Page 4 of 4 FirstFirst ... 234
Results 31 to 34 of 34

Thread: Interview with Lyn Buchanan former US Army CRV

  1. #31
    Quote Originally Posted by Fore View Post
    Sorry if I came off as too straightforward on the analysis.

    Certain things jump out at you when you've had hands on experience in the subject.

    For example, implementing ciphers make no sense if you consider several facts about how straightforward psychic targeting is carried out.
    Like C3Gamma means absolutely nothing. Both to the CRV team nor their psychic components and extended awareness.


    C3Gamma is what you'd understand as a pointer/cipher. Something that substitutes for something else. A reference.
    By itself it is useless. Sort of like a nick name that has nothing associated with it. It means nothing.

    Unless a particular neurological datapoint inside a person or post-processed (psychic imprinted) information is associated with a piece of data with the term "C3Gamma". It is essentially a term without meaning.

    -----------------

    Now, if you associate a datapoint (C3Gamma) with a kinetic weapon on some sub in the Navy. That can be meaningful as a CRV/RV target.
    It all depends on whether the CRV team can query the cipher and have it associated with targeting data.
    For example, "a location" that someone knows what C3Gamma refers to or what it represents.
    And additional properties (lines of association) like what it is, what it does, where it is, who knows of it, where are the XXXX devices located.

    As you probably are reading this, you can figure out what you are actually doing is querying remote sources of information (usually human) to transform a nick name into actual targeting descriptions or vectors that isolate the identity of a target.

    https://en.wikipedia.org/wiki/Six_degrees_of_separation

    From there you spread out accessing human beings thoughts and knowledge base on what C3Gamma represents.
    That is where CRV (probably in a different implementation than this guy describes) would jot down what they gather about human nodes with disparate piece of data. So it is basically espionage without a physical presence.

    Except your either observing the external world if you know where you are looking; or your are remotely running queries against the person with targeting information. Either in their organic memories or their post-processed psychic imprints of those organic memories. (less noticeable to your average individual)

    From querying each node, and it's post-processed (psychic data). You can figure out how big is the kinetic missile, what properties it has (tons, color, shape, volume, details like speed or deployment issues), or any number of things. Anything the target knows, the CRV'er should assimilate and absorb as their own knowledge.

    Putting all the pieces together they should eventually know as much as the (human) nodes combined.

    ----------------------

    Of course the ET explain pretty plainly in lessons that to circumvent this vulnerability, the average project has multiple individuals who are compartmentalized and each team knows the same project by different names and different details and teams are often not allowed to associate with one another for reasons beyond their understanding. (protocol)

    So a group of 6 teams may know the same project under various names that do not coincide with one another. Usually the ET explain the human protocols are made so that they do not need to become aware of that fact. In fact, the lessons the ET give you about how to understand this is that cover stories are given to compartments so that they do not really fully know what they are supposedly working on.

    Lines of association and psychic targeting techniques break between teams because there should not be (in the explanations given by the ET on common knowledge) any Rosetta stone in common between the project teams. What one team calls "Eagle Break" the next team calls "Figure Pusher". Even if they are in the same room on different sides. They don't know (according to the ET examples) what the project is called and the names are throw away terms.

    And that is only on white world secrecy.

    ------------------

    When they explain black world secrecy and unknown projects the designs of the projects are inhumane.

    People are scanned psychically on a regular basis and precognitive assessed on a repeated basis (never known when they are being scanned)*(only aware that they are being monitored at all times). They don't even think freely within themselves and are described as living under extreme ongoing tension.

    People who are at risk of defecting even if not in present time are passed on to a different (human) team by the ET's and they are "discharged" (dead, or "re-purposed"). They have no right to live or decide anything important about where they do the next job. The main strategy is to recycle individuals until they burn out. They explained that vast majority end up as corpses one way or another. The ones who live are never going to see common society due to risks of leaking information.

    The ET's said the ones who are extremely "lucky" (handful) and are favorably treated have the option of being implanted with invasive false memories and starting a new life as a disinformation agent. They explained that is considered something like an honorable discharge that very (VERY) few obtain from pretty evil ET project managers.

