I will be on The Edge tonight with Daniel Ott, the Cosmic Cowboy (2nd hour) to discuss my personal experience with the invisible war and last weeks military Red/Blue war game on the topic.
The 4th and Final Revolution
Is the truth is becoming increasingly hard to discern? Is authenticity (i.e., full trustworthiness) is dying? The advent of the quantum computing, AI, has brought with it the global spread of a myriad of hoaxes, urban myths, and the dreaded fake news. The Firehose of Guile has ushered in deceit, cunning, and duplicity enveloping the earth in its shadow.
In March President began to declare to the public that we were fighting an invisible enemy. On April 10, 2020 in the Presidential briefing, the President said: "I’d like to provide Americans an update on our ongoing efforts in the war against the invisible enemy.” Who and what is this invisible enemy? You might assume that it is the pathogen novel coronavirus. In reality, it is a dual-purpose combination. These my friends, are weaponized word in an evil fight against humanity. This war is asymmetrical and multi-dimensional. As you celebrate Independence Day, we have entered an invisible war for the independence and survival of mankind and humanity. You have no choice to engage in this war or you will be killed physically and spiritually. It is critical for you to learn effective Rules of Engagement (ROE).
To understand the war, we need to know the terminology. According to Merriam-Webster asymmetrical warfare is:
Warfare that is between opposing forces which differ greatly in military power and that typically involves the use of unconventional weapons and tactics (such as those associated with guerrilla warfare and terrorist attacks)
Multi-Dimensional Warfare or 15-D+spiritual and/or Shock was developed by the Office of Strategic Services (OSS) – a WWII organization that later evolved as Central Intelligence Agency (CIA) a simple methodology to identify targets for disruption. The name of the algorithm is CARVER – which is an acronym of Criticality, Accessibility, Recuperability, Vulnerability, Effect and Reconfigurability. It was Beta-Tested during the Vietnam War.
Rules of Engagement: a directive issued by a military authority controlling the use and degree of force, especially specifying circumstances and limitations for engaging in combat.
Who is the Invisible Enemy?
I would propose to you that the invisible enemy is an invading alien force coming from other dimensions to conquer mankind into submission and then eternal death. With the weaponization of the words though it can be interchanged with any invisible force such as a pathogen, electromagnetic force, the spiritual realms both of God and Satan, or the unseen celestial forces such as the Galactic Current Sheet headed our way.
Dimensional Warfare: CARVER 15+Shock
The 15-dimensional war or 15-D war is an evolution of the CARVER algorithm. The CARVER algorithm provides the following:
- Accessibility to any dimension, physical or spiritual,
- Destructability known as Lethality,
- Low Cost and Yield (high).
This new targeting method, 15D warfare, is DEADLY. This DEADLY targeting selects targets and uses methods that have high deniability. Deniability is the ability to hide/shift/obfuscate the evidence of involvement of the attacking/sponsoring agency and/or entity.
Effectiveness is the probability of success in achieving desired effects.
- Accessibility is the relative ease of reaching the target.
- Destructibility (level) is the achievable lethality.
- Cost that should be as Low as possible but includes the political, combat/military cost and the economic cost in that order. With the expected Yield being high.
- Yield is defined as fruitfulness gained from the targeting operation such as something positive for combat/military, political and/or economic value, or spiritual and/or physical degradation.
DEADLY requires technology-based innovation or basically quantum computing AI capability. Technology alone will not suffice; it has to be enmeshed or yoked into a solution for the mission that aids deniability.
Using DEADLY matrix one can devise technology-based innovative solutions for both – constructing deniable attacks and countering deniable threats.
There also some additions to CARVER such as Shock Value. In spiritual terms this includes the birth pangs mentioned in scripture.
The 4th Industrial Revolution encompasses several emerging and interacting technological trends blurring the lines between digital and physical realms. “Industry 4.0” is made up of trends in “artificial intelligence, robotics, the Internet of Things, autonomous vehicles, 3-D printing, nanotechnology, biotechnology, materials science, energy storage, and quantum computing.”
This Revolution also brings with its super empowered individuals and entities, bad actors, with the ability to engineer unique weapons and dangerous weapons with ease.
