less)

3. I graph the information contained within the file and look at the curves. Using the curves I can tell if I found something or not. Now, on my graphs yes it is possible for me to pull the information into a third party file but a lot of times I assign my numbers + or – with a base line and use a unit of measurement beside my numbers. I also also have my software compute what type of curve it is and tell me. Yeah, its cheesy but it works for me. I learned to do this from my day trading. I had to go through and get my averages for a security I was trading then use my calculator to compute a short average crossing over and under a longer average. So I put that to use in my data-mining bots. I can look at the numbers and see what type of curve I have.

4. AI file recognition. This is like facial recognition but the AI looks at it to see if it looks like a good file.

5. There are statical methods like nearest neighbor method and root mean square and standard deviations.

The nearest neighbor method is often very helpful for data mining time travel computer media. Even totally different files can look similar. Take humans. Look at one human and look at another and they look similar. Computer files are the same too. This method can be used for data-mining.

Other methods I have been working on.

1. Quantum entanglement and quantum codes being used in messages from the future or the past. Here methods for observing quantum entanglement and using that to construct codes that can be embedded in messages and videos and set up my time travel computer media searches to look for these codes.

2. Real time file construction or as as close as possible to Real time file construction for communication with the future or the past. My new methods for finding time travel media is getting very close to this goal of real time file construction of check-sums.

3. Taking the time travel media and constructing time-lines. Each file having its OWN TIME LINE FOLDER.

4. Dating the information that I find. Developing methods to date that information in the time-line that it came from.

5. Organizing the time-lines into an organizational system so time-lines can be researched.

Some people have questioned if the past or the future really exist. My method of time travel is more proof that the past, future, and alternate time-lines really do exist. It is also proof that time-travel is real and that time travel really does exist.

My conspiracy against time travel talk for today.

Ray aka Rainman his most hated nightmare is that someday the scientific community will believe me that my method of time travel is real and does exist and that I will get credit for my discovery. Well I hate to tell Ray this but his nightmare is real. Now, Ray is still working on that discredit part that his why he and his pals do everything they can from keeping my post off the forums, and groups.

There is a lot more here at stake than Ray aka Rainman trying to get revenge on me for not leaving the Internet when he ordered me to do so. That is also why they Ray and his pals are stealing and plagiarizing my work. But, his ultimate goal is to keep time travel from the public and the scientific community. Which is the reason I call him and his pals and http://timetravelinstitute.com the “Conspiracy Against Time Travel”. They are trying to kill the greatest discovery of all time. TIME TRAVEL and keep its inventor Lloyd Burris from getting the credit for it.

When I came home from camping I logged into my router to see if Aaron had paid me a visit. My router was clean. Now, I did not check the outside of my network just the inside. On my logs I log where my Internet comes in from my ISP. I log before my firewall. I log after my firewall. I also reinstall my firewall from time to time.

I found out how to change my mac addresses as well as my IP’s so the next time I do a switch up and go to a new IP address all the mac addresses will be different too. Though if one of our computers is still running one of Aaron’s net bots that will not help us any. But, this will help me confirm if there is still a net bot present on my network.

Before I left the time travel institute dot com the first time not the second when Ray aka Rainman and I were not getting along because he was trolling his membership there and everyone was tired of him Rays administers told me “You can be his friend or his enemy and you do not want to be his enemy.” I know now they were threating me when they said that too me. That is another reason why their site should be taking down.

And, now on that note these guys still aint got shit still can not do shit to me. I am still posting and posting and posting.
And, yes these guys may track me down on the Internet a good part of the time but there are times when they fail to catch me posting. Hey Ray, your not getting your money’s worth out of Aaron he is slacking up. You need to cut his pay.

Hey Ray, are you and Darby financially supporting Aaron too? You might as well every one else is?
BAAAAAAAAAAAAHAHAHAHAHAHAHAH!!!!!!!!

Maybe you guys (talking to http://timetravelinstitute.com) are finally getting the message that I am here to stay. Time will tell. Well this is my post for today.

March 28,2014

I spent today drinking coffee and programing and watching tv. Actually I would watch tv for a while then pause it (I have dish DVR) then program actually debugging then watch tv some more. I was putting my new code through its paces and trying to find any errors that might exist. I did find one error. I got it in a loop it would not exit from. I got that fixed. I was adding the cout.precision and myfile.precision statements into my code. In c++ that takes numbers out to a specific length. I do not much enjoy looking at scientific notation when I program I like to see a good deal of my numbers.

Before I started programing today I
have my code in encrypted file containers. Well I forgot the damn
password. I spent over a hour trying to find the password.

I wrote a
list and entered every damn password I use in different combinations and
tried everyone of them before I finally remember the password and it was not on
the list.

It was a whole new one I thought of. I was sweating and
stressing out like hell for a while. I got to try harder to remember my passwords. If I had not remembered it I would of rewritten all that damn code if I had too.

The code I have now is rather long. It still looks a lot like my firecodes over at sourceforge but it works nothing like firecodes at all. Oh, I still get a weak check-sum and weighted check-sum but other than that it goes way totally in a different direction than firecodes did.

My new shit is so good I actually started getting the shakes wondering “WHAT THE HELL HAVE I DONE”.  I was tempted to email Darby and Rainman my programs today but I know they dont give a damn about time travel all they care about is causing trouble and stealing from other people.

They are satist I have come to learn. Mainly they are Internet marketers and trolls not men of science. They run a time travel forum but it is a fake forum for running adds so they can make money off advertisements and selling Titor stuff and finding new people to pray upon. Because they enjoy that sort of thing.

The reason I was tempted to email them because they keep calling my stuff bull shit. They are full of their own words. They are the ones full of bull shit. But, they did not understand BNS so they would not understand this either.

And, they would use it against me. There goal is disinformation because they are disinformation agents. I still think these guys might be working for the CIA. I know Darby said he is retired from there but I am not so sure.

My old code was good but it took a while to find stuff. But my new code kicks ass. In my counter development I have gone through basically 3 phases of counter development.

1. Smart counters.
2. Speed controllable brute force counters and smart counters.
3. speed controllable PRECISION COUNTERS, speed controllable brute force counters, and smart counters.

My speed controllable precision counters is my new counter. This baby using my new check-sum algorithms takes a check-sum and quickly creates a file for that one check-sum.

And, IT DOES IT FAST. The beauty of this thing is when I do my math to calculate where I am going to search for time travel media files now my check-sums are MORE PRECISE. MORE ACCURATE. AND MY RESULTS COME FASTER!!!

All because I have gone from using weaker check-sums to stronger check-sums with my speed throttling of my counters.

When I first started all of this it was hell at first finding good time travel media files. I worked my ass off with my smart counters. My code was way more complex than it is now and the quality of my files took a lot of work.

I mean hours upon hours looking through thousands of files manually before I got my data mining bots up just to find 1 good time travel media file. And, my smart counters where not always as smart as I wanted them to be.

I worked my ass off going from one counter to another trying to find the right counter. There was one time I spent a few months programing just to scrap the code and start on a new and different counter. It was a lot of work.

Then I got my speed throttling going. My counters improved. I got better at mathematically predicting where my time travel media would be on the counter.

But, It was hell playing with the speed of my counters to get things right. I learned how to use my data mining bots to help me control the speed of my counter even employing my AI to help me control the speed of my counter.

Now, I upgraded how I use my check-sums. I do not truncate my check-sums to a specific length. And I use methods now that get a damn strong check-sum. And, I can use these strong check-sums in my math calculations when mathematically calculating where on the binary counter time travel media files will be.

Now combining my precision counters with my counter throttling (controlling the speed of the counter as it reconstructs a time travel media file) OH MY GOD I HAVE TAKEN CHECK-SUM HACKING TO A WHOLE NEW LEVEL.

Time travel with computers is getting a whole lot easier for me.

Before it was hell for me to construct one good time travel media file. NOW ITS LIKE TAKING CANDY FROM A BABY!

Now when I get done with this I need to add really good search engine technology to my programs. I need to take my math calculations that help me tell on the binary counter where time travel media files will be and now I need to build a search engine that can work with my precision counters.

WHO THE HELL NEEDS THE INTERNET WHEN ALL OF TIME AND SPACE CAN BE USED TO SEARCH FOR INFORMATION!!!

Don’t worry. If http://timetravelinstitute.com has their way about it mankind well never know of my accomplishments. I’m going to finish up getting my new code through its paces then start on my second book as well as get my damn drone built. Then I need to get my search engine going and work on my other advancements.

Well I have to get to bed and try to get up in a few hours. This is a night (actually its early morning) where I think I will open up a alcoholic beverage and laugh my ass off at http://timetravelinstitute.com while looking at some time travel media. And no Arron that computer will not be on the Internet. At least Aaron gave me my lesson in Internet security before I got my new shit up.

March 31, 2014

Well, I have been busy. Mainly programming. I did discover a new bug in my new time travel program that I have to work with. In the past I always get my files at a specific weak check-sum when building a unknown time travel media file.

Well now I am working with strong check-sums. But, I found I need to work a little bit more how I build a file now because my strong check-sums can have different weak check-sums. So, If I try to use the same weak check-sum all the time then my program has a problem getting my strong check-sum to its precise target value.

What is more when I pick a strong check-sum for my program to use I have a general ideal what weak check-sum it should have but not a specific ideal about what it should be. It was a variance I let slip my mind when planning out my new program. I guess I am working too hard on it. I assumed or thought I could give it a starting weak check-sum and it would stop on its target all the time. Well that is not always true as I found out.

The reason I did not see this before was because I was using it to construct known media files. When I started hard and heavy constructing the unkown time travel media files I discovered a error in my loop trying to get my strong check-sum to its target value. The reason it was having problems because the program was trying to construct the wrong weak check-sum for the strong check-sum and it was off enough to prevent the program from finishing its file reconstruction. Which, I had not planned for.

So, I need to find a way to let my weak check-sum float as my program constructs the file. It will be in my next upgrade after my tempory fix. I will sit down one evening with my pencile and paper and work out the algorithm details mathematically.

But, that has not stopped me. What I will do is have a minimum weak check-sum and if my program fails to meet its target strong check-sum it will increment the weak check-sum and try again with the same strong check-sum. This is the fix I will use. Now after debugging and writting all that code some 1500 lines of code not counting my data-mining robots. That is just the counter. I will get “er” done.

And, earlier in my blog I was bragging. I opened my mouth too soon but my shit still works.

Now when my program runs it adds a certain number of bytes per pass to the counter. This is where the counter is BUILDING A REAL TIME TRAVEL MEDIA FILE.

This is called the speed of the counter. The more bytes added to the counter the faster the counter reconstructs a time travel media file. It is why I can do this shit on a desktop without using a mainframe.

Now, here is how my new program works now.

My strong check-sum looks something like this.
239874328.29384738
My weak checksum
90548

So, when I start building a file I do this

Program says
File reconstruction started.

pass 1
current              Target
3387.9238         239874328.29384738

pass 2
current              Target
98347.9873       239874328.29384738

pass 3
current               Target
898789.8786      239874328.29384738

pass 4,5,6…….

pass 15873
current                       Target
239874328.29384738 239874328.29384738

File reconstructed successfully

current weak            Target weak
90548                       90548

Then my data-mining robot steps in
program says
processing file
file passed test and was saved to media folder
or if the file is bad.
file rejected and was file sent to trash folder

Then another strong check-sum is given to the program and the process repeats. But, now this time I have to use multiple weak checksums when data mining for time travel media files.  Until I learn how to make my weak check-sum float during file reconstruction.

My question for the conspiracy against time travel when they said my programs were bull shit. WHAT THE HELL IS SO HARD TO UNDERSTAND ABOUT USING CHECK-SUM HACKING TO FIND TIME TRAVEL MEDIA FILES??? YOU GUYS SURE ARE STUPID. (TALKING TO THE CONSPIRACY AGAINST TIME TRAVEL.) PROOF IS IN THE STUPID SHIT THEY DO AGAINST ME. LIKE THAT CRAP AARON HINIKER FROM BEDFORD, MA PULLED.

On the subject of time travel before I go the problem people have with what I do is they

DO NOT KNOW THE DIFFERENCE BETWEEN TIME TRAVEL MEDIA FILES AND COMPUTER GENERATED MEDIA FILES.

And, to make matters worse if the media file is a altnerate reality file then someone can point at it and say “YEAP THAT IS COMPUTER GENERATED NOT TIME TRAVEL”. ITS BULLSHIT!

So, lets say my computer spits out a cartoon. It has a copyright date from the future. It has a company on it that DOES NOT EXIST AT LEAST NOT YET.

Now, it is a cartoon but it has legal markings of a traditional cartoon. IS THAT TIME TRAVEL OR IS THAT COMPUTER GENERATED?

Well the conspiracy against time travel from the fake add supported http://timetravelinstitute.com those thugs, trolls, INTERNET CYBER MAFIA, CHILD PORN PERVERTS, those satist would tell you its bull shit.

But, now step in Mr. Scientist who is not emotional and does not care a damn about me. He looks at it and is well versed in the subject of time travel. He would say “PLEASE LET ME STUDY THAT FILE”.

You see, earlier I talked abou peole who dig things up out of the ground for a living. THEY DATE WHAT THEY FIND. I organize what I find and try to date it if I can. I study it.

Using computers to search for time travel media files is no different than the scientist that digs up stuff out of the ground. It is a way to study the past. It is a way to study the future. It is a way to study other time-lines. It is a way to search for new technologies and see new entertainment and visit other places in space-time that we can not yet get too.

It is a way to study ancient documents long dead and gone. Its a way to study documents and media from other civiliations from any point in space-time.

It is a way to study history past and future. That is why I call this time travel.

April 03, 2014

I got my check-sum patch implemented in my code. Now my Time travel code is back to normal.

The reason for the patch is I am using a strong check-sum range now for my time travel searches where before I used a weak check-sum range.

So, with strong check-sums when I am constructing known computer files from a weak check-sum. I know what the weak check-sum will be.

But, when constructing unknown files from the future, past, or other time-lines with strong check-sums I have to find the right weak check-sum so my strong check-sum will work. So, this is how I did it.

The files I use to construct time travel media from weak and strong check-sums.

1. Counter file (This is created with a specific weak check-sum)
2. Speed file. This is the file I add to my counter to build my computer files. It is how I build large files in a small amount of time. The speed file is how many bytes to add to a file at a specific time WITHOUT CHANGING THE WEAK CHECK-SUM.

So, I have add a new routine in my code. When my counter passes its target strong check-sum but does not come to its specific check-sum I know there is a problem. My routine I call bumps up or down the weak check-sum of my counter file. My speed file is un-affected.

Now, this is not perfect because the counter has to be at a specific byte order. But, that problem is taken care of by just letting the damn thing roll over if necessary to find the correct byte order.

Now, The speed file too is also bumped up or down to control the speed of the counter as all this happens.

My algorithms monitor this process until my time travel media is constructed sucessfully.

RAY AKA RAINMAN, DARBY FROM THE HTTP://TIMETRAVELINSTITUTE.COM YOU COCK SUCKERS EAT YOUR HEARTS OUT. Im still on the interent. I am still time traveling. You have not done anything. BAAAAAAAAAAAAHAHAHAHAHAHAH!!!!

Well I have work to do. I have a hardware project to go work on along with my TTI stuff. Everyone take care. Reactor1967 over and out.

April 5th, 2014

Well today I sat down with my paper notebook and a calulator and a pen and worked out an algorithm to directly convert my strong check-sum to a weak check-sum to speed up my precision time travel media search programs.

Basicly how I do it is when I construct a strong check-sum range for the time travel media I am constructing I also construct a weak check-sum range for the same time travel computer media.

So, it was a matter of incrementing my strong check-sums and finding out what weak check-sum they belong with to write out my algorithm.

Using this I constructed an algorithm to do the conversion. Now, when I setup a project I always will have to know my first weak check-sum with my first strong check-sum. After that it is just a matter of running my algorithm to do the conversion.

Now, I can brag again that finding time travel media of the future, past, or alternate time-lines is again like taking candy from a baby. I did not run my programs long enough when testing them last time and my results were skewed because I had a pretty good ideal of what my weak check-sums would be. But, when the real testing hit I found my error. But now I have it worked out.

So, for I think I have it under control. I know my attacker/hacker Aaron could not of figured this out. He thinks he is so smart but he can not even understand the simplist of algorithms. When the shit hits the fan that guy aint got shit.

Hell, he has trouble just functioning at home. If he lived in the real world he would be eaten alive. I could see him throwing his 2 year old baby fits at work and getting fired because he can not understand how to work with people.

That probably came from his parents Gary and Susan (I spelled her name wrong but it is close.) not teaching him how to work and respect others and not giving him enough spankings.

So, now he spends his days looking for underage pre-teen girls in front of their web-cams and trying to convence people to give him money or set them up so he can hack their computers and rob them of their credit and lifes work.

I decided that Darby and Ray aka rainman of the http://timetravelinstitute.com must of been paying him to do what he did. If not then that kid is more of a fool than I previously thought.

A kid with folks that have money but he himself can not make money except to steal it from others. Along the way engaging in a way of life that in most nations would land him in jail or prison, get his hands cut off, or get him hanged or shot for his crimes.

What he does not understand is where will his way of life get him at the end of his life. He is still a loser living at home as a grown man with his parents. Most women looking for a husband would not have him on those grounds. But, as long as momy and daddy pay his bills I guess he does not give a shit.

You have a nice day sleeping in all day today Aaron after staying up all night. your earned it being stupid just like your friends are stupid. When your 45 and do not have anything you will have no one to blame but yourself.

What he does not understand that in this world all people have at the end of the day at the end of their lifes even with their family and friends is themselves to depend upon. Because people will leave other people out to dry quickly in a heart beat.

People come and go from a persons life and in his life when his friends move on he will have nothing to show for what he has done. And that includes his forum friends. Push comes to shove they would turn him in to serve time in jail or prison before they themselves would serve that same time.

And, when it comes to money even though he does not believe it he would also loose in that situation too. Oh, they might drag him for a while but eventually he would be cut loose.

So, my so called fake friend and pal Aaron is a traiter, theif, and a fool, as well as being stupid. And, like his friends he is also a coward.

He is way much worse off than Darby and Ray aka Rainman of the http://timetravelinstitute.com . He is almost as bad off as Grayson is. Grayson is so bad off I do not even bring his name up very much because he is so wrong as a person his name does not merit mention.

Aaron is almost to that point. It was merely for the fact that I want to expose his crimes to humanity that I even talked about him at all in the first place. What I am doing for Aaron is given him the spanken his parents never did. He needs his lesson as well as his pay date with KARMA. At least if he approaches someone in the future the way he approached me and they google him there is a chance they will find my blog and read about his hacking operation he did with me and not fall for his shit.

By posting this information about Aaron I may help someone else in the future.

I have a feeling Aaron Hiniker of Bedford, MA you and KARMA might have bad date in the future. If I hear of it I will laugh my ass off because you deserve what ever you get and give to others at least 10 times over. So, my laugh would be like this for you:
BAAAAAAAAAAAAAAAAHAHAHAHAHAHAH!!!!

Now, the boy does have computer skills. If he did decide to get his life straight he could land a real job. But, not by posting on the internet for his work.

He would have to get in a real car or take the buse and go fill out applications and look for a real job. Even move out of state if necessary.

He could still use the internet but that should not be his only means of searching for employment. Most employers do not look at all those applications.

Most of them work off what they have in corporate because they know those people are close and can be quickly contacted and interviewed.

Most employers hate internet applications even if they accept them. But, for Aaron Hiniker of Bedford, MA just getting up early in the morning to look for a real job would be way too much work for him.

So, Aaron Hiniker of Bedford, MA still remains a stupid fool drop out and a loser. A mere pawn for Dary and Ray to use as they wish. A fool to the end.

Well I have to go. I hear my computer alerting me to a new found time travel media file of the future, past, or alternate time-lines.

Before I go one other thing for today.

I also found when I set up my time travel media search projects I can create a lookup index for the range of strong check-sums I will be reconstructing for my time travel media. So, instead of using my conversion algorithm my lookup chart can be used. So, I have now about 4 or 5 ways to handle my weak check-sum problem when constructing my strong check-sums.

All these years looking at time travel media I am ready to answer the question for mankind again. I have talked about this before but these are my thoughts for today.

So, How will it end for us mankind?

Well, we could still make it to outter space but that effort is hampered by the need for an economy and a military.

Largely technology for the public is held back to make a long story short so that people and corporations can stay in power and the military wants the best for themselves so they can put down any public unrest or defeat an enemy.

Im not saying it won’t happen it will just happen very slowely if at all. Space-travel for the masses will be a long time coming if at all.

I once in my time travel media saw California get wiped out a earthquake at sea. I have pretty much seen it all as for natural or man made disasters.

What I have come to know and understand is that something Im not sure what will reduce our 6+ billion people on earth to less than a million or to less than a billion at some point in time.

There is no way to stop it. There is no way to prevent it. It is just going to happen. It can’t be stopped. Some of it can be delayed like earth getting hit from space science is a working on ways to stop that but not everything can be stopped. So, it is a 100% certanity that most of mankind on earth will get wiped out at some point in time. And nothing can stop it. I can’t stress this enough. Nothing can stop it.