    ------------------

    The unknown projects (unknown to the ET but assumed to exist) are completely invisible and are largely unknown in details. They are human led and they are impossible to find by psychic means. Several of the ET's mentioned over the years that human installations (as a standard) use light security measure like generating noise on a non-physical level to disrupt parts of the psychic targeting methods.

    Others supposedly use a disruptive phenomena (that I think) is electrical or physical in nature to isolate facilities from psychic intrusion. And some heads of state in the white world have wearable devices (never seen it) that looks like a short pen which generates scattering noise. They also mentioned the intelligence agencies also supposedly use electrical (physical) phenomena to broadcast noise surrounding facilities to disrupt certain ranges of phenomena (less sophisticated). (different from targeting disruption) I found out this was actually true in several documentaries about how NSA and CIA buildings have countermeasure for electronic spying.

    ==================

    Anyway, if you can imagine, the ciphers by themselves mean nothing. So if the man implied they use ciphers, then there is logically a third party or "a system" in place to connect the cipher with the target.

    It doesn't automatically work by itself.

    What is the third party? Who knows. If they are getting 70% hit ratios in a group, then they either have a third party who is talented and is projecting the data into them so they can jot it down. Either that or the USA must have something that is capable of targeting a large scope of people and running queries to see what comes up.

    Honestly, do not know what the missing element might be. But from the way he describes his activity, either he is lying (understandable) or he doesn't know what feeds him the information. The setup doesn't make sense without the missing component.

    ---------------

    He seems to have performed RV as he describes it, but notices that "CRV" is less detectable.

    So it implies there is a different implementation at work when they are doing CRV. Nothing he shared seems to imply he knows what exactly the missing element might be.
    Fascinating stuff Fore. "Evil ET project managers" sounds ominous to say the least.

    "Straightforward" always works for me, I appreciate the candor.

    Although I have no experience with (C)RV, I certainly do have experience with cyphers, so I too was confused with Buchanan's explanation about how targets were acquired.

    Your description of the "unknown projects" for some reason brought back memories of some of the ultra-high security/secret areas on some of the bases I've been to. My job at times allowed me to enter some of these areas (escorted) and I was always amazed to see how multi-layered the security and how compartmentalized these areas were. One was underground and entering it reminded me of the beginning of the "Get Smart" TV show with a seemingly endless gauntlet of security doors. I always wondered "what the hell do they do down here?"

  2. #32
    Quote Originally Posted by Wansen View Post
    Fascinating stuff Fore. "Evil ET project managers" sounds ominous to say the least.

    "Straightforward" always works for me, I appreciate the candor.

    Although I have no experience with (C)RV, I certainly do have experience with cyphers, so I too was confused with Buchanan's explanation about how targets were acquired.
    Personally, I think the man either is omitting info (which is understandable) or he genuinely does not know how the targeting portion of the CRV works.

    His story makes much better sense if he "connects" to the [assumed to exist] third party and gives them the ciphers. Then that party would take the cipher and compare it to a Database that has compiled some kind of targets.

    Then the third party would perform the actual CRV session(s) and the "CRV" team receives the results and jots them down.

    The implementation should leave the CRV team without specific knowledge other than what they have jotted down. If the CRV team is being given info in a compartmentalized fashion, then that session data that has been jotted down could later be compiled together to form a picture with all it's elements of what the various elements relate to.

    But again, the implementation of a third party doesn't makes sense.
    The only instance (to me at least) where it makes sense to do it this way is if you are trying to get around a policy that is being enforced globally that restricts the direct dissemination of psychic data collection (or something like that).

    -----------------

    Think about it, if (a big if) you wanted to know about what happens in an Afghanistan bunker or the activity under artic sheets. Technically alot of non-terrestrials would know and can easily obtain that information. But it might be against a global policy for them to directly divulge that information. Perhaps they would have their Terrestrial permits pulled (lol, I dunno).

    But if you got wise to creating a workaround such a hypothetical policy, you could probably create a (potentially) sham CRV team just capable enough to perceiving the communication of said data.

