JADE HELM: THE HARD CORE TRUTH EXPLAINED

JADE HELM: THE HARD CORE TRUTH EXPLAINED

Add to

Share

More
867,838 views

Published on Jun 22, 2015

PLEASE get this information out!!! SHARE and RE-POST as far and wide as you can folks! A learned network / software engineer’s analysis of what’s really behind the “JADE HELM EXERCISE”, (aka “Jade Helm 15”), (Joint Assistant For Development and Execution (JADE). She reveals that what we are actually seeing is a SYSTEM ROLL OUT of an INCOMPREHENSIBLY DIABOLICAL Artificial Intelligence Quantum Computing Technology that can do many, many things including the production of holographic battlefield simulations and has the ability to use VAST AMOUNTS OF DATA being collected on the HUMAN DOMAIN to generate HUMAN TERRAIN SYSTEMS in geographic population centric locations to IDENTIFY and ELIMINATE insurgents, rebels, or whatever labels that can be flagged as targets in a GLOBAL INFORMATION GRID for NETWORK CENTRIC WARFARE ENVIRONMENTS.

I know… That was a mouthful… But these are all well documented military terminology being stated. Therefore please take a couple minutes to do your own additional research,… come to your own (educated) conclusions. COMPLETELY dissect and break down that first paragraph in your brain BEFORE you:
A: Read onward.
B: Watch my video.
C: Post a comment in the idiot section.
Thank you 😀

The “JADE TWO” BATTLE FIELD SYSTEM is cognitive and intuitive. It can examine prior executed battle plans and devise ‘new and better’ strategies to increase the ‘kill chain’. The second generation of JADE, (aka “JADE TWO”), has the capability for two way communication with DRONES through the O.C.C.O.M. technology which is one of the next generation integrations to this system. In short, JADE HELM will not be battles directed by Generals and Military Commanders, but by a computer. It is a COGNITIVE SOFTWARE SYSTEM program based on a NETWORK CENTRIC WARFARE SYSTEM,… basically “AT THE HELM”. Hence we have “JADE HELM”! The COMPLETE 2.5 HOUR INTERVIEW can be viewed here:https://www.youtube.com/watch?v=oqGEz…

Related Videos:
https://www.youtube.com/watch?feature…
JADE HELM: “MASTERING THE HUMAN DOMAIN”-1033 Program & Exec Order 13684
https://www.youtube.com/watch?v=oqGEz… Governor’s Response To Resident’s Concerns With Jade Helm15
https://www.youtube.com/watch?v=9crAz
Robin Sage Is Jade Helm For Eastern US
https://www.youtube.com/watch?v=uIRV_

Research Links:
Official US Defense Department Science Blog
http://science.dodlive.mil/2015/03/16
DTIC News Wire 10 April 2015
http://www.dtic.mil/dtic/pdf/longrang
Raytheon BBN Technologies
http://www.raytheon.com/ourcompany/bbn/
JADE Program continuation paper – Tuesday Presentation Details
http://www.dodccrp.org/files/13th_icc
Mega Data Collection – GWEN Towers
http://www.trunews.com/local-police-d
NSA Decryption Multipurpose Research Facility
http://censored31.blogspot.com/2012/0
Is “The Cloud” an Integral Part of the NSA Data Center and Project Bumblehive…??
https://www.youtube.com/watch?v=9ZYeK
Recommended viewing on the subject:
Jade Helm – An Expose-Part 2-Infiltration
http://www.watchmanscry.com/News_aler

http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA3980­21
The AFRL-IF-RS-TR-2001-171 (Joint Assistant For Development and Execution (JADE) Final Technical Report can’t be opened in a browser, you have to download it and read it using Adobe or word/open office writer.
You can find it by Google: AFRL-IF-RS-TR-2001-171

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s