We live in an era of “Improvised Everything” where common products within the physical and spiritual realms are co-opted into weapons, even the very molecules and atoms of creation have been weaponized. In fact, corporations have advanced weaponry, Stealing the Sword, from humanity.
AI is speeding up disinformation in the ongoing war, soon to be onslaught, of "Weaponized Information." The landscape is far from a pastoral scene but rather includes artificial intelligence, information warfare, and international security in all theaters. Emerging technologies will accelerate disinformation and what impact our lives and routines with swarms of deep fakes, advanced troll armies, mass-produced fake personas, and other aspects of an advanced information environment.
The information dimension is constantly changing with the explosion of data and hyper-connectedness enabled by social media, the Internet of Things, and emerging technologies. Weaponized Information will permeate our daily existence, fundamentally changing how we live and fight.
Soon, a comprehensive assault on authenticity could be achieved through disruptive technologies like deep fakes, artificial influencers, AI-generated news and dialogue, and virtual/augmented reality.
The emergence of weaponized social media, as typified in P.W. Singer’s “LikeWar — The Weaponization of Social Media,” is potentially just the tip of the iceberg compared to the emergence of some disruptive technologies in the artificial intelligence (AI) and machine learning (ML) sector.
There are three specific AI/ML applications that could bring about the Death of Authenticity:
- Deepfakes – Videos that are constructed to make a person appear to say or do something that they never said or did. AI has improved this capability so greatly that it is extremely difficult to discern deepfakes from real video by the naked eye and ear. Deepfakes can cause unforeseen havoc.
AI-Generated Bodies and Faces – AI-driven Generative Adversarial Networks (GANs) are being used to generate entirely original and fake faces and even whole bodies. Whole invisible invading troll and bot armies are of increasing concern to military and government officials who worry about their effects on political environments and electoral outcomes. Imagine a landscape with amplified psychological effects from realistic bodies and faces that humanize such bots or demons.
- AI Writing – A text generation tool created by OpenAI, a research institute based in San Francisco, can now compose original text in realistic prose. The tool is continuing to improve, generating convincing headlines, posts, articles, and comments, entirely free from human input. AI can generate millions of comments or posts, geared at either supporting or undermining a specific issue or causes. Personalized chat bots can interact with you posing as a human and you will never know that it is AI.
The convergence of these three technologies could spell the death of authenticity. How will the masses struggle with being flooded with a steady stream of AI-generated deep fakes constantly conveying mixed messages and troll armies that are indistinguishable from their fellow citizens? A constant bombardment of messages by false media and fabricated personalities currently in use is provoking severe reactions throughout the world and leading people to question the very reality they believe.
Effective Rules of Engagement
The very notion that we have entered the Final Revolution and must engage giant invisible enemies can be disheartening, to say the least. We should all be encouraged that throughout history mankind has warred against tyranny. True, this go-round is for high-stakes, but you can engage and do it successfully!
- Disinformation and propaganda have been a part of the information landscape for a long time, but the current news focus sometimes creates a misconception that it is a new phenomenon.
- The tools and tactics that organizations use might change with the creation of new media, but the patterns and messages are the same throughout the historical context.
- You and your proactive actions are your first line of defense against fake news.
- You are the solution when you actively are conscientious about what information you consume and what you share.
- The number of entity players involved in creating, disseminating, and amplifying disinformation will keep increasing is a successful disinformation operation with info tools and weapons.
- Entities will also move into the space as “disinformation-for-hire” with troll farms, black PR firms, demonic actors.
- Each person needs to do due diligence and become trained in disinformation investigation and analysis.
- Disinformation entities have become ever more sophisticated.
- We need to pay more attention to the actual solutions of how we minimize the risk of disinformation with different intervention tactics.
- Education plays a huge role in defending against disinformation.
Spiritual Rules of Engagement
I come from a biblical world-view so if this is not your position you can breeze over this section although in this war you might want to take note.
- Know Your Enemy
(For the weapons of our warfare are not carnal, but mighty through God to the pulling down of strong holds) Casting down imaginations, and every high thing that exalteth itself against the knowledge of God, and bringing into captivity every thought to the obedience of Christ; 2 Corinthians 10:4-5
- Apply the Blood of Jesus
- Before we answer a phone call, we must pray the blood of Jesus over the call.
- Before we make a phone call, we must pray the blood of Jesus over the call
- Before we send or reply to an email or internet interaction, we must pray the blood of Jesus over the emails/internet activity!!!
- Before we enter a chat, we must pray the blood of Jesus over the chat.
These steps listed above are the only real to crush the demons and other evil spirits away from the conversations.
It will also keep your mind clear at all times, during any interaction with another person or 'entity.’
We have entered the time of grave evil covering our planet.
We must provide a true defense for our souls, eternal lives and body by praying the protection of the Blood of Jesus over each and everything we do.
- Wear your armor
Finally, my brethren, be strong in the Lord, and in the power of his might.
Put on the whole armour of God, that ye may be able to stand against the wiles of the devil. For we wrestle not against flesh and blood, but against principalities, against powers, against the rulers of the darkness of this world, against spiritual wickedness in high places. Wherefore take unto you the whole armour of God, that ye may be able to withstand in the evil day, and having done all, to stand. Stand therefore, having your loins girt about with truth, and having on the breastplate of righteousness; And your feet shod with the preparation of the gospel of peace; Above all, taking the shield of faith, wherewith ye shall be able to quench all the fiery darts of the wicked. And take the helmet of salvation, and the sword of the Spirit, which is the word of God: Praying always with all prayer and supplication in the Spirit, and watching thereunto with all perseverance and supplication for all saints; Ephesians 6
- Do not trust anything you see or hear.
And shall make him of quick understanding in the fear of the Lord: and he shall not judge after the sight of his eyes, neither reprove after the hearing of his ears: Isaiah 11
- Live life in complete faith and dependence upon God and stand in all the power of Jesus.
- Know in your heart you are redeemed.
- Know: For I am persuaded, that neither death, nor life, nor angels, nor principalities, nor powers, nor things present, nor things to come, Nor height, nor depth, nor any other creature, shall be able to separate us from the love of God, which is in Christ Jesus our Lord. Romans 8
- Ask the Holy Spirit to open your eyes to the areas in your life that are not pleasing to Him and are footholds of Satan.
- Stand in victory that Jesus achieved for us.
Live gratefully and thankfully.
Yes, the attacks will come in all forms: physical, mental, emotional, spiritual, even discord or malcontent or discouragement etc... (One of Satan's most worn weapon is to discourage the saints and cause them us to stumble because we feel like failures etc.)
If you consider your heart and mind and soul to be of paramount importance this is the time when especially we must engage and be covered by the Blood of the Lamb. We must get to the very core of our faith and surrender at the heart at the deepest levels to Jesus, and always let his protection cover us.
Coming to a Conclusion
Walk in victory fellow humans created in the Divine Image of God. The first step towards victory is to understand the enemy and battle plan by getting educated. The second, is to understand that you do not need to cower in fear of the giants who have assembled to make war against you. Choose your weapons carefully my friends. This war is only for a brief time in the span of eternity with the Timeless One. God bless each of you.
Celeste has worked as a contractor for Homeland Security and FEMA. Her training and activations include the infamous day of 911, flood and earthquake operations, mass casualty exercises, and numerous other operations. Celeste is FEMA certified and has completed the Professional Development Emergency Management Series.
- Incident Command
- Integrated EM: Preparedness, Response, Recovery, Mitigation
- Emergency Plan Design including all Emergency Support Functions
- Principles of Emergency Management
- Developing Volunteer Resources
- Emergency Planning and Development
- Leadership and Influence, Decision Making in Crisis
- Exercise Design and Evaluation
- Public Assistance Applications
- Emergency Operations Interface
- Public Information Officer
- Flood Fight Operations
- Domestic Preparedness for Weapons of Mass Destruction
- Incident Command (ICS-NIMS)
- Multi-Hazards for Schools
- Rapid Evaluation of Structures-Earthquakes
- Weather Spotter for National Weather Service
- Logistics, Operations, Communications
- Community Emergency Response Team Leader
- Behavior Recognition
Celeste grew up in military & governmental home with her father working for the Naval Warfare Center, and later as Assistant Director for Public Lands and Natural Resources, in both Washington State and California.
Celeste also has training and expertise in small agricultural lobbying, Integrative/Functional Medicine, asymmetrical and symmetrical warfare, and Organic Farming..
My educational eBooks
Prep Resources for the Climate Chaos
Climate Revolution: The Grand Solar Minimum