    Technically, the CRV group asked about D3629 (a cipher) and they got back perceptual data and jotted it down.
    But there are no potential records of asking about _ANY Specific_ location in Afghanistan (a bunker) or under the artic sheets.
    Tomato, Tomoto

    As far as anyone is concerned these folks just simply got the data about D3629. Now who else knows what D3629 means or what it refers to?
    <shrug>

    Probably only the third party doing the session, probably only the analyst doing the review after the CRV team performed their jotting down of details.

    Is that a loop-hole in some policy. Perhaps. It could just be a bad guess though.

    ===============
    Quote Originally Posted by Wansen View Post
    Your description of the "unknown projects" for some reason brought back memories of some of the ultra-high security/secret areas on some of the bases I've been to. My job at times allowed me to enter some of these areas (escorted) and I was always amazed to see how multi-layered the security and how compartmentalized these areas were. One was underground and entering it reminded me of the beginning of the "Get Smart" TV show with a seemingly endless gauntlet of security doors. I always wondered "what the hell do they do down here?"
    I have heard rumors that some of the facilities are even out of phase with the rest of spacetime. (which is actually the norm for some ETs bases by the way)

    So a while back when I asked you if you noticed any irregularities on your excursions about the time and any peculiar after effects, you didn't seem to know of any.
    So what looks like high security in the white world might be something different in the real black.

    I recall back in the 90's one ET talking about a security card (well it looks like a card on the outside). The inside doesn't have a chip...well not one that we would really call a chip. It had a material inside that was like a glue and it's color if I recall correctly was a dark gun-mental black like a graphite color.




    The card works on a complicated principle that the material will go through phase changes in a predictable manner. So the card is presented at locations and the terminal has a recording of the initial state and the predicted state it should be at the moment of scanning. (and not sure how the card is even scanned?)

    The card is/was a recent addition (remember its hearsay) to security for some location that I don't recall at the moment. The gooey material itself is like a ?quantum? or atomic pattern that is used in place of encryption keys. The reason being is because ET's can break encryption methods. But they cannot easily replicate the initial instance of the material and it's internal and predictable progression at an atomic scale.

    So the card is harder to defeat. Never heard of it anywhere so I don't know if it actually exists or not.

    ---------------------
    ET's teach that
    Human bases with high security have an artificial field running through them and surrounding the bases perimeters and there is a ton of security they have to pass through (that annoys some ET) and then they said there are audits of people (human and ET) and there are human telepaths behind walls strictly checking internal activity. Either at hallways, sections, and spot inspections/audits (which the ET hated alot when they commented about).

    Then some of them talked about administrations that some projects have vs others. That the beginning (historically) of a developing project is slow and annoying cause they have to wait for the ideas they initially gave to human beings to develop into a sophisticated understanding. That some projects are tedious or that they have to attend meetings on a regular basis and schedule or that there is antagonistic replies (politics) involved and global tension and people pushing each other buttons and skirmishes between ET and the list went on and on.

    So everything you've come to expect from Earth, but from "Space". heh
    Last edited by Fore; 08-23-2017 at 02:18 AM.
    For every action, there is a corresponding over-reaction. -- Anonymous

  3. #33
    Quote Originally Posted by Fore View Post
    Personally, I think the man either is omitting info (which is understandable) or he genuinely does not know how the targeting portion of the CRV works.

    His story makes much better sense if he "connects" to the [assumed to exist] third party and gives them the ciphers. Then that party would take the cipher and compare it to a Database that has compiled some kind of targets.

    Then the third party would perform the actual CRV session(s) and the "CRV" team receives the results and jots them down.

    The implementation should leave the CRV team without specific knowledge other than what they have jotted down. If the CRV team is being given info in a compartmentalized fashion, then that session data that has been jotted down could later be compiled together to form a picture with all it's elements of what the various elements relate to.

    But again, the implementation of a third party doesn't makes sense.
    The only instance (to me at least) where it makes sense to do it this way is if you are trying to get around a policy that is being enforced globally that restricts the direct dissemination of psychic data collection (or something like that).