All everyone knows and understands will one day come to a stop and mankind will once again have to rebuild from scratch if that is possible. So, it is good that people archive technology and seeds and that we still have libraries with books. All this Internet and computer stuff will one day be junk. Scrap metal for swords once again. It is just simply speaking the cycle of life. Nothing personal against any one. Religious people try to make it personal. None of this is personal. None of this is caused by our sins. It is just the way the universe works.

When it comes it might be a man made or it might be a act of god. With climate change it is a good bet it might be man made. But, please every one must understand. It is going to happen. And, not to piss of the religious people it will probably happen before Jesus Christ comes again and no it is not part of a plan it is just the way nature works. It is the way the universe works. So, for all those preparers out there and survivalist keep on doing what your doing.

On the survival ways for mankind to live on. The way to survive on earth would be to survive like we would in outer space and not just in space but on other worlds where the environment is not friendly to life. But, that is not practical for a everyday way of life for the billions that already live on earth. Most people do good just go get a clean drink of water and some food and a place to sleep. So, that is not practical.

Well governments are building underground cities and there are bunkers but the need for a long term food supply, long term water supply, and long term something to breath that can be maintained over generations of life would be needed. Yeah, that kinda of technology would be needed on earth in the long run during events where the sun will not come out for years and so on. Or when tempatures start going way below freezing or way above 130 F. Only the the best technology can help in those situations. Most people will be SOL.

Only governments build the type of places where people can survive very long term during an extinction event. People do not have the resources or the technology to build long term environments. But, to save mankind that someday will be needed. As well as ways to maintain science, technology, research, and advancement.
Access to resources have to be maintained too and the manpower and equipment to work those resources.

But, for now everyone is only concerned for the economy and the next Iphone and their favorite tv shows. So, most people will be screwed when the end nears.

The only thing that will prevent this is for mankind to stop fighting and holding each other back and work as a group to save our own asses.  There is a reason civilizations develop the means to leave the planet. What I am talking about here is why.

Now, if you talk to the conspiracy against time travel they will tell everyone screw this stuff I bet Reactor can not give us the score to the next football game or tell us what the stock market is going to do.

As the “Conspiracy against time travel” tells the public some times when I post in the forums right before they delete my post and get me banned for talking about time travel and the conspiracy against it.

That would be Darby and Ray of http://timetravelinstitute.com but they use a lot of people like Aaron and Grayson to do their dirty work for them. That is why I call them cowards. They can not fight their own battles.

No, none of the shit those cowards tell people on the forums matters worth a damn really if everyone wants to know the truth. All through out my blog I have laid out my research and my work EVEN WROTE A BOOK TO START HELP EXPLAINING IT. No, Darby and Ray are just plain wrong and I think they know they are wrong.

Getting back on topic (Yeah I ramble a bit. I give the insomniacs something to read when they can’t sleep. Hahah.)

No one gives a shit about what their government is doing and what will happen in the future. At least for most folks.
And, that is ok, Budda (That is my religion) tells people to live for today never think about the past or the future. And, I have come to learn that time and events will always repeat themselves and in infinite combinations. All that can happen will happen and come to pass and happen again.

So, I guess everything will really be ok on the long run. But, when everyone’s shit stops working and they starve to death or take their own lives at the moment when that shit happens that shit will suck a big one.

There is nothing anyone can do about the cycle of life. It just happens.

Here is my latest readership by country to this blog.
My all time readership is around 30,000 something people. Dary and Ray, all those forum banns and I am still talking to the public about time travel. You guys have not stopped shit.

United Kingdom 51

United States 42

France 19

Germany 15

Sweden 4

Brazil 3

India 3

Switzerland 2

Latvia 2

Romania 2

April 7th, 2014

Today I can not help but think that when my blog was down and I was not posting anymore to the blog. That was in fact when Ray and Darby the guys I call the leaders of the “Conspiracy Against Time Travel” that is when they attacked me the hardest and the longest attack I have ever seen them pull on me. And, a internet hacking attack job at that with stealing, fraud, wiretaping, plagerism, and looking at my kids through their web cams as well as my wife involved.  They say take a picture it will last longer. So, I guess they is exactly what those guys did.

Also, case in point I do not believe most people would of fallen for it. I mean Aarons emails were pretty much laced with bullshit which screamed “Im up to something” though I went along with it out of curiousity.
Those guys are so fucking stupid sometimes they have me on edge waiting to see what fucking stupid shit they will do next. It is kinda like watching laural and hardy back in the old days. With Ray being hardy and Darby being laural.

But, after I think hard about it I believe they were trying to get me to put my blog back up. To get me posting again. And, I believe if that is the case then they do believe I know what I am talking about with time travel. Though they still keep me out of the forums. Later I have some more transcripts to post about the forums but it will be a bit.

No, I do believe they wanted my blog back up now that I think about it.

Well I came home today I watch one hour of tv then I worked my ass off on running my time travel program. I found another bug. This one is a particular nasty bug. In my counter loop my count variable will not increment. I believe I have a stack overflow caused by my buffer which is preventing my count variable from incrementing.

I use a lot of memory in my program. The reason for that is I can choose how strong to mathematically make my check-sum. The more memory I use the stronger my check-sum. When I get it on my big desktop off my small laptop I believe my program will run better. It may be I over ran my buffer I do not know still have to finish checking it out.

I have the new ubuntu on my desktop but after Aarons shit it does not touch the internet. When I want to update it I use update offline then take the script to another computer on another machine and run the script to download the updates. I also install software that way.

So I previously wiped my desktop computer so I have to install rocks cluster again. I have 32gig of memory so when I get done my programs should run just fine again after I figure out what I did to my buffer to cause my count variable not to increment in c++.

Tomorrow is my Drone day. That is when I work on building my drone. See my other blog for that.

I started alternating on my programming work and my drone. One day I work on my time travel programming the next on my drone.

Aaron should not feel to bad about that drone. I was planning on building it before he came along. But, just like he motivated me to finish my first book he also movtivated me to finish my drone.

I will have to be careful about the tech I put in it or I could get into really big trouble. Aaron, If  you really do believe I can time travel my question for you is why would you piss off somebody with unlimited access to technology and tell him about it and tell him who you are and where you live?

You see when I call the conspiracy against time travel stupid. They really really are. Those guys aint got 2 cents of common sense between them. They really dont. And what is even more funny they think they are smart!!!

BAAAAAAAAAAAAAAHAHAHAHAHAHAHA!!!!!
BAAAAAAAAAAAAAAHAHAHAHAHAHAHA!!!!!
BAAAAAAAAAAAAAAHAHAHAHAHAHAHA!!!!!

Oh my god my ribs are hurting!!! Tears are rolling down my face right now.

Ok, I got that laugh out of the way. Yeah Darby and Ray you guys are really smart.Yeah, smart asses. These guys do not know their own butt holes from a regular hole in the ground. That is how smart they are.

BAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAH!!!!
Ok, I need to stop before I have a stroke or heart attack. When I think about those guys I can not but help laugh sometimes at them.

Well, Ray and Darby I guess you guys missed me so yeah my blog is back. I will still be putting it up on a more secure site where I can control who sees it better when I get a chance but I have been so busy and it may be a bit.

Today after tomorrow I will get that damn bug worked out. I have went back into the code and I am testing every single line of code individually.

Later I want to go back and put my new improvements in some of my old programs and dust those things off and upgrade them too. I want my new arsonal of my

1. smart counter
2. weak check-sum counter
3. strong check-sum counter

All upgraded and working better.

Well I need to get to bed. Good night everyone.

April 8th, 2014

Well
I was tired when I got home and fell asleep but I really needed it. I
did get up and laid my work out on my electronics bench for my drone
work tomorrow and organzied it so when I get home I can start to work.
I have some time off so I should get plenty done on my drone. On my
programming I will hit that thursday afternoon for a bit.

On the conspiracy getting me banned on the forums I do not know if my post are getting delayed getting into the search engines or what but now it is taking them the conspiracy at least a week to find my post and about another week to get me banned.

During that time I rack up traffic to my blog and websights. One of my forum post I made 2 or 3 weeks ago and they the conspiracy still have not found that one. But, these guys are still stalking me. I scratch me head a lot of days wondering what those guys deal is. Some people are just crazy as well as stupid. That pretty much describes the conspiracy against time travel.

Im getting my drone ready for the accident Aaron Hiniker said I was going to have. That guy should be more careful with what he says. Where I live when you threaten someone you had better damn well be ready to back those words up. My ex-brother in law one time had a guy pull a gun on him. Well the guy did not use it and went the rest of his life with no teeth after my brother-in-law throughly removed all his teeth rather quickly I might add. Shit like that is why it is best not to threaten people if you can not back it up with action. But of course my drone is purly for protection only. That means self defense only. Like I said I had planned to build it before Aaron Hiniker came along but he just helped me speed it up a bit.

In my spare time I have owned many RC helicopters. I was going to buy the parrot but since I am building my own their is no need. My drone will be way more cooler and will do a hell of a lot more shit. If I see a threat all I have to do is target it and give the response to the drone I want used. That response will be immediately carried out. There will be many different responses at my disposal.

My coolest device I will have on my drone is the inverted laser. Yes, I got that off my time travel media. It uses the surrounding air as the laser medium and causes light to be asorbed or emitted. It can combine frequency’s with the incoming light to change the incoming lights frequency.

Un-like normal lasers where the medium is on the inside of the laser and needs a lens this laser is turned inside out and uses the outside air as its laser medium. It uses its ability to control the energy level of the atoms in the air and causes the atoms in the air to change energy levels.

When they the atoms change energy levels they emit light or absorb light. If the light is completly absorbed then the laser or what ever it is mounted to becomes invisible.

Now, it can also change the frequency of the incoming light by merging it with another frequency of outgoing light and cause the incoming light to go into the ultra-violet range. In that range the light can not be seen by humans thus again the laser or what it is mounted too is invisible.

So, when the light bounces off my drone it will be at a higher frequency that can not be seen or will be absorbed and not bounce off at all. Thus the drone will not be seen.I have been keeping this to myself for a very long time. Along time ago it was one of my pet projects I searched for in my time travel media.But, at the time I did not know it was a type of laser until I came across the actual design for it. I was trying to find a device to make things invisible when I came across this inverted laser. The laser’s main purpose is to make things invisible. I will use it to make my drone invisible.
The inverted laser as far as I know does not exist on earth. I guess I will be the first person to build one.
Man, there is just so much shit in time travel media people got know ideal. No, I have reasons for doing what I do. I fucking love it. It is my hobby.But, yeah I plan to put the inverted laser on my drone with my lighting system. I hope I don’t get busted for it. When I get this thing built I assure everyone it will be well hidden and put away but close enough I can use it if needed. I will use it in a responsible manner of course. See my drone blog at the shown at the top to see the page.Well its late.April 9th, 2014

Well I discovered I was still putting March dates. I fixed it. Yeah, that comes from not getting enough sleep. I got to thinking today and I can’t help but laughing and chuckling at how Darby and Ray keep trying to keep me out of the forums. More so now than ever because I post my blog link. Which, when I first came to their forum they were trying to stop me from posting my web-sight links which at the time had nothing to do with the time travel or them. But now they try to stop me more then ever because I talk on my blog about their conspiracy against me. The conspiracy against time travel is their dirty laundry.

Those guys should read the book about the man who folded himself. It is about them. They know what I am talking about. The more they mess with me the more dirty laundry they end up having to hide from others. I have no secrets when it comes to the laws they break trying to get to me. To the stupid shit they try to do to me. No, I put all that crap up on my blog for the world to see in hopes that maybe the law will catch them for the crimes they are committing against me.

And, it is not getting easy for them because I am everywhere on the internet. Yeah, now anyone who reads my blog see Ray’s and Darby’s dirty laundry flying in the wind because they put it there.

It was Darby actually who started following me around the internet first after Ray informed me he was watching me then Ray joined Darby later on following me around then they brought their friends in on it and they have been doing it ever since. Now their sending hackers after me. Next I guess they will send a hit man for me. Aaron already said I was going to have an accident.

And ever since I post ever thing they say or do to me. Man they hate that. Well its their fault. If they don’t want me to post it then they should not be messing with me. They hate me showing the public who they are but then they do stupid shit and show the public who they really are. I am just a clear glass letting their bad behavior against me shine through to my blog. And, I have a right to my opinion that is why I have a blog.

Hey, Ray’ those are awful big boxer shorts you have there flying in the wind. Damn Darby is that Batman underwear?  BAAAAAAAAAAHAHAHAHAHAAHAHAHAHA!!!!!!

That is what they get for stalking and harassing people. Well, that is all I have to say about Ray and Darby for the evening. Just to let you guys know ever time you guys run me off the internet I laugh at watching you guys trying to keep me from telling people about myself and my sights and my blog and what I do and what my life has been about these last few years.

You guys (talking to the conspiracy against time travel) are just pissing in the wind. Pissing in your very own faces.

Oh, by the way Darby and Ray can’t say to much I have put their post to me up here so my readers saw what they had to say. So, they got their say too.

Before I go for today:

Here is the forum transcript from Gaia online. Please notice that one of the people that responded CALLED HIMSELF A STALKER. Also notice the bullshit remark. This is the conspiracy’s trademark post to me. They have been posting that remark to me since 2010.

Gaia online in their email to me did not post all these people’s words in the emails. I signed up for a email reply but their site is shit do I got a 1/2 ass account of what when on their.

And, because the http://timetravelinstitute.com ask them to ban me and delete my post im not sure if it is possible to recover the rest of it.

I only made one post and it was but a few words.

If I had gotten the chance to go back I could of responded to some of these people’s post to me but Darby and Ray wanted to make sure I did not talk there any more.

Anyway here is the transcript. Since I am not a member their anymore I am not going to worry about posting it in my blog. Also these are my personal emails that Gaia online sent me so it is my property to post.

Beginning of Transcript ————————————–

Reactor1967 Posted

Something new and interesting. Time travel and conspiracy
http://timetravelcomputers.org

—————————————————————————-

Gaia Online webadmin@mailer.gaiaonline.com

Apr 2 (8 days ago)

to me
—————————————-
Gaia Online
—————————————-

MyNameIsKir replied to your thread on the Gaia forums!

Thread Title: Something new – time travel with computers and conspiracy

“But is this technology bigger on the ins…”

To log into Gaia and read the full post, click here: http://www.gaiaonline.com/forum/t.91200071_3/?_gaia_t_=4614#3
Fondest regards,
-Gaia Online

———-

—————————————-
To unsubscribe from emails like this, click the link below:
http://www.gaiaonline.com/account/unsubscribe?type=user&user_id=36598023&context=thread_replied&token=0624fd87c848e8b9d2e78356073413694a5982c1&app=

To modify your communication settings:
http://www.gaiaonline.com/account/notifications/

Privacy Policy:
http://www.gaiaonline.com/info/legal/privacy

Terms of Service:
http://www.gaiaonline.com/info/legal/tos
—————————————-
Gaia Online and all images associated with GAIA Online are (C) Copyright 2003 – 2014 Gaia Interactive, Inc. All Rights Reserved
Gaia Online P.O. Box 612680 San Jose, CA 95161-2680

Darmani1Link replied to your thread “Something new – time travel with computers and conspiracy”
Personal/Gaia online
x
Gaia Online webadmin@mailer.gaiaonline.com

Apr 2 (8 days ago)

to me
—————————————-
Gaia Online
—————————————-

Darmani1Link replied to your thread on the Gaia forums!

Thread Title: Something new – time travel with computers and conspiracy

“This is bullshit. Quantum physics has no…”

To log into Gaia and read the full post, click here: http://www.gaiaonline.com/forum/t.91200071_2/?_gaia_t_=4614#2
Fondest regards,
-Gaia Online

———-

—————————————-
To unsubscribe from emails like this, click the link below:
http://www.gaiaonline.com/account/unsubscribe?type=user&user_id=36598023&context=thread_replied&token=0624fd87c848e8b9d2e78356073413694a5982c1&app=

To modify your communication settings:
http://www.gaiaonline.com/account/notifications/

Privacy Policy:
http://www.gaiaonline.com/info/legal/privacy

Terms of Service:
http://www.gaiaonline.com/info/legal/tos
—————————————-
Gaia Online and all images associated with GAIA Online are (C) Copyright 2003 – 2014 Gaia Interactive, Inc. All Rights Reserved
Gaia Online P.O. Box 612680 San Jose, CA 95161-2680
Gaia Online webadmin@mailer.gaiaonline.com

Apr 2 (8 days ago)

to me
—————————————-
Gaia Online
—————————————-

Darmani1Link replied to your thread on the Gaia forums!

Thread Title: Something new – time travel with computers and conspiracy

“This is bullshit.   Quantum physics has …”
Gaia Online webadmin@mailer.gaiaonline.com

Apr 2 (8 days ago)

to me
—————————————-
Gaia Online
—————————————-

Darmani1Link replied to your thread on the Gaia forums!

Thread Title: Something new – time travel with computers and conspiracy

“This is bullshit.It’s incomprehensible b…”

To log into Gaia and read the full post, click here: http://www.gaiaonline.com/forum/t.91200071_6/?_gaia_t_=4614#6
Gaia Online webadmin@mailer.gaiaonline.com

Apr 2 (8 days ago)

to me
—————————————-
Gaia Online
—————————————-

Darmani1Link replied to your thread on the Gaia forums!

Thread Title: Something new – time travel with computers and conspiracy

“While most of it is true, The MWI I find…”

To log into Gaia and read the full post, click here: http://www.gaiaonline.com/forum/t.91200071_10/?_gaia_t_=4614#1

psychic stalker replied to your thread “Something new – time travel with computers and conspiracy”
Personal/Gaia online
x
Gaia Online webadmin@mailer.gaiaonline.com

Apr 2 (8 days ago)

to me
—————————————-
Gaia Online
—————————————-

psychic stalker replied to your thread on the Gaia forums!

Thread Title: Something new – time travel with computers and conspiracy

“This is bullshit.It’s incomprehensible b…”

To log into Gaia and read the full post, click here: http://www.gaiaonline.com/forum/t.91200071_4/?_gaia_t_=4614#4
Fondest regards,
-Gaia Online

———-

—————————————-
To unsubscribe from emails like this, click the link below:
http://www.gaiaonline.com/account/unsubscribe?type=user&user_id=36598023&context=thread_replied&token=0624fd87c848e8b9d2e78356073413694a5982c1&app=

To modify your communication settings:
http://www.gaiaonline.com/account/notifications/

Privacy Policy:
http://www.gaiaonline.com/info/legal/privacy

Terms of Service:
http://www.gaiaonline.com/info/legal/tos
—————————————-
Gaia Online and all images associated with GAIA Online are (C) Copyright 2003 – 2014 Gaia Interactive, Inc. All Rights Reserved
Gaia Online P.O. Box 612680 San Jose, CA 95161-2680
Gaia Online webadmin@mailer.gaiaonline.com

Apr 2 (8 days ago)

to me
—————————————-
Gaia Online
—————————————-

psychic stalker replied to your thread on the Gaia forums!

Thread Title: Something new – time travel with computers and conspiracy

“While most of it is true, The MWI I find…”

To log into Gaia and read the full post, click here: http://www.gaiaonline.com/forum/t.91200071_8/?_gaia_t_=4614#8
Gaia Online webadmin@mailer.gaiaonline.com

Apr 2 (8 days ago)

to me
—————————————-
Gaia Online
—————————————-

psychic stalker replied to your thread on the Gaia forums!

Thread Title: Something new – time travel with computers and conspiracy

“While most of it is true, The MWI I find…”

To log into Gaia and read the full post, click here: http://www.gaiaonline.com/forum/t.91200071_12/?_gaia_t_=4614#12

Gaia Online – Account permanently banned
Personal/Gaia online
x
Gaia Administration Staff inquiry@gaiaonline.com

Apr 5 (5 days ago)

to me
—————————————-
Gaia Online
—————————————-

You have a message from the Gaia Online administrator:

Your account Reactor1967 is permanently banned because of the following reason:

Terms of Service Violation – Inappropriate behavior: Advertising

Terms of Service: http://www.gaiaonline.com/info/index.php?info=tos

Advertisement on Gaia Online is limited between both pre-approved areas for advertisement and pre-approved types of advertisement. Flooding advertisements or posting inappropriate and/or illegal advertisements on Gaia Online is strictly prohibited.

For general information on why an account may have been banned, or if you wish to inquire about your specific account ban, please check our Help Center article called “Why was my account banned?” which is located here:  https://www.gaiaonlinehelp.com/ics/support/default.asp?deptID=5694&task=knowledge&questionID=757

If you have any questions please use this form to contact Gaia:
https://www.gaiaonlinehelp.com/ics/support/default.asp?deptID=5694&task=knowledge&questionID=380

—————————————-
Privacy Policy:
http://www.gaiaonline.com/info/legal/privacy

Terms of Service:
http://www.gaiaonline.com/info/legal/tos
—————————————-
Gaia Online and all images associated with GAIA Online are (C) Copyright 2003 – 2014 Gaia Interactive, Inc. All Rights Reserved
Gaia Online P.O. Box 612680 San Jose, CA 95161-2680

End of transcript —————————————————-

GAIA ONLINE WORKS FOR THE CONSPIRACY AGAINST TIME TRAVEL!!! THEY WORK FOR THE GOVERNMENT!!!

Thursday April, 10th 2014

Well I had not intended in making a post today but I wanted to get this up. It appears the conspiracy against time travel’s hacker that would be Aaron he stayed away for a bit. I guess he thought I would stop looking at my logs. But, today from Cambridge, MA he ran a dos scan attack on my network again which did get through my firewall. Of course I am filling out a FBI report. Here is the log.

[DoS Attack: ACK Scan] from source: 184.51.108.89, port 80, Thursday, April 10, 2014 20:53:45
[DoS Attack: ACK Scan] from source: 184.28.17.171, port 80, Thursday, April 10, 2014 20:46:50
[DoS Attack: ACK Scan] from source: 184.28.17.171, port 80, Thursday, April 10, 2014 20:46:19
[DoS Attack: ACK Scan] from source: 184.28.17.171, port 80, Thursday, April 10, 2014 20:45:54
[DoS Attack: ACK Scan] from source: 184.51.108.89, port 80, Thursday, April 10, 2014 20:45:51
[DoS Attack: ACK Scan] from source: 184.28.17.171, port 80, Thursday, April 10, 2014 20:45:36
[DoS Attack: ACK Scan] from source: 184.28.17.171, port 80, Thursday, April 10, 2014 20:45:22

Here is the whois by IP

[Querying whois.arin.net]
[whois.arin.net]

#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#


#
# Query terms are ambiguous.  The query is assumed to be:
#     "n 184.51.108.89"
#
# Use "?" to get help.
#

#
# The following results may also be obtained via:
# http://whois.arin.net/rest/nets;q=184.51.108.89?showDetails=true&showARIN=false&ext=netref2
#

NetRange:       184.50.0.0 - 184.51.255.255
CIDR:           184.50.0.0/15
OriginAS:
NetName:        AKAMAI
NetHandle:      NET-184-50-0-0-1
Parent:         NET-184-0-0-0-0
NetType:        Direct Allocation
RegDate:        2009-10-22
Updated:        2012-03-02
Ref:            http://whois.arin.net/rest/net/NET-184-50-0-0-1

OrgName:        Akamai Technologies, Inc.
OrgId:          AKAMAI
Address:        8 Cambridge Center
City:           Cambridge
StateProv:      MA
PostalCode:     02142
Country:        US
RegDate:        1999-01-21
Updated:        2014-03-19
Ref:            http://whois.arin.net/rest/org/AKAMAI

OrgTechHandle: MHA379-ARIN
OrgTechName:   Hannigan, Martin
OrgTechPhone:  +1-617-444-2535
OrgTechEmail:  ip-admin@akamai.com
OrgTechRef:    http://whois.arin.net/rest/poc/MHA379-ARIN

OrgAbuseHandle: MHA379-ARIN
OrgAbuseName:   Hannigan, Martin
OrgAbusePhone:  +1-617-444-2535
OrgAbuseEmail:  ip-admin@akamai.com
OrgAbuseRef:    http://whois.arin.net/rest/poc/MHA379-ARIN

OrgTechHandle: ZIPKI-ARIN
OrgTechName:   Zipkin, Justin
OrgTechPhone:  +1-617-444-9713
OrgTechEmail:  ip-admin@akamai.com
OrgTechRef:    http://whois.arin.net/rest/poc/ZIPKI-ARIN

OrgTechHandle: SJS98-ARIN
OrgTechName:   Schecter, Steven Jay
OrgTechPhone:  +1-617-274-7134
OrgTechEmail:  ip-admin@akamai.com
OrgTechRef:    http://whois.arin.net/rest/poc/SJS98-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#

-------------------------------------------------------------

[Querying whois.arin.net]
[whois.arin.net]

#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#


#
# Query terms are ambiguous.  The query is assumed to be:
#     "n 184.28.17.171"
#
# Use "?" to get help.
#

#
# The following results may also be obtained via:
# http://whois.arin.net/rest/nets;q=184.28.17.171?showDetails=true&showARIN=false&ext=netref2
#

NetRange:       184.24.0.0 - 184.31.255.255
CIDR:           184.24.0.0/13
OriginAS:
NetName:        AKAMAI
NetHandle:      NET-184-24-0-0-1
Parent:         NET-184-0-0-0-0
NetType:        Direct Allocation
RegDate:        2010-10-11
Updated:        2012-03-02
Ref:            http://whois.arin.net/rest/net/NET-184-24-0-0-1


OrgName:        Akamai Technologies, Inc.
OrgId:          AKAMAI
Address:        8 Cambridge Center
City:           Cambridge
StateProv:      MA
PostalCode:     02142
Country:        US
RegDate:        1999-01-21
Updated:        2014-03-19
Ref:            http://whois.arin.net/rest/org/AKAMAI

OrgTechHandle: ZIPKI-ARIN
OrgTechName:   Zipkin, Justin
OrgTechPhone:  +1-617-444-9713
OrgTechEmail:  ip-admin@akamai.com
OrgTechRef:    http://whois.arin.net/rest/poc/ZIPKI-ARIN

OrgAbuseHandle: MHA379-ARIN
OrgAbuseName:   Hannigan, Martin
OrgAbusePhone:  +1-617-444-2535
OrgAbuseEmail:  ip-admin@akamai.com
OrgAbuseRef:    http://whois.arin.net/rest/poc/MHA379-ARIN

OrgTechHandle: MHA379-ARIN
OrgTechName:   Hannigan, Martin
OrgTechPhone:  +1-617-444-2535
OrgTechEmail:  ip-admin@akamai.com
OrgTechRef:    http://whois.arin.net/rest/poc/MHA379-ARIN

OrgTechHandle: SJS98-ARIN
OrgTechName:   Schecter, Steven Jay
OrgTechPhone:  +1-617-274-7134
OrgTechEmail:  ip-admin@akamai.com
OrgTechRef:    http://whois.arin.net/rest/poc/SJS98-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#

Well I need to go I need to get some rest for tomorrow.



Friday April 11th, 2014

Well I found my bug in my code from the other day. I had a buffer over run which kept me from incrementing my counter. To make it simple the bug was when I created my speed file to add to my counter my program wrote some bad bytes to my speed file. So, later when my program went to add my speed file to my counter it read back the bad bytes to my buffer and boom buffer over run and counter would not increment.

So, I have to go back and fix how I create my speed file. How I worked this out is I left my count variable along but started remarking out the code before it so it would not compile to the program. Then I ran the program and watched to see if my counter variable would increment. When I finally remarked out the code causing the error my counter variable started incrementing.

And it was the code where I opened up my speed file and read from it. When I remarked that out my counter incremented perfectly.

I am still new to reading and writing more than one byte at a time so it was a math error on my part. I will fix it.

Well today I have not seen anything come through my firewall. Now, what is before the wall I have not checked. I will offload my logs later and look at it.

So, I guess Aaron is coming back seeing if I relaxed. This comment is for him “Hey boy you looking for something. I’ve moved the cookie jar son.” Aaron, if you were to connect to a web cam now in my room you would see that drone getting built. That is what you would see. Well that is not entirely true. You would see my ugly mug writing code too. Building, coding and yes surfing the net a bit and watching netflix. I do that too.

But, that new program is really something else. When I get that finished I am going to get my old code with my weak check-sums and add that to the menu then start that bad boy back up and running like I use too but after the conspiracy’s last attack I probably will not have it running when I am not home.

Moving on to my talk for tonight. The laws of physics. There is still a lot of misconceptions in science.

One of the bigger misconceptions that the laws of physics always have to work together. And, if they don’t then one of the laws is not entirely correct. Well that is a misconconception. Why, because:

Not all laws of physics are created equal.

Why?

Because for every set of laws of physics. There is another set of laws of physics that must exist to support the first set of laws of physics.

Why?

Because in the grand scheme of things our universe is just as small as we petty humans are. Our universe is just as insignificant as we are.

So to sum it up creation is huge. So, science has been trying to get quantum mechanics to explain our macro laws of physics. But, quantum mechanics is a set of laws of physics that must exist so that the laws of physics on the level we see can work. So, in the world of the laws of physics science needs to understand that their are certain laws of physics that govern different sets of laws of physics.

They need to be able to seperate the laws of physics into different branches like a phylogenetic tree that describes the relationships among entities. Because it will not always be possible to see every relationship directly. At least not at first.

As every animal is different in the world so will different laws of physics be different. And again why is that? because of evolution. It works for the laws of physics just as it works for living things. What works stays around and what does not work well it does not last very long.

The scenery changes. So, now science sets and scratches their heads trying to get the first sets of laws of physics to explain the second set. But, how do that do that when THE FREAKING LAWS OF PHYSICS CHANGED! No, man it is like I said. There is always something supporting the previous laws. What is needed is a method to put them on a tree and understand their relationships then later after that work on understanding the smaller things.

One thing does not always belong to another. And, that is the mistake that science makes with the laws of physics. There is not one theory of everything because the laws of physics have evolved like everything else over a very long period of time. So, like nature on earth physics follows a tree pattern where laws like quantum mechanics are different than say Newton’s laws. Each has its purpose and its place on a tree. All the laws of physics that govern all of space-time that we know and beyond belong on a
phylogenetic tree that describes the relationships among entities. The theory of everything would be that tree. Any theory of everything would describe the mathematical relationship among the different branches of that tree. But, different laws of physics would be grouped as branches forming a tree. That tree would be the multiverse not the universe.

So, as science blows past one set of laws of physics they will always run into another set of laws of physics that change the game. They run into the laws of physics that supported the previous sets of laws of physics. So, that puts science back to being little kids again looking at a brand new world that must be explored and learned all over again.

So, where will science be when they get past quantum mechanics? They will be in the same boat they were in when they first discovered quantum mechanics. Because there will be another set of laws to learn that support quantum mechanics. And, it will be on a different branch of the tree.

So, it is shit like this that the conspiracy against time travel can not understand. Things that I learned and understand a long time ago when I started looking at my time travel media.

They the conspiracy fail to see or maybe they do see and are just too aragant to admit it. Yes they are that too. I still don’t see how them sons of bitches made it out of grade school must less high school.

Suffice to say there is a reason why time travel with computers is possible. Computer media is just a list of numbers. When those numbers are re-ordered and changed around and verified as real computer media it is possible to have a film that someone will take off their camera a year in the future. Two years in the future. 500 years in the future. But, getting that dated can be hard to do. But it is possible. That is the laws of physics I understand. That is the laws of physics I work with.

Just as it is possible to use check-sum hacking to send data over a weak Internet connection which has been proven by the older but still slightly popular program Rsync so it is possible to use check-sum hacking to send computer data through space-time. To bridge the gap between the future, past, and alternate time-lines.

Then there is the question of that whole quantum entanglement thing. Mathematically embedding codes in messages and searching for those messages where on a quantum level time travel media file can be verified.

We verify emails with encryption and codes. Why can not a time travel way be used to verify time travel media files? Well, it can. There is a way. Now, not all media I search for and find has quantum entanglement codes in them. I just call them quantum codes.

Technology is a lot like the laws of physics because technology has to depend on the laws of physics to work. So, for every technology there is a previous technology that supports it. That is why reverse engineering can only work when someone understands the technologies involved. When they do not then reverse engineering becomes a lot like trying to do science when you don’t understand the laws of physics your working with.

So, them sons of bitches Darby and Ray who are the conspiracy against time travel. They and their friends. These guys who sent hackers after me do not understand my technology because quite frankly they do not understand the technology that supports it.

Them sons of bitches the conspiracy against time travel barely understand todays laws of physics let along anything else. So, yeah I can understand why they can not understand time travel with computers.
ITS CALLED BEING STUPID!!!

And that kid they tried to get to understand my work hell that boy really had problems. I guess hacking is a hell of a lot easier than time traveling with computers. That is one sad kid that really needs to get an apartment and go back to school. Badly, maybe if he got away from Darby and Ray and got off his laptop he could have a normal life.

I still do not see how that boy made it as a hacker. My guess is he uses stuff already pre-wrote for him. He is not a true hacker. Just a spooled punk kid that thinks he is something. I can’t wait for him to hit the real world.

For every bully on the block there is always a bigger bully somewhere. Aaron just has not met him yet. Of course he would not. He is too much of a pussy to get a job and get out in the real world. He is hanging out with them geezers Darby and Ray. He is not going to learn any thing from them except how to be a arragant punk. Oh, don’t for get stupid too. BAAAAAAAAAAAAAAAHAHAHAHAHAHA!!!!! Yeah they are that too. When I think of Darby and Ray and the word stupid it gets me laughing every time.

Well, I need to go. I done my update, my science talk, my time travel talk, and my ranting for today. Hey, that is what blogs are for. That is why people have them. Some blogs are better than others. I am not really looking for a fan club just a place on the net the conspiracy against time travel can’t run me off from.

Well finally good night every one. Damn I have to get up in a few hours and go to work.

Saturday April 12th

Well, did not do much today except work. When I can I really need to get back to my books, programs, and videos I had planned to produce and put some more media here too. I am going to do another revision of my first book at some point and get a Burris Numerical System program up for the public that compresses data. Finish up my current programs and get that second book written and finish producing my documentry. On my current program I am working on creating my speed file better. That is where I am now. I am making it where it will run rock hard solid and be very dependable and fast.

Of course I have said all that before about gettng my books, programs, and videos done in my blog and I am still trying to get around to it. I was on the net this Afternoon and notice my ol fake friend and pal Aaron Hiniker was a technical assistant at age 11 for his school’s arts department. As well as some other things.

He counts his decade of experiance his words not mine I guess from age 11. Yeah right. I laughed my ass off at that when I read it. Actually in real life any series employer would only credit him with maybe a few years at most. But since he has no actual work experiance it is most likey he would get credited with zero experiance. But, the schooling he did. I think it was 1 year as far as I know would help.

I have been finding Aarons job postings on the internet. I can not but help wonder why Ray does not give him a job. Oh, I guess he did that was his hacking job he did on my computer. Hahahahah

But, why can he not get the boy a real job? After all he put him at risk of getting arrested when he told him to hack me. Seems like he owes him something after he tried to throw him under the bus (a figure of speech). Aaron Hiniker said they were his friends. If they were his friends they would of told him to stay away from me and not do that hack job he did.

But, they are not his friends as he thanks. They just used him. My bet he was probably getting paid by them and there is no friendship at all. But, who knows. The kid is kinda stupid though he thinks he is smart. So, they let him risk his neck hacking me and he claims that they are his friends? YEAH RIGHT ARRON. IF YOU WANT TO KNOW THE REAL BULLSHIT. THAT IS THE REAL BULLSHIT RIGHT THERE. THESE GUYS ARE NOT YOUR FRIENDS. THAT IS BUUUUUULLLLLLLSSSSSHHHHIIIIITTT!!!

Aaron Hiniker’s claimed profession is programing. His real profession is hacking and stealing. At least the boy is trying to find work but again as I said before his best bet is to get in the car and physically put out applications. But, even if he did get a job he would not last very long and if they caught him using the computers and systems in a well hacking manner then he would get fired.

The reason I google him is because he googles me. So, if someone is going to take the time to keep up with me and let me know about it at least I can return the favor. They the conspiracy follow me by my Reactor1967 user name. At least that is what Aaron said. He should now he is the hacker. I just hack causality/time-lines I don’t go around hacking other peoples computers and children and womens computers like Aaron does.

Why I was googling Aaron I looked in on Ray too. He has moved up in the world at his Arospace job. Good for you Ray not saying that in a mean way. I bet that surprises the hell out you. I still do not understand how that man has the time to work, teach/lecture, and stay on the internet all the damn time. He must do his internet activities at his job too and at school is what I got figured out. When I was at wiki and joined the chat room I kinda got the feeling that is what they do all day. They talk to each other in a big ol chat room. Probably where they make their plans against me like keeping my forum down and keeping me off the forums and search engines. It has not helped them very much. I still get a lot of traffic here at this blog and at my other blogs on the internet. My forum is picking up traffic even though I have not been actively running it. I need to post on it some more.

Well I am going to keep it short for today.

WAITING FOR FOR MY HACKER TO GET ARRESTED AND HAULED OFF TO JAIL!!!

 

 

 

 

 

 

 

This blog copyrighted (c) 2008 – 2015 timetravelinstitute.biz

HACKER DUDE, THIS VIDEO IS FOR YOU.
THE NET IS CLOSING.

 

MY HACKER
IS GOING TO JAIL.
https://www.youtube.com/watch?v=qq9CX0kIv3w

 

update 12/31/2013
Even though there are those trying
to stop me. That would be the http://timetravelinstitute.com through their associated friends and connections
through out the internet which I have labeled and call “THE CONSPIRACY
AGAINST TIME TRAVEL.”
Update 12-04-2014
I am going to use my hackers first
name now since I am now 99% sure he had a hand in the hacking. His name is
Aaron. I want to use his last name but he has to use it first in public before

I can use it. Also, I am still moving this blog but after I noticed they are now doing a 24 hour a day 7 day a week hacking on me which every bit is being logged and reported to the FBI on a daily bases. I decided to open my blog back up since it is the reason I am  getting hacked in the first place.
The conspiracy against time travel:
HTTP://TIMETRAVELINSTITUTE.COM RAINMAN AKA RAY AND DARBY AND AARON AND GRAYSON

AT CONSPIRACYCAFE (A STUPID FORUM) AND SOME MORE OF THEIR FRIENDS AT WIKI AND

ABOVETOPSECRET.COM AND THE LIST GOES ON. THEY DO NOT WANT ME TALKING ABOUT TIME

TRAVEL THEY WANT ME OFF THE INTERNET.

HAY ASSHOLES!!!! (ITS NOT WORKING!!!!!!!!!!

BAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHA!!!!!!!!!!!!)

YOU PUSSIES AINT GOT NOTHING!!!! LIKE I SAID PAM FROM THE TITOR STORY COULD KICK ALL YOUR ASSES WITH BOTH HANDS AND ONE LEG TIED BEHIND HER BACK. BY THE WAY. I STILL WANT TO KNOW IF YOU GUYS ARE RESPONSIBLE FOR TITOR LEAVING THE INTERNET? DID YOU GUYS DO TO HIM WHAT YOU ARE DOING TO ME? The FBI may want to look at  this blog too. I also will be visiting A LOT MORE FORUMS.  I installed a another firewall today. It is not on everything yet but it will be. It wont stop Aaron from living in my router but it should stop him from owning my computers. Also, My old linux is gone. Sorry Aaron I know you loved that system since you viewed my screen and got my passwords and looked at my project files. At least you did not get all my code. Thank god I was not using it for anything and had stopped using time travel one station.
I will be eventually changing all my passwords and getting rid of my old encryption and re-encrypting everything again brand new. Yeah, the kid was capturing my keys on my keyboard I think since he got my credit card info and emailed me what I was seeing on my computer screen. THINK YOU FOR TELLING ON YOURSELF AARON.
Aaron was kind enough to put in the emails what the conspiracy against time
travel wants from me. Here are their demands.

1. Stop using Reactor1967 as a user name.

2. Delete all post on the internet
forums.

3. Take down the blog.

4. Take down my web sights.

A. http://timetravelinstitute.biz

B. http://thetimetravelinstitute.com

Not going to happen. Hell, I am looking at setting something up so

WHEN I EVENTUALLY GO TO THE AFTER LIFE MY WEB-SIGHTS AND BLOG WILL LIVE ON. You guys will never shut me down. The only problem is these guys have been distracting me from my real work. TIME TRAVEL WITH INFORMATION.

I work a lot and have a problem falling a sleep when I
get home but I will get back to a regular bed time schedule and try
to do heather things and buy some energy drinks and get back to work.
Now, normally any sane person would not do this but since
the security of my router is already toast things to MY GOOD
FRIEND AND PAL

Aaron and because I promised a while back to publish my logs
here is my router log for today. This is what my router log looks like most days thinks to my good friend and pal Aaron. Hey, Aaron, is this how you treat your mentors? He said I was his mentor. This is what I get for trying to help someone learn my skill. Anyway here is the router log.

[DHCP IP: 192.168.1.5] to MAC
address 30:85:a9:90:ce:b2, Saturday, January 04, 2014 21:28:02
[DoS Attack: RST Scan] from source:
96.17.111.73, port 80, Saturday, January 04, 2014 21:25:09
[DoS Attack: RST Scan] from source:
23.67.252.240, port 80, Saturday, January 04, 2014 20:47:13
[DoS Attack: RST Scan] from source:
208.117.232.116, port 80, Saturday, January 04, 2014 20:44:50
[DoS Attack: RST Scan] from source:
31.13.66.64, port 443, Saturday, January 04, 2014 20:44:48
[DoS Attack: RST Scan] from source:
208.117.252.25, port 80, Saturday, January 04, 2014 20:40:22
[DHCP IP: 192.168.1.5] to MAC
address 30:85:a9:90:ce:b2, Saturday, January 04, 2014 20:39:50
[DHCP IP: 192.168.1.5] to MAC
address 30:85:a9:90:ce:b2, Saturday, January 04, 2014 20:16:28
[DoS Attack: RST Scan] from source:
17.151.236.50, port 443, Saturday, January 04, 2014 20:15:11
[DHCP IP: 192.168.1.6] to MAC
address 78:e4:00:f0:de:a0, Saturday, January 04, 2014 20:07:02
[DHCP IP: 192.168.1.6] to MAC
address 78:e4:00:f0:de:a0, Saturday, January 04, 2014 20:04:29
[DHCP IP: 192.168.1.6] to MAC
address 78:e4:00:f0:de:a0, Saturday, January 04, 2014 19:46:39
[DHCP IP: 192.168.1.6] to MAC
address 78:e4:00:f0:de:a0, Saturday, January 04, 2014 19:46:19
[DoS Attack: SYN/ACK Scan] from
source: 5.135.140.140, port 80, Saturday, January 04, 2014 19:35:12
[DoS Attack: RST Scan] from source:
17.173.66.134, port 443, Saturday, January 04, 2014 19:31:56
[UPnP set event: add_nat_rule] from
source 192.168.1.3, Saturday, January 04, 2014 19:04:53
[DHCP IP: 192.168.1.3] to MAC
address 1c:4b:d6:79:89:5e, Saturday, January 04, 2014 19:04:50
[DHCP IP: 192.168.1.3] to MAC
address 1c:4b:d6:79:89:5e, Saturday, January 04, 2014 19:04:49
[UPnP set event: add_nat_rule] from
source 192.168.1.3, Saturday, January 04, 2014 18:37:33
[DHCP IP: 192.168.1.3] to MAC
address 1c:4b:d6:79:89:5e, Saturday, January 04, 2014 18:34:32
[DoS Attack: RST Scan] from source:
46.4.242.137, port 9001, Saturday, January 04, 2014 18:28:17
[DoS Attack: RST Scan] from source:
23.59.188.65, port 80, Saturday, January 04, 2014 18:25:55
[DoS Attack: RST Scan] from source:
17.154.66.44, port 443, Saturday, January 04, 2014 18:18:08
[DHCP IP: 192.168.1.5] to MAC
address 30:85:a9:90:ce:b2, Saturday, January 04, 2014 18:17:27
[DHCP IP: 192.168.1.4] to MAC
address 04:15:52:77:26:65, Saturday, January 04, 2014 18:15:10
[DoS Attack: SYN/ACK Scan] from
source: 213.163.71.136, port 11002, Saturday, January 04, 2014 16:09:54
[DoS Attack: SYN/ACK Scan] from
source: 67.228.245.10, port 27015, Saturday, January 04, 2014 15:27:15
[DoS Attack: SYN/ACK Scan] from
source: 176.31.18.19, port 7652, Saturday, January 04, 2014 14:40:08
[DoS Attack: SYN/ACK Scan] from
source: 198.50.236.67, port 6010, Saturday, January 04, 2014 14:39:30
[DoS Attack: SYN/ACK Scan] from source:
5.135.126.44, port 7777, Saturday, January 04, 2014 12:46:02
[DoS Attack: SYN/ACK Scan] from
source: 178.18.31.49, port 1935, Saturday, January 04, 2014 12:14:52
[DoS Attack: SYN/ACK Scan] from
source: 192.99.1.184, port 9000, Saturday, January 04, 2014 10:45:23
[DoS Attack: SYN/ACK Scan] from
source: 5.135.28.30, port 13001, Saturday, January 04, 2014 10:06:54
[DoS Attack: SYN/ACK Scan] from
source: 84.244.186.31, port 80, Saturday, January 04, 2014 08:36:06
[DoS Attack: SYN/ACK Scan] from
source: 46.4.62.75, port 80, Saturday, January 04, 2014 07:52:01
[DoS Attack: TCP/UDP Chargen] from
source: 81.17.130.54, port 47811, Saturday, January 04, 2014 07:30:48
[DoS Attack: RST Scan] from source:
66.114.54.8, port 80, Saturday, January 04, 2014 07:27:44
[DoS Attack: RST Scan] from source:
17.151.236.22, port 443, Saturday, January 04, 2014 07:25:53
[DoS Attack: SYN/ACK Scan] from
source: 198.50.161.10, port 80, Saturday, January 04, 2014 07:25:27
[DoS Attack: RST Scan] from source:
17.151.236.19, port 443, Saturday, January 04, 2014 07:22:22
[DoS Attack: SYN/ACK Scan] from
source: 37.187.56.134, port 25655, Saturday, January 04, 2014 06:56:15
[Time synchronized with NTP server]
Saturday, January 04, 2014 04:02:12
[DHCP IP: 192.168.1.2] to MAC
address 24:0a:64:9d:a0:87, Saturday, January 04, 2014 03:37:56
[DoS Attack: SYN/ACK Scan] from
source: 37.187.26.152, port 80, Saturday, January 04, 2014 02:50:24
[DoS Attack: SYN/ACK Scan] from
source: 178.32.74.20, port 6005, Saturday, January 04, 2014 00:20:02
[DoS Attack: SYN/ACK Scan] from
source: 37.187.26.152, port 80, Saturday, January 04, 2014 00:09:27
[email failed] ssmtp: Cannot open
:25, Saturday, January 04, 2014 00:00:02
[email sent to:  Saturday,
January 04, 2014 00:00:02
[DHCP IP: 192.168.1.4] to MAC
address 04:15:52:77:26:65, Friday, January 03, 2014 23:58:50
[Internet connected] IP address:
174.53.9.137, Friday, January 03, 2014 23:47:56
[DoS Attack: SYN/ACK Scan] from
source: 37.187.26.152, port 80, Friday, January 03, 2014 23:10:06
[DoS Attack: RST Scan] from source:
17.151.236.37, port 443, Friday, January 03, 2014 22:48:19
[DoS Attack: SYN/ACK Scan] from
source: 37.59.31.61, port 21412, Friday, January 03, 2014 21:58:15
[DoS Attack: RST Scan] from source:
17.154.66.108, port 443, Friday, January 03, 2014 19:37:15
[DoS Attack: RST Scan] from source:
17.154.66.106, port 443, Friday, January 03, 2014 19:22:57
[DoS Attack: RST Scan] from source:
17.154.66.154, port 443, Friday, January 03, 2014 19:17:35
[DoS Attack: SYN/ACK Scan] from
source: 37.59.31.144, port 80, Friday, January 03, 2014 18:59:24
[DoS Attack: SYN/ACK Scan] from
source: 198.50.228.9, port 80, Friday, January 03, 2014 18:45:06
[DoS Attack: RST Scan] from source:
96.17.235.164, port 443, Friday, January 03, 2014 18:41:55
[DoS Attack: RST Scan] from source:
173.194.36.126, port 443, Friday, January 03, 2014 18:39:53
[DoS Attack: RST Scan] from source:
72.21.91.19, port 80, Friday, January 03, 2014 18:34:33
[DoS Attack: ACK Scan] from source:
72.21.91.19, port 80, Friday, January 03, 2014 18:28:46
[DoS Attack: RST Scan] from source:
31.13.66.64, port 80, Friday, January 03, 2014 18:22:12
[DoS Attack: RST Scan] from source:
17.151.236.38, port 443, Friday, January 03, 2014 18:22:05
[DoS Attack: RST Scan] from source:
208.117.252.246, port 80, Friday, January 03, 2014 18:20:03
[DoS Attack: RST Scan] from source:
17.151.236.37, port 443, Friday, January 03, 2014 18:02:07
[DoS Attack: RST Scan] from source:
96.17.237.199, port 443, Friday, January 03, 2014 17:53:53
[DHCP IP: 192.168.1.2] to MAC
address 24:0a:64:9d:a0:87, Friday, January 03, 2014 17:52:37
[DoS Attack: RST Scan] from source:
17.154.66.45, port 443, Friday, January 03, 2014 17:20:21
[DoS Attack: SYN/ACK Scan] from
source: 176.31.253.45, port 80, Friday, January 03, 2014 17:18:33
[DoS Attack: ACK Scan] from source:
72.21.91.19, port 80, Friday, January 03, 2014 17:12:14
[DHCP IP: 192.168.1.2] to MAC
address 24:0a:64:9d:a0:87, Friday, January 03, 2014 17:03:27
[DHCP IP: 192.168.1.2] to MAC
address 24:0a:64:9d:a0:87, Friday, January 03, 2014 16:57:02
[DoS Attack: ACK Scan] from source:
72.21.91.19, port 80, Friday, January 03, 2014 16:55:34
[DoS Attack: SYN/ACK Scan] from
source: 37.187.17.165, port 3306, Friday, January 03, 2014 16:35:41
[DHCP IP: 192.168.1.3] to MAC
address 1c:4b:d6:79:89:5e, Friday, January 03, 2014 16:27:27
[DoS Attack: RST Scan] from source:
199.59.148.10, port 443, Friday, January 03, 2014 15:18:40
[DoS Attack: RST Scan] from source:
31.13.66.112, port 443, Friday, January 03, 2014 15:14:08
[DHCP IP: 192.168.1.2] to MAC
address 24:0a:64:9d:a0:87, Friday, January 03, 2014 14:59:28
[DoS Attack: SYN/ACK Scan] from
source: 5.39.65.146, port 1321, Friday, January 03, 2014 14:51:10
[DoS Attack: SYN/ACK Scan] from
source: 37.59.31.144, port 80, Friday, January 03, 2014 13:41:16
[DoS Attack: SYN/ACK Scan] from
source: 176.9.28.7, port 80, Friday, January 03, 2014 13:23:44
[DoS Attack: SYN/ACK Scan] from
source: 5.39.65.146, port 1321, Friday, January 03, 2014 12:43:11
[DoS Attack: RST Scan] from source:
17.151.236.50, port 443, Friday, January 03, 2014 12:00:57
[DoS Attack: RST Scan] from source:
17.154.66.156, port 443, Friday, January 03, 2014 12:00:57
[DoS Attack: RST Scan] from source:
17.151.236.38, port 443, Friday, January 03, 2014 12:00:57
[DHCP IP: 192.168.1.4] to MAC
address 04:15:52:77:26:65, Friday, January 03, 2014 11:58:44
[DoS Attack: SYN/ACK Scan] from
source: 198.50.161.10, port 80, Friday, January 03, 2014 10:47:46
[DoS Attack: SYN/ACK Scan] from
source: 213.232.200.92, port 80, Friday, January 03, 2014 08:42:50
[DoS Attack: SYN/ACK Scan] from
source: 37.187.56.98, port 22, Friday, January 03, 2014 08:10:49
[DoS Attack: SYN/ACK Scan] from
source: 37.221.169.114, port 80, Friday, January 03, 2014 07:39:18
[DoS Attack: SYN/ACK Scan] from
source: 185.4.75.35, port 80, Friday, January 03, 2014 07:17:30
[Time synchronized with NTP server]
Friday, January 03, 2014 04:02:11
[DoS Attack: SYN/ACK Scan] from
source: 8.27.226.126, port 80, Friday, January 03, 2014 03:41:44
[DHCP IP: 192.168.1.2] to MAC
address 24:0a:64:9d:a0:87, Friday, January 03, 2014 03:34:57
[DoS Attack: SYN/ACK Scan] from
source: 193.203.198.151, port 80, Friday, January 03, 2014 02:54:13
[DoS Attack: SYN/ACK Scan] from
source: 95.211.218.82, port 80, Friday, January 03, 2014 02:43:15
[DoS Attack: SYN/ACK Scan] from
source: 95.211.182.168, port 80, Friday, January 03, 2014 02:30:53
[DoS Attack: SYN/ACK Scan] from
source: 178.33.33.44, port 80, Friday, January 03, 2014 00:58:40
[email failed] ssmtp: Cannot open
:25, Friday, January 03, 2014 00:00:02
[email sent to:  Friday,
January 03, 2014 00:00:02
[DoS Attack: RST Scan] from source:
17.151.236.22, port 443, Thursday, January 02, 2014 22:49:25
[DoS Attack: RST Scan] from source:
17.151.236.16, port 443, Thursday, January 02, 2014 22:49:25
[DoS Attack: RST Scan] from source:
23.7.70.108, port 443, Thursday, January 02, 2014 21:19:52
[DoS Attack: RST Scan] from source:
23.2.17.234, port 80, Thursday, January 02, 2014 21:17:46
[DoS Attack: RST Scan] from source:
23.3.12.161, port 80, Thursday, January 02, 2014 21:15:01
[DoS Attack: RST Scan] from source:
74.125.193.141, port 443, Thursday, January 02, 2014 21:09:39
[DoS Attack: RST Scan] from source:
74.125.142.141, port 443, Thursday, January 02, 2014 21:05:41
[DoS Attack: RST Scan] from source:
17.154.66.154, port 443, Thursday, January 02, 2014 20:56:31
[DoS Attack: RST Scan] from source:
199.59.148.82, port 443, Thursday, January 02, 2014 20:43:35
[DoS Attack: RST Scan] from source:
31.13.66.112, port 443, Thursday, January 02, 2014 20:28:33
[DoS Attack: RST Scan] from source:
31.13.66.33, port 443, Thursday, January 02, 2014 20:28:32
[DoS Attack: RST Scan] from source:
74.125.193.141, port 443, Thursday, January 02, 2014 20:27:43
[DHCP IP: 192.168.1.2] to MAC
address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 20:24:45
[DoS Attack: RST Scan] from source:
17.154.66.106, port 443, Thursday, January 02, 2014 20:21:24
[DoS Attack: RST Scan] from source:
54.236.114.164, port 443, Thursday, January 02, 2014 20:03:58
[DHCP IP: 192.168.1.2] to MAC
address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 19:56:56
[DoS Attack: RST Scan] from source:
91.189.91.14, port 80, Thursday, January 02, 2014 19:30:53
[DHCP IP: 192.168.1.5] to MAC
address 30:85:a9:90:ce:b2, Thursday, January 02, 2014 19:25:02
[DHCP IP: 192.168.1.5] to MAC
address 30:85:a9:90:ce:b2, Thursday, January 02, 2014 19:22:00
[Internet connected] IP address:
174.53.9.137, Thursday, January 02, 2014 19:06:59
[DHCP IP: 192.168.1.5] to MAC
address 30:85:a9:90:ce:b2, Thursday, January 02, 2014 19:00:29
[DoS Attack: SYN/ACK Scan] from
source: 95.211.218.82, port 80, Thursday, January 02, 2014 18:57:20
[DHCP IP: 192.168.1.2] to MAC
address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 18:49:26
[DoS Attack: SYN/ACK Scan] from
source: 91.121.223.7, port 25565, Thursday, January 02, 2014 18:43:00
[DoS Attack: SYN/ACK Scan] from
source: 37.59.75.232, port 80, Thursday, January 02, 2014 18:40:01
[DoS Attack: SYN/ACK Scan] from
source: 91.121.223.7, port 25565, Thursday, January 02, 2014 18:27:28
[DoS Attack: RST Scan] from source:
17.154.66.156, port 443, Thursday, January 02, 2014 18:08:00
[DoS Attack: RST Scan] from source:
173.194.131.7, port 80, Thursday, January 02, 2014 18:07:46
[DoS Attack: RST Scan] from source:
17.173.66.130, port 443, Thursday, January 02, 2014 17:20:12
[DHCP IP: 192.168.1.4] to MAC
address 04:15:52:77:26:65, Thursday, January 02, 2014 17:19:28
[DHCP IP: 192.168.1.2] to MAC
address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 16:47:56
[DoS Attack: RST Scan] from source:
17.173.66.136, port 443, Thursday, January 02, 2014 15:51:58
[DoS Attack: RST Scan] from source:
17.173.66.135, port 443, Thursday, January 02, 2014 15:51:58
[DHCP IP: 192.168.1.3] to MAC
address 1c:4b:d6:79:89:5e, Thursday, January 02, 2014 15:35:09
[DoS Attack: SYN/ACK Scan] from
source: 5.39.65.146, port 1321, Thursday, January 02, 2014 15:29:18
[DoS Attack: SYN/ACK Scan] from
source: 178.32.74.19, port 65464, Thursday, January 02, 2014 15:15:02
[DoS Attack: RST Scan] from source:
31.13.66.96, port 443, Thursday, January 02, 2014 15:08:31
[DoS Attack: SYN/ACK Scan] from
source: 5.10.68.59, port 80, Thursday, January 02, 2014 15:03:59
[DoS Attack: SYN/ACK Scan] from
source: 5.39.65.146, port 1321, Thursday, January 02, 2014 15:03:24
[DHCP IP: 192.168.1.2] to MAC
address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 14:52:47
[DoS Attack: SYN/ACK Scan] from
source: 87.98.142.52, port 27015, Thursday, January 02, 2014 14:49:03
[DoS Attack: ACK Scan] from source:
72.21.91.19, port 80, Thursday, January 02, 2014 13:40:51
[UPnP set event: add_nat_rule] from
source 192.168.1.3, Thursday, January 02, 2014 13:17:22
[DHCP IP: 192.168.1.3] to MAC
address 1c:4b:d6:79:89:5e, Thursday, January 02, 2014 13:16:45
[DoS Attack: ACK Scan] from source:
72.21.91.19, port 80, Thursday, January 02, 2014 13:13:33
[DoS Attack: TCP/UDP Chargen] from
source: 89.248.172.128, port 39304, Thursday, January 02, 2014 13:01:50
[DoS Attack: SYN/ACK Scan] from
source: 199.187.120.2, port 80, Thursday, January 02, 2014 10:51:23
[DoS Attack: SYN/ACK Scan] from source:
63.240.92.167, port 80, Thursday, January 02, 2014 10:31:52
[DoS Attack: SYN/ACK Scan] from
source: 198.50.228.9, port 80, Thursday, January 02, 2014 10:20:35
[DoS Attack: SYN/ACK Scan] from
source: 198.50.161.10, port 80, Thursday, January 02, 2014 10:17:17
[DoS Attack: RST Scan] from source:
17.173.66.130, port 443, Thursday, January 02, 2014 09:07:37
[DoS Attack: RST Scan] from source:
17.173.66.136, port 443, Thursday, January 02, 2014 08:16:04
[DoS Attack: RST Scan] from source:
17.154.66.109, port 443, Thursday, January 02, 2014 08:06:29
[DoS Attack: SYN/ACK Scan] from
source: 178.33.233.75, port 80, Thursday, January 02, 2014 07:48:02
[DoS Attack: RST Scan] from source:
31.13.66.1, port 80, Thursday, January 02, 2014 07:23:24
[DoS Attack: SYN/ACK Scan] from
source: 178.33.233.75, port 80, Thursday, January 02, 2014 06:26:13
[DHCP IP: 192.168.1.4] to MAC
address 04:15:52:77:26:65, Thursday, January 02, 2014 05:19:31
[DoS Attack: SYN/ACK Scan] from
source: 37.59.41.227, port 80, Thursday, January 02, 2014 05:06:42
[DoS Attack: SYN/ACK Scan] from
source: 178.33.233.75, port 80, Thursday, January 02, 2014 04:18:19
[DHCP IP: 192.168.1.2] to MAC
address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 04:10:50
[Time synchronized with NTP server]
Thursday, January 02, 2014 04:02:09
[DoS Attack: SYN/ACK Scan] from
source: 199.96.156.82, port 80, Thursday, January 02, 2014 03:35:28
[DHCP IP: 192.168.1.2] to MAC
address 24:0a:64:9d:a0:87, Thursday, January 02, 2014 03:33:55
[DoS Attack: SYN/ACK Scan] from source:
178.33.233.75, port 80, Thursday, January 02, 2014 02:15:58
[DHCP IP: 192.168.1.6] to MAC
address 78:e4:00:f0:de:a0, Thursday, January 02, 2014 01:48:03
[DoS Attack: SYN/ACK Scan] from
source: 37.187.17.165, port 80, Thursday, January 02, 2014 01:10:27
[email failed] ssmtp: Cannot open
:25, Thursday, January 02, 2014 00:00:04
[email sent to: ] Thursday, January
02, 2014 00:00:04
[DHCP IP: 192.168.1.6] to MAC
address 78:e4:00:f0:de:a0, Wednesday, January 01, 2014 22:32:55
[DoS Attack: RST Scan] from source:
17.154.66.111, port 443, Wednesday, January 01, 2014 20:58:27
[DoS Attack: TCP/UDP Chargen] from
source: 80.82.65.9, port 52343, Wednesday, January 01, 2014 20:32:04
[DoS Attack: SYN/ACK Scan] from
source: 178.33.233.75, port 80, Wednesday, January 01, 2014 20:18:30
[UPnP set event: del_nat_rule] from
source 192.168.1.6, Wednesday, January 01, 2014 20:13:05
[DoS Attack: RST Scan] from source:
184.84.180.104, port 443, Wednesday, January 01, 2014 19:58:42
[DoS Attack: RST Scan] from source:
74.125.225.177, port 443, Wednesday, January 01, 2014 19:57:11
[DoS Attack: RST Scan] from source:
208.117.232.117, port 443, Wednesday, January 01, 2014 19:57:11
[DoS Attack: RST Scan] from source:
208.117.232.122, port 443, Wednesday, January 01, 2014 19:57:11
[DoS Attack: RST Scan] from source:
74.125.213.247, port 80, Wednesday, January 01, 2014 19:42:08
[DoS Attack: RST Scan] from source:
23.205.120.115, port 80, Wednesday, January 01, 2014 19:31:44
[DoS Attack: RST Scan] from source:
174.35.35.30, port 80, Wednesday, January 01, 2014 19:26:21
[DoS Attack: RST Scan] from source:
17.151.236.24, port 443, Wednesday, January 01, 2014 19:24:12
[DoS Attack: RST Scan] from source:
17.151.236.37, port 443, Wednesday, January 01, 2014 19:22:48
[DoS Attack: SYN/ACK Scan] from
source: 192.99.1.184, port 80, Wednesday, January 01, 2014 18:59:04
[UPnP set event: add_nat_rule] from
source 192.168.1.6, Wednesday, January 01, 2014 18:57:37
[DHCP IP: 192.168.1.6] to MAC
address 78:e4:00:f0:de:a0, Wednesday, January 01, 2014 18:57:18
[DoS Attack: RST Scan] from source:
8.12.46.167, port 443, Wednesday, January 01, 2014 18:52:07
[DoS Attack: RST Scan] from source:
17.173.66.132, port 443, Wednesday, January 01, 2014 18:50:36
[DoS Attack: SYN/ACK Scan] from
source: 198.27.86.23, port 80, Wednesday, January 01, 2014 18:40:13
[DoS Attack: RST Scan] from source:
17.151.236.22, port 443, Wednesday, January 01, 2014 18:11:28
[DoS Attack: RST Scan] from source:
17.151.236.16, port 443, Wednesday, January 01, 2014 18:11:27
[DHCP IP: 192.168.1.2] to MAC
address 24:0a:64:9d:a0:87, Wednesday, January 01, 2014 18:02:46
[DoS Attack: RST Scan] from source:
17.151.236.38, port 443, Wednesday, January 01, 2014 18:02:45
[DoS Attack: RST Scan] from source:
205.251.243.158, port 443, Wednesday, January 01, 2014 18:01:50
[DoS Attack: SYN/ACK Scan] from
source: 178.33.233.75, port 80, Wednesday, January 01, 2014 17:59:13
[DHCP IP: 192.168.1.5] to MAC
address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 17:39:10
[DoS Attack: RST Scan] from source:
17.151.236.38, port 443, Wednesday, January 01, 2014 17:31:59
[DoS Attack: RST Scan] from source:
17.154.66.111, port 443, Wednesday, January 01, 2014 17:20:16
[DHCP IP: 192.168.1.4] to MAC
address 04:15:52:77:26:65, Wednesday, January 01, 2014 17:19:32
[DHCP IP: 192.168.1.4] to MAC
address 04:15:52:77:26:65, Wednesday, January 01, 2014 17:19:32
[DHCP IP: 192.168.1.4] to MAC
address 04:15:52:77:26:65, Wednesday, January 01, 2014 17:19:31
[Internet connected] IP address:
174.53.9.137, Wednesday, January 01, 2014 17:17:11
[DHCP IP: 192.168.1.5] to MAC
address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 17:14:02
[DoS Attack: RST Scan] from source:
74.125.225.187, port 80, Wednesday, January 01, 2014 17:07:28
[DoS Attack: RST Scan] from source:
199.16.156.70, port 443, Wednesday, January 01, 2014 16:47:42
[DHCP IP: 192.168.1.3] to MAC
address 1c:4b:d6:79:89:5e, Wednesday, January 01, 2014 16:43:09
[DoS Attack: RST Scan] from source:
17.173.66.134, port 443, Wednesday, January 01, 2014 16:22:22
[DoS Attack: RST Scan] from source:
17.173.66.133, port 443, Wednesday, January 01, 2014 16:22:22
[UPnP set event: add_nat_rule] from
source 192.168.1.3, Wednesday, January 01, 2014 16:09:09
[DHCP IP: 192.168.1.3] to MAC
address 1c:4b:d6:79:89:5e, Wednesday, January 01, 2014 16:08:31
[DoS Attack: RST Scan] from source:
72.21.91.168, port 443, Wednesday, January 01, 2014 15:33:53
[DoS Attack: SYN/ACK Scan] from
source: 37.187.87.144, port 9987, Wednesday, January 01, 2014 15:19:58
[DoS Attack: RST Scan] from source:
31.13.66.176, port 443, Wednesday, January 01, 2014 14:58:45
[DoS Attack: RST Scan] from source:
199.16.156.73, port 443, Wednesday, January 01, 2014 14:52:30
[DoS Attack: RST Scan] from source:
199.16.156.70, port 443, Wednesday, January 01, 2014 14:49:26
[DoS Attack: RST Scan] from source:
199.16.156.198, port 443, Wednesday, January 01, 2014 14:37:42
[DHCP IP: 192.168.1.2] to MAC
address 24:0a:64:9d:a0:87, Wednesday, January 01, 2014 14:33:46
[DHCP IP: 192.168.1.3] to MAC
address 1c:4b:d6:79:89:5e, Wednesday, January 01, 2014 13:18:56
[DoS Attack: RST Scan] from source:
17.173.66.136, port 443, Wednesday, January 01, 2014 13:07:54
[DoS Attack: RST Scan] from source:
17.154.66.105, port 443, Wednesday, January 01, 2014 12:58:23
[UPnP set event: del_nat_rule] from
source 192.168.1.3, Wednesday, January 01, 2014 12:56:24
[DoS Attack: RST Scan] from source:
17.154.66.75, port 443, Wednesday, January 01, 2014 12:53:21
[DoS Attack: RST Scan] from source:
23.205.120.146, port 80, Wednesday, January 01, 2014 12:46:32
[DoS Attack: RST Scan] from source:
54.243.115.193, port 443, Wednesday, January 01, 2014 12:46:30
[DoS Attack: RST Scan] from source:
72.21.91.168, port 443, Wednesday, January 01, 2014 12:46:30
[DoS Attack: RST Scan] from source:
72.21.92.54, port 443, Wednesday, January 01, 2014 12:46:30
[DoS Attack: RST Scan] from source:
199.16.156.102, port 443, Wednesday, January 01, 2014 12:46:04
[DoS Attack: RST Scan] from source:
199.59.148.82, port 443, Wednesday, January 01, 2014 12:25:37
[DHCP IP: 192.168.1.2] to MAC address
24:0a:64:9d:a0:87, Wednesday, January 01, 2014 11:50:06
[UPnP set event: add_nat_rule] from
source 192.168.1.3, Wednesday, January 01, 2014 11:49:45
[DHCP IP: 192.168.1.3] to MAC
address 1c:4b:d6:79:89:5e, Wednesday, January 01, 2014 11:49:15
[DoS Attack: SYN/ACK Scan] from
source: 91.123.194.110, port 80, Wednesday, January 01, 2014 11:21:53
[DoS Attack: SYN/ACK Scan] from
source: 178.248.232.55, port 80, Wednesday, January 01, 2014 10:25:15
[DoS Attack: RST Scan] from source:
17.151.236.38, port 443, Wednesday, January 01, 2014 10:01:56
[DHCP IP: 192.168.1.2] to MAC
address 24:0a:64:9d:a0:87, Wednesday, January 01, 2014 09:56:51
[DoS Attack: RST Scan] from source:
207.171.162.148, port 443, Wednesday, January 01, 2014 09:22:35
[DoS Attack: RST Scan] from source:
23.7.70.108, port 443, Wednesday, January 01, 2014 09:20:22
[DoS Attack: RST Scan] from source:
74.125.6.174, port 80, Wednesday, January 01, 2014 08:50:24
[DoS Attack: RST Scan] from source:
17.154.66.111, port 443, Wednesday, January 01, 2014 08:39:35
[DHCP IP: 192.168.1.4] to MAC
address 04:15:52:77:26:65, Wednesday, January 01, 2014 08:35:37
[DHCP IP: 192.168.1.5] to MAC
address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 08:15:20
[DHCP IP: 192.168.1.5] to MAC
address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 08:01:59
[DoS Attack: SYN/ACK Scan] from
source: 192.99.1.184, port 80, Wednesday, January 01, 2014 06:16:43
[DoS Attack: SYN/ACK Scan] from
source: 80.241.209.156, port 80, Wednesday, January 01, 2014 05:56:43
[DoS Attack: SYN/ACK Scan] from
source: 86.7.60.192, port 54312, Wednesday, January 01, 2014 05:14:47
[DHCP IP: 192.168.1.5] to MAC
address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 05:12:14
[DHCP IP: 192.168.1.5] to MAC
address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 05:08:49
[DHCP IP: 192.168.1.5] to MAC
address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 05:03:35
[DoS Attack: SYN/ACK Scan] from
source: 80.241.209.156, port 80, Wednesday, January 01, 2014 04:55:04
[DHCP IP: 192.168.1.5] to MAC
address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 04:49:48
[DoS Attack: SYN/ACK Scan] from
source: 192.99.1.184, port 80, Wednesday, January 01, 2014 04:37:04
[Internet connected] IP address:
174.53.9.137, Wednesday, January 01, 2014 04:28:56
[DoS Attack: SYN/ACK Scan] from
source: 54.238.110.92, port 80, Wednesday, January 01, 2014 04:19:12
[DHCP IP: 192.168.1.5] to MAC
address 30:85:a9:90:ce:b2, Wednesday, January 01, 2014 04:04:09
[Time synchronized with NTP server]
Wednesday, January 01, 2014 04:02:08
[Internet connected] IP address:
174.53.9.137, Wednesday, January 01, 2014 03:58:56

 

Update for 1/5/2014

Well coming to some new conclusions. That Aaron has a interest in the fake
timetravelinstitute.com. That a lot of the very stupid shit I accused Darby and Rainman of may have been the spooled brat antics of a boy in a grown man’s body that plays on the computer 24/7. Living at home with mommy and daddy that refuses or wont get a job to support himself and live his own life.
When I Google-ed him I saw his college stuff and that he was in a frat. I saw what looked like one or more failed business in his attempt not to get a job. But, one thing is certain Arron is not working along in this. Him and his friends are working together to try to keep me from talking about time travel on the internet which is where the conspiracy comes in that I talk about. This blog is a log of their attempts to stop me. It is the proof they do not want the world to see.
They do not want people knowing what they do. Which now has turned into cyber stalking, cyber bulling, harassment, fraud, theft, copy right violations and is quickly turning into a legal case. They are the reason Titor’s family had to sue them.
Again, I wonder what is their full interest in time travel. I think it may be money. In titor’s case they were trying to use his name. In my case they want my technology and want me gone. Not going to happen. So, Aaron lives at home and computers is his life. Darby is a ex-cia wanna be time traveler and wanna be scientist.

I do not really know what Rainmans problem is besides being a bully. He is
probably a wanna be too. Here is the problem here. These guys are not the professionals they want to be. They have fields they come from but in the field of time travel THEY DO NOT KNOW JACK SHIT. BUT THEY THINK THEY  DO. AND THEIR OWN WEB-SIGHTS SAY THEY ARE NOT REAL. THEY THEMSELVES HAVE SAID THEY DO NOT BELIEVE IN TIME TRAVEL. SO, WHAT IS THEIR BUSINESS WITH ME???
Now, I started off calling these guys thugs, rodents, and bullies. Now I can add criminals to their list of personality’s flaws. I have a bad feeling that Aaron who does not want to work will most likely get his wish for being taken care of. But, it will be in jail or prison where he cant play his video games and use his laptop with internet 24 hours a day. Sleeping and playing as he wishes will be the old days and bubba will be his new frat brother. God forbid they give him a shovel or a trash can. I do not think Aaron could handle it. I don’t think that kid can handle real life. Now, he is a young guy. He is probably being hanging around Darby and Rainman for years.
Those guys are thugs. If they have been Aarons teachers. His mentor’s. No
wonder Aaron is so fucked up!!! Hell, they are just one great big happy dysfunctional family of thugs, rodents, trolls, bullies, and now criminals.
He once told me to get my shit together. For him I have these words and they are constructive. “GROW UP”. Before its too late. I will continue to fill out my legal complaints on these guys and hopefully in time the law will deal with them.
I have learned one thing about the FBI. They take their dam time but when they
roll it is too late and their suspect is usually shit out of luck. In time that may be Aarons fate. If he continues to steal for income it most certainly will be. Aaron told me “I am not scared of the FBI.” Dude, you should be. You really really should be. All in all the truth about the conspiracy against time travel is coming out slowly but surely. Aaron is up early today. At 7am he started attacking my
forum with account spam and has 5 hits on it. Already for today he is done a
dos attack on my home router.
Yeah, I have a big FBI report to fill out tonight. I am beginning to think Aaron was behind a lot of shit that happened on the forums. It seems like Rainman and Darby would leash their dog up but I guess they prefer to let it run free. Im hopping the dog kennel/FBI will catch it. I want to leave everyone with the attempted harassment Aaron sent me this morning. He has sent me this type of message 3 times now.
1. At my book trailer.

2. Posted on my forum the real
http://thetimetravelinstitute.com
Proof of this is in the last video
in a previous blog where I recorded it.

3. Now to my gmail account.
FBI (I hope your watching this shit.

I put it in my complaints.)

Delivered-To:
Deleted
Received:
by 10.68.110.195 with SMTP id ic3csp56047pbb;
Sun, 5 Jan 2014 02:27:12 -0800 (PST)
X-Received:
by 10.50.72.36 with SMTP id a4mr10274637igv.40.1388917632311;
Sun, 05 Jan 2014 02:27:12 -0800 (PST)
Return-Path:
Received:
from nm42.bullet.mail.ne1.yahoo.com (nm42.bullet.mail.ne1.yahoo.com.
[98.138.120.49])
by mx.google.com with SMTP id
9si88191949icd.80.2014.01.05.02.27.11
for Deleted;
Sun, 05 Jan 2014 02:27:12 -0800 (PST)
Received-SPF:
pass (google.com: best guess record for domain of middletoncarlyn@yahoo.com
designates 98.138.120.49 as permitted sender) client-ip=98.138.120.49;
Authentication-Results:
mx.google.com;
spf=pass (google.com: best guess record
for domain of middletoncarlyn@yahoo.com designates 98.138.120.49 as permitted
sender) smtp.mail=middletoncarlyn@yahoo.com;
dkim=pass header.i=@yahoo.com
Received:
from [127.0.0.1] by nm42.bullet.mail.ne1.yahoo.com with NNFMP; 05 Jan 2014
10:27:11 -0000
Received:
from [98.138.100.113] by nm42.bullet.mail.ne1.yahoo.com with NNFMP; 05 Jan 2014
10:24:18 -0000
Received:
from [98.137.12.55] by tm104.bullet.mail.ne1.yahoo.com with NNFMP; 05 Jan 2014
10:24:18 -0000
Received:
from [216.39.60.197] by tm15.bullet.mail.gq1.yahoo.com with NNFMP; 05 Jan 2014
10:24:18 -0000
Received:
from [127.0.0.1] by omp1084.mail.gq1.yahoo.com with NNFMP; 05 Jan 2014 10:24:18
-0000
X-Yahoo-Newman-Property:
ymail-4
X-Yahoo-Newman-Id:
245138.63813.bm@omp1084.mail.gq1.yahoo.com
Received:
(qmail 92881 invoked by uid 60001); 5 Jan 2014 10:24:18 -0000
DKIM-Signature:
v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1388917458;
bh=9RlykI5TEFN11vF8izLq5dWRV0D8KdC8WWcw8mJVjnQ=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:MIME-Version:Content-Type;
b=jA8dynXeO62Y0LFcKfKL2mNPB2e/jBPTY+54mPUYWR4t0xMuzLlpbMU4U7Rl394KJkawYVizwh0Nj2yDeEdNYLOsobJhx/wRwzkTDyYRXS/CloZOh+W3VhrxZ2HKeNa/bSMCnSaftiSNELM3N7Vj7F0N8Xt1Ifyz+zXQc4Jfjiw=
DomainKey-Signature:a=rsa-sha1;
q=dns; c=nofws;
s=s1024; d=yahoo.com;
h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:Message-ID:Date:From:Reply-To:Subject:To:MIME-Version:Content-Type;
b=XUAfwLz5RHSdm6eNA/PXpdxyW5rZkUW0DnzsFV1f644qYdjAAPuk+Ar0lMRchPoCqKIeSVak+52lZQO0vRUPBY6z8VBv0R+BQ/CULP4dfKkqncrGmxvPuN9OdGpiyrzQYIkG+5YhwcZVSSVgsT4s2YehmIiDOQb2krmZFSavJog=;
X-YMail-OSG:
pOCEWNUVM1nkjtebK7C4fwVvkwiSTBxKWRRBBRxigjpdNTh
.z_TVw6Vssn.WSRwInTGGiX8_HiTMyaa.pmb7KVVsISPCqVZZvvp.Hf47ij8
dzrjeIli3kUWUDjQJy5dEdmFwOpbjLJj69KA06L9Jba6F.G4yoLAxqd9taeB
eniF1L2WujlxvyKbixHu2vt5NyvPZ6q4Lr3n_PVn_gSE5XZ7JJXLZzD7Uiri
FnN.aaGGMXRkL3sLvdOHi._5nxhS.OM.fhS5Gy1J5Ln6CR6xsxbInnvaUbnQ
L5akbaWiikOQdnbzb4D1_ghEq8bq0vbQvsYLjxw5Nqmo6uKJeFikFueXRm2u
6pmfv8nHD31yBH73vYE4Qk8VPJU7fcboTkXBlCJIONzmplXOe5W_KfYS2xgH
5SGBWIGDYuaOQQXM7Z_v1Ds_nORxszc48gKqzLBFzMIm.m_WUMhj26BWYnNM
WxtD4trcgU0um5PbUiDol2pSPAdwfhSiCEf7jjDEVIY_et33kyeaL98dlquQ
8yiYB1_vRvI4wvJvHtjrbueWAT1AqphHdcZS0uQrjP1Y-
Received:
from [78.173.141.46] by web163405.mail.gq1.yahoo.com via HTTP; Sun, 05 Jan 2014
02:24:18 PST
X-Rocket-MIMEInfo:
002.001,SG93IGFyZSB5b3UgZ2V0dGluZyBvbj8NCkhvcGUgeW91IHRoaW5rIG9mIG1lIG5vdyBhbmQgYWdhaW4uCgpJJ20gc28gZ2xhZCB0byBtZWV0IHlvdSAKSSB3b3VsZCBsaWtlIHRvIHNoYXJlIG15IHBpY3R1cmVzIHdpdGggeW91CgpJIGJlbGlldmUgeW91IHdpbGwgZ2l2ZSBtZSBhIHJlc3BvbnNlLi4uCmJ5ZSAuLi4BMAEBAQE-
X-Mailer:
YahooMailWebService/0.8.172.614
Message-ID:
Date:
Sun, 5 Jan 2014 02:24:18 -0800 (PST)
From:
Little Darling
Reply-To:
Little Darling
Subject:
greeting!
To:
“rakarma19@gmail.com”
MIME-Version:
1.0
Content-Type:
multipart/mixed; boundary=”1091002116-1049814332-1388917458=:56925″
–1091002116-1049814332-1388917458=:56925
Content-Type:
text/plain; charset=us-ascii
How
are you getting on?
Hope
you think of me now and again.
I’m
so glad to meet you
I
would like to share my pictures with you
I
believe you will give me a response…
bye

Last thing – I am having one or more linux brick routers  put in my home in the
next week or two. I am already using a brick for my private connection. But, I
am making it permanent. There will be no ports or services running for Aaron to get thru to. Well Aaron, I guess you wont be watching videos with me an more.

BAAAAAAAAAAAHAHAHAHAHAHHAHA!!!!

Nor looking at what I am typing. Nor seeing my project files. Before I was depressed because I could not bring time travel one station back up on the internet. Well I can now. Granted it may take them longer for Aaron to get thru but as I have been told nothing is full proof. So, when using my sensitive software I will usually disconnect the internet from it first. If I do allow it to be connected I will be monitoring the network. Most of the time it will not be connected at all. Probably only when I need a package upgrade even then I will offload my sensitive shit first. So, I will be getting my internet life back. Thanks to Aaron who pushed me to write my first book. Now when I really get my bad ass software running again and my new stuff too my internet network will be more secure. Yeah, that boy was a pain in the ass but in the long run that little spooled hacker brat helped me a little.

update 01/06/2013

Well Aaron did a good job on my home router today. I had reset the IP to show the FBI he is acquiring my IP somehow. I sent them the log.
He of course attacked my forum today and I forwarded that to the FBI. And he did this email message to me today from

Paranormalis
webmaster@paranormalis.com via s036.panelboxmanager.com

Time-Hacking with computers and algorithms Have you built a time machine or discovered a way to time travel? We’re looking for time travelers interested in being in a documentary on the subject. If interested, shoot an email with a bit about yourself and your time traveling endeavors to brecasting@gmail.com
Which I also forwared to the FBI:
I had previously told him I was doing a Documentary which I am. He used that as the subject to send me his email message today. He had done things like this before but only when I wrote about him. Which I did yesterday and today. So tomorrow he should send me another one or not. We shall see. I am betting this documentary is false. There is probably no such project
from this communication. Oh well the FBI will check that out. Very last for today. Here is the registered accounts and IP’s Aaron used to attack my forum today.

http://thetimetravelinstitute.com
(All these accounts have been sent to the FBI.)
User
IP
Snobre
134.249.84.158
AElogrewellags    31.184.241.12
Allatetl179       212.92.245.51
Andrewgota        89.22.255.140
Alesokaqeh        91.200.13.86
SuperVedroor      178.123.133.194
Infill
46.118.194.245
qtuizzws          195.190.13.118
Dancyplalty       178.19.99.105
cesyspocailla     176.31.60.123
Miguelst          193.105.210.216
12Betinifez       37.57.179.22
licecips          46.118.194.245
ArinochkA         188.93.27.130
ulkaBetinitle     178.95.56.30

The war against time travel from the Conspiracy Against Time Travel with the Generals of the Army Rainman aka Ray and Darby from the fake http://timetravelinstitute.com is alive and well. Ray and Darby your boy is a chip off the old Troll Block. I have to laugh at how hard you guys try to keep me from talking about time travel with information  on the internet. You guys can not win. Im here to stay. Im not Titor. I will not put my tail between my legs and run away like titor did. Your not getting rid of me. No matter where you stamp me out I will always pop up some place else. Here is my home router log for today showing the attack THE CONSPIRACY AGAINST TIME TRAVEL did on my home network.
[DoS
Attack: RST Scan] from source: 31.13.66.33, port 443, Tuesday, January 07, 2014
17:49:26
[DoS Attack: RST Scan] from source: 31.13.66.144, port 443, Tuesday, January
07, 2014 17:47:16
[DoS Attack: SYN/ACK Scan] from source: 37.187.56.24, port 20201, Tuesday,
January 07, 2014 17:44:52
[DoS Attack: RST Scan] from source: 17.154.66.106, port 443, Tuesday, January
07, 2014 17:33:10
[DoS Attack: RST Scan] from source: 17.151.236.24, port 443, Tuesday, January
07, 2014 17:18:01
[DoS Attack: RST Scan] from source: 17.151.236.50, port 443, Tuesday, January
07, 2014 17:17:51
[DoS Attack: ACK Scan] from source: 72.21.91.19, port 80, Tuesday, January 07,
2014 17:11:12
[DoS Attack: RST Scan] from source: 173.195.56.8, port 80, Tuesday, January 07,
2014 16:50:45
[DoS Attack: RST Scan] from source: 17.151.236.24, port 443, Tuesday, January
07, 2014 16:49:04
[DoS Attack: RST Scan] from source: 17.173.66.133, port 443, Tuesday, January
07, 2014 16:48:45
[DoS Attack: RST Scan] from source: 46.8.37.8, port 44405, Tuesday, January 07,
2014 16:46:47
[DoS Attack: SYN/ACK Scan] from source: 46.8.37.8, port 44405, Tuesday, January
07, 2014 16:46:28
[DHCP IP: 192.168.1.3] to MAC address 1c:4b:d6:79:89:5e, Tuesday, January 07,
2014 16:28:02
[DoS Attack: RST Scan] from source: 17.151.236.24, port 443, Tuesday, January
07, 2014 16:26:10
[DoS Attack: RST Scan] from source: 138.91.96.142, port 443, Tuesday, January
07, 2014 16:26:10
[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Tuesday, January 07,
2014 16:18:33
[DoS Attack: RST Scan] from source: 17.151.236.47, port 443, Tuesday, January
07, 2014 16:12:39
[DoS Attack: RST Scan] from source: 17.151.236.22, port 443, Tuesday, January
07, 2014 16:12:36
[DoS Attack: RST Scan] from source: 17.151.236.16, port 443, Tuesday, January
07, 2014 16:12:35
[DoS Attack: RST Scan] from source: 17.151.236.31, port 443, Tuesday, January
07, 2014 16:12:24
[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Tuesday, January 07,
2014 16:11:37
[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Tuesday, January 07,
2014 16:06:07
[DoS Attack: SYN/ACK Scan] from source: 203.211.130.242, port 80, Tuesday,
January 07, 2014 14:57:47
[DoS Attack: SYN/ACK Scan] from source: 198.27.85.102, port 6005, Tuesday,
January 07, 2014 14:23:24
[DoS Attack: SYN/ACK Scan] from source: 220.77.228.24, port 4500, Tuesday,
January 07, 2014 14:09:04
[DoS Attack: TCP/UDP Chargen] from source: 31.207.2.106, port 43760, Tuesday,
January 07, 2014 14:01:36
[DoS Attack: SYN/ACK Scan] from source: 109.99.149.74, port 80, Tuesday, January
07, 2014 13:43:45
[DoS Attack: RST Scan] from source: 46.38.237.116, port 443, Tuesday, January
07, 2014 13:43:31
[DoS Attack: RST Scan] from source: 161.53.74.122, port 9001, Tuesday, January
07, 2014 13:43:30
[DoS Attack: SYN/ACK Scan] from source: 112.187.202.32, port 6688, Tuesday,
January 07, 2014 13:38:33
[DoS Attack: SYN/ACK Scan] from source: 207.58.162.195, port 80, Tuesday,
January 07, 2014 13:33:08
[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Tuesday, January 07,
2014 13:22:21
[DoS Attack: SYN/ACK Scan] from source: 112.187.202.32, port 6688, Tuesday,
January 07, 2014 11:31:41
[DoS Attack: SYN/ACK Scan] from source: 192.169.81.106, port 80, Tuesday,
January 07, 2014 08:35:23
[DoS Attack: TCP/UDP Chargen] from source: 199.19.108.50, port 55536, Tuesday,
January 07, 2014 08:18:54
[DoS Attack: SYN/ACK Scan] from source: 192.99.1.184, port 80, Tuesday, January
07, 2014 07:08:03
[DHCP IP: 192.168.1.5] to MAC address 30:85:a9:90:ce:b2, Tuesday, January 07,
2014 04:03:15
[DHCP IP: 192.168.1.4] to MAC address 04:15:52:77:26:65, Tuesday, January 07,
2014 04:03:15
[DoS Attack: TCP/UDP Chargen] from source: 80.82.78.29, port 59929, Tuesday,
January 07, 2014 02:14:23
[DoS Attack: TCP/UDP Chargen] from source: 80.82.78.29, port 60349, Tuesday, January
07, 2014 01:00:14
[DoS Attack: SYN/ACK Scan] from source: 144.76.72.76, port 80, Tuesday, January
07, 2014 00:49:03
[DoS Attack: SYN/ACK Scan] from source: 222.216.188.88, port 80,

Update
01/08/2014

Well I got my code for speeding my programs. I dropped using the threads for
now because I like my stuff to run on different compilers on different operating systems. So, I am just increasing my buffer size and paging to memory. So,
re-hitting the BNS program that Aaron wanted but sorry Charlie you screwed up
your deal. Then will goto the 2nd book program. Then starting the documentary
and 2nd book. Im zipping up all of Aarons emails today for the FBI and if all goes well I will have a something put in between my router and the internet.

The conspiracy against time travel hit a new low. I have a 15 year old daughter
that uses the internet and my router log shows her getting hacked now. Hopefully that will get the FBI off their asses. She has a camera on her
computer and they are trying port 443 which has services for that camera.
I discovered that last night. Damn, those guys stop at nothing. Kids too?
and girls? You guys are fucked up. Some of that is in the logs above.
Well not checked on Aarons progress for hacking me and attacking my forum yet today. I will look at all that tonight.

01/09/2014
Well, I pulled a Aaron and stayed up night then all day (BAAAAAAAAAAAAAAHAHAHAHAHAHAHA!!!). Yeah, I saw your stupid Ass Aaron popping into my router last night. Yep, logs headed to the authorities.

Update – This past weekend

Well early this morning I posted again at a forum on Craigslist in Boston in the science & math. Now, usually the conspiracy against time travel Cyber Stalks me on the internet and when they see me post something they try to get it deleted or at least raise such a fuss in the thread no one remembers to the op (original poster).

What I posted was a brief explanation about myself and my method of time travel and pointed them to my links. But, Craigslist makes a new person wait seven days before they can post links so posted what they should search for on bing to find my sites.

Well as luck would have it (no it was not luck it was stalking) Aaron posted to. He once told me the conspiracy was finding me by my user name. What he should of said was he was finding me by my user name. What Aaron has to say to me was not very nice. First of All Aaron did not go by his real name. But, what he said to me and how he said it is how I new it was him.

First of All. Here is a sample of one of
Aarons emails to me.

———————————————-

Aarons email:

“Wow fuck me I just overwrote my entire
project. Well fuck it I’ll redo it another time.”

———————————————–

Now, here is the message from Craigslist. I
am leaving out the user name so as not to offend Craigslist for now.

—————————————————–

Aarons message on craigslist

“Wow! Congratulations! 2014-01-11
05:52:43

I used my version of your system to determine your future success and fame by
reading some MS Word files I’ll be writing about you in 2017 and storing on my
laptop for retrieval today. Sorry to will-hear about your accident, and, if it
is on your hard drive, please don’t mention what will happen to my family in
2016. It’s only one eye, and it will be replaced by an artificial one in 2023.
I don’t want the insurance companies or The Division of Children and Family
Services to learn about it for obvious reasons.”

—————————————————————-

So, Aaron and this user both started off with
Wow. Now, what got my attention was the personal information contained within the post that normal people would not know. You see Aaron and I exchanged over a thousand emails. He was wanting me to teach him about my method of time travel and wanted my code and my programs.

Aaron had said me might write about me in the future in his emails to me. Here he said he is writing about me. Though I thought it would only be me apparently he stole a lot of my information from my files and plans to use it for his own financial gain. Now he said my version. Aaron has used our emails probably to commit copyright infringement on my books, programs, and code. He talked about a laptop. Aaron has a laptop. A black one if I am not mistaken.

Here Aaron mentions a Accident for me. HE IS THREATING ME!!!!! FBI YOU SEEING THIS SHIT!!!!! What is this exchange one eye for another. Sounds like me may be threating my family.

He said something about mentioning about what will happen to his family. Apparently he had to give me his ID before I would talk to him and I found out who he was and who is family was. So, he is expressing concern about his family. (Yeah Aaron you should be concerned. You exposed your family to a stranger on the internet.

That will be helpful for me later as I am considering contacting Gary and Suzanne. I will send Gary a letter and all our emails and pictures and ask him to secure his internet and his son. I am sure your sister Ashley will be glad to hear you are exposing her to strangers on the internet too. Yeah boy, you are dragging your family into a world of shit if this goes south for you.

How will Gary and Suzanne and Ashley deal with visiting you in jail. What if I was a crazy freaking nut. How would they deal with that? Boy, you have a lot of shit to think about. They soon will have to think about this too because I am not going to let your hacking me just go. You need to go tell them what you have done because I assure you I will make sure they know sooner or later. As I said I may be contacting your family.

Oh yeah, they live up by Boston, MA is that correct? Your dad and mom runs a computer business? You sis is a facility manager right? So, it is their home that you are attacking me over the internet from. YEP, IM GETTING A HOLD YOUR DAD LITTLE BOY!!!

Your dad needs to secure his shit. But, you also mentioned web bots in your emails to me so the FBI might look for where you planted your web bots. If your dads internet shut off tonight I doubt your internet attacks would stop. I also know you have your computer science friends to.

Also one night when I caught Aaron in my computer (my firewall told me) I pulled up my gedit and starting writing smack about his family. The file was not saved nor was it sent over the internet. When I got done I simple deleted what I wrote and closed the windows unsaved/unsent.

I wanted to see if Aaron would throw that back at me later on either by email or when I visited the forums. I wanted to see if Aaron was running a key logger on my computer. Here he was concerned about his family and has verified that he read the smack I thought I was typing in private on my home computer keyboard. So, Aaron was committing a crime when he read the smack I was writing.

So FBI – KEYLOGGING CONFIRMED BY MY HACKING OF MY COMPUTERS. So, I have confirmed Aaron connected to my VCN service now I have confirmed Aaron was recording what was being typed on my computer keyboard. You guys can arrest him now.

The insurance companies. I am assuming he is talking about his theft of my credit card from BARCLAY CARD. I guess he is assuming they are insured for his credit fraud. Maybe he thinks I am filing a complaint with my home owners insurance because of his hacking my home computers. Having to buy a new router and install Linux bricks. (My Linux bricks I had some problems so Aaron is still living in my home network.)

My hard drive he is referring to my computer files.

Now here Aaron mentions something.

“The Division of Children and Family
Services to learn about it for obvious reasons.”

He appears to be making some sort of threat
against myself and my family.

YEAH AARON YOU CALL THE DIVISIOIN OF CHILDREN
AND FAMILY SERVICES.

TELL THEM YOU ARE HACKING MY 15 YEAR OLD DAUGHTER THROUGH PORT 443 (ITS IN MY LOGS I HAVE POSTED IN THIS BLOG).

TELL THEM YOU ARE CONNECTING TO MY UNDERAGE PRETEEN DAUGHTERS WEBCAM YOU FUCKING SICK FREAK CHILD PORN PERVERT. I HAVE TWO DAUGHTERS. ONE IS FIFTEEN ONE IS AROUND 7. BOTH HAVE TABLETS WITH WEBCAMS.

YOU TELL THEM THAT!!! I HOPE THEY HAUL YOUR ASS OFF TO JAIL!!!

FBI YOU SEEING THIS SHIT. GET OFF YOUR ASSES AND STOP THIS MONSTER!!!!

FBI I AM ZIPPING UP ALL OF AARONS EMAILS AND FILING ANOTHER REPORT TO NIGHT. IN THE REPORT WILL BE A LINK WHERE YOU CAN DOWNLOAD THE EMAILS. I WILL ALSO GIVE YOU THE LATEST ROUTER LOGS AND WEBSIGHT
LOGS. FBI – IN THE EMAILS AARON SAYS THE http://timetravelinstitute.com WAS AND IS TRACKING ME ON THE INTERNET. HE SAYS THEY ARE TRACKING ME THROUGH MY USER NAME!!!

FBI IN THAT REPORT I MADE LOOK AT AARONS EMAIL WHERE HE SAID HIS CREDIT CARD DISAPPEARED FROM HIS ACCOUNT. THAT IS WHEN MY CREDIT CARD WAS USED FOR FRAUD.

LOOK AT THE EMAIL ARRON GAVE WHEN HE MENTIONED SOME VIDEO AND I WROTE I JUST SAW THAT VIDEO.

What a lot of this is about is a person’s right to his freedom of speech to have a blog. I have followed blog procedures in maintaining my blog. There should not be any last names here except my own.

Darby in a interview which is publicly posted on the internet which was the subject of my CIA experiment post. Since Darby gave the interview and his information was in that interview it was ok for me to run with it.

Ray I know he does not like me blogging about him but he has publicly giving his last name  the company he works for and even a picture of himself all on a public forum. And he talks publicly about other people.

The time travel institute the fake one is a forum. Their terms of service say they are a pretend service. Which was my mistake because I posted there about time travel by way of data mining binary counters to find computer media of the past or the future even alternate time-lines.

I used only their User names from a forum and I called Rainman Ray because Darby did that in public on the forum and so that is consent to use that name because Ray gave the permission for it to be used in public that way.

DARBY AND RAINMAN BOTH OF THEM WRITE ABOUT OTHER PEOPLE ALL THE TIME. DARBY HAS WRITTEN THOUSANDS OF MESSAGES ABOUT TITOR. NOT ALL OF IT WAS GOOD EITHER. SOME OF IT WAS PERSONAL.

NOW DARBY AND RAY AKA RAINMAN OVER THE YEARS HAVE TALKED ABOUT 1000’S OF PEOPLE. TALKING ABOUT PEOPLE IS ALL THEY DO. IT IS WHAT THEY DO. SO IT IS OK FOR ME TO TALK ABOUT THEM.

(Hey Darby, I am using all caps again. If my account still exist at the http://timetravelinstitute.com you can send me warning.  BAAAAAHAHAHAHAHAH.)

They use a public forum to talk about other people even troll and harass other people. So, there is nothing wrong with me blogging about them here. More so since I am using User names only from a forum that is largly dieing and half dead anyway.

They gave that consent when they went on a public forum and started their churn and burn on other people. So, it is ok for me to talk about the http://timetravelinstitute and their admins here on my blog.

Now, These guys started their shit with me first. Ray, stopped me from posting and talking about my time travel. They delete my messages. When they banned me and I posted else where about time travel they got me banned there too and got my messages deleted. They called me names like troll so they called me names first they can not bitch when I call them names. They used my first and last name publically even when I told them to stop and not to do that.

So what people read in this blog that I have written is legal. I have the right to my freedom of speech. I have the right to have my blog here. I am not giving up that right.

I have the right to go by Reactor1967 on the internet. I am not going to stop using that user name. That was a demand of Aaron who is hacking me. Among other demands. I have the right to use it and I will use it.

I will never stop working on time travel with information.

I will never writing programs that find time travel media.

I will never stop developing my theories.

I will never stop writing about my theories and if I want to write about Ray and Darby I will.

Now, when they got me thrown out of Abovetopsecret.com for talking about them. THEY FAILED TO TELL OTHERS THEY TALK ABOUT PEOPLE TOO. THEY TALK ABOUT PEOPLE BUT YET I CAN NOT TALK ABOUT THEM ON ABOVETOPSECRET.COM (THEY ARE VIOLATING MY RIGHTS UNDER THE AMERICAN CONSTITUATION AND IN MY OPION SHOULD BE ARRESTED FOR IT. They talk about people so it is ok for me to talk about them. And I do and I will continue.

RAY TALKS ABOUT OTHER PEOPLE ALL THE TIME.

SO, I CAN TALK ABOUT THEM ALL I WANT TOO. YOU
GOT THAT ARRON BOY.

I will never stop. And that goes for you guys over at the fake http://timetravelinstitute.com

What Aarons beef is with me has to do with the http://timetravelinstitute.com but he still has not told me what his problem with me is.

Im hoping when the FBI arrest Aaron for Child porn, stalking me, hacking me, copyright infringement, assault (for the threats), fraud, theft, wire tapping, and other things that the FBI will tell me what was Aarons problem with me.

You see, when Ray banned me he sent me a private message telling me “We are watching you.”. HOW TRUE THAT WAS.  In Aarons emails he told me they were tracking me on the internet. Now, Aaron has attacked me personally at home through the internet.

I WILL NEVER STOP BLOGGING ABOUT MY TIME TRAVEL YOU. I HAVE THE RIGHT TO MY BLOG HERE!!!

I HAVE THE RIGHT TO POST IN FORUMS ABOUT TIME TRAVEL AS REACTOR1967 AND WITH MY METHOD OF TIME TRAVEL.

THAT DOES NOT GIVE THE http://timetravelinstitute.com to do what they have done. They want me gone and are trying to find ways to make that happen. Guys, its not going to happen.

FBI – Since your investigation is still on going here is a message posted at the REAL http://thetimetravelinstitute.com I believe is from Aaron. I locked the board and will free the account later. You guys can log in if you want I gave you guys a login. Here is the message from the cyber stalkers/hacker
Victimize Sigg

by Amelloste » Mon Jan 13, 2014 11:45 pm
nick yatesPrey upon Sigg has all more than 25 years of advertisements, aiding and tube media expertise. Currently the President of Appearance Single Media, he leads his team of media experts to day by day affirm virgin and advanced systems of driving mod conclusion while maintaining unprecedented standards to fortify answers someone is distressed existing customers.
During perpendicular steady central relationships, Show Bromide has the know-how to come by media at beneath hawk value rates which supplies our clients with incomparably bountiful media opportunities. Our procurement master diagram includes; extended duration media commitments, later banking, traffic deals and critical partnerships. We’ve got assets and leverage unmatched in the marketplace. Our strategic partnerships encompass; networks, train depot groups, syndicators and constituents providers. We deliver locality transmit, peculiar mooring, style radio, cohort and syndicated media opportunitiesrob sigg –
rob sigg –
rob sigg
Recognizing recently created takings opportunities prior to bringing video to consumers ‘over-the-top’, Performance The same Media launched an dynamic CDN (Delight Distribution Network) and an advertising childbirth monetization motor in the next half of 2012. Since its engender, Display Under any circumstances handcuff Media has recognized well-heeled consumer launches with the aid state-of-theart applications on Sony, LG and Samsung connected devices, Roku streaming video players, iOS and Android revealing devices, with a handful other launches impending.
In advance starting display Person Media, Looting dead beat down 8 years with Turner Media Gather, which he helped skiff from its origin. As President of Turner Media Brigade, Ransack’s natural execution-oriented spirit made repayment after tremendous broaden when he took them from a 3-man media instrumentality to a 100 employees member power businesswoman within the media landscape. He pioneered and was conducive in the unfolding of Turner Media Organize as the classy rep-business custom-made all media sales throughout DISH Network. At its shinny up, after bringing them to a sales growth of 250MILLIMETERS, Cheat made his retire in 2004.

rob sigg –
rob sigg –
rob sigg
In the years
performance one media
performance one mediauntil to Turner Media Departmentalize, Burgle utilized his outspoken entrepreneurial force and his accord to conceive of how ‘all-the-pieces-fittogether’ to own and control over and above numerous businesses within the natural property, erection, spa and salon disciplines.

rob sigg –
rob sigg –
rob sigg
The conspiracy against time travel has taken to attempting to call me at home. I got a call from this number but it is a voip. The number is actually from the ip  carrier trying to bring the the call.

Here it is

202-455-8888 7:47 pm 01/16/2014
767-275-9071 12:07 pm 01/11/2014

They do not want to talk to me. I can give as good as I  get.

update 01/18/2014

Anyone reading Aarons and I emails and reading his messages to me through the forums and online services can easily put two plus together. Here is Aarons message today for me. I put the full code in it so it is long and cryptic. Here it is.

Delivered-To: deleted
Received: by 10.68.110.195 with SMTP id ic3csp56734pbb;
Fri, 17 Jan 2014 16:58:42 -0800 (PST)
X-Received: by 10.50.62.102 with SMTP id x6mr1115139igr.35.1390006722464;
Fri, 17 Jan 2014 16:58:42 -0800 (PST)
Return-Path:
Received: from s036.panelboxmanager.com (s036.panelboxmanager.com. [72.55.186.56])
by mx.google.com with ESMTPS id n10si5541568igk.61.2014.01.17.16.58.42
for
(version=TLSv1 cipher=RC4-SHA bits=128/128);
Fri, 17 Jan 2014 16:58:42 -0800 (PST)
Received-SPF: pass (google.com: best guess record for domain of paranor@s036.panelboxmanager.com designates 72.55.186.56 as permitted sender) client-ip=72.55.186.56;
Authentication-Results: mx.google.com;
spf=pass (google.com: best guess record for domain of paranor@s036.panelboxmanager.com designates 72.55.186.56 as permitted sender) smtp.mail=paranor@s036.panelboxmanager.com
Received: from mailnull by s036.panelboxmanager.com with sa-checked (Exim 4.80.1)
(envelope-from )
id 1W4KFF-000lz4-JV
for deleted; Fri, 17 Jan 2014 19:58:41 -0500
Received: from paranor by s036.panelboxmanager.com with local (Exim 4.80.1)
(envelope-from )
id 1W4KFF-000lyi-GV
for deleted; Fri, 17 Jan 2014 19:58:41 -0500
To: Reactor1967
Subject: Time-Hacking with computers and algorithms – New reply to watched thread
X-PHP-Script: paranormalis.com/deferred.php for 151.74.83.81
From: Paranormalis
Message-Id:
Date: Sat, 18 Jan 2014 00:58:41 +0000
Content-Type: multipart/alternative;
boundary=”=_2bca471bf49b0297165472e98132cf5e”
MIME-Version: 1.0
Sender:
X-Spam-Checker-Version: spamc_ctasd client on
localost
X-Spam-Level:
X-Spam-Status: No, score=0.0 required=50.0 tests=SpamClass_Unknown,
VirusClass_Unknown autolearn=disabled
version=1.0.0
X-CTCH-PVer: 0000001
X-CTCH-Spam: Unknown
X-CTCH-VOD: Unknown
X-CTCH-Flags: 0
X-CTCH-RefID: str=0001.0A020204.52D9D1C1.00E5,ss=1,re=0.000,recu=0.000,reip=0.000,cl=1,cld=1,fgs=0
X-CTCH-Score: 0.000
X-CTCH-ScoreCust: 0.000
X-CTCH-Rules:
X-CTCH-SenderID: webmaster@paranormalis.com
X-CTCH-SenderID-Flags: 0
X-CTCH-SenderID-TotalMessages: 2
X-CTCH-SenderID-TotalSpam: 0
X-CTCH-SenderID-TotalSuspected: 0
X-CTCH-SenderID-TotalConfirmed: 0
X-CTCH-SenderID-TotalBulk: 0
X-CTCH-SenderID-TotalVirus: 0
X-CTCH-SenderID-TotalRecipients: 0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname – s036.panelboxmanager.com
X-AntiAbuse: Original Domain – gmail.com
X-AntiAbuse: Originator/Caller UID/GID – [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain – s036.panelboxmanager.com
X-Get-Message-Sender-Via: s036.panelboxmanager.com: mailgid no entry from get_relayhosts_entry
X-Source:
X-Source-Args:
X-Source-Dir:

–=_2bca471bf49b0297165472e98132cf5e
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Reactor1967,=0A=0Avp8671 replied to a thread you are watching at Paranor=
malis.=0A=0A=09″Time-Hacking with computers and algorithms”=0A=0AThis is=
the message they posted:=0A——————————————–=
————————–=0AHello Reactor, i just wanted to ask you , i=
f you agree, a couple of questions.=0A1: You use the word text counter,=
can you describe exactly what is a text counter ? you scan for text in=
a file full of words and count words ???=0A2: You scan for emails, but=
emails are stoed on the server, how do you perform exactly your scan ?=
=0A3: You use checksum ,to find files , but again, emails are not files=
normally stoed on the computer, they are stored on the server and then=
sent to your inbox, do you scan that directory ??=0AIts been a while i=
follow you and your blog, but still i cannot wrap hmy haed around your=
method.=0AYou say you are writing a second book, where you explain your=
code, can you give some hints using a meta-code ‘?=0Ai have 20+ years o=
f pc programming, i can implement any kind of software pretty quickly.=
=0AThanks for your time=0A———————————————-=
————————=0A=0ATo view this thread, click here:=0Ahttp://=
paranormalis.com/threads/time-hacking-with-computers-and-algorithms.6314=
/#post-78878=0A=0AYou will not receive any further emails about this thr=
ead until you have read the new messages.=0A=0A————————-=
———————————————=0A=0AThis message was sent=
to you because you opted to watch the thread “Time-Hacking with compute=
rs and algorithms” at Paranormalis with email notification of new replie=
s.=0A=0ATo disable emails from this thread:=0Ahttp://paranormalis.com/wa=
tched/via-email?u=3D4543&c=3Defc901e2c6a0df152abe1c731294f8fd&a=3Dno_ema=
il&t=3Dthread&id=3D6314=0A=0ATo disable all emails:=0Ahttp://paranormali=
s.com/watched/via-email?u=3D4543&c=3Defc901e2c6a0df152abe1c731294f8fd&a=
=3Dno_email=0A=0Ahttp://paranormalis.com/

–=_2bca471bf49b0297165472e98132cf5e
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

=0A=0A=09 />=0A=09=0A=09Time-Hac=
king with computers and algorithms – New reply to watched thread=
=0A=0A=3D”#176093″ alink=3D”#176093″ vlink=3D”#176093″ style=3D”padding: 10px”=
>=0A=0A=09

“LTR” style=3D”=0A=09=09background-color: #F0F7FC;=0A=09=09border: 1px s=olid #A5CAE4;=0A=09=09border-radius: 5px;=0A=09=09direction: LTR;”>=0A==09=0A=09=09=09=09=09padding: 5px 10px;=0A=09=09=09border-bottom: 1px solid #A5CAE4;=
=0A=09=09=09border-top-left-radius: 4px;=0A=09=09=09border-top-right-rad=
ius: 4px;=0A=09=09=09font-family: ‘Trebuchet MS’, Helvetica, Arial, sans=
-serif;=0A=09=09=09font-size: 11px;=0A=09=09=09line-height: 1.231;”>=0A=
=09=09=09ext-decoration:none”>Paranormalis=0A=09=09

=0A=09

=0A=09

=
=0A=09=09padding: 1em;=0A=09=09=09color: #141414;=0A=09=09=09font-family: ‘Trebuc=
het MS’, Helvetica, Arial, sans-serif;=0A=09=09=09font-size: 13px;=0A=09=
=09=09line-height: 1.231;”>=0A=09=09=09

Reacto=
r1967, “color: #176093; text-decoration: none”>vp8671 replied to a thread y=
ou are watching at #176093; text-decoration: none”>Paranormalis.
=0A=0A

“font-size: 18pt; font-weight: normal; margin: 10px 0″>/paranormalis.com/threads/time-hacking-with-computers-and-algorithms.631=
4/#post-78878″ style=3D”color: #176093; text-decoration: none”>Time-Hack=
ing with computers and algorithms

=0A=0A
; margin: 10px 0; border: 0; color: #D7EDFC; background-color: #D7EDFC”=
/>=0A=0A

=3D”100%” style=3D”margin: 10px 0 20px”>=0A=0A=09style=3D”font-size: 13px; line-height: 1.231; padding-right: 20px”>=0A=
=09=09

rder: 1px solid #D7EDFC;=0A=09=09=09border-radius: 5px”>=0A=09=09=09le cellpadding=3D”0″ cellspacing=3D”0″ border=3D”0″>=0A=09=09=09
=0A=
=09=09=09=09=09=09=09=09=09padding: 5px;=0A=09=09=09=09=09border-radius: 4px”>=0A=09=
=09=09=09=09le=3D”vp8671″=0A=09=09=09=09=09=09>tyles/default/xenforo/avatars/avatar_male_s.png” alt=3D”vp8671″ title=3D=
“vp8671″ style=3D”=0A=09=09=09=09=09=09=09width: 48px;=0A=09=09=09=09=09=
=09=09height: 48px;=0A=09=09=09=09=09=09=09background-color: #FCFCFF;=0A=
=09=09=09=09=09=09=09border: 1px solid #A5CAE4;=0A=09=09=09=09=09=09=09p=
adding: 2px;=0A=09=09=09=09=09=09=09border-radius: 4px”=0A=09=09=09=09=
=09=09/>=0A=09=09=09=09=09

=0A=09=09=09=09

=0A=09=09=09le>=0A=09=09=09=09=09display: block”><!–vp8671

=0A=09=09
=0A=09

–>d>=0A=09
an’, Times, serif; font-size: 11pt; line-height: 1.4″>=0A=09=09Hello Rea=
ctor, i just wanted to ask you , if you agree, a couple of questions.
/>=0A1: You use the word text counter, can you describe exactly what is=
a text counter ? you scan for text in a file full of words and count wo=
rds ???
=0A2: You scan for emails, but emails are stoed on the serv=
er, how do you perform exactly your scan ?
=0A3: You use checksum ,=
to find files , but again, emails are not files normally stoed on the co=
mputer, they are stored on the server and then sent to your inbox, do yo=
u scan that directory ??
=0AIts been a while i follow you and your=
blog, but still i cannot wrap hmy haed around your method.
=0AYou=
say you are writing a second book, where you explain your code, can you=
give some hints using a meta-code ‘?
=0Ai have 20+ years of p=
c programming, i can implement any kind of software pretty quickly.
>=0AThanks for your time=0A=09
=09=0A=0A=0A=0A
llpadding=3D”10″ cellspacing=3D”0″ border=3D”0″ width=3D”100%” style=3D”=
margin: 20px 0; background-color: #f0f7fc; border-top: 1px solid #d7edfc=
“>=0A
=0A=09=
=0A=09=0A
=0A<=
/table>=0A=0A

This message w=
as sent to you because you opted to watch the thread aranormalis.com/threads/time-hacking-with-computers-and-algorithms.6314/=
” style=3D”color: #969696″>Time-Hacking with computers and algorithms> at Paran=
ormalis with email notification of new replies. You will not receive=
any further emails about this thread until you have read the new messag=
es.
=0A=0A

If you no long=
er wish to receive these emails, you may com/watched/via-email?u=3D4543&c=3Defc901e2c6a0df152abe1c731294f8fd&=
amp;a=3Dno_email&t=3Dthread&id=3D6314″ style=3D”color: #969696″>=
disable emails from this thread or  om/watched/via-email?u=3D4543&c=3Defc901e2c6a0df152abe1c731294f8fd&a=
mp;a=3Dno_email” style=3D”color: #969696″>disable all emails.
=0A=
=09=09

=0A=09=09ime-hacking-with-computers-and-algorithms.6314/unread” style=3D”=0A=09=
=09=09display: block;=0A=09=09=09float: left;=0A=09=09=09padding: 5px 10=
px;=0A=09=09=09background-color: #65a5d1;=0A=09=09=09border: none;=0A=09=
=09=09border-radius: 3px;=0A=09=09=09font-family: ‘Trebuchet MS’, Helvet=
ica, Arial, sans-serif;=0A=09=09=09font-size: 11px;=0A=09=09=09color: wh=
ite;=0A=09=09=09text-decoration: none”>View This Thread=0A=09 =0A=09=09tched/threads” style=3D”=0A=09=09=09display: block;=0A=09=09=09padding:=
5px 0;=0A=09=09=09font-family: ‘Trebuchet MS’, Helvetica, Arial, sans-s=
erif;=0A=09=09=09font-size: 11px;=0A=09=09=09color: #176093;=0A=09=09=09=
text-decoration: none”>Unread Watched Threads=0A=09
=0A=09=0A=09
=0A=09=09
ound-color: #F0F7FC;=0A=09=09=09padding: 5px 10px;=0A=09=09=09border-top=
: 1px solid #D7EDFC;=0A=09=09=09border-bottom-left-radius: 4px;=0A=09=09=
=09border-bottom-right-radius: 4px;=0A=09=09=09text-align: right;=0A=09=
=09=09font-family: ‘Trebuchet MS’, Helvetica, Arial, sans-serif;=0A=09=
=09=09font-size: 11px;=0A=09=09=09line-height: 1.231;”>=0A=09=09=09ef=3D”http://paranormalis.com/&#8221; style=3D”color: #176093; text-decoration=
: none”>http://paranormalis.com/=0A=09=09
=0A=09
=0A=09le>=09=0A=0A=0A

–=_2bca471bf49b0297165472e98132cf5e–

Did the conspiracy against time travel member Darby participate in the CIA MKUltra LSD mind control experiments?

 

This blog copyrighted (c) 2008 – 2015 timetravelinstitute.biz

November 21th, 2013
(Some material for this post was from Darby’s public radio interview.) Darby went on coast to coast AM and gave a public interview. That is were I learned a lot of my material for this post.
In my previous post I posted what I found out about Darby. That his job was Experimental Psychology. If I understand that right he experimented with people’s brains. No, not curing them but experimenting with them. And, I was told he was CIA. So, a good friend of mine brought it to my attention the famous CIA LSD experiments where they tried to control people’s minds with LSD which really screwed up a lot of them for life. Some without their knowledge or permission.

 

So, Darby is retired. That puts him at about the right age to of done some of that work. The Unabomber himself, participated in CIA-sponsored MKUltra experiments. Everyone remember him. He hurt all those poor people but it really may of not been all his fault. People do bad things when exposed to LSD.

So, why am I bringing this up? I have been trying to figure out what the conspiracy against time travel’s interest is in me. What I believe is there interest does not have good intentions.

So, in my last post I established Darby wants to be like me. He plays on a time travel forum all day instead of having a life and has a interest in physics like I did. But, he can not time travel like I can. But, he wants to. That is where his interest in me comes in. And, he may not be as good of a person as some would like to believe.

Now, why does Ray hang around with Darby? Oh, it gets better. I figured out Ray is a Mafia/gangster/thug wanna be. So, you have a guy who might of experimented on people’s brains and another guy who might look up to him because he just likes being plain mean and cruel to people. HOLY SHIT!!! It fits the picture for me of why this two thugs give me so much crap.

These two guys run the fake http://timetravelinstitute.com like Guantanamo Bay detention camp in cuba because that is how Darby is use to running things and how Ray who looks up to Darby because Darby has qualities that Ray admires. They got some sick freak show going on over there at the fake http://timetravelinstitute.com

AND THESE GUYS WANT MY TIME TRAVEL SOFTWARE!!!!! WHAT EVIL AGAINST MANKIND ARE THESE TWO LOONS PLANNING??? And they talk about my nuke sight? These guys are seriously crazy and mean!!! That is the advantage these loons have over me. This is why they sometimes get the best of me. Their mean, crazy, greedy, power hungry, and have connections and resources that I do not have. I have in the past seen Pamela complain online about how mean these thugs were. And, she was not lying.

Case in point one of their agents I think I met him at the Conspiracy Cafe A while back but I have not confirmed that. He seemed like a person of interest in hacking my computer and seemed like a person of interest in spamming my forum

And, him and I have spoke directly about this post and he said I was “Shooting my only friend in the foot.” So, after careful deliberation I will hold a wait and see attitude on this guy.

He said much of the reasons I suspected him made sense except a couple of them were just : condensing his words: bull shit. So, since him and I never met except through the internet I still have at least some right to my claims though they are not yet fully supported. Truly I doubt law enforcement will investigate my claims of computer hacking so I may never get vindicated.  Most likely that will not happen even though my logs and my isp logs say I was hacked.

But the reasons I suspected him were:

1. He knows how to tap into someones computer and view their screen. He told me this himself. I have that email.

2. He once sent me a email talking about a video I just viewed on youtube.

3. His ip seems to be the one that was once used at my forum two years ago on a spam account. And, on the last video below one of the last ip’s looked similar to his. That may have been done purposely to communicate with me

4. He has the skills I talked about because we briefly talked about going to a hacking convention.

5. He had the time. He does not work. Which is bad news for him if his living situation ever falls apart.

6. He went through a lot of trouble to contact me.

7. I have previous emails which seems from him pretending to be someone else trying to contact me before we actually made contact.

8. He wrote me saying his credit card disappeared from his account the next day my credit card company contacts me and tells me my credit card had been deactivated because someone else which was not me was using my credit card. (This is was big wake up call for me.)

9. There are other reasons but these are the main ones.

So, I am giving him credit for his side of the story which is not much more than a few curse words and you know me stuff which I do not completely agree with.

I know what he has told me about him and some other basic info but that does not tell me who he is as a person at all. Not one bit. And, what I do know about him is largely  fragmented.

I had to Google him and his family to really get the big picture. Which was easy to do because of their professions. One piece of information my alleged hacker denied was that never he went to college but, that info I got seemed to tie directly into the information he gave me. And, I got a picture of him from that too. He seems like a really healthy person someone that may of played sports.

In fact, I have a picture of most members of his immediate family including him. And, I told him about that too. Remember I was trying to be honest with him. Oh man he got pissed about that. I do not blame him but he has my phone number and address and info about a brother of mine which I did not give him.

He might keep secrets from me but I am an honest person I do not try  to keep any secrets from him because we are alleged friends. So, I respect that pact even though I have my suspicions about him as a member of the conspiracy against time travel.

On top of that I am letting the world know his side of the story too while not given out his identity publicly or anything remotely local to him publicly. But again, I maintain my suspicions.

At my age I have learned that you can know people all their entire life then wake up one day and find out you never knew them at all. The reason I say that is because people can flip like a light switch it is human nature. So, I dont buy into this you know me stuff. But, he should not take that personal Im like that with anyone.

So, I made my claims here in this post and I had to go back up and rewrite this post after my accused person of interest had a conversation with me about this blog. So, I rewrote this to set the story straight.

So, I will continue this post and maybe edit some of what I said but  I still want to try to leave it intact as possible.

Also, I did recently visit the http://timetravelinstitute.com and they did have my IP and could of pulled off these hacks leaving me to blame a newly met friend on the internet with the conspiracy being directly responsible.

———————————————————————–
Continuing post after corrections:

So after much planning they because this was more than one person cracked a plan to steal my property and get revenge on me.

Now, the problem this kid has is yes he constructs really good proxy chains but every now and then he screws up and HIS REAL IP BLEEDS THROU
Actually if he takes his glasses off and faces the camera he is uglier than
this. He puts glasses on and faces sideways so people do not know how
ugly he really is.

 

arronhiniker

BAAAAAAAAHAHAHAHAHAHAHAHAHA!!!!!!!!!!!!

Take a look below and see what I mean. Only a mother could love that face.

aaron-hiniker

 

GH!!! That is how hackers get caught. In a perfect world which in their minds they believe they are in but sooner or later they find out this is not the perfect world they play in. So, this guy might have been working for them. (Here on the IP after looking at my logs it seemed like he registered for an account on my forum about two years ago but it was a spam account.

So, jury out on that one. This is why I wrote about the IP bleed through. Normally my spammers come through proxy’s but one time this IP which I linked to my friend did not. But on forum accounts unless that IP goes into real bad behavior it is not enough to convict. This one just had a random user name like slkdjrflkds or something like that.)

These dudes really need to take a break and relax. Their alleged hacker friend turned me onto a hooka and I tried it and like it. I used Shisa tobacco which is real legal tobacco. It is marinated and when it is heated not burned and the marinade evaporates taking some of the nicotine and smell with it. I think Darby and Ray should try it if they have not already done so. Maybe their alleged hacker friend got that from them? Here is a pic showing what I mean.

 

Here are some more pics I did for this morning. You know, sometimes you have to take the lemons life gives you and make lemonade. It is not my fault these guys want to ruin me, run me off the internet like they did Titor, and steal my intellectual property. But, I will give them hell for trying. Here are the rest of the pics. You have to click on them to make them bigger.

When their alleged hacker friend contacted me by sending me email that went to at least 10 other addresses I might of had I gave this guy a shot because I generally try to be nice to people if their intentions are good. One time I tried explaining a little of what I knew about the future to this kid. That nuclear bombs or robots is not the real threat to mankind. The kind of threat man makes himself. But, rather from mans use of nano-technology.
I think I scared the shit out of him because his next few emails complained about bad dreams. I laughed my ass off. You see nano-tech is not very well known now but in the future nano-tech will have categories like type 1 nano-tech, type 2 nano-tech and so forth. It will be complicated to place nano-tech in those types but they will be judged on their size, energy use, material use from the environment, replication ability, how long they can last under certain conditions and so forth.The worst type of nano-tech is the kind that can go very small, can self replicate, and has a self sustaining energy source, and function in extreme temperatures and pressures. I told my hacker friend who at the time I did not know he was hacking me by getting my ip off my emails that this was a very hideous type of stuff.Just a needle head of that stuff could wipe the planet barren and that includes all life on it then eat the planet to its core. Then float off into the rest of the solar system  and start on the other planets. The hacker said “Oh well just shoot them with a EMP pulse.” Well, in a perfect world maybe. In the comic books maybe. So, this is what I have seen in the future. We go from weapons that can destroy a city to weapons that can destroy an entire solar system. And the public doe not know and will not know about it.You see society does not yet fully understand nano-technology and what it represents and what it can do. I do understand it because I read about it from my time travel media though I did tell people to take what they read from counters with a grain of salt. So, after being politically correct I will continue. Nano-tech can concentrate UNGODLY amounts of energy. Like the world has never seen before.

Nano-tech can build technology with UNGODLY circuit sizes which means think of a computer mother board the size of new York city. Now, imagine what a computer that size built with to-days  size specs could do. When technology becomes smaller the complexity that technology can achieve can be will UNGODLY.

So, not only do you now have UNGODLY complexity combined with UNGODLY ENERGY USE. WHAT DO YOU THINK THAT KIND OF TECHNOLOGY CAN DO!!! A WHOLE LOT!!!

Remember that civilizations are categorized as types 1, 2, and 3. And we have not even got to one yet. But with nano-tech not only can mankind be immortal but a single person could be a very dangerous weapon of mass destruction not just for one planet but for every solar system that person encountered.

And people wonder why NASA has all those videos of ET watching us. Yeah, I know why they are watching us but I am not going there now. There are more secrets in heaven than hell could ever hold.

Well we could with nano-tech elevate mankind to GOD STATUS IN THE EYES OF THE ANCIENTS AND EVEN IN THE EYES OF TODAY’S CIVILIZATION. You see what makes one generation different from the next is the complexity of their technology. As that complexity grows so does achievements  of society. Now, those achievements can be for BETTER OR WORSE. We can make our lives better or DESTROY PARTS OF MANKIND. OUR OWN KIND.

So, with the complexity growth of technology we can become god or the devil. Now, what makes things worse as technology grows so does a single persons ability to be good or bad. As technology grows so does a single persons ability grows to destroy others or help others.

Government tries the big brother thing but in the long run it is about civilization being able to rear everyone as equals and monitor everyone as they do so.

Unless that is achieved we are destined  to experience social problems which will lead to much death and destruction. People must be equals in society not rich and poor not black and white but equals on all levels. And that means getting raised without getting abused as well.

That is what will end war and poverty and terrorism. Only as equals can we ALL ACHIEVE GREATNESS. So, on that point that means man kinds extinction or continuation in this great universe of ours. This is what time travel has taught me.

And, what scares me is Darby and Ray just made a play for my technology directly to my computer. What were they going to do if they actually got it? Sell it to China or Russia and retire near the equator basking in the sun and playing on their yachts? Was that their plan? Or, are they actually working for the government of the United States of America and this was for the military? I want to know and I am sure everyone else does too. WHAT WAS YOUR PLANS DARBY AND RAY IF YOUR HACKER GOT MY STUFF???

No, I do not have that tech on my system. In fact my main code was stored offline. As I explained to the hacker I have not written any code for a while now and since I was writing my books I have stopped running my time travel software.

So, they did get my minor code but nothing major like my very advanced mathematical algorithms. Also, I do not keep all the media I bring into existence. My space is limited and I have to pick and choose what I have on hand.

Answering a question someone asked me. Yes I do have my BNS but NO way in hell am I keeping all the media I find in existence. SOME SLEEPING DOGS ARE BETTER LEFT ALONG!!!

If I want it bad enough I can run my software again and find it again I do not have to keep it and that is almost just as good as my BNS. I have many different ways to accomplish the same task. That is why I am so good at doing this stuff.

Right now I do not have anything worth stealing on hand nor worth anyone’s time. Except for my time travel code and software itself. And, that I am taking steps to make sure no one gets it. Yes, answering another question I got since writing this post. I am still going to write my books.

I want to show the conspiracy against time travel what they did not get when they hacked my computer. Oh, I am loving this. Ray, Darby and other members of the conspiracy against time travel. This is what you can not have.

BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHAHAHAHAHAHAHAHAHAHAHAHAH!!!!!!!!!!!!!!!!!!!!!!!!!!

Here is THE TIME TRAVEL CODE!!!!!!

 

Here is backup’s of the time travel code.

 

Here is the Rocks Cluster Software I use to run my code.

 

HERE IS TIME TRAVEL ONE STATION. THIS IS MY TIME MACHINE!!!!!
Well before I call it a post I just have to do one more thing. Public please forgive me for this out burst I am about to make. This is for the conspiracy against time travel not directed toward the general public. This is personal between them and me.

 

To the conspiracy against time travel:
Hey conspiracy against time travel IS THAT ALL YOU GOT? You guys aint got nothing!!! What you gonna do? Huh? You guys are pussies. Pamela could kick all your asses with both hands and one leg tied behind her back. BAAAAAAAAAAAAAAAAAHAHAHHAHAHAHAHAH!!!!!!!!!
You guys aint got nothing! Wimps. If that is the best you guys can do you need to go home and break out your hooka’s and forget about it.

Here are some videos of the conspiracy against time travel attacking my forum. They use Russian addresses because I said some stuff about Russia to them including my alleged hacker.

Conspiracy Cafe use to run a Russian Bride site and in these videos will be a women that seems Russian looking for a man. And, they post in the conspiracy part of my forum because when I was posting about the conspiracy on the internet I posted in the conspiracy part of the forum.

Here we go – LIVE ACTION!!!!

Update 11/26/2013

My hacker friend (I have had worse friends so he should not feel too bad.) has since I started writing him be wanting to know how my time travel technology works. Well I sent him my book. I wrote dozens of emails to him trying to explain. And, he still does not understand. Why, well when he got my book and seen the math in it he realized he was going to have problems. He is a code guy he writes code but he seems to have a problem with the math.

So, I am working on a documentary (YES CONSPIRACY YOU ARE IN IT.) and he told me to detail how my code works. I have news for him. Yes the code is a very important function of how I time travel with information but the code can not achieve that time travel along.

You see, when I work up a counter project I go through pages and pages and pages of math CALCULATING WAY POINTS ON THE COUNTER WHERE TIME TRAVEL MEDIA MIGHT EXIST.

You can not just roll a counter and expect to find time travel media of any significance (Unless you have a quantum super computer.) No, it takes some work. So, even if I did detail the code for him he would still be lost. The counters have to be setup and ran according to a plan. A plan that is worked out in advance.

The counter has to be organized into spacial concepts where computer media have coordinates and locations. And, to get from one media/location to another media/location takes a counter direction and counter speed. And can have more than one counter direction and more than one counter speed. The speeds and directions are THE COORDINATES AND LOCATIONS FROM A FIXED COUNTER STARTING POINT.

Time travel with binary counters hell even with text counters is like traveling to another planet. You take off from earth. You speed up. Half way there you start slowing down. When you get to your location you enter orbit. From orbit you make plans to land on the planet. FINDING TIME TRAVEL MEDIA ON A BINARY COUNTER IS LIKE THAT. AND THAT TAKES A SHIT LOAD OF MATH.

So, in my next book I will do my damn-est to show people how to do that. So, my hacker friend thanks if I showed him my code he could do it himself. BULLSHIT. No he would still have problems.

Why would he have problems? Because before you ever run the code you need to work through pages and pages of math to set up the files to run the counter. He would be completely lost. So, this is a case where if anyone did get my stuff that would still have to learn more that just what the code showed them.

Here is the one thing I have had trouble getting people to understand. Physically the binary counter is simulating the 5th dimension. Now, in the 5th dimension on a binary counter is all the computer time travel media of everything that has happened in reality here on earth and everything that could of happen but did not and everything that did happen in the eons of the past or the future when space-time wrapped around on itself and the universe was born anew to experience different time-lines and different realities only to die again before its next rebirth.

In the fifth dimension all this exist. Now, in order to visit other places in space-time through the binary counter creating computer media of the future, past, and alternate time lines ONE HAS TO KNOW HOW TO NAVIGATE THROUGH THE FIFTH DIMENSION. ONE HAS TO KNOW HOW TO NAVIGATE THE BINARY COUNTER!!! That is where my math comes in. So, yes the code explains a lot but WITH OUT THE TIME-HACKER SKILLS HAVING THE CODE IS WORTHLESS!!! I have the skills. I alone know how to do this. Trying to steal from me without having the skills the conspiracy against time travel is wasting their time.

Time hacking is an acquired skill that is only learned through years of practice. You can not just steal the code and expect to time travel. It does not work that way. The conspiracy against time travel want to steal my time travel code and remove me from the equation. That is not possible either. Anyone wanting to use my code HAS TO HAVE ME TO DO IT!!! With out my help they are pissing in the wind. Pissing in their own faces.

And last for this post. The arrow of time is about going from order to disorder. Space and time is like a hot glass of water that is getting cold. This is called entropy.  The measure of information in a system.

Now, on the binary counter it is possible to go from order to disorder and it is possible to go from disorder to order. So, mathematically the counter has proven that it is mathematically possible to do so. SO, IN A WAY IT MAY BE THE BASIC BEGINNING TO SHOW THAT OUR UNIVERSE WILL GO FROM DISORDER BACK TO ORDER. Being born anew again to continue this great wonder of life, death, and re-birth.

Like it our not the one fact the conspiracy against time travel will have to learn to face is that the ultimate truth which they hate to do so. Why, because they find most disturbing the parallel which I gave them and brought this to their attention and they hate me with no end in site because of it.

That the Universe is like a binary counter. It starts at the beginning rolling until it reaches the end and rolls over and starts over again. Why is they so? Because the Universe seeks to express all possibilities of information. The universe is like water and information is like the container that holds that water. Eventually all possibilities of information get represented. This is the continuum I talked about. The is the computational universe I talked about.

———————————————————————–
Update 12/04/2013

Well my  work is steadily coming along. I am not done with my BNS program I just have some side stuff I have to do with it.

I have been writing my program for the 2nd book and my time travel documentary I will be making. The hacker guy (the one I talked about up above in the post) him and I traded a few messages but I did not get too series with the guy and oh yeah I tried not to have my IP in my communications with the guy either.

I just asked a few questions to kinda of test him and he met my exceptions rather well. I am wondering if he is the guy in the conspiracy against time travel circle called “Cosmo”? Hmmm, I need to do so more research on that one. But, enough said there.

Besides pushing me to finish my first book when I told him of my interest in trading currency true to form he paralleled my interest and talked about bit coin. Today It hit me like a sack bricks over my head that I could be using my time travel counters to data-mine for bit coins. I just need a API to interface with my code with. Im checking it out. He may have unknowingly helped me again. And, im kicking myself for not thinking of that earlier.

So, when I do my documentary I may be showing my counters data-mining for bit coins, as well as my A/B email system, and trying to find other computer media of the past, future, or alternate time-lines. As well as playing the lottery. Anything to show my programs work. But bitcoin will show how good my counters work finding the present. The rest will be to show my counters finding the future, past, and alternate time-lines.

In my documentary I aim to show that my programs do more than just computer generate computer media but that the media itself can be a causality violation in the time-line. And the process to get that causality violation is called “Time-Hacking”.

The plan is to use my documentary to help prove time travel with information then follow that up with the release of my 2nd book and software for both BNS and time-hacking.

Now for tonight I wanted to talk more about entropy (the measure of energy in a system).  I believe the arrow of time is nothing more than the physics of our universe and that time itself is more or less an illusion. When we go from order to disorder the arrow of time is suppose to be pointing forward. When we go from disorder to order the arrow of time is suppose to be pointing backwards.

Now, when the arrow of time goes forward that is from order to disorder a energy system is getting colder. It more or less is losing energy but in our universe there is never a loss of energy just recycling. It depends how how big or small you look at the situation.

And, when the arrow of time goes backward that is from disorder to order a energy system is getting hotter. It more  or less is gaining energy but there again in our universe it is just recycling.

So, when our solar system was born energy was put into our system forming our sun and its planets. Is this an example of the arrow of time going backwards? Because, if there are trillions of worlds like earth our history could of happened before and will happen again. This is what I mean when I say the arrow of time is really an illusion.

Energy was put into our system we all live and die and as our sun burns up and our planets get cold energy leaves our system thus the arrow of time goes forward for us but what a minute what happens when another earth is born someplace else? Oh, yeah for a short period of time the arrow of time backs up putting energy into a system to create ORDER from DISORDER then for billions of years that energy slowly drains out of that system going from ORDER to DISORDER and life lives and dies all over again. So, when a solar system is born entropy goes from disorder to order the arrow of time backs up. Then, as that solar system lives it goes from order to disorder. The arrow of time goes forward.

So, in reality the arrow of time does not just go one direction only. No, it actually goes both directions. Academics physics today wants people to believe the arrow of time only goes one way but actually the arrow of time goes BOTH WAYS all the time! Yes, I call this the Burris principle of entropy.

So, the arrow of time is really just an illusion. Time itself is a mere thermodynamic property of physics. Time itself is just a thermodynamic property of entropy and the illusion of the arrow of time. Control the thermodynamic energy flow in a system at the quantum level and time itself can be controlled all together.

The reason gravity controls time because gravity is an efficient energy flow manager. Time occurs because of thermodynamics and the direction of energy in that system. When I say the direction of energy I mean is it getting hotter or colder.

So, gravity controls the flow of energy in a system so gravity controls time. The speed of an object in our universe as it gets faster the flow of energy slows down in a system thus time slows down in that system. As it stands acceleration like gravity controls the flow of energy in a system. Acceleration in principle is like gravity.

There is no magic to time. Time again is a thermodynamic property of entropy. This is the Burris principle of time. (Yeah I name it and take my credit because if I do not someone else will try to claim it.) So, the arrow of time and the pace of time is a property of energy flow within a system.
Last topic for this evening. Now everyone knows that energy is never created nor destroyed it just goes from one from of energy to another.
Matter is never created nor destroyed it just too just changes and eventually turns to energy. Matter really is just energy.

So, what happens when all the matter in the universe decays to energy and there is nothing left but cold dark black space all at the same temperature? Energy was doing this?

 

^
< * >
V

 

Here the arrow of time goes forward for the universe. We are experiencing this now even with planet formation and star formation.

It is my belief that space-time is energy itself. And that energy can not come to a complete rest. It can not come to a stop. Why can it not come to a stop? Because the laws of physics say that energy is never created nor destroyed it just goes from one from of energy to another. So, if all matter decay’s away in our universe including black holes and space-time is void and empty and reaches its absolute temperature it can not go anymore and nothing else happens then that would really mean that the energy from our space-time was completely gone. Used up, Empty, nothing, doing no work. It can not do that because for me that would violate the very laws of physics currently taught at our schools.

No, Energy can not stay still even under complete entropy. Space-time can not stay still. When the end finally comes for our universe the energy in our universe will have only one course of action left to follow. One path to flow when all is said and done. And it will be this path.

V
> * <
^

The arrow of time reversing as it does all the time but this time it does it on a very large scale.Now question I have about this is every now and then in some part of the internet people talk about getting energy from space-time. What if all the energy in a small system could be self contained and the arrow of time sped up until entropy is at its very end?Would that produce a weapon of mass destruction? Would great amounts of energy be released as the energy was forced to come to a complete rest but instead it created a mini-big bang?Could this be a way to harvest space-time as a energy source? Oh, it goes way beyond just a simple energy source too.

If this was true (and I believe it is ) if the ratios and dynamics of the energy matrix could be controlled in a collapse (Yep, done by adding more energy or subtracting it at the right time) then the ratio of matter to anti-matter could be controlled and collected. Exotic particles produced. Synthetic singularities.

What I said should piss Darby off. He just absolutely hates it when I talk about physics. I think he is trying to compensate for something and I am just getting in his way. I think that is it.

So, messing with space-time as a energy source is THE ULTIMATE FOR A TYPE III CIVILIZATION. These is where holes are punched in space-time and dimension’s bridged and traveled.

So in conclusion here is the Burris principle of entropy. As energy goes from one form of energy to another it can not every come to a rest. It has to continue going from one form to another form for all eternity.

And in doing so the arrow of time can go backwards as well as forwards for the micro and well as the macro. The arrow of time is not static in one direction. It never was. It goes both ways. And, I believe this might be what caused the big bang and will cause it again.

Update 12/11/2013

I read a article today at sciencedaily.com called
Possibility of Cloning Quantum Information from the Past.  Basically in a nutshell this says that information encrypted with quantum mechanics is safe as long as hackers do not have access to “Wildes’s looping closed timelike curves”. Good luck there buddy. BAAAAAAHAHAHAHAHAH.

Ok, lets say I take known computer media say todays and yesterdays news videos. I put two of those videos on a counter. One counter does not roll. The other counter is trained to roll from the first news video on day one to the second news video on day two.

While the first counter rolls to completely match the second counter my programs study the counter speeds (counter speed is controlled by addition or subtraction of small or very large numbers to the counter) and assigns mathematical checksums (Numbers that represent the mathematical state of the current counter state ) to each counter speed the counter rolls to make the 1st video on day one roll to the second video on day two and do so very quickly.

Well now I have a collection of checksums with assigned counter speeds. Well lets say I do a whole lot of this videos and now I have a really big collection now of these checksums with assigned counter speeds.

Now, I teach my AI all this stuff and put my AI in charge of controlling the counter TO FIND TIME TRAVEL MEDIA OF THE FUTURE OR THE PAST OR ALTERNATE TIME LINES.

Question for you public. Do you think your information encrypted with quantum mechanics is safe from a professional time hacker where closed time loops mean nothing to him?

Why would the closed time loops mean nothing to a time-hacker? Because a skilled time hacker can get access to the information BEFORE IT WAS ENCRYPTED IN THE PAST OR WHEN IT WAS DECRYPTED AGAIN IN THE FUTURE!!! And, HE DOES NOT NEED THE ENCRYPTED FILE TO DO IT!!!

Yes, hacking by time traveling. Or, time hacking. Yes, a skilled time-hacker has all the time in the world to do this. Quantum mechanics and quantum computing will stop nothing. The game will continue. It will be afoot.

I am going to tell you that no information is safe from my methods of time hacking. As one technology is invented to safe guard the future another technology is invented to free that future from it’s self.

update 12/14/2013

Well here I go again. Science Daily published another article today confirming that the big bang will indeed happen again. Here is the link. Collapse of the Universe Is Closer Than Ever Before. Basically when entropy runs its course there is a phase change in the energy level of the universe then the mass of the universe increases causing it to collapse into another big bang. In a nutshell what I said before would happen. Hmmmm funny how I know these things. I wonder why? Ok, that being said Now I will introduce the machine I briefly talked about up above. It uses electric gravity to control mass and time. It uses a high voltage source to control the energy level of the electrons then emf which has the properties of electricity and magnets hits the subatomic matter at the right phase and wave length causing the atomic material to go thru the emf charges and poles like a gauss gun thus creating gravity. Now gravity controls time because time is a thermal property of entropy and gravity is a energy flow manger. As it controls the energy flow it controls time. So here is the ultimate in power sources for civilization’s. It is also the ultimate weapon. Click on the picture to make it bigger.
 Now public please excuse me it is time for some Darby and Rainman bashing. Since those goons sent their hacker friends after me it is the least I can do to return the favor for them. So public here goes. Step out if this bothers you.(Since Darby feels like he can go around the internet calling me names what I said below should not offend him)
Hey Darby I talked about physics again. You pissed off yet? I hope so “MOTHER FUCKER”. You stupid pussy. Hey I just have one question for you and Ray aka Rainman. Between the both of you “WHO IS THE BITCH?” BAAAAAAAAAAAHAHAHAHAHAHAHAHA. Good night pussies. Im going to bed.