    -----------------

    Think about it, if (a big if) you wanted to know about what happens in an Afghanistan bunker or the activity under artic sheets. Technically alot of non-terrestrials would know and can easily obtain that information. But it might be against a global policy for them to directly divulge that information. Perhaps they would have their Terrestrial permits pulled (lol, I dunno).

    But if you got wise to creating a workaround such a hypothetical policy, you could probably create a (potentially) sham CRV team just capable enough to perceiving the communication of said data.

    Technically, the CRV group asked about D3629 (a cipher) and they got back perceptual data and jotted it down.
    But there are no potential records of asking about _ANY Specific_ location in Afghanistan (a bunker) or under the artic sheets.
    Tomato, Tomoto

    As far as anyone is concerned these folks just simply got the data about D3629. Now who else knows what D3629 means or what it refers to?
    <shrug>

    Probably only the third party doing the session, probably only the analyst doing the review after the CRV team performed their jotting down of details.

    Is that a loop-hole in some policy. Perhaps. It could just be a bad guess though.

    ===============


    I have heard rumors that some of the facilities are even out of phase with the rest of spacetime. (which is actually the norm for some ETs bases by the way)

    So a while back when I asked you if you noticed any irregularities on your excursions about the time and any peculiar after effects, you didn't seem to know of any.
    So what looks like high security in the white world might be something different in the real black.

    I recall back in the 90's one ET talking about a security card (well it looks like a card on the outside). The inside doesn't have a chip...well not one that we would really call a chip. It had a material inside that was like a glue and it's color if I recall correctly was a dark gun-mental black like a graphite color.




    The card works on a complicated principle that the material will go through phase changes in a predictable manner. So the card is presented at locations and the terminal has a recording of the initial state and the predicted state it should be at the moment of scanning. (and not sure how the card is even scanned?)

    The card is/was a recent addition (remember its hearsay) to security for some location that I don't recall at the moment. The gooey material itself is like a ?quantum? or atomic pattern that is used in place of encryption keys. The reason being is because ET's can break encryption methods. But they cannot easily replicate the initial instance of the material and it's internal and predictable progression at an atomic scale.

    So the card is harder to defeat. Never heard of it anywhere so I don't know if it actually exists or not.

    ---------------------
    ET's teach that
    Human bases with high security have an artificial field running through them and surrounding the bases perimeters and there is a ton of security they have to pass through (that annoys some ET) and then they said there are audits of people (human and ET) and there are human telepaths behind walls strictly checking internal activity. Either at hallways, sections, and spot inspections/audits (which the ET hated alot when they commented about).

    Then some of them talked about administrations that some projects have vs others. That the beginning (historically) of a developing project is slow and annoying cause they have to wait for the ideas they initially gave to human beings to develop into a sophisticated understanding. That some projects are tedious or that they have to attend meetings on a regular basis and schedule or that there is antagonistic replies (politics) involved and global tension and people pushing each other buttons and skirmishes between ET and the list went on and on.

    So everything you've come to expect from Earth, but from "Space". heh
    He does seem to be playing it close to the vest at times. Perhaps he's drawing a military pension.

    I will have to defer giving an opinion on the mystery of the use of a third party or not.

    Being the simple-minded musician I am, this stuff is pretty far-out to me and I'm still trying to grasp the concept.

    I'm reading Angela Smith's book on RV now and in an online interview, she does describe an RV target in space designated to the RV group by its celestial name, i.e., "Wolf359" would be ""W359". I inferred that no other information was given to the RV group.

    Why the location needs to be encrypted is a puzzle to me.

    That security card-like device you described sounds impressive.
    Last edited by Wansen; 08-24-2017 at 10:19 AM.

  4. #34
    After a long stretch of near zero activity; last night and the night before that has been too active for my tastes.
    Followed by (the predictable) bad events that always follows such things.
    Someones been remotely projecting (RP) and making it clear they are present.

    So time to bail out and keep things to myself again.
    Thanks for all the free fish (troubles). I have yet more hardships to take care of in my spare time now.
    For every action, there is a corresponding over-reaction. -- Anonymous

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •