2010 proxies

Climate Skeptics: Trying to see through the alarmism

2008.07.16 19:00 Climate Skeptics: Trying to see through the alarmism

Questioning climate related environmentalism.
[link]


2024.05.13 14:22 BlackBeatles_ Politics (Edexcel) essay on whether the current Conservative Party has moved away from Thatcher

Not sure if this is a sensible place to share my politics essay- please delete/remove this if so. Please feel free to use this in regards to benefitting your revision on political parties and feel free to give advice/opinions (this is an A scoring 24/30)
Evaluate the view that the current conservative party has moved away from Thatcherism? (30)
Thatcherism is a marriage of neo-conservatism and neo-liberalism which advocated for a strong force on law and order, free-market coupled with laissez-faire economics and privatisation. However, under Boris Johnson’s government, the tory government has diverged away from thatcher’s economic view as Johnson advocates for more state intervention which contradicts thatcher’s position.
Firstly, Thatcherism held a negative view on trade unions claiming that they negatively effected the economy due to the fact that workers could unify and strike which was seen to harm the economy. The passage of the Trade Union Act (1984) was seen as a way to tackle this issue by making it harder for workers to strike. One could argue that under Johnson’s government, it contradicts Thatcherites ideology as Rishi Sunak announced a £170 million investment package in 2020 to help boost and stimulate economic growth and establish the furlough scheme (£69 million to prevent unemployment). This was part of Johnson’s ‘levelling up the north’ scheme in which it aimed to reduce the divisions between the rich and poor. This aligns with one-nations ideology of an organic society to try and reduce the ‘distance’ between the rich (south) and the poor(north). This contradicts Thatcher’s view that ‘unemployment should be left to market forces’ which highlights that the tory government has shifted from Thatcherism. Moreover, Sunak’s passage of increasing NI tax to 1.25% (historically high) would help to invest into health and social, this its evident that Johnson’s government favours an interventionalist state/government and huge amounts of welfare spending which diverges from Thatcherites ideology as she calls for a minimalist state interference and that people would become ‘dependant’ on the state.
This could be seen as a weak government due to the circumstances-Covid-19. Prior to Covid, the Tory’s manifesto promised to not raise NI, VAT and income tax which aligns with the believe that people should conserve their money which proves to carry on Thatcher’s legacy in keeping tax low. Had there been no pandemic, it could be argued that the Tory’s would move to a more new-right ideology. Furthermore, in 2010, Cameron introduced the idea of a welfare reform via the passage of Universal Credit which he claimed people would be better off in employment and not benefits which led to benefits caps and the ‘bedroom tax’ which tackled the idea of social housing tenants having more rooms/space than needed. This supports the idea that a welfare state creates a dependant society. So, one could suggest that due to Covid, it forced the Tory’s to come up with a short-term response via the furlough scheme as without it, many businesses would fail and create a poor society which would create a ‘dependant society’. So, it could be argued that the Tory’s stance on the state is intertwined with neo-liberalism and one nation as the party wants to decrease corporation tax to boost economy (mirrors Thatcherites) but taxes on lower incomes are too high which will create poverty and lead to a dependant culture. This is evident via Sunak reducing corporation tax from 20% to 19% which is seen to carry on Thatcherism’s ‘legacy’ but due to the high public spending, it highlights that the tory government favours a one-nation stance which is evident in the ‘levelling up’ scheme.
Another factor in which the Tory party has seem to diverged from Thatcherism is the idea of (neo-conservatism) strong forces on law and order to impose social morality. Dominic Raab made plans to repel the HRA to give more power to the government to choose when rights should be upheld (mirrors with neo-conservatisms) as the sentencing policy should be in the hands of the elected government and not the unelected judiciary. This is evident in the introduction of the (2021) Police, Crime, Sentencing and Court Bills which limits the freedom to protest- this act allows for protesters to be ‘shut down’ which emphasises the idea of strong police powers which mirrors neo-conservatism. Moreover, in the 2017 and 2019 manifesto, the Tory’s pledged to alter the HRA with the introduction of a bill of rights which would assert dominance over domestic control and legal matters and national threats like terrorism (the idea that the HRA has been abused and is a proxy for crime and terrorism. However, this could be seen as a weak argument as the party-gate scandal which included numerous MP’s like Johnson and Sunak which is seen as a breach in ministerial code and sets a tone for a weak and lawless society. Lastly, another point in which the current conservative party is a continuation of Thatcherism is the fact of the party being Eurosceptic which ultimately led to Brexit.
In conclusion whilst it may seem like on the economy, the most important aspect of Thatcherism, that the conservatives have moved away from her ideals, in reality this is only a temporary situation. It is clear that the party still remains wedded to her principles.
submitted by BlackBeatles_ to 6thForm [link] [comments]


2024.05.12 23:37 YOLO_Divergence Empty Voting and Over Voting: A Potential Explanation for GameStop’s 52-Week Low around Record Date and current Price Movements

Empty Voting and Over Voting: A Potential Explanation for GameStop’s 52-Week Low around Record Date and current Price Movements

PREFACE

Hey everyone, first of all: I am no financial advisor, and this is absolutely not financial advice in any form.
I always thought I would have more time for my first DD, but in the light of current events I needed to quickly share some things with you that deserve more eyes.
While discussing the recent price action with someone (thanks to u/[REDACTED]), we recognized one thing regarding the record date, which seems to be connected to phantom shares and therefore FTDs. But to be clear, I am by far no expert on voting matters. So please feel free to peer-review and discuss!

TL;DR

Empty voting means that someone votes with borrowed shares, while over voting is caused by voting on loaned out shares or phantom shares. Both are connected to (naked) shorting (and therefore FTDs) as well as borrow fees.
I present a hypothesis on how a market maker could have flooded the market with phantom shares in advance of the record date so that institutions could buy them up and vote with them. Since most of them likely use the same clearing broker as most executing brokers of household investors, this could distort votes in favor of institutions.
This hypothesis is encouraged by…
  • Price action: GME reached its 52-week low around the record date. Since then, the price sharply increased.
  • FTDs: There were higher FTDs than usual between the end of March and mid-April (the second half of April has not yet been published).
  • Borrow Fees: Borrow fees decreased until the record date, after which they started to sharply increase again.

EMPTY VOTING AND OVER VOTING

“There is no one share, one vote” – Dr. Susanne Trimbath [Cf. [1], p. 102]
One share should equal one vote in an annual general meeting (AGM) or extraordinary general meeting (EGM), right? Well, may I introduce you to empty voting and over voting?
Empty voting refers to borrowing stock before the record date to vote these borrowed shares at the upcoming AGM or EGM [Cf. [2], p. 16]. This results in the borrower obtaining voting rights without the economic interest of a shareholder [Cf. [3], p. 58].
Over voting means that the proxy solicitor receives more votes from some (clearing-) brokers than they are entitled to vote [Cf. [4], p. 1]. When could this happen?
  • Your broker loans out your shares, while still enabling you to vote with all of them. Unless other customers of the same broker don’t vote their shares in return to even out your (over-)votes, over-voting occurs [Cf. [4], p. 1 et seq.].
For the "wrinkle brains" among us: Technically we are talking about the clearing broker (e.g. Apex Clearing) of your executing broker (e.g. Robinghood), as this entity holds the shares in “street name” at the Depository Trust Company (DTC) [Cf. [5], p. 118]. The DTC on the other hand is the record owner through its nominee, “Cede & Co.” [Cf. [3], p. 24]. This is also why “shares” is the technically incorrect term since you only have entitlements against your executing broker, who has entitlements against the clearing broker, who has entitlements against the DTC [Cf. [6], p. 49]. Moreover, in many cases, there are no individual shares loaned out, but instead, some shares from a fungible bulk (“omnibus account”), causing loans not to be attributed to specific clients [Cf. [1], p. 98].
  • You have a Failure-to-Receive (FTR) as the receiving end of a Failure-to-Deliver (FTD) in your brokerage account. Since the original share/entitlement (which could be another FTR!) has not been delivered yet, you and the current owner simultaneously claim ownership of the same share/entitlement [Cf. [7], p. 12]. This means you both could in fact vote on the same (real) share, as your broker won’t show you that you only have a phantom share [Cf. [8], p. 6]. Maybe the (executing) broker itself doesn’t even know what exactly is in your account since these shares are held in a fungible bulk with the clearing broker [Cf. [1], p. 97 et seq.].
For the wrinkle brains among us: Technically an FTR not only represents a marker for later delivery, but an entitlement to an entitlement, as you wouldn’t own real shares anyway. In this case, you shouldn’t have any voting rights, but with the issues presented, nobody can make this sure [Cf. [9], p. 345 et seqq.].

Let’s look at an example: 100 investors bought 1 “share” each through their executing broker (EB). The EB holds these 100 “shares” with its clearing broker (CB) in a fungible bulk. But only 60 of them got delivered, leaving 40 FTRs. So how do you attribute these to specific clients? Yeah, that’s a problem!
Phantom shares can not be attributed to an individual client

A SMALL EXCURSUS INTO OCCURRENCES OF OVER VOTING

When talking about known occurrences of over votings at AGMs, we have to look a few years back, as today such instances would likely not be made public.
Most recently, in 2018, the Securities Transfer Association (STA) conducted a study on over votings. Out of 183 shareholder meetings, over votings occurred in 134 instances. By the way: GameStop’s transfer agent Computershare is an STA member [Cf. [10], p. 3].
Excerpt from the STA [Cf. [10]]
This is an update to their 2005 study, where the STA found instances of (attempted) over voting in 341 out of 341 corporate contests [Cf. [11], p. 1].
Excerpt from the STA [Cf. [11]]
Around the same time, Bank of America (BofA) seems to have received 130 % of votes, as outlined by Dr. Susanne Trimbath [Cf. [12], p. 237]. Keep in mind that these are just the votes that showed up for the meeting and BofA is not some OTC-traded small-cap company.
I couldn’t find more sources on the BofA case, so if anyone here knows some further literature on it or some other cases of over voting that went public, please share them!

VOTE RECONCILIATION

As explained, we are unlikely to see over votings become public nowadays. The reason is the usage of so-called “reconciliation techniques”:
  • With a Pre-Reconciliation approach, your broker will not let you vote on shares that are not entitled to vote. If 69 out of your 420 shares are lent out, you can only vote your remaining 351 shares [Cf. [4], p. 2].
  • With Post-Reconciliation on the other hand, you are invited to vote all your shares before your broker ultimately adjusts them. Such adjustments could consist of throwing away votes from lent-out shares, normalizing based relative voting results, and more [Cf. [4], p. 2; [1], p. 100].
Let’s make an example: Your broker has 10 clients who hold 200 shares of GME each, resulting in 2000 shares of GME absolute. When all shares of 5 clients are lent out, in a pre-reconciliation approach 5 people get to vote 200 shares each, while the other 5 have no vote at all. In the case of post-reconciliation, the broker is likely to look at the results (like 1500 votes (75 %) for and 500 votes (25 %) against a proposal). The clients cast in 2000 votes, but as the broker only has 1000 shares left because of lending, 750 votes (75 % of 1000 shares) and 250 votes (25 % of 1000 shares) are reported to the proxy solicitor.
It seems like one proxy solicitor alone, Broadridge, tossed out 7 billion votes in 2022, as reported by themselves [Cf. [13], p. 1 et seqq.]. For more details on such matters, I recommend this interview with Dr. Susanne Trimbath: https://www.reddit.com/Superstonk/comments/16ngbel/dr_susanne_trimbath_broadridge_proxy_service/
https://preview.redd.it/u0rvqtvmc20d1.png?width=760&format=png&auto=webp&s=e06c4e16af4c3e3037f2ed17bad4f3b21112f989

THE (POTENTIAL) ROLE OF PHANTOM SHARES

Empty voting and over voting can go hand in hand:
  • Naked shorting (risk of over voting) should have an impact on borrow fees, as the demand for borrowable shares (risk of empty voting) changes. Because empirical studies so far only analyzed the impacts of FTDs on liquidity, price, spread, and volatility, we don’t have scientific evidence and thus this remains a hypothesis [Cf. [14], p. 493 et seqq.; [15], p. 15 et seqq.; [16], p. 1265 et seqq.].
  • A change in borrow fees (risk of empty voting) on the other hand seems to have an impact on FTDs (risk of over voting), with higher fees going along with higher FTDs [Cf. [17], p. 11 et seqq.; [18], p. 25 et seqq.].
Moreover, higher FTDs should go along with higher borrowing activities within the clearing and settlement system at DTCC. Such borrowing happens through securities financing transactions (SFTs), which explicitly aim to avoid naked shorts and FTDs [Cf. [19], p. 4]. This in itself could be a whole series of DD (and there are some great posts about it), which I may write at some point. But for now, just keep in mind that there can be lending transactions to hide naked shorts/FTDs.
https://preview.redd.it/ya625zrrc20d1.png?width=1240&format=png&auto=webp&s=1d370c913085ac7fb43b51659d5f5a4e7229b249
This is where it gets tricky. We now know that both, empty voting and over voting can skew voting results. And we know that their causes, borrowing transactions and (naked) shorting influence each other.
So how could this theoretically play out?
  1. The market maker creates phantom shares before record date
  2. Some institutions buy these shares and vote with them
  3. As they might share a clearing broker with the executing brokers of household investors, the relative proportion of votes foagainst changes [Cf. [3], p. 29]
  4. After voting, the market maker buys some phantom shares back to avoid too large changes in risk
Let’s look at two scenarios: In the first one, there are only 200 real shares without any phantom shares. Both executing brokers receive a 60 % participation. This results in 120 votes “against”.
Scenario 1 (only real shares)
The second scenario shows that the clearing broker has 200 real shares and 200 phantom shares. The executing brokers receive 60 % participation, the institution votes with 100 %. This results in 80 votes “against” and 120 votes “for”.
Scenario 2 (real shares + phantom shares)
Do you see how 120 votes “against” turned into 80 votes? This is caused by shares held in fungible bulks and applied proportional post-reconciliation.

ACCELERATION THROUGH DRS

With more and more direct registration, the relative portion of real shares to phantom shares per clearing broker becomes larger. The need to reconcile voting results thus becomes more urgent, making the votes at brokerages more vulnerable to the presented issues.
The next scenario shows that 100 real shares got transferred to the transfer agent, leaving the clearing broker with 100 real shares and 200 phantom shares. The executing brokers receive 60 % participation, the institution votes with 100 % of its shares. This results in 12 votes “against” and 77 votes “for”.
Scenario 3 (real shares + phantom shares + DRS)
You can see the following effects:
  • More DRS = phantom shares become less effective in distorting the votes (77 votes “for” in scenario 3 vs. 120 votes “for” in scenario 2)
  • Higher participation (regarding both, household investors and institutions) = proportion between “for” and “against” votes is less likely to become significantly distorted to one side

GAMESTOP’S RECORD DATE

Let us take a look at GameStop. We hypothesize that there should be an increase in (naked) shorts in advance of the record date. Our indicators could be the price action, FTDs, as well as changes in borrow fees. Please keep in mind that these are only indicators and no evidence. The charts depicted are also pure explanatory analyses without any statistical testing.
The record date for GameStop’s annual meeting was April 19, 2024 [Cf. [20], p. 1]

Price
  • The price reached its 52-week low within two weeks around the record date. As this date may not be known in advance, institutions could have made sure not to miss it by reaching the $10 a few days before.
  • Note that the chart does not display the full 52 weeks.
Source: TradingView
FTDs
  • FTDs were higher from the end of March to mid-April (the second half of April not yet published), coinciding with the sharper decline in price.
Source: SEC
Borrow Fee
  • Borrow fees as depicted here are volume-weighted average fees per day. I calculated them by looking at the volume of each reduction in borrowable shares and the corresponding borrowing fee.
Source: ChartExchange

THE PROPOSAL NUMBER 4

“Those investors who may sometimes borrow stock just to get votes in a proxy contest, may have different interests in an election’s outcome than a company’s long-term shareholders” – Carl Hagberg [Cf. [1], p. 100]
Why should institutions want to influence the vote? Proposal number 4 is striking in this context. Its first goal is to “(1) assess how well-suited individual director nominees are for GameStop in light of its long-term business strategy and risks, including the overall mix of director attributes and skills” [Cf. [20], p. 41].
This sounds strange. What if some board member is deemed unsuited? Well, this is up for speculation. The only thing sure in this context is that the voting results will be really interesting.

SOME FURTHER THOUGHTS AND LIMITATIONS

“Most of the time you don’t get overvotes because so many shareholders don’t vote” – Paul Schulman [Cf. [1], p. 103]
Voting is important. It belongs to the rights (and in my opinion also to the obligations) of investors to do so. But this is not financial advice.
Regarding limitations, this DD did not touch the topic of differences within shares held in street name. Here we could have e.g. Non-Objecting Beneficial Owners (NOBO), whose voting process would mirror the one for DRS holders (Cf. [10], p. 4).
Also not included are votes from ETFs and phantom ETFs. This subject in itself would deserve a whole DD series as it has its own line of academic papers.
Last but not least, this DD turned out more theoretical and hypothetic. In order to further explore the topic, statistical testing would be necessary.

SOURCES

[1] Drummond, Bob: Corporate Voting Charade, in: Bloomberg Markets, No. 4 (2006), p. 96 – 104
[2] Securities Finance Times: Empty voting: back in the spotlight?, in: Securities Finance Times, Issue 306 (2022), p. 16 – 20
[3] Donald, David C.: The Rise and Effects of the Indirect Holding System: How Corporate America Ceded its Shareholders to Intermediaries, Working Paper, Frankfurt: University of Frankfurt, 2007
[4] Katten Muchin Rosenman LLP: Proxy Vote Processing Issues: Over- Voting and Empty Voting, Chicago (IL) et al.: Katten Muchin Rosenman LLP, 2013
[5] Waters, Maxine, Green, Alexander N.: Game Stopped: How the Meme Stock Market Event Exposed Troubling Business Practices, Inadequate Risk Management, and the Need for Legislative and Regulatory Reform, Washington (DC): U.S. House Committee on Financial Services, 2022
[6] Culp, Christopher L., Heaton, John B.: The Economics of Naked Short Selling, in: Regulation, Vol. 31 (2008), No. 1, p. 46 – 51
[7] Trimbath, Susanne: Trade Settlement Failures in U.S. Bond Markets, Version 2, in: STP Working Paper Series, No. 2007/01 (2008), p. 1 – 37
[8] Finnerty, John D.: Short Selling, Death Spiral Convertibles, and the Profitability of Stock Manipulation, Working Paper, New York City (NY): Fordham University Graduate School of Business, 2005
[9] Putninš, Tālis J.: Naked short sales and fails-to-deliver: An overview of clearing and settlement procedures for stock trades in the USA, in: Journal of Securities Operations & Custody, Vol. 2 (2009/2010), No. 4, p. 340 – 350
[10] STA: Re: File Number 4-725, https://www.sec.gov/comments/4-725/4725-6501331-199628.pdf (12-03-2019)
[11] STA: Street Proxy Tabulation Results: Over-Voting Still Pervasive, in: STA Newsletter, Issue 4 (2005), p. 1 – 4
[12] Trimbath, Susanne: Naked, Short and Greedy – Wall Street’s Failure to Deliver, London: Spiramus, 2020
[13] Broadridge Financial Solutions, Inc.: 2022 Proxy Season Key Stats and Performance Ratings, https://www.broadridge.com/\_assets/pdf/broadridge-proxy-season-stats-2022.pdf (n.d.)
[14] Fotak, Veljko, Raman, Vikas, Yadav, Pradeep K.: Fails-to-deliver, short selling, and market quality, in: Journal of Financial Economics, Vol. 114 (2014), Issue 3, p. 493 – 516
[15] Breeze, Stephen, Cox, Justin, Griffith, Todd: Settling Down: T+2 Settlement Cycle and Liquidity, in: The Center for Growth and Opportunity Working Paper 2020.003 (2020), p. 1 – 21
[16] Baig, Ahmed, Breeze, Stephen, Cox, Justin, Griffith, Todd: Settling down: T+2 settlement cycle and liquidity, in: European Financial Management, Vol. 28 (2022), Issue 5, p. 1260 – 1282
[17] Boni, Leslie: Strategic delivery failures in U.S. equity markets, in: Journal of Financial Markets, Vol. 9 (2006), Issue 1, p. 1 – 26
[18] Stratmann, Thomas, Welborn, John W.: Informed Short Selling, Fails-to-Deliver, and Abnormal Returns, in: George Mason University Department of Economics Research Paper Series, No. 14-30 (2016), p. 1 – 61
[19] SEC: Notice of Filing of Proposed Rule Change to Establish the Securities Financing Transaction Clearing Service and Make Other Changes (Release No. 34-94694, File No. SR-NSCC-2022-003) from 04-12-2022
[20] GameStop Corp.: 2024 Proxy Statement, https://gamestop.gcs-web.com/static-files/1bb27488-56b6-4ec7-a863-b15cb7ea797f (04-30-2024)
submitted by YOLO_Divergence to householdinvestors [link] [comments]


2024.05.12 00:49 YOLO_Divergence Empty Voting and Over Voting: A Potential Explanation for GameStop’s 52-Week Low around Record Date and current Price Movements

Empty Voting and Over Voting: A Potential Explanation for GameStop’s 52-Week Low around Record Date and current Price Movements

PREFACE

Edit: Some of the pictures are difficult to see in dark mode because of the transparent background. Unfortunately, I can't change them... so light mode is recommended for this post.
Hey everyone, first of all: I am no financial advisor, and this is absolutely not financial advice in any form.
I always thought I would have more time for my first DD, but in the light of current events I needed to quickly share some things with you that deserve more eyes.
While discussing the recent price action with someone (thanks to u/[REDACTED]), we recognized one thing regarding the record date, which seems to be connected to phantom shares and therefore FTDs. But to be clear, I am by far no expert on voting matters. So please feel free to peer-review and discuss!

TL;DR

Empty voting means that someone votes with borrowed shares, while over voting is caused by voting on loaned out shares or phantom shares. Both are connected to naked shorting (and therefore FTDs) as well as borrow fees.
I present a hypothesis on how a market maker could have flooded the market with phantom shares in advance of the record date so that institutions could buy them up and vote with them. Since most of them likely use the same clearing broker as most executing brokers of household investors, this could distort votes in favor of institutions.
This hypothesis is encouraged by…
  • Price action: GME reached its 52-week low around the record date. Since then, the price sharply increased.
  • FTDs: There were higher FTDs than usual between the end of March and mid-April (the second half of April has not yet been published).
  • Borrow Fees: Borrow fees decreased until the record date, after which they started to sharply increase again.

EMPTY VOTING AND OVER VOTING

“There is no one share, one vote” – Dr. Susanne Trimbath [Cf. [1], p. 102]
One share should equal one vote in an annual general meeting (AGM) or extraordinary general meeting (EGM), right? Well, may I introduce you to empty voting and over voting?
Empty voting refers to borrowing stock before the record date to vote these borrowed shares at the upcoming AGM or EGM [Cf. [2], p. 16]. This results in the borrower obtaining voting rights without the economic interest of a shareholder [Cf. [3], p. 58].
Over voting means that the proxy solicitor receives more votes from some (clearing-) brokers than they are entitled to vote [Cf. [4], p. 1]. When could this happen?
  • Your broker loans out your shares, while still enabling you to vote with all of them. Unless other customers of the same broker don’t vote their shares in return to even out your (over-)votes, over-voting occurs [Cf. [4], p. 1 et seq.].
For the wrinkle brains among us: Technically we are talking about the clearing broker (e.g. Apex Clearing) of your executing broker (e.g. Robin_hood), as this entity holds the shares in “street name” at the Depository Trust Company (DTC) [Cf. [5], p. 118]. The DTC on the other hand is the record owner through its nominee, “Cede & Co.” [Cf. [3], p. 24]. This is also why “shares” is the technically incorrect term since you only have entitlements against your executing broker, who has entitlements against the clearing broker, who has entitlements against the DTC [Cf. [6], p. 49]. Moreover, in many cases, there are no individual shares loaned out, but instead, some shares from a fungible bulk (“omnibus account”), causing loans not to be attributed to specific clients [Cf. [1], p. 98].
  • You have a Failure-to-Receive (FTR) as the receiving end of a Failure-to-Deliver (FTD) in your brokerage account. Since the original share/entitlement (which could be another FTR!) has not been delivered yet, you and the current owner simultaneously claim ownership of the same share/entitlement [Cf. [7], p. 12]. This means you both could in fact vote on the same (real) share, as your broker won’t show you that you only have a phantom share [Cf. [8], p. 6]. Maybe the (executing) broker itself doesn’t even know what exactly is in your account since these shares are held in a fungible bulk with the clearing broker [Cf. [1], p. 97 et seq.].
For the wrinkle brains among us: Technically an FTR not only represents a marker for later delivery, but an entitlement to an entitlement, as you wouldn’t own real shares anyway. In this case, you shouldn’t have any voting rights, but with the issues presented, nobody can make this sure [Cf. [9], p. 345 et seqq.].
Let’s look at an example: 100 investors bought 1 “share” each through their executing broker (EB). The EB holds these 100 “shares” with its clearing broker (CB) in a fungible bulk. But only 60 of them got delivered, leaving 40 FTRs. So how do you attribute these to specific clients? Yeah, that’s a problem!
Phantom shares can not be attributed to an individual client

A SMALL EXCURSUS INTO OCCURRENCES OF OVER VOTING

When talking about known occurrences of over votings at AGMs, we have to look a few years back, as today such instances would likely not be made public.
Most recently, in 2018, the Securities Transfer Association (STA) conducted a study on over votings. Out of 183 shareholder meetings, over votings occurred in 134 instances. By the way: GameStop’s transfer agent Computershare is an STA member [Cf. [10], p. 3].
Excerpt from the STA [Cf. [10]]
This is an update to their 2005 study, where the STA found instances of (attempted) over voting in 341 out of 341 corporate contests [Cf. [11], p. 1].
Excerpt from the STA [Cf. [11]]
Around the same time, Bank of America (BofA) seems to have received 130 % of votes, as outlined by Dr. Susanne Trimbath [Cf. [12], p. 237]. Keep in mind that these are just the votes that showed up for the meeting and BofA is not some OTC-traded small-cap company.
I couldn’t find more sources on the BofA case, so if anyone here knows some further literature on it or some other cases of over voting that went public, please share them!

VOTE RECONCILIATION

As explained, we are unlikely to see over votings become public nowadays. The reason is the usage of so-called “reconciliation techniques”:
  • With a Pre-Reconciliation approach, your broker will not let you vote on shares that are not entitled to vote. If 69 out of your 420 shares are lent out, you can only vote your remaining 351 shares [Cf. [4], p. 2].
  • With Post-Reconciliation on the other hand, you are invited to vote all your shares before your broker ultimately adjusts them. Such adjustments could consist of throwing away votes from lent-out shares, normalizing based relative voting results, and more [Cf. [4], p. 2; [1], p. 100].
Let’s make an example: Your broker has 10 clients who hold 200 shares of GME each, resulting in 2000 shares of GME absolute. When all shares of 5 clients are lent out, in a pre-reconciliation approach 5 people get to vote 200 shares each, while the other 5 have no vote at all. In the case of post-reconciliation, the broker is likely to look at the results (like 1500 votes (75 %) for and 500 votes (25 %) against a proposal). The clients cast in 2000 votes, but as the broker only has 1000 shares left because of lending, 750 votes (75 % of 1000 shares) and 250 votes (25 % of 1000 shares) are reported to the proxy solicitor.
It seems like one proxy solicitor alone, Broadridge, tossed out 7 billion votes in 2022, as reported by themselves [Cf. [13], p. 1 et seqq.]. For more details on such matters, I recommend this interview with Dr. Susanne Trimbath: https://www.reddit.com/Superstonk/comments/16ngbel/dr_susanne_trimbath_broadridge_proxy_service/
https://preview.redd.it/glckj4abkvzc1.png?width=760&format=png&auto=webp&s=48f684661b82c862332263c983a6a19650e707d0

THE (POTENTIAL) ROLE OF PHANTOM SHARES

Empty voting and over voting can go hand in hand:
  • Naked shorting (risk of over voting) should have an impact on borrow fees, as the demand for borrowable shares (risk of empty voting) changes. Because empirical studies so far only analyzed the impacts of FTDs on liquidity, price, spread, and volatility, we don’t have scientific evidence and thus this remains a hypothesis [Cf. [14], p. 493 et seqq.; [15], p. 15 et seqq.; [16], p. 1265 et seqq.].
  • A change in borrow fees (risk of empty voting) on the other hand seems to have an impact on FTDs (risk of over voting), with higher fees going along with higher FTDs [Cf. [17], p. 11 et seqq.; [18], p. 25 et seqq.].
Moreover, higher FTDs should go along with higher borrowing activities within the clearing and settlement system at DTCC. Such borrowing happens through securities financing transactions (SFTs), which explicitly aim to avoid naked shorts and FTDs [Cf. [19], p. 4]. This in itself could be a whole series of DD (and there are some great posts about it), which I may write at some point. But for now, just keep in mind that there can be lending transactions to hide naked shorts/FTDs.
https://preview.redd.it/hgfpu73kkvzc1.png?width=1240&format=png&auto=webp&s=99c584059da8818d9df1bd85ef8317a0541527a7
This is where it gets tricky. We now know that both, empty voting and over voting can skew voting results. And we know that their causes, borrowing transactions and (naked) shorting influence each other.
So how could this theoretically play out?
  1. The market maker creates phantom shares before record date
  2. Some institutions buy these shares and vote with them
  3. As they might share a clearing broker with the executing brokers of household investors, the relative proportion of votes foagainst changes [Cf. [3], p. 29]
  4. After voting, the market maker buys some phantom shares back to avoid too large changes in risk
Let’s look at two scenarios: In the first one, there are only 200 real shares without any phantom shares. Both executing brokers receive a 60 % participation. This results in 120 votes “against”.
Scenario 1 (only real shares)
The second scenario shows that the clearing broker has 200 real shares and 200 phantom shares. The executing brokers receive 60 % participation, the institution votes with 100 %. This results in 80 votes “against” and 120 votes “for”.
Scenario 2 (real shares + phantom shares)
Do you see how 120 votes “against” turned into 80 votes? This is caused by shares held in fungible bulks and applied proportional post-reconciliation.

ACCELERATION THROUGH DRS

With more and more direct registration, the relative portion of real shares to phantom shares per clearing broker becomes larger. The need to reconcile voting results thus becomes more urgent, making the votes at brokerages more vulnerable to the presented issues.
The next scenario shows that 100 real shares got transferred to the transfer agent, leaving the clearing broker with 100 real shares and 200 phantom shares. The executing brokers receive 60 % participation, the institution votes with 100 % of its shares. This results in 12 votes “against” and 77 votes “for”.
Scenario 3 (real shares + phantom shares + DRS)
You can see the following effects:
  • More DRS = phantom shares become less effective in distorting the votes (77 votes “for” in scenario 3 vs. 120 votes “for” in scenario 2)
  • Higher participation (regarding both, household investors and institutions) = proportion between “for” and “against” votes is less likely to become significantly distorted to one side

GAMESTOP’S RECORD DATE

Let us take a look at GameStop. We hypothesize that there should be an increase in (naked) shorts in advance of the record date. Our indicators could be the price action, FTDs, as well as changes in borrow fees. Please keep in mind that these are only indicators and no evidence. The charts depicted are also pure explanatory analyses without any statistical testing.
The record date for GameStop’s annual meeting was April 19, 2024 [Cf. [20], p. 1]
Price
  • The price reached its 52-week low within two weeks around the record date. As this date may not be known in advance, institutions could have made sure not to miss it by reaching the $10 a few days before.
  • Note that the chart does not display the full 52 weeks.
Source: TradingView
FTDs
  • FTDs were higher from the end of March to mid-April (the second half of April not yet published), coinciding with the sharper decline in price.
Source: SEC
Borrow Fee
  • Borrow fees as depicted here are volume-weighted average fees per day. I calculated them by looking at the volume of each reduction in borrowable shares and the corresponding borrowing fee.
Source: ChartExchange

THE PROPOSAL NUMBER 4

“Those investors who may sometimes borrow stock just to get votes in a proxy contest, may have different interests in an election’s outcome than a company’s long-term shareholders” – Carl Hagberg [Cf. [1], p. 100]
Why should institutions want to influence the vote? Proposal number 4 is striking in this context. Its first goal is to “(1) assess how well-suited individual director nominees are for GameStop in light of its long-term business strategy and risks, including the overall mix of director attributes and skills” [Cf. [20], p. 41].
This sounds strange. What if some board member is deemed unsuited? Well, this is up for speculation. The only thing sure in this context is that the voting results will be really interesting.

SOME FURTHER THOUGHTS AND LIMITATIONS

“Most of the time you don’t get overvotes because so many shareholders don’t vote” – Paul Schulman [Cf. [1], p. 103]
Voting is important. It belongs to the rights (and in my opinion also to the obligations) of investors to do so. But this is not financial advice.
Regarding limitations, this DD did not touch the topic of differences within shares held in street name. Here we could have e.g. Non-Objecting Beneficial Owners (NOBO), whose voting process would mirror the one for DRS holders (Cf. [10], p. 4).
Also not included are votes from ETFs and phantom ETFs. This subject in itself would deserve a whole DD series as it has its own line of academic papers.
Last but not least, this DD turned out more theoretical and hypothetic. In order to further explore the topic, statistical testing would be necessary.

SOURCES

[1] Drummond, Bob: Corporate Voting Charade, in: Bloomberg Markets, No. 4 (2006), p. 96 – 104
[2] Securities Finance Times: Empty voting: back in the spotlight?, in: Securities Finance Times, Issue 306 (2022), p. 16 – 20
[3] Donald, David C.: The Rise and Effects of the Indirect Holding System: How Corporate America Ceded its Shareholders to Intermediaries, Working Paper, Frankfurt: University of Frankfurt, 2007
[4] Katten Muchin Rosenman LLP: Proxy Vote Processing Issues: Over- Voting and Empty Voting, Chicago (IL) et al.: Katten Muchin Rosenman LLP, 2013
[5] Waters, Maxine, Green, Alexander N.: Game Stopped: How the Meme Stock Market Event Exposed Troubling Business Practices, Inadequate Risk Management, and the Need for Legislative and Regulatory Reform, Washington (DC): U.S. House Committee on Financial Services, 2022
[6] Culp, Christopher L., Heaton, John B.: The Economics of Naked Short Selling, in: Regulation, Vol. 31 (2008), No. 1, p. 46 – 51
[7] Trimbath, Susanne: Trade Settlement Failures in U.S. Bond Markets, Version 2, in: STP Working Paper Series, No. 2007/01 (2008), p. 1 – 37
[8] Finnerty, John D.: Short Selling, Death Spiral Convertibles, and the Profitability of Stock Manipulation, Working Paper, New York City (NY): Fordham University Graduate School of Business, 2005
[9] Putninš, Tālis J.: Naked short sales and fails-to-deliver: An overview of clearing and settlement procedures for stock trades in the USA, in: Journal of Securities Operations & Custody, Vol. 2 (2009/2010), No. 4, p. 340 – 350
[10] STA: Re: File Number 4-725, https://www.sec.gov/comments/4-725/4725-6501331-199628.pdf (12-03-2019)
[11] STA: Street Proxy Tabulation Results: Over-Voting Still Pervasive, in: STA Newsletter, Issue 4 (2005), p. 1 – 4
[12] Trimbath, Susanne: Naked, Short and Greedy – Wall Street’s Failure to Deliver, London: Spiramus, 2020
[13] Broadridge Financial Solutions, Inc.: 2022 Proxy Season Key Stats and Performance Ratings, https://www.broadridge.com/\_assets/pdf/broadridge-proxy-season-stats-2022.pdf (n.d.)
[14] Fotak, Veljko, Raman, Vikas, Yadav, Pradeep K.: Fails-to-deliver, short selling, and market quality, in: Journal of Financial Economics, Vol. 114 (2014), Issue 3, p. 493 – 516
[15] Breeze, Stephen, Cox, Justin, Griffith, Todd: Settling Down: T+2 Settlement Cycle and Liquidity, in: The Center for Growth and Opportunity Working Paper 2020.003 (2020), p. 1 – 21
[16] Baig, Ahmed, Breeze, Stephen, Cox, Justin, Griffith, Todd: Settling down: T+2 settlement cycle and liquidity, in: European Financial Management, Vol. 28 (2022), Issue 5, p. 1260 – 1282
[17] Boni, Leslie: Strategic delivery failures in U.S. equity markets, in: Journal of Financial Markets, Vol. 9 (2006), Issue 1, p. 1 – 26
[18] Stratmann, Thomas, Welborn, John W.: Informed Short Selling, Fails-to-Deliver, and Abnormal Returns, in: George Mason University Department of Economics Research Paper Series, No. 14-30 (2016), p. 1 – 61
[19] SEC: Notice of Filing of Proposed Rule Change to Establish the Securities Financing Transaction Clearing Service and Make Other Changes (Release No. 34-94694, File No. SR-NSCC-2022-003) from 04-12-2022
[20] GameStop Corp.: 2024 Proxy Statement, https://gamestop.gcs-web.com/static-files/1bb27488-56b6-4ec7-a863-b15cb7ea797f (04-30-2024)
submitted by YOLO_Divergence to Superstonk [link] [comments]


2024.05.07 16:05 NevinEdwin How to create and Connect AWS Opensearch inside a vpc using lambda

Hi guys, I'm stucked in a requirement. That I have to create an Amazon Opensearch in a private manner using VPC and do queries using Lambda.
I tried to create an Opensearch which is inside a vpc and created a lambda which is also inside the vpc and try to access the elastic search. But I got timeout error always.
Please find a solution for this. I am using Cloudformation for this.

The template is:

AWSTemplateFormatVersion: "2010-09-09"
Transform: "AWS::Serverless-2016-10-31"
Description: "Hyphen CRM SAM Template For Elastic Search Demo"
Parameters:
StageName:
Type: String
Default: "dev"
AllowedValues:
Mappings:
ElasticSearchOptions:
dev:
InstanceType: t2.small.elasticsearch
InstanceCount: 2
MasterEnables: "false"
DedicatedMasterType: c5.large.elasticsearch
DedicatedMasterCount: 0
EBSVolumeSize: 10
EBSVolumeType: gp2
AvailabilityZoneCount: 2
ZoneAwarenessEnabled: "true"
Globals:
Function:
Runtime: nodejs20.x
Timeout: 900
Layers:
Resources:
CRMTrailApiGateway:
Type: AWS::Serverless::Api
Properties:
Name: crm-trail-api-end-point
StageName: !Ref StageName
Cors:
AllowMethods: '''GET,POST'''
AllowHeaders: '''Content-Type,X-Amz-Date,Authorization,X-Api-KeyContent-Type,X-Api-Key,X-Amz-Security-Token,X-Amz-User-Agent'''
AllowOrigin: '''*'''
CRMTrailSampleLayerEs:
Type: AWS::Serverless::LayerVersion
Properties:
ContentUri: ./lambdaLayerStack/nodejs.zip
LayerName: "es-sample-lambda-layer"
RetentionPolicy: Delete
CompatibleRuntimes:
Type: AWS::DynamoDB::Table
Properties:
TableName: testcrmEntitiesTable
AttributeDefinitions:
AttributeType: S
AttributeType: S
KeySchema:
KeyType: HASH
KeyType: RANGE
PointInTimeRecoverySpecification:
PointInTimeRecoveryEnabled: true
BillingMode: PAY_PER_REQUEST
StreamSpecification:
StreamViewType: "NEW_AND_OLD_IMAGES"
CRMTrailVPC:
Type: AWS::EC2::VPC
Properties:
CidrBlock: 10.0.0.0/24
EnableDnsSupport: true
EnableDnsHostnames: true
InstanceTenancy: default
CRMTrailSubnet1:
Type: AWS::EC2::Subnet
Properties:
VpcId: !Ref CRMTrailVPC
CidrBlock: 10.0.0.0/25
AvailabilityZone: !Select
Ref: "AWS::Region"
MapPublicIpOnLaunch: false
CRMTrailSubnet2:
Type: AWS::EC2::Subnet
Properties:
VpcId: !Ref CRMTrailVPC
CidrBlock: 10.0.0.128/25
AvailabilityZone: !Select
Ref: "AWS::Region"
MapPublicIpOnLaunch: false
CRMTrailIG:
Type: AWS::EC2::InternetGateway
Properties:
Tags:
Value: CRMTRAILIG
Value: CRMTRAIL
CRMTrailGatewayAttachment:
Type: AWS::EC2::VPCGatewayAttachment
Properties:
VpcId: !Ref CRMTrailVPC
InternetGatewayId: !Ref CRMTrailIG
CRMTrailVPCRouteTable:
Type: AWS::EC2::RouteTable
Properties:
VpcId: !Ref CRMTrailVPC
CRMTrailVPCRoute:
Type: AWS::EC2::Route
DependsOn: CRMTrailGatewayAttachment
Properties:
RouteTableId: !Ref CRMTrailVPCRouteTable
DestinationCidrBlock: 0.0.0.0/0
GatewayId: !Ref CRMTrailIG
CRMTrailVPCSubnetAssociation:
Type: AWS::EC2::SubnetRouteTableAssociation
Properties:
SubnetId: !Ref CRMTrailSubnet1
RouteTableId: !Ref CRMTrailVPCRouteTable
CRMTrailVPCSubnet2Association:
Type: AWS::EC2::SubnetRouteTableAssociation
Properties:
SubnetId: !Ref CRMTrailSubnet2
RouteTableId: !Ref CRMTrailVPCRouteTable
CRMTrailProxyLambdaSecurityGroup:
Type: AWS::EC2::SecurityGroup
Properties:
GroupDescription: Allows lambda for axcessing from outside vpc
VpcId: !Ref CRMTrailVPC
SecurityGroupEgress:
FromPort: 433
ToPort: 433
CidrIp: 0.0.0.0/0
SecurityGroupIngress:
FromPort: 433
ToPort: 433
CidrIp: 0.0.0.0/0
CRMTrailProxyLambdaRole:
Type: AWS::IAM::Role
Properties:
AssumeRolePolicyDocument:
Version: 2012-10-17
Statement:
Principal:
Service: lambda.amazonaws.com
Action: sts:AssumeRole
Path: /
Policies:
PolicyDocument:
Version: 2012-10-17
Statement:
Action:
Resource: "*"
Action:
Resource:
Action:
Resource: !GetAtt CRMTrailTestEntitiesTable.StreamArn
Action:
Resource: "arn:aws:logs:*:*:*"
CRMTrailDbStreamLambda:
Type: AWS::Serverless::Function
Properties:
FunctionName: crm-trail-dbStream-function
Handler: dynamoStream.main
CodeUri: dynamoStream
Role: !GetAtt CRMTrailProxyLambdaRole.Arn
VpcConfig:
SecurityGroupIds:
SubnetIds:
Events:
DBStream:
Type: DynamoDB
Properties:
Stream: !GetAtt CRMTrailTestEntitiesTable.StreamArn
StartingPosition: LATEST
BatchSize: 1
DBWarmUpRule:
Type: Schedule
Properties:
Schedule: rate(5 minutes)
CRMTrailProxyLambda:
Type: AWS::Serverless::Function
Properties:
FunctionName: crm-trail-proxylambda-function
Handler: elastic.main
CodeUri: elastic
Role: !GetAtt CRMTrailProxyLambdaRole.Arn
Environment:
Variables:
ES_ENDPOINT: !GetAtt CRMTrailElasticSearchDomainCRMSource.DomainEndpoint
VpcConfig:
SecurityGroupIds:
SubnetIds:
Events:
ApiTrigger:
Type: Api
Properties:
Method: POST
Path: /elastic
RestApiId: !Ref CRMTrailApiGateway
ProxyWarmUpRule:
Type: Schedule
Properties:
Schedule: rate(5 minutes)
CRMTrailElasticRole:
Type: "AWS::IAM::Role"
Properties:
AssumeRolePolicyDocument:
Version: "2012-10-17"
Statement:
Principal:
Service: "lambda.amazonaws.com"
Action: "sts:AssumeRole"
Path: "/"
Policies:
PolicyDocument:
Version: "2012-10-17"
Statement:
Action:
Resource: "arn:aws:logs:*:*:*"
Action:
Resource: !GetAtt CRMTrailTestEntitiesTable.StreamArn
Action:
Resource:
Type: AWS::IAM::ServiceLinkedRole
Properties:
AWSServiceName: es.amazonaws.com
Description: Service-linked role for Amazon OpenSearch Service
CRMTrailElasticSecurityGroups:
Type: AWS::EC2::SecurityGroup
Properties:
GroupDescription: Allow elastic Access from proxy lambda
VpcId: !Ref CRMTrailVPC
SecurityGroupIngress:
FromPort: 443
ToPort: 443
SourceSecurityGroupId: !Ref CRMTrailProxyLambdaSecurityGroup
FromPort: 443
ToPort: 443
CidrIp: 49.37.232.111/32
CRMTrailElasticSearchDomainCRMSource:
Type: AWS::Elasticsearch::Domain
Properties:
DomainName: crm-demo-source
ElasticsearchClusterConfig:
InstanceType: !FindInMap [ElasticSearchOptions, !Ref StageName, InstanceType]
InstanceCount: !FindInMap [ElasticSearchOptions, !Ref StageName, InstanceCount]
DedicatedMasterEnabled: "false"
DedicatedMasterType: !Ref AWS::NoValue
DedicatedMasterCount: !Ref AWS::NoValue
ZoneAwarenessConfig:
AvailabilityZoneCount: 2
ZoneAwarenessEnabled: "true"
EBSOptions:
EBSEnabled: true
Iops: 0
VolumeSize: 10
VolumeType: gp2
AccessPolicies:
Version: "2012-10-17"
Statement:
Principal:
AWS: !GetAtt CRMTrailElasticRole.Arn
Action: "es:*"
Resource: "*"
AdvancedOptions:
indices.fielddata.cache.size: ""
rest.action.multi.allow_explicit_index: "true"
ElasticsearchVersion: "6.8"
VPCOptions:
SecurityGroupIds:
SubnetIds:
Type: AWS::EC2::VPCEndpoint
Properties:
ServiceName: !GetAtt CRMTrailElasticSearchDomainCRMSource.Arn
VpcId: !Ref CRMTrailVPC
VpcEndpointType: Interface
PrivateDnsEnabled: true
SecurityGroupIds:
SubnetIds:
Type: AWS::IAM::Role
Properties:
AssumeRolePolicyDocument:
Version: 2012-10-17
Statement:
Principal:
Service: lambda.amazonaws.com
Action: sts:AssumeRole
Path: /
Policies:
PolicyDocument:
Version: 2012-10-17
Statement:
Action:
Resource: "arn:aws:lambda:*:*:function:*"
CRMTrailTestLambda:
Type: AWS::Serverless::Function
Properties:
Handler: crmtrail.main
CodeUri: crmtrail
MemorySize: 512
Timeout: 900
FunctionName: crm-trail-es-test
Environment:
Variables:
ELASTIC_LAMBDA_ARN: !GetAtt CRMTrailProxyLambda.Arn
Role: !GetAtt CRMTrailTestLambdaRole.Arn
Events:
ApiTrigger:
Type: Api
Properties:
Method: GET
RestApiId: !Ref CRMTrailApiGateway
Path: /test
Outputs:
ApiGatewayOutPut:
Description: "Api gateway URL"
Value: !Sub "https://${CRMTrailApiGateway}.execute-api.${AWS::Region}.amazonaws.com/${StageName}"
ElasticSearchDomain:
Description: "Domain name"
Value: !Ref CRMTrailElasticSearchDomainCRMSource
ElasticsearchDomainARN:
Description: "ElasticsearchDomainARN"
Value: !GetAtt CRMTrailElasticSearchDomainCRMSource.Arn
ElasticDomainARN:
Description: "ElasticDomainARN"
Value: !GetAtt CRMTrailElasticSearchDomainCRMSource.DomainArn
ElasticsearchDomainEndpoint:
Description: "ElasticsearchDomainEndpoint"
Value: !GetAtt CRMTrailElasticSearchDomainCRMSource.DomainEndpoint
And the Lambda for access the open search is
import AWS from 'aws-sdk'
import path from "path"
const { ES_ENDPOINT } = process.env;
const endpoint = new AWS.Endpoint(ES_ENDPOINT);
const httpsClient = new AWS.NodeHttpClient();
const credentials = new AWS.EnvironmentCredentials("AWS");
const esDomain = {
index: "sampleindex",
doctype: "_doc"
};
export function main(event) {
console.log(`event: ${JSON.stringify(event)}`);
const {
httpMethod,
requestPath,
payload,
isGlobal
} = JSON.parse(event.body);
const request = new AWS.HttpRequest(endpoint);
request.method = httpMethod;
request.path = !isGlobal ? path.join("/", esDomain.index, esDomain.doctype) : "";
console.log(`PAth: ${JSON.stringify(request.path)}, ${requestPath}`);
request.path += requestPath;
console.log(`Paath: ${JSON.stringify(request.path)}`);
request.region = "us-west-2";
request.body = JSON.stringify(payload);
request.headers["presigned-expires"] = false;
request.headers["Content-Type"] = "application/json";
request.headers.Host = endpoint.host;
console.log(`request: ${JSON.stringify(request)}`);
const signer = new AWS.Signers.V4(request, "es");
signer.addAuthorization(credentials, new Date());
console.log(`signer: ${JSON.stringify(signer)}`);
return new Promise((resolve, reject) => {
httpsClient.handleRequest(
request,
null,
(response) => {
const { statusCode, statusMessage, headers } = response;
let body = "";
response.on("data", (chunk) => {
body += chunk;
});
response.on("end", () => {
const data = {
statusCode,
statusMessage,
headers
};
/** debug */
console.log('body===>', body);
/** debug */
if (body)
data.body = httpMethod !== "GET" ? JSON.parse(body) : body;
resolve(data);
})
},
(err) => reject({err})
);
})
};
submitted by NevinEdwin to aws [link] [comments]


2024.05.06 22:44 Empty_Revolution6944 Problemas de desempenho ao jogar no Linux e travamentos

Olá gente, veio nesse ano agora migrado do windows para linux. Antes utilizava como acho que a maioria faz dual boot, no meu caso no meu notebook fraco da semp Toshiba da AMD radeon graphics 8210, E1-2100 de 4 ram.
Uma breve contextualização Onde tinha windows 8.1, que no meu caso funcionava melhor do que windows 10. Então ficava no 8.1, utilizando aqueles programas pra ativar o Windows, por isso eu não sentia segurança meio que tava na beira e podia acontecer algo. Mas eu consegui jogar alguns jogos, de 2000 a 2010 nesse caso, alguns nem tanto. Mas Gta San Andreas, Portal 1 e 2, Saint Row(No médio), não lembro agora mas é entre 2 ou 3, Fallout 3 e New Vegas, Katana Zero, por incrível que parece Assassin's Creed Rogue.
Mas tenham noção que edição de vídeo não. Teve uma vez que eu consegui fazer um sempre(Graça ao tipo no caso que video legenda de música mas dando uns gargalo com a proxy da proxy no shotcut).
E nesse tempo eu usava dual boot com linux mint na época que eu brincava de front end, nisso com tempo deu um pau no grub e não consegui mais acessar o windows, só consegui acessar a partição pelo o mint. Então me habituei ao linux pra não ter que perder as coisas. Com isso eu queria mexer em alguns programas do Linux e um deles era oq eu estudava com uma menina que eu tava afim que era astrologia védica, jannatha hora que só tem windows, fui usar o playonlinux e funcionou. Só aí eu queria usar pelo menos um katana zero, com isso tentei baixar e usar tanto playonlinux e lutris mas não funcionou direito. E nesse tempo o mint começou a dar pau. E nisso fui testar outras distros mas o debian deu pau no grub e travava, testei pop-os mas não era compatível com meu note pois não era tão superior pra a distro, testei manjaro, fedora mas não pegaram, zorin travava demais, aí testei xubuntu, lubuntu, puppy mas pra mim estava com o desempenho inferior do mint, pois dava bastante gargalos e a tela escurecia. Com isso achei alguns vídeos e achei o EndeavourOS que é em base Arch linux e foi o que teve mais desempenho em assistir as coisas e programas funcionarem no playlinux. Consegui de certa forma jogar portal 2 da steam nele, no médium, com cuidado pra não ter nada aberto se não travava tudo e eu não conseguia sair da tela e ia que desligar no botão do notebook.
Com isso com passar do tempo as vezes travava o sistema ao ponto não conseguir nem abrir terminal pra fazer comando xkill e apertar no programa pra mata-lo.
No windows vc vai clicando o mouse no programa travado e aí o windows por si fecha ele pra vc ou pede vc fechar ou não. Tem algo tipo socorro no linux quando o sistema trava tudo? Um comando ou alguma coisa quando trava? Do que vi no EndeavourOS alt-4 fecha o programa. Mas não sei oq fazer quando o sistema trava, pois passou um tempo travava muito e eu desligava no botão do note e deu que o sistema trava por si só depois de um tempo. Aí testei Drauger OS, mas tinha menos desempenho do que EndeavourOS, aí voltei de novo e reinstalei e ficou tudo ok.
Mas aí eu testei todos os protons pois eu consegui comprar o fallout 3 e new vegas na steam na promoção, mas só o Proton 4.2 que teve um desempenho bom na tela de menu pois não travava tanto. Mas na gameplay era 10, 9 fps.
Com isso eu fiquei curioso em vir aqui comentar sobre isso na época, mas fiquei tão curioso que instalei o Windows 10, linux mint e DraugerOs de novo só para testar desempenho desses jogos mas deu a mesma coisa deu no Endereço, e testei no Windows os fallout e todos eles pegaram numa boa, liso, diferente do EndeavourOS e dos linux que testei (Drauger, linux mint).
Afinal há algo que se pode fazer pra ter mais desempenho no sistema, nos jogos no linux?
Pois do que vejo acho realmente vou deixar um dual boot do EndeavourOS e Windows seja 8.1 ou 10(Senti um desempenho melhor agora na última versão)
Ps: O único jogo que roda de boas no linux pra mim é portal 2, no baixo e lisinho é Doki Doki
submitted by Empty_Revolution6944 to linuxbrasil [link] [comments]


2024.05.01 18:22 NolanLover Every known actor who appeared in at least 2 movies directed by the Coen brothers from most to least movies


Actor Blood Simple (1984) Raising Arizona (1987) Miller's Crossing (1990) Barton Fink (1991) The Hudsucker Proxy (1994) Fargo (1996) The Big Lebowski (1998) O Brother, Where Art Thou? (2000) The Man Who Wasn't There (2001) Intorlerable Cruelty (2003) The Lady Killers (2004) No Country for Old Men (2007) Burn After Reading (2008) A Serious Man (2009) True Grit (2010) Inside Llewyn Davis (2013) Hail, Caesar! (2016) The Ballad of Buster Scruggs (2018) The Tragedy of Macbeth (2021) Drive-Away Dolls (2024) Total movies
Frances McDormand X X X X X X X X X 9
John Goodman X X X X X X 6
Steve Buscemi X X X X X 5
John Polito X X X X X 5
Stephern Root X X X X X 5
John Turturro X X X X 4
George Clooney X X X X 4
Holly Hunter X X X 3
Michael Badaluco X X X 3
Bruce Campbell X X X 3
Richard Jenins X X X 3
J.K. Simmons X X X 3
Josh Brolin X X X 3
M. Emmett Walsh X X 2
Peter Stormare X X 2
Charles Durning X X 2
Tony Shalhoub X X 2
Billy Bob Thorton X X 2
Michael Lerner X X 2
Jeff Bridges X X 2
Tilda Swinton X X 2
Clancy Brown X X 2
Brendan Gleeson X X 2
Harry Melling X X 2
Ralph Ineson X X 2
Matt Damon X X 2

submitted by NolanLover to CoenBrothers [link] [comments]


2024.04.17 22:15 Pathfinder0201 I work for a Member of Congress and feel stuck in my job.

I posted this in jobs, too, but haven't received any input. I'll do my best to not write a novel but I apologize in advance is this TLDR. I've dedicated my life to public service and don't know how to progress from where I am to working in Public Policy. Identifying, analyzing, and advocating for policy amendments, abolishment, and implementation to better protect the American people's interests is my greatest ambition. My Member doesn't have any openings to become a Legislative Assistant, and honestly after seeing how many Members' offices treat their staff, especially those on the Green & Gold Congressional Aide Program (which gave me the opportunity to be where I am today), I have no interest in working for another Member. There's a common misconception that your Member directly assists you with federal agency issues. 99.9% of the time the Member is not involved in federal agency issues regarding their constituents and they are intentionally not apprised of their constituents issues yet they represent them (I call this intentional naivety). Instead, a Staffer, such as myself, advocates on your behalf to federal agency Congressional Liaisons. My Member's office assigns casework based off counties, which differs from majority of other Member offices who assign casework based on portfolios (i.e., a Staffer [usually a veteran, in this case] being assigned all VA and DOD issues for their entire District). My office assigns casework based on counties so our constituents have a face they can recognize for all federal agency issues in their area. This has exposed me to many federal agency policy issues where fixes would be rather simple if my Member was open to hearing ideas on fixing these issues. Since I am not a Legislative Assistant and casework, as horrible as this sounds, is out of sight/out of mind to my Member, the issues that constituents reach out to our office for and that a Staffer, not the Member, assists with, are resolved solely for the constituent but the issue isn't resolved for every constituent that has the same issue because there is no further push from my office for change.
In my opinion, the goal for any person in public policy is to work themselves out of their job. If something is working, don't fix it. Congress has been legislating since 1774, which means policies have been changing for over two and a half centuries. The purpose of making or changing policy should be to ensure no further changes to the policy(s) are ever needed again. This clearly hasn't happened, which means the work of Congress hasn't been working effectively. I'm here to do whatever I can to fix that, as every American should expect from their Representatives, but I am not a Representative. I hope to someday be a Representative who genuinely is one of the People and is for the People, but in the mean time I long for experience in Public Policy. Just in the almost two years of this line of work that I have been exposed to I've made note of 134 Public Policy issues, on a national/federal scale, that I believe any reasonable person would consider to be in need of rectifying and/or implementation. A few examples are:
1) Servicemembers who have children enrolled at one DOD school should be allowed to have their children remain enrolled if servicemembers execute orders to another installation within liberty limit radius, especially when the military installation does not have a DOD school where the orders are for. 2) Remote government jobs acclimated for those who are disabled (which will not affect every disabled person as there are disabled people who physically/mentally cannot work under any circumstance) to decrease SSDI spendature and to receive revenue from taxes from those working remote jobs that weren't working previously. Tax payer dollars are used to fund SSDI, but those who are unemployed do not have wage stubs for taxes to be collected from, resulting in the government (and, in turn, the People) being double-hit, essentially. 3) Do away with proxy voting indefinitely. Representatives need to represent. 4) Ban prescription drug commercials. Commercials can be misleading and elderly targeting. Only medical professionals, not paid actors, should be recommending prescription drugs to the People. They are prescription drugs because they need to be prescribed, otherwise they would be optional drugs. Commercials advertise their own products in attempt to have people favor choosing their product over others. Not all prescription drugs can be chosen by the public to be prescribed. These commercials can provide false hope to people that they can receive a prescription drug when their health care provider, who makes educated medical decisions in the best interest of people, makes the ultimate decision. 5) If a branch of service fails to provide a servicemember their DD-214 on their date of separation/start date of terminal leave, the servicemember will continue to receive their status pay (active duty/reserve) and have no obligation to pay those funds back after finally receiving their DD-214. It is the branch of service's responsibility to provide servicemembers with their DD-214s and servicemembers deserve financial means to get by during the time frame they do not have their DD-214 once they separate from a service since they are unable to show proof of service when applying for jobs and can't receive unemployment benefits without their DD-214.
I don't care about credit for my ideas. I just want to give voice to those who don't know what the next step is to get out of their figurative hole. I realize the "hole" I'm in regarding feeling stuck in my job is nothing in comparison to other issues, but I'm hoping someone here might have some insight. Since January, I've applied to over 40 jobs on USAJobs regarding Policy to no avail. Per my wife's advice, just yesterday I started taking off my High School graduation date on my resumes in attempts to not have hiring managers disregard my applications solely because I graduated in 2010 and may be perceived as too young for certain positions regardless of experience.
submitted by Pathfinder0201 to PublicPolicy [link] [comments]


2024.04.17 18:57 Pathfinder0201 I work for a Member of Congress and I feel stuck in my job.

I'll do my best to not write a novel but I apologize in advance is this TLDR. I've dedicated my life to public service and don't know how to progress from where I am to working in Public Policy. Identifying, analyzing, and advocating for policy amendments, abolishment, and implementation to better protect the American people's interests is my greatest ambition. To protect the American people, I served just over six years in the USMC as an Unmanned Aerial Vehicle (UAV) Operator and a Marine Security Guard (MSG) (Embassy) at U.S. Embassies Tunis, Tirana, and San Salvador. I had a TS-SCI eligible clearance to be a MSG. After separating honorably from the USMC, to provide a safety net for those in need I worked at the Dept. of Human Services as a Human Services Specialist processing Medicaid intakes. To advocate for the American people, I became a District StaffeConstituent Services Representative for a Member of Congress. June will be two years since I've held this position. I also graduated Magna Cum Laude from American Military Univserity with a Bachelor of Arts in Political Science while in this position, which was no easy feat to be modest with my schedule. I'm not saying all of this to brag, rather to give context on my experiences and to ask advice on how to gain the opportunity to work in Public Policy (the dream is to work on National Public Policy someday). My Member doesn't have any openings to become a Legislative Assistant, and honestly after seeing how many Members' offices treat their staff, especially those on the Green & Gold Congressional Aide Program (which gave me the opportunity to be where I am today), I have no interest in working for another Member. There's a common misconception that your Member directly assists you with federal agency issues. 99.9% of the time the Member is not involved in federal agency issues regarding their constituents and they are intentionally not apprised of their constituents issues yet they represent them (I call this intentional naivety). Instead, a Staffer, such as myself, advocates on your behalf to federal agency Congressional Liaisons. My Member's office assigns casework based off counties, which differs from majority of other Member offices who assign casework based on portfolios (i.e., a Staffer [usually a veteran, in this case] being assigned all VA and DOD issues for their entire District). My office assigns casework based on counties so our constituents have a face they can recognize for all federal agency issues in their area. This has exposed me to many federal agency policy issues where fixes would be rather simple if my Member was open to hearing ideas on fixing these issues. Since I am not a Legislative Assistant and casework, as horrible as this sounds, is out of sight/out of mind to my Member, the issues that constituents reach out to our office for and that a Staffer, not the Member, assists with, are resolved solely for the constituent but the issue isn't resolved for every constituent that has the same issue because there is no further push from my office for change.
In my opinion, the goal for any person in public policy is to work themselves out of their job. If something is working, don't fix it. Congress has been legislating since 1774, which means policies have been changing for over two and a half centuries. The purpose of making or changing policy should be to ensure no further changes to the policy(s) are ever needed again. This clearly hasn't happened, which means the work of Congress hasn't been working effectively. I'm here to do whatever I can to fix that, as every American should expect from their Representatives, but I am not a Representative. I hope to someday be a Representative who genuinely is one of the People and is for the People, but in the mean time I long for experience in Public Policy. Just in the almost two years of this line of work that I have been exposed to I've made note of 134 Public Policy issues, on a national/federal scale, that I believe any reasonable person would consider to be in need of rectifying and/or implementation. A few examples are:
1) Servicemembers who have children enrolled at one DOD school should be allowed to have their children remain enrolled if servicemembers execute orders to another installation within liberty limit radius, especially when the military installation does not have a DOD school where the orders are for. 2) Remote government jobs acclimated for those who are disabled (which will not affect every disabled person as there are disabled people who physically/mentally cannot work under any circumstance) to decrease SSDI spendature and to receive revenue from taxes from those working remote jobs that weren't working previously. Tax payer dollars are used to fund SSDI, but those who are unemployed do not have wage stubs for taxes to be collected from, resulting in the government (and, in turn, the People) being double-hit, essentially. 3) Do away with proxy voting indefinitely. Representatives need to represent. 4) Ban prescription drug commercials. Commercials can be misleading and elderly targeting. Only medical professionals, not paid actors, should be recommending prescription drugs to the People. They are prescription drugs because they need to be prescribed, otherwise they would be optional drugs. Commercials advertise their own products in attempt to have people favor choosing their product over others. Not all prescription drugs can be chosen by the public to be prescribed. These commercials can provide false hope to people that they can receive a prescription drug when their health care provider, who makes educated medical decisions in the best interest of people, makes the ultimate decision. 5) If a branch of service fails to provide a servicemember their DD-214 on their date of separation/start date of terminal leave, the servicemember will continue to receive their status pay (active duty/reserve) and have no obligation to pay those funds back after finally receiving their DD-214. It is the branch of service's responsibility to provide servicemembers with their DD-214s and servicemembers deserve financial means to get by during the time frame they do not have their DD-214 once they separate from a service since they are unable to show proof of service when applying for jobs and can't receive unemployment benefits without their DD-214.
I don't care about credit for my ideas. I just want to give voice to those who don't know what the next step is to get out of their figurative hole. I realize the "hole" I'm in regarding feeling stuck in my job is nothing in comparison to other issues, but I'm hoping someone here might have some insight. Since January, I've applied to over 40 jobs on USAJobs regarding Policy to no avail. Per my wife's advice, just yesterday I started taking off my High School graduation date on my resumes in attempts to not have hiring managers disregard my applications solely because I graduated in 2010 and may be perceived as too young for certain positions regardless of experience.
submitted by Pathfinder0201 to jobs [link] [comments]


2024.04.17 18:21 Public_Finance_Guy Does Paying Tithing Break the Poverty Cycle? New Economics Paper

Hi Everyone,
I know most of the research shared on this subreddit tends to be from historians or religious scholars, but I wanted to share my new research that tests whether paying tithing improves economic well-being and reduces poverty. As a PhD student studying Public Finance, I've always been interested in the financial administration of the church, especially after learning about Ensign Peak. In my paper, I approach tithing as an anti-poverty program analogous to a government program.
RMN and other church leaders have taught over and over that paying tithing can break the cycle of poverty. To test this promise, I looked at the relationship between Mormon temples and county-level poverty rates in the U.S. from 2010-2018, using temple locations as a proxy for high levels of tithing participation. This is because members must be full tithe-payers to enter temples, and the church historically considered local tithing obedience when deciding where to build temples (at least they did before RMN). Temples should represent a critical mass of full-tithe payers, producing lower levels of poverty, all else constant.
While this method isn't explicitly testing how tithing payments influence the incidence of poverty, actual tithing data is locked down tight by the Church and unavailable to use. But by controlling for other relevant factors in the analysis I can make a strong argument that it is a decent way of doing things.
I ran several tests using different methods, but found no statistically significant effect between the presence of temples and poverty rates. As far as I know, the Church doesn't provide a clear mechanism for how poverty reduction is supposed to happen after paying tithing, and based on estimates, it looks like the Church hasn't put a lot of effort into targeted anti-poverty measures at the local level with tithing funds. However, the church absolutely has the power to fulfill this promise by administering the tithing program more effectively at the local level, especially considering the vast resources it has accumulated at Ensign Peak.
According to the Widow's Mite report, only about 6% of annual tithing revenues are returned to wards and stakes, while approximately 15% is deposited into the church's investment fund at Ensign Peak. The Church currently has a clear preference to save rather than spend to benefit the poor. Given the size of this fund, the church could allocate much more money to local units, who better understand the needs of their members and can more effectively address poverty in their communities in targeted ways.
The highly centralized and non-transparent nature of the church's finances makes it challenging to determine how tithing funds are being used and whether they are effectively addressing poverty, though estimates by the Widow's Mite show they probably are not doing it well. As a member and researcher, I think we have a duty to critically examine the church's teachings and practices, especially when they impact members' well-being. Taking 10% of someone's income without following through with your end of the bargain is a big deal! While this research doesn't negate the potential spiritual blessings of tithing or the importance of faith, it highlights the need for the church to align its financial practices with its doctrinal promises.
To better fulfill its promise of reducing poverty through tithing, the church should consider decentralizing its financial decision-making, allocating more tithing funds to local units, and using its investment fund to directly support poverty alleviation efforts. Increased financial transparency would allow members to understand how their tithes are being used and hold the church accountable, fostering trust and ensuring that funds are used consistent with Jesus Christ's teachings.
Let me know what you think about this study! The Church has SO MUCH MONEY and they could be doing so many good things with it! If you're interested in reading the full paper, you can find it here.
submitted by Public_Finance_Guy to exmormon [link] [comments]


2024.04.16 04:26 Hot-Adeptness421 Total Individual Control Technology (Part 3)

- Technological mind tricks of many types supporting of psychological operations via black project technology (Mandela effect psyops, time travel psyops, synthetic optics based psyops, powerful mind control)
- Invisible black project technology under an inter dimensional being / disembodied spirit cover story
- Black ops remote influencing tech used to create notions like ethereal implants and their removal to keep opposition in a continual loop of fruitless action
- More fruitless paths: use of notions like fighting in a synthetically produced tech based VR “astral realm” will help humanity defeat evil (e.g. Cameron Day)
- New age disinformation & many new age cover stories have been modeled after derivatives of black project science capabilities
- New Age Telepathic Impersonations: ascended masters, Ashtar, demons, jinn, shadow beings, RA, archangels, Jesus, holy spirit, God/Source, Gaia, extraterrestrials, inter dimensional Beings, Blue Avians, Pleiadians, reptilians, etc
- Directed energy weapon environmental manipulation with a “jinn” interaction cover story
- Artificial intelligence + electromagnetic weaponry engineered synchronicities
- New age mind control assets are rewarded by the electronic control grid (What I have called the dark law of attraction)
- “New Age Psychological Operations are successful societal engineering attempts in that which a supernatural spiritual ability is central to the belief system. I believe a reason the black ops sources chose this flavor of psyop is it enables a supreme vulnerability to remote influencing technologies. Implanted v2k thoughts can be psychic ESP… end game virtual reality cognitions can be remote viewing. Synthetic dreams can be astral projection. Electronic harassment can be ‘ascension symptoms’ or ‘psychic attacks’. Mind Control can be spirit possession or higher self. I believe all of these cover stories were engineered to be popular for their providing remote influence ease and concealment.[5]” ~Omnisense
“In the era of new age psychological operations there is an emphasis on controlled opposition in alt media. I have learned remote influencing technologies are rampant in the modern day turning targets into mind control asset false messiahs of sorts. It doesn’t end there. This conspiracy also involves covertly engineered events with remote technologies to persuade into the belief system. After a few decades of constant societal digestion of mind control assets, and constant mind control programs aimed at persuading into the belief system, we have an engineered mass delusion of decently big proportions.[9]” ~Omnisense
“New age cover stories exist for literally all black ops technology abilities.[10]” ~Omnisense
“The New Age Belief System was engineered to be more bright and exotic than the truth, this creates a situation where if a fully programmed new ager was ever to stumble upon a good picture of the truth, it would seem underwhelming, ridiculous, or even like a psyop.” ~Omnisense
Read More on Social Engineering: Psychological Operations Blueprint
New Hi-Tech Generation of COINTELPRO

In a Nutshell: Government sources are using directed energy weapons and artificial intelligence to terrorize, threaten, intimidate, discredit, silence, torture, and murder dissidents. In addition, security contractors (among others) are being hired as military thugs to gangstalk targets[19].

Zerzetsen: “Inflicting as much pain and suffering as possible without leaving any marks.[20]”
Directed energy weapon programs revolutionized this…
Counter-proliferation programs are intended to subvert the potentials of a target while punishing them with psycho-sadist techniques. The perversions of cointelpro are notable. The murderous and sadistic ethos of government counter-proliferation programs echos that of the Nazis and this perpetrator network of war criminals are committing sickening acts upon the global population.

Modern Day COINTELPRO Objectives:
These are counter-proliferation centered programs intended to subvert all progress --
- To discredit the target / To character assassinate / To slander the target
- To taint the target’s image / To misrepresent the target
- To suppress the target’s monetary success
- To suppress the target’s good character qualities or people’s awareness of positive aspects of the target
- To arrange a partner for the target or mind control the partner of the target
- To destroy relationships of the target
- To co-opt the target’s manifestation
- To turn the target into controlled opposition (In terms of beliefs & actions)
- To incriminate the target
- To round down the target’s output and audience – To marginalize the target
- To eliminate connections & networking ability
- To suppress the target’s personality
- Sanitization of pleasure, emotions, and individuality
- To punish the target / To torture the target
- To destroy the target’s life
- To stop a target from procreating / Ending a target’s bloodline (Eugenics)
- To suicide the target / To covertly assassinate the target
- To cover up the targeting operation
“If they see too much power and originality coming out of someone, they either use it and siphon it or they undermine it in order to neutralize it.” ~Ahmad Enani (TI)

COINTELPRO 2.0 Methodology:
Covert remote influencing technology suite --
- COINTELPRO 2.0: Thought surveillance neural AI net for psyche profiling
- COINTELPRO 2.0: Directed energy weapon mind control network for counter-proliferation targeting
- Ai based retro-causation; Extensive international neural monitoring programs can calculate a target’s potentials before the target is aware of them.
- Gangstalking / Organized Stalking
- Trauma based mind control – No touch torture
- Character assassination / Slander via proxies
- Technological illusions (PSYOPS) / misdirection
- Electromagnetic mind control aimed at discrediting the target
- Mind control of people who provide opportunities for the target
- Use of family against the target (e.g. Mind control of family)
- Use of pharmaceutical drugs against a target
- To orchestrate the detaining of the target in a psyche ward
- v2k to get a target diagnosed as a “paranoid schizophrenic”
- Exaggerated, warped and untrue slander about the target is proliferated
- Technology playing devil’s advocate via implanted thoughts to get a target in trouble
- Agenda to incriminate the target (Advice for COINTELPRO targets: Stay lawful)
- Use of ego against a target
- Weaponized mind control against a target
- Coercing of a target into appearing overly paranoid (e.g. An objective of stalking)
- Specific technological control of a target’s body language or vocal tone (e.g. To generate mistrust)
- Total individual control technology is used as a tactic to take away a citizen’s rights through faulty mental illness diagnoses[21]
- Outlandish black project technology experiences intended to discredit when spoken
- Use of electronic control grid to mind control misfortunes for a target
- Synthetic social phobias ~ Synthetic social anxiety (e.g. Public speaker related suppression)
- Suppression of whatever platform the target is talented in (e.g. Music production, software design)
- To dehumanize a target via electromagnetic neuroscience
- Severe targets are sanitized of pleasure, emotions, and personality
- Synthetic suicide programming
- Technologically enabled serial killers with a taste for revolutionaries & activists

Electronic Targeting Holocaust
- “While all these traditional tactics have proven fruitful throughout time without waning effectiveness, the agencies involved in extreme cover-ups prefer another tactic that seems to have withstood the test of time too. That is labeling someone “paranoid schizophrenic” or mentally ill. Once that label has been attached to someone, almost all testimony will be disbelieved. The military has employed this tactic since the 60’s to get rebellious soldiers and others locked up in mental hospitals. But since the weapons testing of neurological disruptor technology has begun on the general population beginning in the early 60’s and then stepped up to full throttle in 1976, the scope of what is considered mentally ill had to be reprogrammed into a broader definition for the general population.” ~Department of Defense Whistleblower: From the Out of Print Book – The Matrix Deciphered
- “My name is Dr. John Hall, I’m a medical Doctor from Texas. As a physician, relative to some of what you’re hearing today, in the community we are seeing an alarming rate of complaints of use of electromagnetic weapons, microwave auditory effect, silent sound spectrum, EEG cloning,… Which has taken the lab out of the laboratory and into the home, most of these from the research that we’ve reviewed can be done remotely. It seems to be more weapons research than medical research. I’ve personally corresponded with upwards of 1,500 victims all complaining of identical complaints from every state in the nation. Of being exposed to electromagnetic radiation. Non-ionizing radiation. For the use of cognitive control or behavior control….” ~Anesthesiologist Dr. John Hall Speaking to the Presidential Bioethics Commission
- “I am also targeted and this is my story. My name is Sandra Fields. I’m an architect, recipient of Who’s Who of Women in America achievement award and have run a successful business for over 28 years. My life and livelihood have been compromised for the last 11 years by being attacked by electromagnetic radiation torture, and by organized stalking… Thousands of Americans are currently suffering from chemical, electromagnetic, psychological and physical torture with no government relief or laws. Our servicemen, prisoners, and thousands of unknowing innocent civilians are currently being lamed, tormented and tortured as a result of military research, medical research, pharmaceutical research, physiological and psychological studies that have virtually destroyed participants’ sanity, physical well-being, reputation and privacy.” ~Targeted Individual Sandra Fields, Speaking to Obama’s Presidential Bioethics Committee
- “What the governments found, was that you could induce by changing the pulse frequency like morse code of the microwaves going into the brain and interfering with the brain, by specializing on the pulse frequency you could induce psychiatric illnesses to the point where a psychiatrist could not tell if it is a genuine psychiatric illness or an induced psychiatric illness. So what you can do theoretically, is you can target an individual’s brain, they may have auditory hallucinations where they hear things, which is actually quite common with microwaves. Or show signs of schizophrenia, for instance 6.6 pulses a second can induce severe sexual aggression in men. … Technically what you could do is have someone committed to a psychiatric hospital or a jail for a crime, just by somebody saying that they had a psychiatric problem where by they didn’t.” ~Ex-British Royal Navy Scientist Dr. Barrie Trower
- “They can cause insanity, and it was an experiment. One of the experiments was to take an ordinary sane person, cause insanity, and have a psychiatrist who was unknown to everybody diagnose schizophrenia, or paranoia or a psychiatric illness. That was a successful outcome. And the person would spend the rest of their life in an asylum in misery, but to the government scientists that was a success.” ~Ex-Black Project Scientist Dr. Barrie Trower
- “The war against satellite terrorism isn’t just the USA. This is a global issue! I’m in tropical Queensland Australia and get battered daily.” ~Targeted Individual Amanda Emily Reed

MKUltra Cover Stories
This technology has interacted with quite a large amount of people, however it is almost always misidentified as other sources[8].

Directed Energy Weapon Cover Stories:
- Mental illness as an electronic harassment cover story
- End game technology packaged under persuasive “spiritual warfare” illusions
- Directed energy interaction packaged as the supernatural
- Government technology under a cosmic being facade
- Religious themed illusions/Using religion mythology as a means for cover stories
- Extraterrestrial contact as a psychological operation cover story
- Ghosts as a cover story – AI orchestrated phantom illusions
- End game technology as a sorcery cover story
- End game technology as the real source behind effective voodoo
- Witchcraft as a directed energy cover story
- Black project science under a black magic cover story
- Directed energy attacks deceptively packaged as physiological ailments
- Synthetic signals in the brain from implants framed as physiological ailments
- “Psychic Attack” as a directed energy attack cover story
- “Spiritual Attack” as a directed energy attack cover story
- New Age cover stories (e.g. Disembodied spirit illusions)
- Old age mythological gods used as a cover story
- Human based electronic harassment with aliens packaged as the perpetrator
- Scientology methods as a cover story for technological remote influence
- Exotic neurobody illusions (e.g. Chakra, entity attachments, ethereal implants)
- Inter dimensional being interaction as an electronic targeting cover story
- Exploitation of illusory explanations to conceal directed energy crimes.“People who have already assimilated the cover stories are often not ready to hear the truth.” ~Omnisense
Beings Impersonated:
- Neighbors (Targeted Individual v2k)
- Black Ops Agents (Targeted Individual v2k)
- Family (Targeted Individual v2k)
- Deceased Loved Ones / Deceased Relatives / Deceased Pets (Psy Ops v2k)
- Demons (Mind Control Cover Story)
- Jinn (Cover Stories)
- Archons (Cover Stories)
- Inter Dimensional Beings (New Age Psy Ops)
- Extraterrestrials (Cosmic Being Impersonation Programs/UFOlogy Bastardization)
- Entity Attachments (New Age Psy Ops)
- Shadow Beings (e.g. To Cause Fear from an Obscure Source)
- Archangels (To Impersonate a Higher Authority)
- Lucifer (To Persuade into Evil)
- Satan (Satanist v2k)
- RA (New Age Psy Ops)
- Spirits (Spiritual Warfare Illusions)
- Ghosts – Phantoms (Directed Energy Trickery)
- Faeries (Rehashed Old Age Cover Stories)
- Higher Self (Mind Control Cover Story)
- Panpsychism Based Impersonations (e.g. Gaia aka Mother Earth Speaking to People)
- Saints & Mother Mary (Religious Impersonations)
- Holy Spirit (Psychological Direction Method / Sleeper Assassin Method)
- Ascended Masters (Impersonation of a Higher Power)
- Jesus (Any Vector of Vulnerability is Exploited)
- Person’s of Note (e.g. To get a Target to Murder them, To Psychologically Direct)
- Any Mythological God of the Past (These can be pretty cool)
- God / Allah / Yahweh / Jehovah (Impersonation of the Highest Power)
- Done via Electronic Telepathy Contact (Voice to Skull – v2k)
“Directed energy weapons operate invisibly while the inducible mental limits of directed energy weapons are the limits of consciousness itself, this makes for an incredibly potent environment for illusions of all types.” ~Omnisense

NeuroWeaponry & Artificial Intelligence Quotes:
- “The point of the program is to have maximum psychological effect and leave the minimal amount of evidence.[22]” ~Anonymous Targeting Program Insider
- “In 1985 CNN did a special report on radio frequency weapons. They hired an engineer who built an “RF Mind Interference” machine based on Soviet schematics. The machine successfully transmitted images into a CNN reporter’s mind. The stunned engineer said that, given three weeks time, he could scale up the machine to use on a whole town, causing them to do things against their better judgement, see and hear things that weren’t there, etc. The pentagon said it was too sensitive a subject to comment on. Remember, these effects were achieved by civilians over 30 years ago! One can speculate that they’ve made great advances in the past decades.[8]” ~Targeted Individual Jim Hastings
- “Through the effective use of cover stories sources like the CIA hide an abundance of technological effects on society under a plethora of various facades.[23]” ~Omnisense
- “Electromagnetic mind control provides for revolutionary opportunities to control the opposition.[8]” ~Omnisense
- “MKUltra tech can induce the exact feeling that a thought came from yourself to mask it’s presence.[8]” ~Omnisense
- “An idea behind using cover stories, such as religious or new age, is to encapsulate the opposition into a state of inability to identify the real perpetrators.[8]” ~Omnisense
- “Superior scientific knowledge has been obtained via government black projects and this knowledge is being weaponized.[24]” ~Omnisense
- “The top of the pyramid of a global black ops crime syndicate formed an AI based electronic telepathy cybernetic secret society sometime in the era of Project mkultra.” ~Omnisense
- “The black ops sources operate most effectively if their presence is unknown.[8]” ~Omnisense
- “Theres no way any agency or government could possibly admit this level of assassination and torture without a complete collapse.[25]” ~Ex-CIA Engineer Dr. Robert Duncan

Most Evil Acts Done by These Technologies:
- Attacking of the defenseless
- Negation of free will in both overt and covert methodologies
- Severe violations of human rights
- Profoundly dirty tactics – All evil tactics mapped and exploited
- Proliferation of wawars by proxy
- Unwitting enslavement/Manchurian candidates
- Suppression of societal progress that threatens the control systems
- Framing innocent individuals (e.g. murder, molestation, drug charges)
- Vicious character assassination/incredibly malicious slander
- Permanent damage to body parts of targets (e.g. damaging the most valuable aspect of someone’s ability)
- Mind control based injustices on unwitting individuals (e.g. mind controlled cheating on partners as a eugenics act)
- Suppression and/or malicious sabotage of work (e.g. art, music, writing)
- Intentional destruction or sabotage of that which is priceless
- Directed energy weapon emotional abuse
- Coerced suicide/suicide as a cover story for murder
- Psychiatric targeting (getting targets locked up in psyche wards/framing targets as mentally ill/creation of psychiatric symptoms for the effect of pharmaceutically drugging a target)
- Feigning illness in children to drug them with harmful pharmaceuticals (ADHD is very easy to feign with these technologies)
- Malicious sabotage of infant development via electromagnetic weaponry
- Microwave induced tumors, cancers & heart attacks in covert murders
- Murder by Proxy/assassination by proxy
- Promotion of pedophilia/molestation/rape via the electronic control grid
- Eugenics operations (e.g. Elimination of masterful oppositional bloodlines)
- Fukushima is credibly rumored to have been done by HAARP
- Intentional malicious programming of geneticsIntentional malicious sabotage of genetics/Intentional damaging of genetics
- Intentional malicious programming of soul (e.g. with misalignments)
- An unknown area of the conspiracy is a sick & twisted agenda to not only victimize people in this lifetime, but to make their victimization transcend into future incarnations.“No matter how paranoid or conspiracy-minded you are, what the Government is actually doing is worse than you imagine.[26]” ~William Blum - Perpetrators of a Covert Holocaust

The CIA
- Julian Assange, Vault 7 Press Conference: “The CIA is the largest intelligence agency in the world by budgetary expenditure.”
- Dr. Udo Ulfkotte: “Do you really think that this is journalism? Intelligence agencies writing articles…[27]”
- Former DEA Dennis Dayle: “In my 30-year history in the Drug Enforcement Administration and related agencies, the major targets of my investigations almost invariably turned out to be working for the CIA.[28]”
- The CIA has mastered the craft of warfare by proxy.
- The CIA employs overzealous weaponization of everything possible
- The Central Intelligence Agency has a cover story front for public rationalization of what it does.
- There are CIA world spanning information warfare programs proliferated through the electronic control grid.
- There are CIA superiors above the official director.
- I would suspect the CIA director can be informed or pretty clueless.
- These shadow CIA heads are not elected or appointed by the U.S. President.
- CIA higher ups commit acts as if they are Charles Manson mixed with Adolf Hitler.
- The CIA black ops agent model suppresses or negates a sense of humor, empathy, and in general they are not allowed to feel love.
- Planning, orchestration, and cover up of false flags[29]
- Covert divide and conquer is employed against domestic and international civilian populations.
- Engineering of weaponized viruses & other biological warfare.
- The CIA likes to do criminal activity when they have the opportunity to explain it with a “rational” cover story.
- I have heard stated in the electronic telepathy network that the CIA has the most comprehensively mapped black project artificial intelligence in the world.
- The CIA has built Ai models to simulate any American (e.g. Mind control & interrogation Ai).
- From what I could gather, the CIA is majorly influenced by a foreign power, the Vatican.
- CIA actions controlled by a war mongering secret society of bloodliners.
- According to several sources the founding director of the CIA, and subsequent directors have a tendency to be Knights of Malta aka servants of the pope.
- It is possible that arranged electronic control grid influence is sold to the highest bidder by sources like the CIA. If this is the case the bidders are likely chosen very carefully, and have very criminal and sinister ethos similar to the groups who set up the electronic control grid. Also possible that initial investors in the electronic control grid now have seats of power.Hypothesis: The CIA is the largest perpetrator of electronic targeting on the planet.In my view the CIA should be extirpated“The CIA knows how to manipulate conclusions.” ~Omnisense
The Vatican
- CIA Vet E. Howard Hunt said in the documentary A Coup: Made in America: “We always said in an admiring way that the Jesuits have formed the greatest intelligence service in the world, always have.”
- A group called the “Society of Jesus” likely has their hands dirty with the electronic control grid.
- The Black Pope is the official leader of the Society of Jesus[30]
- Vatican bank system allegedly connected to Italian Mafia
- Vatican library secrets have been hidden since times of mass illiteracy worldwide
- A Vatican hidden artifacts of history treasury is sure to exist in my opinion
- Vatican conceptual energy matches extremely dark realities
- High tech faux-demonic possession exorcism used as a method to gain followers
- Diplomatic manipulation of governments & monarchies
- Conspiring Cardinals
- Vatican & Jesuits credibly behind countless dissident & heretic murders throughout history.
- A Jesuit oath speaks of assassination of ideological opposition, slaying the enemy’s children, and waging relentless war (e.g. Creating civil wars in artistic & prosperous nations)[31]
- A world full of nescient catholics donate to an incredibly corrupt church.
- The top leadership of the Vatican are fake Christians using the religion for greed, lust & power.
- Imposters of Christ – They pretend to believe in Christ but secretly serve darkness.
- Imposters of God taken to a new level with electronic telepathy impersonation.
- Hidden hand behind wars for centuries.
- Secret Vatican Bible & history knowledge is utilized by shadow government.
- Agenda to wipe any true evidence of Christ off the face of the Earth.
- Inside the electronic telepathy network a Satanist is said to be the true head of the Vatican.
- I believe that a Vatican source heads the shadow government as of April 2017.
- The Catholic Church has paid out $3,994,797,060.10+ as a result of sex abuse scandals[32]
- Alleged illuminati insider Svali says she witnessed the satanic ritual murder of a child in a basement catacomb of the Vatican[33]
- One name I heard as an insider to the electronic telepathy cybernetic network is Joseph Ratzinger aka Pope Benedict XVI
- “With the track record the Vatican has, it should be banned from going anywhere near children.” ~Baboshka

Other Highly Probable or Confirmed Perpetrators:
- United States Military – U.S. Navy / U.S. Air Force / U.S. Army
- The Pentagon
- Department of Defense (DoD)
- National Security Agency (NSA)
- National Reconnaissance Office (NRO)
- National Geospatial-Intelligence Agency (NGA)
- World Health Organization (WHO)
- Federal Bureau of Investigation (FBI)
- Department of Homeland Security (DHS)
- American “Fusion Centers”
- Security Industry Companies
- DARPA – Defense Advanced Research Projects Agency
- Israeli Government / Mossad / Zionist cabal
- UK Government / MI5 / MI6 / GCHQ
- German Government / The Federal Intelligence Service (Bundesnachrichtendienst)
- Government of India / Intelligence Bureau (IB)
- Chinese Government / The Ministry of State Security (MSS)
- Russian Government / Russian Military / Federal Security Service (FSB) / KGB
- Japanese Government / Public Security Intelligence Agency (公安調査庁)
- Danish Government / Politiets Efterretningstjeneste (PET)
- Government of France / French Intelligence / French Military
- Spanish Government / The National Intelligence Center (CNI)
- Australian Government / Australian Secret Intelligence Service (ASIS)
- New Zealand Government / Security Intelligence Service (SIS)
- Canadian Government / Canadian Security Intelligence Service (CSIS)
- Brazilian Government / Agência Brasileira de Inteligência (ABIN)
- Saudi Arabian Government / General Intelligence Directorate (GID)
- Plenty of unnamed corporations within the military industrial complex.
- Every unnamed & corrupted military worldwide has potential to be involved.
- Every unnamed intelligence agency worldwide has potential to be involved.
- Secret societies connected to the intelligence community.
Rumor: Every party that has figured out remote neural monitoring has been initiated into a secret coalition controlled by totalitarian secret society members“Each agency plays it’s role in the integrated global system.” ~Black Project Engineer Dr. Robert Duncan
See: The Shadow Government Cybernetic Network Article.

More on the Perpetrators:
- Intelligence agencies are used for their ability to keep secrets, superior funding, national security excuses, lack of checks and balances, & propensity for criminal activity.
- Electronic telepathy provides for no paper trail and relatively zero traceable roots
- Electronic control grid perpetrators conspire daily via electronic telepathy with electronic targeting cases & planning of new psychological operations.
- U.S. Military heads in a network appear to be cruel and barbaric.
- Electronic control grid sources harbor lunatic serial killer ideologies which are in use against the international civilian population via electronic warfare.
- Militaristically psychopathic acts of terror, sadism, and cruelty are a norm.
- Shadow government war criminals are known to practice BCI sadism[34] (e.g. cruel pain affliction with invisible technologies while the perpetrator interfaces the psychological distress of their victim with surveillance fed BCI tech)
- Shills in government, military, and media are complicit in the cover up.
- Electronic control grid sources are in control of governments either wittingly or unwittingly through persuasion, coercion, and/or covert electromagnetic mind control.
- There are powerful serial rapists within the electronic control grid pyramid.
- There is a focused agenda to incriminate as many people as possible with this conspiracy, they want more company for a sinking ship.
- There are signs of opposition coming from inside Russia’s network (This is a potential reason for the ruling class to orchestrate proxy attacks against Russia)
- Electronic control grid sources have strategically used deceptive rationalizations to curtail the public domain implementations of these technologies.“When I worked [at the NSA 1982-2010] I had no idea that there was an über-evil, anti-American side to NSA. Everything is highly compartmented… this protects secrets but of course is a perfect environment in which to hide elaborate criminal activity, especially when the NSA Security as well as other watch dog organizations were compromised in preparation for crimes of unfathomable reach and scope.[35]” ~Karen Melton-Stewart

submitted by Hot-Adeptness421 to Gangstalking2023 [link] [comments]


2024.04.16 04:15 Hot-Adeptness421 Total Individual Control Technology (Part 3)

- Technological mind tricks of many types supporting of psychological operations via black project technology (Mandela effect psyops, time travel psyops, synthetic optics based psyops, powerful mind control)
- Invisible black project technology under an inter dimensional being / disembodied spirit cover story
- Black ops remote influencing tech used to create notions like ethereal implants and their removal to keep opposition in a continual loop of fruitless action
- More fruitless paths: use of notions like fighting in a synthetically produced tech based VR “astral realm” will help humanity defeat evil (e.g. Cameron Day)
- New age disinformation & many new age cover stories have been modeled after derivatives of black project science capabilities
- New Age Telepathic Impersonations: ascended masters, Ashtar, demons, jinn, shadow beings, RA, archangels, Jesus, holy spirit, God/Source, Gaia, extraterrestrials, inter dimensional Beings, Blue Avians, Pleiadians, reptilians, etc
- Directed energy weapon environmental manipulation with a “jinn” interaction cover story
- Artificial intelligence + electromagnetic weaponry engineered synchronicities
- New age mind control assets are rewarded by the electronic control grid (What I have called the dark law of attraction)
- “New Age Psychological Operations are successful societal engineering attempts in that which a supernatural spiritual ability is central to the belief system. I believe a reason the black ops sources chose this flavor of psyop is it enables a supreme vulnerability to remote influencing technologies. Implanted v2k thoughts can be psychic ESP… end game virtual reality cognitions can be remote viewing. Synthetic dreams can be astral projection. Electronic harassment can be ‘ascension symptoms’ or ‘psychic attacks’. Mind Control can be spirit possession or higher self. I believe all of these cover stories were engineered to be popular for their providing remote influence ease and concealment.[5]” ~Omnisense
“In the era of new age psychological operations there is an emphasis on controlled opposition in alt media. I have learned remote influencing technologies are rampant in the modern day turning targets into mind control asset false messiahs of sorts. It doesn’t end there. This conspiracy also involves covertly engineered events with remote technologies to persuade into the belief system. After a few decades of constant societal digestion of mind control assets, and constant mind control programs aimed at persuading into the belief system, we have an engineered mass delusion of decently big proportions.[9]” ~Omnisense
“New age cover stories exist for literally all black ops technology abilities.[10]” ~Omnisense
“The New Age Belief System was engineered to be more bright and exotic than the truth, this creates a situation where if a fully programmed new ager was ever to stumble upon a good picture of the truth, it would seem underwhelming, ridiculous, or even like a psyop.” ~Omnisense
Read More on Social Engineering: Psychological Operations Blueprint
New Hi-Tech Generation of COINTELPRO

In a Nutshell: Government sources are using directed energy weapons and artificial intelligence to terrorize, threaten, intimidate, discredit, silence, torture, and murder dissidents. In addition, security contractors (among others) are being hired as military thugs to gangstalk targets[19].

Zerzetsen: “Inflicting as much pain and suffering as possible without leaving any marks.[20]”
Directed energy weapon programs revolutionized this…
Counter-proliferation programs are intended to subvert the potentials of a target while punishing them with psycho-sadist techniques. The perversions of cointelpro are notable. The murderous and sadistic ethos of government counter-proliferation programs echos that of the Nazis and this perpetrator network of war criminals are committing sickening acts upon the global population.

Modern Day COINTELPRO Objectives:
These are counter-proliferation centered programs intended to subvert all progress --
- To discredit the target / To character assassinate / To slander the target
- To taint the target’s image / To misrepresent the target
- To suppress the target’s monetary success
- To suppress the target’s good character qualities or people’s awareness of positive aspects of the target
- To arrange a partner for the target or mind control the partner of the target
- To destroy relationships of the target
- To co-opt the target’s manifestation
- To turn the target into controlled opposition (In terms of beliefs & actions)
- To incriminate the target
- To round down the target’s output and audience – To marginalize the target
- To eliminate connections & networking ability
- To suppress the target’s personality
- Sanitization of pleasure, emotions, and individuality
- To punish the target / To torture the target
- To destroy the target’s life
- To stop a target from procreating / Ending a target’s bloodline (Eugenics)
- To suicide the target / To covertly assassinate the target
- To cover up the targeting operation
“If they see too much power and originality coming out of someone, they either use it and siphon it or they undermine it in order to neutralize it.” ~Ahmad Enani (TI)

COINTELPRO 2.0 Methodology:
Covert remote influencing technology suite --
- COINTELPRO 2.0: Thought surveillance neural AI net for psyche profiling
- COINTELPRO 2.0: Directed energy weapon mind control network for counter-proliferation targeting
- Ai based retro-causation; Extensive international neural monitoring programs can calculate a target’s potentials before the target is aware of them.
- Gangstalking / Organized Stalking
- Trauma based mind control – No touch torture
- Character assassination / Slander via proxies
- Technological illusions (PSYOPS) / misdirection
- Electromagnetic mind control aimed at discrediting the target
- Mind control of people who provide opportunities for the target
- Use of family against the target (e.g. Mind control of family)
- Use of pharmaceutical drugs against a target
- To orchestrate the detaining of the target in a psyche ward
- v2k to get a target diagnosed as a “paranoid schizophrenic”
- Exaggerated, warped and untrue slander about the target is proliferated
- Technology playing devil’s advocate via implanted thoughts to get a target in trouble
- Agenda to incriminate the target (Advice for COINTELPRO targets: Stay lawful)
- Use of ego against a target
- Weaponized mind control against a target
- Coercing of a target into appearing overly paranoid (e.g. An objective of stalking)
- Specific technological control of a target’s body language or vocal tone (e.g. To generate mistrust)
- Total individual control technology is used as a tactic to take away a citizen’s rights through faulty mental illness diagnoses[21]
- Outlandish black project technology experiences intended to discredit when spoken
- Use of electronic control grid to mind control misfortunes for a target
- Synthetic social phobias ~ Synthetic social anxiety (e.g. Public speaker related suppression)
- Suppression of whatever platform the target is talented in (e.g. Music production, software design)
- To dehumanize a target via electromagnetic neuroscience
- Severe targets are sanitized of pleasure, emotions, and personality
- Synthetic suicide programming
- Technologically enabled serial killers with a taste for revolutionaries & activists

Electronic Targeting Holocaust
- “While all these traditional tactics have proven fruitful throughout time without waning effectiveness, the agencies involved in extreme cover-ups prefer another tactic that seems to have withstood the test of time too. That is labeling someone “paranoid schizophrenic” or mentally ill. Once that label has been attached to someone, almost all testimony will be disbelieved. The military has employed this tactic since the 60’s to get rebellious soldiers and others locked up in mental hospitals. But since the weapons testing of neurological disruptor technology has begun on the general population beginning in the early 60’s and then stepped up to full throttle in 1976, the scope of what is considered mentally ill had to be reprogrammed into a broader definition for the general population.” ~Department of Defense Whistleblower: From the Out of Print Book – The Matrix Deciphered
- “My name is Dr. John Hall, I’m a medical Doctor from Texas. As a physician, relative to some of what you’re hearing today, in the community we are seeing an alarming rate of complaints of use of electromagnetic weapons, microwave auditory effect, silent sound spectrum, EEG cloning,… Which has taken the lab out of the laboratory and into the home, most of these from the research that we’ve reviewed can be done remotely. It seems to be more weapons research than medical research. I’ve personally corresponded with upwards of 1,500 victims all complaining of identical complaints from every state in the nation. Of being exposed to electromagnetic radiation. Non-ionizing radiation. For the use of cognitive control or behavior control….” ~Anesthesiologist Dr. John Hall Speaking to the Presidential Bioethics Commission
- “I am also targeted and this is my story. My name is Sandra Fields. I’m an architect, recipient of Who’s Who of Women in America achievement award and have run a successful business for over 28 years. My life and livelihood have been compromised for the last 11 years by being attacked by electromagnetic radiation torture, and by organized stalking… Thousands of Americans are currently suffering from chemical, electromagnetic, psychological and physical torture with no government relief or laws. Our servicemen, prisoners, and thousands of unknowing innocent civilians are currently being lamed, tormented and tortured as a result of military research, medical research, pharmaceutical research, physiological and psychological studies that have virtually destroyed participants’ sanity, physical well-being, reputation and privacy.” ~Targeted Individual Sandra Fields, Speaking to Obama’s Presidential Bioethics Committee
- “What the governments found, was that you could induce by changing the pulse frequency like morse code of the microwaves going into the brain and interfering with the brain, by specializing on the pulse frequency you could induce psychiatric illnesses to the point where a psychiatrist could not tell if it is a genuine psychiatric illness or an induced psychiatric illness. So what you can do theoretically, is you can target an individual’s brain, they may have auditory hallucinations where they hear things, which is actually quite common with microwaves. Or show signs of schizophrenia, for instance 6.6 pulses a second can induce severe sexual aggression in men. … Technically what you could do is have someone committed to a psychiatric hospital or a jail for a crime, just by somebody saying that they had a psychiatric problem where by they didn’t.” ~Ex-British Royal Navy Scientist Dr. Barrie Trower
- “They can cause insanity, and it was an experiment. One of the experiments was to take an ordinary sane person, cause insanity, and have a psychiatrist who was unknown to everybody diagnose schizophrenia, or paranoia or a psychiatric illness. That was a successful outcome. And the person would spend the rest of their life in an asylum in misery, but to the government scientists that was a success.” ~Ex-Black Project Scientist Dr. Barrie Trower
- “The war against satellite terrorism isn’t just the USA. This is a global issue! I’m in tropical Queensland Australia and get battered daily.” ~Targeted Individual Amanda Emily Reed

MKUltra Cover Stories
This technology has interacted with quite a large amount of people, however it is almost always misidentified as other sources[8].

Directed Energy Weapon Cover Stories:
- Mental illness as an electronic harassment cover story
- End game technology packaged under persuasive “spiritual warfare” illusions
- Directed energy interaction packaged as the supernatural
- Government technology under a cosmic being facade
- Religious themed illusions/Using religion mythology as a means for cover stories
- Extraterrestrial contact as a psychological operation cover story
- Ghosts as a cover story – AI orchestrated phantom illusions
- End game technology as a sorcery cover story
- End game technology as the real source behind effective voodoo
- Witchcraft as a directed energy cover story
- Black project science under a black magic cover story
- Directed energy attacks deceptively packaged as physiological ailments
- Synthetic signals in the brain from implants framed as physiological ailments
- “Psychic Attack” as a directed energy attack cover story
- “Spiritual Attack” as a directed energy attack cover story
- New Age cover stories (e.g. Disembodied spirit illusions)
- Old age mythological gods used as a cover story
- Human based electronic harassment with aliens packaged as the perpetrator
- Scientology methods as a cover story for technological remote influence
- Exotic neurobody illusions (e.g. Chakra, entity attachments, ethereal implants)
- Inter dimensional being interaction as an electronic targeting cover story
- Exploitation of illusory explanations to conceal directed energy crimes.“People who have already assimilated the cover stories are often not ready to hear the truth.” ~Omnisense
Beings Impersonated:
- Neighbors (Targeted Individual v2k)
- Black Ops Agents (Targeted Individual v2k)
- Family (Targeted Individual v2k)
- Deceased Loved Ones / Deceased Relatives / Deceased Pets (Psy Ops v2k)
- Demons (Mind Control Cover Story)
- Jinn (Cover Stories)
- Archons (Cover Stories)
- Inter Dimensional Beings (New Age Psy Ops)
- Extraterrestrials (Cosmic Being Impersonation Programs/UFOlogy Bastardization)
- Entity Attachments (New Age Psy Ops)
- Shadow Beings (e.g. To Cause Fear from an Obscure Source)
- Archangels (To Impersonate a Higher Authority)
- Lucifer (To Persuade into Evil)
- Satan (Satanist v2k)
- RA (New Age Psy Ops)
- Spirits (Spiritual Warfare Illusions)
- Ghosts – Phantoms (Directed Energy Trickery)
- Faeries (Rehashed Old Age Cover Stories)
- Higher Self (Mind Control Cover Story)
- Panpsychism Based Impersonations (e.g. Gaia aka Mother Earth Speaking to People)
- Saints & Mother Mary (Religious Impersonations)
- Holy Spirit (Psychological Direction Method / Sleeper Assassin Method)
- Ascended Masters (Impersonation of a Higher Power)
- Jesus (Any Vector of Vulnerability is Exploited)
- Person’s of Note (e.g. To get a Target to Murder them, To Psychologically Direct)
- Any Mythological God of the Past (These can be pretty cool)
- God / Allah / Yahweh / Jehovah (Impersonation of the Highest Power)
- Done via Electronic Telepathy Contact (Voice to Skull – v2k)
“Directed energy weapons operate invisibly while the inducible mental limits of directed energy weapons are the limits of consciousness itself, this makes for an incredibly potent environment for illusions of all types.” ~Omnisense

NeuroWeaponry & Artificial Intelligence Quotes:
- “The point of the program is to have maximum psychological effect and leave the minimal amount of evidence.[22]” ~Anonymous Targeting Program Insider
- “In 1985 CNN did a special report on radio frequency weapons. They hired an engineer who built an “RF Mind Interference” machine based on Soviet schematics. The machine successfully transmitted images into a CNN reporter’s mind. The stunned engineer said that, given three weeks time, he could scale up the machine to use on a whole town, causing them to do things against their better judgement, see and hear things that weren’t there, etc. The pentagon said it was too sensitive a subject to comment on. Remember, these effects were achieved by civilians over 30 years ago! One can speculate that they’ve made great advances in the past decades.[8]” ~Targeted Individual Jim Hastings
- “Through the effective use of cover stories sources like the CIA hide an abundance of technological effects on society under a plethora of various facades.[23]” ~Omnisense
- “Electromagnetic mind control provides for revolutionary opportunities to control the opposition.[8]” ~Omnisense
- “MKUltra tech can induce the exact feeling that a thought came from yourself to mask it’s presence.[8]” ~Omnisense
- “An idea behind using cover stories, such as religious or new age, is to encapsulate the opposition into a state of inability to identify the real perpetrators.[8]” ~Omnisense
- “Superior scientific knowledge has been obtained via government black projects and this knowledge is being weaponized.[24]” ~Omnisense
- “The top of the pyramid of a global black ops crime syndicate formed an AI based electronic telepathy cybernetic secret society sometime in the era of Project mkultra.” ~Omnisense
- “The black ops sources operate most effectively if their presence is unknown.[8]” ~Omnisense
- “Theres no way any agency or government could possibly admit this level of assassination and torture without a complete collapse.[25]” ~Ex-CIA Engineer Dr. Robert Duncan

Most Evil Acts Done by These Technologies:
- Attacking of the defenseless
- Negation of free will in both overt and covert methodologies
- Severe violations of human rights
- Profoundly dirty tactics – All evil tactics mapped and exploited
- Proliferation of wawars by proxy
- Unwitting enslavement/Manchurian candidates
- Suppression of societal progress that threatens the control systems
- Framing innocent individuals (e.g. murder, molestation, drug charges)
- Vicious character assassination/incredibly malicious slander
- Permanent damage to body parts of targets (e.g. damaging the most valuable aspect of someone’s ability)
- Mind control based injustices on unwitting individuals (e.g. mind controlled cheating on partners as a eugenics act)
- Suppression and/or malicious sabotage of work (e.g. art, music, writing)
- Intentional destruction or sabotage of that which is priceless
- Directed energy weapon emotional abuse
- Coerced suicide/suicide as a cover story for murder
- Psychiatric targeting (getting targets locked up in psyche wards/framing targets as mentally ill/creation of psychiatric symptoms for the effect of pharmaceutically drugging a target)
- Feigning illness in children to drug them with harmful pharmaceuticals (ADHD is very easy to feign with these technologies)
- Malicious sabotage of infant development via electromagnetic weaponry
- Microwave induced tumors, cancers & heart attacks in covert murders
- Murder by Proxy/assassination by proxy
- Promotion of pedophilia/molestation/rape via the electronic control grid
- Eugenics operations (e.g. Elimination of masterful oppositional bloodlines)
- Fukushima is credibly rumored to have been done by HAARP
- Intentional malicious programming of geneticsIntentional malicious sabotage of genetics/Intentional damaging of genetics
- Intentional malicious programming of soul (e.g. with misalignments)
- An unknown area of the conspiracy is a sick & twisted agenda to not only victimize people in this lifetime, but to make their victimization transcend into future incarnations.“No matter how paranoid or conspiracy-minded you are, what the Government is actually doing is worse than you imagine.[26]” ~William Blum - Perpetrators of a Covert Holocaust

The CIA
- Julian Assange, Vault 7 Press Conference: “The CIA is the largest intelligence agency in the world by budgetary expenditure.”
- Dr. Udo Ulfkotte: “Do you really think that this is journalism? Intelligence agencies writing articles…[27]”
- Former DEA Dennis Dayle: “In my 30-year history in the Drug Enforcement Administration and related agencies, the major targets of my investigations almost invariably turned out to be working for the CIA.[28]”
- The CIA has mastered the craft of warfare by proxy.
- The CIA employs overzealous weaponization of everything possible
- The Central Intelligence Agency has a cover story front for public rationalization of what it does.
- There are CIA world spanning information warfare programs proliferated through the electronic control grid.
- There are CIA superiors above the official director.
- I would suspect the CIA director can be informed or pretty clueless.
- These shadow CIA heads are not elected or appointed by the U.S. President.
- CIA higher ups commit acts as if they are Charles Manson mixed with Adolf Hitler.
- The CIA black ops agent model suppresses or negates a sense of humor, empathy, and in general they are not allowed to feel love.
- Planning, orchestration, and cover up of false flags[29]
- Covert divide and conquer is employed against domestic and international civilian populations.
- Engineering of weaponized viruses & other biological warfare.
- The CIA likes to do criminal activity when they have the opportunity to explain it with a “rational” cover story.
- I have heard stated in the electronic telepathy network that the CIA has the most comprehensively mapped black project artificial intelligence in the world.
- The CIA has built Ai models to simulate any American (e.g. Mind control & interrogation Ai).
- From what I could gather, the CIA is majorly influenced by a foreign power, the Vatican.
- CIA actions controlled by a war mongering secret society of bloodliners.
- According to several sources the founding director of the CIA, and subsequent directors have a tendency to be Knights of Malta aka servants of the pope.
- It is possible that arranged electronic control grid influence is sold to the highest bidder by sources like the CIA. If this is the case the bidders are likely chosen very carefully, and have very criminal and sinister ethos similar to the groups who set up the electronic control grid. Also possible that initial investors in the electronic control grid now have seats of power.Hypothesis: The CIA is the largest perpetrator of electronic targeting on the planet.In my view the CIA should be extirpated“The CIA knows how to manipulate conclusions.” ~Omnisense
The Vatican
- CIA Vet E. Howard Hunt said in the documentary A Coup: Made in America: “We always said in an admiring way that the Jesuits have formed the greatest intelligence service in the world, always have.”
- A group called the “Society of Jesus” likely has their hands dirty with the electronic control grid.
- The Black Pope is the official leader of the Society of Jesus[30]
- Vatican bank system allegedly connected to Italian Mafia
- Vatican library secrets have been hidden since times of mass illiteracy worldwide
- A Vatican hidden artifacts of history treasury is sure to exist in my opinion
- Vatican conceptual energy matches extremely dark realities
- High tech faux-demonic possession exorcism used as a method to gain followers
- Diplomatic manipulation of governments & monarchies
- Conspiring Cardinals
- Vatican & Jesuits credibly behind countless dissident & heretic murders throughout history.
- A Jesuit oath speaks of assassination of ideological opposition, slaying the enemy’s children, and waging relentless war (e.g. Creating civil wars in artistic & prosperous nations)[31]
- A world full of nescient catholics donate to an incredibly corrupt church.
- The top leadership of the Vatican are fake Christians using the religion for greed, lust & power.
- Imposters of Christ – They pretend to believe in Christ but secretly serve darkness.
- Imposters of God taken to a new level with electronic telepathy impersonation.
- Hidden hand behind wars for centuries.
- Secret Vatican Bible & history knowledge is utilized by shadow government.
- Agenda to wipe any true evidence of Christ off the face of the Earth.
- Inside the electronic telepathy network a Satanist is said to be the true head of the Vatican.
- I believe that a Vatican source heads the shadow government as of April 2017.
- The Catholic Church has paid out $3,994,797,060.10+ as a result of sex abuse scandals[32]
- Alleged illuminati insider Svali says she witnessed the satanic ritual murder of a child in a basement catacomb of the Vatican[33]
- One name I heard as an insider to the electronic telepathy cybernetic network is Joseph Ratzinger aka Pope Benedict XVI
- “With the track record the Vatican has, it should be banned from going anywhere near children.” ~Baboshka

Other Highly Probable or Confirmed Perpetrators:
- United States Military – U.S. Navy / U.S. Air Force / U.S. Army
- The Pentagon
- Department of Defense (DoD)
- National Security Agency (NSA)
- National Reconnaissance Office (NRO)
- National Geospatial-Intelligence Agency (NGA)
- World Health Organization (WHO)
- Federal Bureau of Investigation (FBI)
- Department of Homeland Security (DHS)
- American “Fusion Centers”
- Security Industry Companies
- DARPA – Defense Advanced Research Projects Agency
- Israeli Government / Mossad / Zionist cabal
- UK Government / MI5 / MI6 / GCHQ
- German Government / The Federal Intelligence Service (Bundesnachrichtendienst)
- Government of India / Intelligence Bureau (IB)
- Chinese Government / The Ministry of State Security (MSS)
- Russian Government / Russian Military / Federal Security Service (FSB) / KGB
- Japanese Government / Public Security Intelligence Agency (公安調査庁)
- Danish Government / Politiets Efterretningstjeneste (PET)
- Government of France / French Intelligence / French Military
- Spanish Government / The National Intelligence Center (CNI)
- Australian Government / Australian Secret Intelligence Service (ASIS)
- New Zealand Government / Security Intelligence Service (SIS)
- Canadian Government / Canadian Security Intelligence Service (CSIS)
- Brazilian Government / Agência Brasileira de Inteligência (ABIN)
- Saudi Arabian Government / General Intelligence Directorate (GID)
- Plenty of unnamed corporations within the military industrial complex.
- Every unnamed & corrupted military worldwide has potential to be involved.
- Every unnamed intelligence agency worldwide has potential to be involved.
- Secret societies connected to the intelligence community.
Rumor: Every party that has figured out remote neural monitoring has been initiated into a secret coalition controlled by totalitarian secret society members“Each agency plays it’s role in the integrated global system.” ~Black Project Engineer Dr. Robert Duncan
See: The Shadow Government Cybernetic Network Article.

More on the Perpetrators:
- Intelligence agencies are used for their ability to keep secrets, superior funding, national security excuses, lack of checks and balances, & propensity for criminal activity.
- Electronic telepathy provides for no paper trail and relatively zero traceable roots
- Electronic control grid perpetrators conspire daily via electronic telepathy with electronic targeting cases & planning of new psychological operations.
- U.S. Military heads in a network appear to be cruel and barbaric.
- Electronic control grid sources harbor lunatic serial killer ideologies which are in use against the international civilian population via electronic warfare.
- Militaristically psychopathic acts of terror, sadism, and cruelty are a norm.
- Shadow government war criminals are known to practice BCI sadism[34] (e.g. cruel pain affliction with invisible technologies while the perpetrator interfaces the psychological distress of their victim with surveillance fed BCI tech)
- Shills in government, military, and media are complicit in the cover up.
- Electronic control grid sources are in control of governments either wittingly or unwittingly through persuasion, coercion, and/or covert electromagnetic mind control.
- There are powerful serial rapists within the electronic control grid pyramid.
- There is a focused agenda to incriminate as many people as possible with this conspiracy, they want more company for a sinking ship.
- There are signs of opposition coming from inside Russia’s network (This is a potential reason for the ruling class to orchestrate proxy attacks against Russia)
- Electronic control grid sources have strategically used deceptive rationalizations to curtail the public domain implementations of these technologies.“When I worked [at the NSA 1982-2010] I had no idea that there was an über-evil, anti-American side to NSA. Everything is highly compartmented… this protects secrets but of course is a perfect environment in which to hide elaborate criminal activity, especially when the NSA Security as well as other watch dog organizations were compromised in preparation for crimes of unfathomable reach and scope.[35]” ~Karen Melton-Stewart


submitted by Hot-Adeptness421 to Gangstalking2024 [link] [comments]


2024.04.14 19:23 benjamin-crowell Causes of populist authoritarianism

There has been a worldwide surge of populist authoritarianism. Orban was elected in 2010, Modi 2014, Trump 2016, Poland's PiS most recently in 2015. What evidence do we have about the causes of what seems to be a global phenomenon?
In the US media following the 2016 upset, the morning-after consensus seemed to be that it was an economic cry for help. This was criticized by Mutz, who proposed instead that the issue was status threat. Schaffner argues that in this election, education was only a statistical proxy for racism and sexism.
The rise of social media and the ubiquity of smartphones happened during this same time period, around 2010-2015. This was the time when it started to be common to see people walking their dogs while staring at their phones. Jonathan Haidt has a new book out that makes a case for a cause-and-effect relationship between these technological/behavioral changes and mental health problems among young people. It's striking that the same time frame coincides so well with the populist authoritarian surge, although Haidt doesn't touch on the topic in this book.
Is there an evidence-based consensus on why the global populist authoritarian surge occurred? My current picture, which may be wrong, is that nothing changed dramatically about people's objective well being, but that social media took their existing feelings of discontent (whether reasonable or unreasonable), amplified them, allowed them to be shared with other people in the same silo, and provided nontraditional communication channels for politicians like Modi and Trump who would have been locked out in the Walter Cronkite era.
References
Haidt, 2024, The anxious generation:how the great rewiring of childhood is causing an epidemic of mental illness
Mutz, "Status threat, not economic hardship, explains the 2016 presidential vote," PNAS May 8, 2018 115 (19) E4330-E4339
Schaffner, B., MacWilliams, N., & Nteta, T. (2018). Understanding white polarization in the 2016 vote for president: The sobering role of racism and sexism. Political Science Quarterly, 133(1), 9–34.
submitted by benjamin-crowell to PoliticalScience [link] [comments]


2024.04.11 18:25 Public_Finance_Guy Does Paying Tithing Break the Poverty Cycle? New Economics Paper

Hi Everyone,
I know most of the research shared on this subreddit tends to be from historians or religious scholars, but I wanted to share my new research that tests whether paying tithing improves economic well-being and reduces poverty. As a PhD student studying Public Finance, I've always been interested in the financial administration of the church, especially after learning about Ensign Peak. In my paper, I approach tithing as an anti-poverty program analogous to a government program.
RMN and other church leaders have taught over and over that paying tithing can break the cycle of poverty. To test this promise, I looked at the relationship between Mormon temples and county-level poverty rates in the U.S. from 2010-2018, using temple locations as a proxy for high levels of tithing participation. This is because members must be full tithe-payers to enter temples, and the church historically considered local tithing obedience when deciding where to build temples (at least they did before RMN). Temples should represent a critical mass of full-tithe payers, producing lower levels of poverty, all else constant.
While this method isn't explicitly testing how tithing payments influence the incidence of poverty, actual tithing data is locked down tight by the Church and unavailable to use. But by controlling for other relevant factors in the analysis I can make a strong argument that it is a decent way of doing things.
I ran several tests using different methods, but found no statistically significant effect between the presence of temples and poverty rates. As far as I know, the Church doesn't provide a clear mechanism for how poverty reduction is supposed to happen after paying tithing, and based on estimates, it looks like the Church hasn't put a lot of effort into targeted anti-poverty measures at the local level with tithing funds. However, the church absolutely has the power to fulfill this promise by administering the tithing program more effectively at the local level, especially considering the vast resources it has accumulated at Ensign Peak.
According to the Widow's Mite report, only about 6% of annual tithing revenues are returned to wards and stakes, while approximately 15% is deposited into the church's investment fund at Ensign Peak. The Church currently has a clear preference to save rather than spend to benefit the poor. Given the size of this fund, the church could allocate much more money to local units, who better understand the needs of their members and can more effectively address poverty in their communities in targeted ways.
The highly centralized and non-transparent nature of the church's finances makes it challenging to determine how tithing funds are being used and whether they are effectively addressing poverty, though estimates by the Widow's Mite show they probably are not doing it well. As a member and researcher, I think we have a duty to critically examine the church's teachings and practices, especially when they impact members' well-being. Taking 10% of someone's income without following through with your end of the bargain is a big deal! While this research doesn't negate the potential spiritual blessings of tithing or the importance of faith, it highlights the need for the church to align its financial practices with its doctrinal promises.
To better fulfill its promise of reducing poverty through tithing, the church should consider decentralizing its financial decision-making, allocating more tithing funds to local units, and using its investment fund to directly support poverty alleviation efforts. Increased financial transparency would allow members to understand how their tithes are being used and hold the church accountable, fostering trust and ensuring that funds are used consistent with Jesus Christ's teachings.
Let me know what you think about this study! The Church has SO MUCH MONEY and they could be doing so many good things with it! If you're interested in reading the full paper, you can find it here.
submitted by Public_Finance_Guy to mormon [link] [comments]


2024.04.09 21:40 cormoranP Whatever happened to Kashmiri Pandit's protest against the government?

“A majority of around 5,000 Kashmiri Pandit employees, who had returned to Kashmir under a special employment package introduced by former Prime Minister Manmohan Singh in 2008, left the Valley in May this year following a spree of killings carried out by militants affiliated to the TRF.”
-The Hindu, 22 Dec, 2022
Kashmiri Pandits had been protesting for about a year against the BJP government and didn’t want to return to the valley after the acts of violence against them by The Resistance Force (TRF). TRF is a terrorist organization that has been targeting innocent people in the aftermath of removal of Article 370. Another point to ponder is that why was this news so downplayed by the mainstream media?
Government had nothing to lose from this and yet the news reached us via the OTT platforms rather than the mainstream media. YouTube channels, digital newspapers and other platforms that reported about it, were obviously falling short of reaching the mass audience of mass media.

"Only Solution, Relocation!"

These were Kashmiri Pandit's chant against the government. When the targeted killings began, people had to leave the place again for their safety and while they would have had to ask only for justice for the killed ones, they also had to protest for relocation as LG Manoj Sinha called them back to report to their duties without assuring their safety.

What was the Special package by Manmohan Singh and why is it backfiring?

In 2008, PM Manmohan Singh announced a 1600 crore package for Kashmiri migrants. This was aimed at rehabilitating the victims of militancy of the past 20 years in the erstwhile state and to provide some sense of justice (however late) to the Kashmiri Pandits who had to abandon their home. In 2010, Singh created around 6000 posts in the Kashmir Division for all the migrant families who left the valley after the inception of armed militancy.
However, in case the employees from the Valley migrate again for any reason whatsoever, they shall lose the job without any notice and shall stand terminated. After the killings began, most of them not only lost their land again, but they stood to lose their jobs as well. Hence, about 5000 of the employees sat on protest against the government, to relocate them to a safer place, given that the government has been unable to provide them with safety in their promised adobe.

Who are TRF?

TRF are a separatist militant organization who are yet another group to crop up in the ongoing insurgency that started in 1989, which had caused the mass migration to begin with. TRF announced their inception after the abrogation of Article 370 and are believed to be a proxy outfit of LeT. The group's name hints at this group's intention of portraying the Kashmir issue as a political one rather than a religious war, as the predecessors have done in the past. Government declared them terrorist organization in Jan, 2023. However, the move didn't come before the organization had killed innocent civilians and army personnels as well. Peerzada Ashiq of The Hindu covered this organization in an article October, 2021.

So why no talk?

So, one would think why would the government that has obviously been sympathetic to the cause of justice for the Kashmiri Pandits, chose to ignore the pleas of the safety shorn people. There may be highly complicated reasons for the government that plays the vishwaguru to the world leaders, but anyone looking at the plain facts would not find it difficult to come to these two conclusions.

What happened then?

We heard no updates about it on either of the platforms. Manoj Sinha’s call to the employees to come back to office was met with fierce protest, and local BJP politicians, Farooq Abdullah, Mehbooba Mufti, Ghulam Nabi Azad and others also demanded protection of the Kashmiri Pandits.
Last update I can find is that a petition by Pandit employees Boopinder Bhat and Yogesh Pandita was made to the central Administrative Tribunal to strike down the clause that terminates the employee if they leave the valley for any reason whatsoever.
submitted by cormoranP to unitedstatesofindia [link] [comments]


2024.04.05 13:53 szilagyipal Változik a fogyasztóvédelmi törvény

Ez a passzusa kerül hatályon kívül, ha elfogadják a Parlament előtt lévő törvényjavaslatot:
45/C. § \* A Nemzeti Adó- és Vámhivatal a fogyasztóvédelmi hatóság részére a 45/A. § (2) bekezdés szerinti feladatainak ellátása érdekében a tárgyhónapot követő hónap 20. napjáig adatot szolgáltat
a) a vállalkozások részére tárgyhónapban kiadott, továbbá
b) – a vállalkozások tárgyhavi adatszolgáltatása alapján – a vállalkozás által a fogyasztók részére átadott
a médiaszolgáltatásokról és a tömegkommunikációról szóló 2010. évi CLXXXV. törvény szerinti, az adatok végleges hozzáférhetetlenné tételét lehetővé tevő alkalmazás egyszeri aktiválásához szükséges adattörlő kódok darabszámáról a vállalkozás elnevezésének, székhelyének és adószámának megadásával.
submitted by szilagyipal to fogyasztovedelem [link] [comments]


2024.04.04 17:34 DeadlyOne7 [Android/Mobile/Tablet][2010-2015] Hack n Slash, Side Scroller, Dark-Themed Warrior/Barbarian, 2D

I'm looking for an old mobile-android game (possibly on other platforms too?) That is a 2D - 2.5D sidescroller, hack-n-slash, roguelike, RPG (similar sidescrolling to Khronos)
I will put some "what I remember in my mind " images in some parts here
The theme is some ruthless warrio barbarian that kills notably skeletons in the beginning along with snake ladies, later demons, and later in late-game angelic-like enemies in a sinister heavenly place.
Selecting the dungeon was on a map and there you could see the regions with few dungeons for each region there were also towns or not a dungeon part that was more empty for buying gear and potions and a blacksmith maybe? But all I know for sure there were some kind of safezones with no monsters but with NPCs
I don't know if there were other classes or genders because I only played one character.
I also remember in the beginning there was some big ugly boss who would later be like the final boss and he had white/skincolor skin, I think he was stationary and legless (similar to this guy's skin color and crowned )
The game is hack and slash and has an infinite combo system. The game is also RPG, with stats, items, enchants, swords, item tiers, with abilities (notably a big whirlwind spinning ability that you can move around like a beyblade and deal tons of hits)
The graphic was not fully pixelated but also not 3D or sharp so somewhere in between, dark style graphics like in Khronos and Never Gone
The title and title screen/menu if I remember correctly had dark and red colors (similar to this)
Any ideas about what game it could be? I think the year is somewhere between 2010-2015.
Will add more info if I remember
submitted by DeadlyOne7 to tipofmyjoystick [link] [comments]


2024.04.04 15:10 DeadlyOne7 Looking for old Hack n Slash Side Scroller, can't find it...

I'm looking for an old mobile-android game (possibly on other platforms too?) That is a 2D - 2.5D sidescroller, hack n slash, roguelike, rpg (similar sidescrolling to Khronos)
I will put some "what I remember in my mind " images in some parts here
The theme is some ruthless warrio barbarian that kills notably skeletons in the beginning along with snake ladys, later demons, and later in lategame angelic-like enemies in a sinister heavenly place.
Selecting the dungeon was on a map and there you could see the regions with few dungeons for each region there were also towns or not a dungeon part that was more empty for buying gear and potions and blacksmith maybe? But all I know for sure there was some kind of safezone with no monster with NPCs
I don't know if there were other classes or genders because I only played one character.
I also remember in the beginning there was some big ugly boss who would later be like the final boss and he had white/skincolor skin, i think he was stationary and legless (similar as this guy's skin color and crowned )
The game is hack and slash and has an infinite combo system. The game is also RPG, with stats, items, enchants, swords, item tiers, with abilities (notably a whirlwind spinning ability that you can move like a beyblade and deal tons of hits)
The graphic was not fully pixelated but also not 3D or sharp so somewhere in between,. dark style graphic like in Khronos. I think
The title and title screen/menu if I remember correctly had dark and red colors (similar as this) Any ideas about what game it could be? I think the year is somewhere between 2010-2015. (Will add more info if I remember)
submitted by DeadlyOne7 to AndroidGaming [link] [comments]


2024.04.03 21:22 gogglesvancouver blackberry-investigated-its-new-ceo-for-sexual-harassment-lawsuit-claims

for fack sakes.

https://www.forbes.com/sites/sarahemerson/2024/04/03/blackberry-investigated-its-new-ceo-for-sexual-harassment-lawsuit-claims/?sh=4c369dd15063
Last December, BlackBerry ended its brief search for a new chief executive officer by appointing its cybersecurity president, John J. Giamatteo, to the role. Today, Giamatteo and the company were sued by a former executive at the company for what she alleges was a pattern of sexual harassment, gender discrimination and retaliation, which BlackBerry knew of before making him CEO, she claimed. She claims she was fired days before Giamatteo’s ascension was announced.
The lawsuit against BlackBerry and Giamatteo was filed by a Jane Doe in the United States District Court for the Northern District of California. It details a series of sexual and workplace harassment complaints made about Giamatteo, and alleges that BlackBerry failed to meaningfully address them and then promoted Giamatteo to his new role. Doe’s attorney Maria Bourn of Gomerman Bourn & Associates told Forbes that it was filed anonymously due to potential unlawful retaliation.
“It feels like death by a thousand paper cuts,” Doe told Forbes in an interview.“On an isolated basis, some of those things might not seem like a big issue. But when it’s happening so regularly and deliberately, it is. It affected me, and it affects many women.”
“BlackBerry is committed to maintaining a respectful and productive work environment free from discrimination and harassment,” spokesperson Camilla Scassellati Sforzolini told Forbes in a statement on behalf of BlackBerry and Giamatteo. “To this end, we do not tolerate, condone, or ignore workplace discrimination or harassment or any unlawful behavior. We conducted an extensive investigation, which found no evidence of wrongdoing or violations of the Company code of conduct, and we are confident that the robustness of our process and its findings will be made evident in court. As such, BlackBerry and Mr. Giamatteo believe that these allegations are without merit and intend to vigorously defend against them in court.” BlackBerry is scheduled to release its quarterly earnings today.
“I felt like I had gone back to the 1980s in tech, where there was truly a culture of misogyny.” Former BlackBerry employee
Forbes spoke to three other women who previously worked alongside Giamatteo at BlackBerry who shared similar details concerning the now-CEO and gender discrimination. All of these women requested anonymity out of fear of retribution. All three claimed they had direct knowledge of several female executives whose roles were diminished during Giamatteo’s tenure as a division president. Two of these sources claimed they had some of their responsibilities removed under Giamatteo’s leadership, and one of them claimed her duties were given to male counterparts. They additionally corroborated Doe’s account of an internal investigation that BlackBerry had launched while Giamatteo was being considered for the position of CEO, regarding alleged complaints of sexual harassment and discrimination that had been made about him. The company did not respond to these claims or address a detailed list of questions sent by Forbes.
“I felt like I had gone back to the 1980s in tech, where there was truly a culture of misogyny,” one of these women told Forbes. “I thought: I started my career that way and now I’m ending my career that way.”
Giamatteo, a Texas resident, joined BlackBerry in 2021 after nearly seven years at the security giant McAfee, where he was president and chief revenue officer in charge of sales and marketing. BlackBerry was attempting to rebrand as “the world’s largest and most trusted AI-cybersecurity company” under the leadership of then-CEO, John Chen, and in 2022 famously decommissioned its iconic phones in a pivot to enterprise software. While overseeing BlackBerry’s $500 million cybersecurity business unit, Giamatteo was given the responsibility of ushering in that new future.
According to the lawsuit, after joining, Giamatteo asked Doe, who had been working at BlackBerry for more than a decade, to begin reporting to him so that they could “travel together,” providing no business reason for this change. Giamatteo subsequently invited Doe to what she believed was a work dinner, but turned out to be a “date,” in which he attempted “to see what [she] would tolerate regarding Giamatteo’s advances,” the lawsuit continued. At one point, Doe alleged that he made comments about his daughters’ ages and attire, and claimed he said that “when he is out with his daughters he gets dressed up, and people think ‘he is a dirty old man’ because it appears he is out on a date with them.’” The plaintiff is younger than Giamatteo and claimed she found his remarks disturbing.
Doe said she subsequently reported these comments to Chen, at which point Giamatteo warned her “that I needed to be nice to him,” Doe told Forbes. After she rejected his advances, she claimed his behavior escalated to “excluding me from things and telling people that he was working on getting me out of the company, and then ultimately getting me out of the company.” (Chen did not respond to a request for comment.)
BlackBerry has never publicly disclosed that Giamatteo was the subject of a sexual harassment review.
Announcing Giamatteo’s CEO role last December, board member Mike Daniels praised his “deep industry experience and outstanding track record of inspiring teams and delivering operational excellence.” Before retiring in October, Chen, a Silicon Valley veteran, had served as BlackBerry’s CEO since 2013 and was succeeded by Interim CEO Richard Lynch.
According to the lawsuit, BlackBerry’s board of directors became aware of sexual harassment claims made about Giamatteo, and in November retained law firm Morrison & Foerster to conduct an internal investigation of Doe’s complaint, as well as the cases of two other women who had allegedly experienced gender discrimination by Giamatteo. At the time, BlackBerry was vetting him for the job of CEO, and on a November 6 leadership call, Lynch had said the board had “run into a couple of process hiccups in appointing the person,” the lawsuit alleged. Doe claimed that she met with the attorneys that same day, whereupon they revealed that they were investigating Giamatteo’s conduct towards women, but informed Doe that she would not face retaliation for her testimony. She claimed that human resources did not appear to be involved in the process.
On December 4, however, Doe alleged that she was fired by Lynch, who presented her with a severance agreement that required her to release all claims against the company, including those of unlawful retaliation. She declined to sign. Lynch announced her departure to the company on December 10, and Giamatteo’s new role was made public the next day.
Despite these alleged complaints, “Giamatteo was not only shielded from consequences but rewarded with a promotion to the highest position in the company,” which set his total compensation at $700,000 with stock valued at $6 million, said Doe’s attorney Bourn.
Two individuals familiar with Morrison & Foerster’s inquiry into Giamatteo claimed to Forbes that it was perfunctory and that some of the women interviewed by the firm never received a follow up about the information they had provided nor the results of the investigation. BlackBerry has never publicly disclosed that Giamatteo was the subject of a sexual harassment review. Morrison & Foerster, which has represented companies like OpenAI and Google in litigation, had not responded to a request for comment at the time of publication.
“I think the board has some accountability in this too, because they allowed this to happen,” said Doe.
BlackBerry, once an $80 billion technology pioneer whose virally popular “CrackBerry” predated even the iPhone, eventually lost the gadget war to competitors like Apple, Nokia and Microsoft, and in 2016 stopped manufacturing its iconic phones before cutting off support for the devices entirely. The 40-year-old company went from controlling nearly half of the U.S. smartphone market in 2010 to none of it.
Last year, Chen, who had a track record for rehabilitating dying tech firms, decided to prioritize BlackBerry’s software offerings and announced that its cybersecurity and internet-of-things divisions would split into two separate business units, with a plan to take its IoT arm public as a subsidiary. Previously, the company had struggled to grow its revenue and cited declines in its cybersecurity unit. Under Giamatteo, however, BlackBerry’s plans to spin out its cybersecurity and IoT pillars have been scrapped.

submitted by gogglesvancouver to BB_Stock [link] [comments]


2024.04.01 19:23 Bardfinn We’re not debating the 2024 POTUS election. Read why —

Federal elections for President of the United States

(because they are performed by the proxy system of the Electoral College, and because of the high prevalence & popularity of the Democratic party and Republican party in the United States),
Are a:
Electoral System.
(These qualities make the POTUS election significantly distinct from many other US federal, state, and local elections.)
The choice to opt-out of the POTUS election, to no-bill all candidates, was precluded in 1787 at the adoption of the Constitution of the United States,0 and never overhauled. That’s what “Locked-In” means. You can’t quit the game.
As a result, every voting-eligible citizen is thrust into an inescapable choice, a kind of Trolley Problem:
Pursuant to the choices of the electorate, one or the other candidate will take power.
Republican or Democratic.
Nothing else.
Choosing to abstain from this vote is simply expressed as “I’m OK with either one”1 , because one of them will be in power. That’s what “Zero-Sum”2 means. If you choose not to decide, you still have made a choice.
Running other “independent” candidates who profess some variation of one major party’s platform is a long-leveraged tactic to “split” support for that major party’s candidate, by peeling off voters who would vote for the major party’s candidate. So is promoting “Well my vote is worthless because my state has historically been [opposition party candidate]’s electoral votes.” They serve to split support, to split the vote, and to suppress turnout1 . That’s what “First Past the Post” means3 .
And the winner is not a lone individual; the winner brings with him or her an entire slate of secretaries, directors, appointees, etc etc etc. It’s an entire executive branch, not merely one person. That’s what “Winner Takes All” means.4
As a result of these qualities of the POTUS electoral system, we observe these facts:
The GOP — which is a theofascist, terrorist cult that agrees with the views and goals of Nazism on LGBTQ people, immigrants, and reproductive rights — as well as the GOP’s ideological allies — want (from you, an eligible US voter in the 2024 POTUS election) the following in order of preference:
  • For you to vote Republican (presumptively Donald Trump);
  • For you to vote for anyone other than the Democratic Candidate;
  • For you to not vote; — and absolute last —
  • For you to vote for the Democratic Candidate.
Anything other than a vote for the Democratic Candidate (presumptively Joe Biden)
is not merely preferred by the Republicans (who, as a reminder, are planning to outlaw reproductive health care, birth control, LGBTQ people, brown people, etc at home and abroad, answering only to party leaders, not to protests or protestors or protest votes)
But is something they actively desire.
So that the 2024 POTUS election, and control of the US Federal government (and thus state and local) be handed to them for at least the next generation.
And as the wisdom says,6
You Do Not, Under Any Circumstances, "Gotta Hand It To Them"
If you’re OK with the US Republican Party controlling any amount of government power,
If you believe that assisting the fascist terrorists that are the US Republican Party is a Good Thing™️,
you are in the wrong space.7
This is a space for analysing and opposing conservative terrorism (the alt-right phenomenon), not helping it seize power.
So if you come here and start trying to play this playbook or demand that people not vote effectively against the seizure of power by seditionist, White Identity Extremist, misogynist, theofascist terrorists —

We ban you.

Further Reading:
*0 Timeline of drafting and ratification of the United States Constitution; Wikipedia Article Available at: https://en.m.wikipedia.org/wiki/Timeline_of_drafting_and_ratification_of_the_United_States_Constitution
*1 Grant M. Hayden, Abstention: The Unexpected Power of Withholding Your Vote, 43 Conn. L. Rev. 585 (2010) Available at: https://scholarlycommons.law.hofstra.edu/faculty_scholarship/560
*2 Zero-Sum Game; Wikipedia Article Available at: https://en.m.wikipedia.org/wiki/Zero-sum_game
*3 First Past the Post Voting; Wikipedia Article Available at: https://en.m.wikipedia.org/wiki/First-past-the-post_voting
*4 Presidency of Donald Trump, Section: Supreme Court Nominations; Wikipedia Article Chapter Available at: https://en.m.wikipedia.org/wiki/Presidency_of_Donald_Trump#Supreme_Court_nominations
*5 Indictments against Donald Trump; Wikipedia Article Available at: https://en.m.wikipedia.org/wiki/Indictments_against_Donald_Trump
*6 @dril on Twitter, 5:02 AM Feb 15, 2017
*7 Be instead anywhere but here. A history class, for preference.
submitted by Bardfinn to Fuckthealtright [link] [comments]


2024.04.01 02:06 Roadkill_Bingo How Mad was March? Average seed among men's NCAA Final Four teams 2000-2024 [OC]

How Mad was March? Average seed among men's NCAA Final Four teams 2000-2024 [OC] submitted by Roadkill_Bingo to dataisbeautiful [link] [comments]


2024.03.31 17:41 deverbovitae Canaan

In few places are so many different environments found in so little of an area. It is a land of milk and honey, the “Promised Land”; and no piece of ground has been fought over, and conquered, more than the land of Canaan.
What the Bible calls the land of Canaan was known to the Egyptians as Djahy, part of the greater area known as Retenu or Khor; later empires would speak of it as part of Beyond the River or Greater Syria. In archaeology it is often deemed the southern part of the Levant; today its land is part of the nations of Israel, the occupied lands of Palestine, Lebanon, and Syria. It extends from the “River of Egypt” near modern-day Gaza east to the Dead Sea and all of the land west of the Jordan River until one reaches the Anti-Lebanon Mountains in the north. On the west the land is bounded by the Mediterranean Sea.
This strip of land extends only about one hundred miles north to south and no more than around sixty miles east to west. And yet the biodiversity of this land remains unparalleled: there are coastal plains which lead to the central hill country, followed by the steepest descent in the world into the Great Rift Valley of the Jordan River; the land becomes drier as one proceeds further south, and becomes more fertile as one goes north. The land enjoys a temperate Mediterranean climate with a dry and rainy season, with the latter generally expressing itself with rains at the beginning and end of the period, the early and latter rains. We can only imagine how much more fertile the whole land of Canaan would have been before the 4.2 Kiloyear event; Lot saw the land to its east as well-watered like the Garden of Eden in Genesis 13:10. Yet even in the later periods of antiquity the land would have proven more fertile than it does today.
Canaan was identified as the son of Ham and likely a product of incest between Ham and his mother, the wife of Noah; for this reason Canaan was cursed to become a slave to his brothers (Genesis 9:18-27). Canaan’s half-siblings were Kush, Mizraim, and Put, the people who would occupy much of northeastern Africa (Genesis 10:6), and Canaan would, at least in part, occupy the land to which his name would be given.
According to the archaeological record, Canaanite populations lived in that land for at least five thousand years, and received significant influence from various Mesopotamian and Egyptian influences. Bronze Age records in the Amarna Letters, records from Ugarit and Hatti, and Akkadian records align with the story we find in the Hexateuch in the Hebrew Bible: the Canaanites lived in various city-states throughout the land of Canaan, which were frequently under the greater control of one or more of the great Bronze Age Empires. The Akkadians would have maintained such an influence in the late third millennium BCE as seen in Genesis 14:1-16; the Egyptians arrived with its New Kingdom by the middle of the second millennium BCE; Thutmose III’s battle at Megiddo was one of the first recorded battles in the land of Canaan.
The Israelites would speak of the peoples of the land of Canaan as the “Canaanites, Hittites, Amorites, Perizzites, Hivites, and Jebusites” (cf. Exodus 3:8, 17). The “Amorites” were the dominant tribe of people throughout Mesopotamia, Syria, and Canaan in the second half of the second millennium BCE (cf. Genesis 15:16). The “Hittites” would be sons of Heth, of whom Ephron sold the Cave of Machpelah to Abraham (cf. Genesis 23:1-20); the “Jebusites” were those who dwelled in Jebus, or Jerusalem (cf. 1 Chronicles 11:4-5). The land of Canaan, therefore, seemed to be populated with various tribes of people who had entered the land at various times in the more distant past.
We tend to speak of the peoples of the southern Levant as Canaanite since they all seemed to speak a Canaanite dialect, made distinct from Aramaic to the north around 1500 BCE. Canaanite dialects include Phoenician, Ammonite, Moabite, Edomite, and, yes, Classical Hebrew. The Phoenicians were Canaanites; they are generally considered a separate culture because of their unique geographical challenges and opportunities. While the Israelite origin story did make much of the Aramean heritage of Abraham, Isaac, Jacob, and their wives and children, it was explicitly revealed how Judah ben Jacob married a Canaanite woman (cf. Genesis 38:2, 6), and it stands to reason how his siblings would likewise have married Canaanite women, save Joseph who married an Egyptian (Genesis 41:50-52). The Israelites, therefore, spoke a Canaanite dialect, had Canaanite ancestry, and, as the prophets would condemn, maintained and upheld Canaanite practices and religion.
At some point toward the end and collapse of the Bronze Age, whether around 1400 or 1250 BCE, the city-states of the Canaanites came under attack by the Israelites under Joshua (Joshua 6:1-12:24). The twelve confederated tribes of Israelites took over part of the eastern Transjordan between Ammon and Moab, what would become the Ephraimite and Judahite hill country, and portions of the coastal plains. These Israelites, along with the remnant populations of the Canaanites and related people, would experience exploitation and oppression from various local groups of growing strength until YHWH would raise a judge or warlord up for portions of Israel to defeat that oppressive force (cf. Judges 3:1-12:15).
In 1178 BCE, Ramses III boasted of having defeated the “Sea Peoples” who had been causing devastation throughout the ancient Near East in a pitched battle in Djahy, likely around southern Lebanon. The advance of the “Sea Peoples” might have thus been checked for Egypt, but it meant a new invading and occupying force in the land of Canaan: the Philistines. It would not take long before the Philistines had established themselves as five city-states in the southwestern corner of Canaan in what would become known as the Philistine Pentapolis of Ashdod, Ashkelon, Ekron, Gath, and Gaza. They would project their force and strength throughout the land of Canaan and oppress the Israelites for many generations.
For most places in the eastern Mediterranean and ancient Near Eastern world, the period immediately after the collapse of the Bronze Age civilizations is reckoned as a difficult time of civilizational collapse with significant disruption, migration, and perhaps loss of life. But for the Levant, this time of the Early Iron Age was a time of increased population and the development of kingdoms. The Canaanites had remained quite divided, with kings ruling over city-states; the Philistines and the Phoenicians along the coast would continue to maintain this kind of structure throughout the first half of the first millennium BCE. Yet various forces had compelled everyone else in the area to develop far more centralized monarchies and kingdoms. Saul, David, and Solomon would thus transition from a charismatic warlord-based system of authority over Israel into a centralized monarchy and even an Israelite Empire subsuming all of Canaan as well as parts of Syria and the Transjordan (ca. 1000-931 BCE; cf. 2 Samuel 1:1-1 Kings 11:43). In so doing, David and Solomon were able to keep at bay a third wave of migration of Aramaean peoples who would come to dominate the lands to their north.
After Solomon there would be a division between the northern Kingdom of Israel and the southern Kingdom of Judah (ca. 930 BCE; cf. 1 Kings 12:1-33). From 930 until 730 BCE, what had been the land of Canaan would be dominated by these two kingdoms, Israel always proving the stronger, yet also best by the occasional invasion from Egypt from the south or the Arameans from the north (cf. 1 Kings 13:1-2 Kings 16:20).
The situation of the land would never be the same again after Ahaz king of Judah hired Tiglath-pileser III king of Assyria against the Arameans and the Israelites (cf. Isaiah 7:1-25). Tiglath-pileser III eliminated Aram as a going concern and significantly reduced the size and influence of Israel; Shalmaneser V and Sargon II would eliminate Israel as a going concern. Thus all of what had been the land of Canaan became part of the Neo-Assyrian Empire, either as directly conquered or as vassal kingdoms, and would continue to be so until its end in 609 BCE. The Assyrians would exile the population of Israel to lands in Assyria, and import people from other parts of Assyria into Israel, developing the people who would become the Samaritans (cf. 2 Kings 17:17-41).
The Kushites who had taken over Egypt did not appreciate the belligerence of Assyria right on its border, and would persuade Hezekiah king of Judah to revolt against Assyrian rule; Sennacherib would devastate all of Judah save Jerusalem in 701 BCE, and perhaps was at least in part sent off by a Kushite expeditionary force (cf. 2 Kings 18:13-19:27). Thus this time until its end in 586 BCE the Kingdom of Judah would find itself a pawn among the powers of Assyria, Babylon, and Egypt.
As Assyrian power waned after the days of Ashurbanipal in 631 BCE, the Egyptians claimed the Assyrians gave them power over the western portions of their empire; after a coalition of the Medes and Chaldean Babylonians destroyed Nineveh and eliminated the Assyrian state as a going concern from 612-609 BCE, the Chaldean Babylonians contested the Egyptian claim. Josiah king of Judah, ostensibly still allied with the Babylonians, attacked Neko king of Egypt’s forces as they traveled to confront the Babylonians in 609 BCE, leading to Josiah’s death; after Neko was decisively defeated by Nebuchadnezzar, he yet continued to attempt to assert authority over Judah by deposing Jehoahaz and installing Jehoiakim as king over Judah (cf. 2 Kings 23:28-37).
Yet Nebuchadnezzar, having become king of Babylon, also asserted his prerogative, besieging Jerusalem in 605 and gaining Jehoiakim’s submission as a vassal. The Egyptians instigated first Jehoiakim in 597 and then Zedekiah in 589, to rebel against Nebuchadnezzar, and it became too much: the Babylonians besieged Jerusalem, captured it, destroyed it, and exiled all the Judahites without repopulating the land (cf. 2 Kings 24:1-25:21). The Babylonians would likewise overcome the Philistine Pentapolis and exile the Philistines to Babylon; they would never return. He would also besiege Tyre for many years, causing great distress to the Phoenicians.
In this way, from 732 until 585 BCE, the land formerly known as Canaan was overrun by the major empires of the age: its cities were devastated and its populations exiled. The land would become part of the province known as Beyond the River. The Edomites would encroach upon Judahite land, gaining the enmity of the Israelites forever in so doing (cf. Obadiah, Malachi 1:1-5).
In 539 BCE Cyrus the Persian entered Babylon and eliminated the Babylonian Empire as a going concern. Beyond the River became a Persian satrapy, and Cyrus would allow Judahite exiles to return to the land of Judah (cf. Ezra 1:1-2:70). Cambyses son of Cyrus would conquer Egypt in 525 BCE, and save for a few small revolts, Beyond the River enjoyed a period of stability and peace throughout the days of the Persians (539-332 BCE). Ezra and Nehemiah testify to the challenges the Judahites experienced in attempting to re-develop and strengthen Judea, especially from the more established, and quite jealous, Samaritans to their north.
In 332 Alexander the Great of Macedon swept through Beyond the River; after his death, “Syria” became part of the Seleucid Empire, while “Judea” became part of the Ptolemaic Empire of Egypt. The Ptolemies and Seleucids would continually fight over the land, and the Seleucids would gain control over Judea in 200 BCE. Until around 167 BCE, the Macedonian Greek rulers were content to be tolerant toward their subjects; but Antiochus IV Epiphanes began imposing Hellenizing customs on his empire, especially in Judea, in 167 BCE, and this led to an insurrection among the Israelites. From 167 until 63 BCE, Seleucid power in Judea would wane, and the Maccabean/Hasmonean insurgents and then kings would create the last independent kingdom that portion of the world would see until modern times.
The western remnants of the Seleucid Empire would be taken over by the Romans in the second and first centuries BCE, and Syria and Judea would become incorporated into the Roman Empire by 63 BCE. Despite some revolts and incursions from eastern empires, the land which had been Canaan would be controlled by the Romans and then the Byzantines until the Battle of Yarmuk in 636 CE.
The Romans attempted to rule over Galilee, Samaria, and Judea by means of proxy kings like the Herods; often they would need to directly rule over Judea by means of procurators or prefects. The first century CE world of Jesus and early Christianity was a time of great unrest in Galilee and Judea as the Jewish people chafed under what they deemed the pagan oppression of the Romans. This unrest boiled over into active revolt twice, leading to the First and Second Jewish Wars of 66-73 and 132-136 CE. The Romans inflicted decisive defeats against the insurrectionists in both wars, leading first to the destruction of the Second Temple, and then the exile of Israelites from Jerusalem and its re-establishment as Aelia Capitolina. The province would become known as Syria Palaestina.
After the defeat of the Byzantine forces by the Muslims at Yarmuk in 636 CE, all of Syria became part of the Umayyad and then Abbasid Caliphate. Western Europeans would invade and conquer part of the land during the Crusades in the eleventh century; they would eventually be defeated, and the land would become part of the Seljuk, Mameluk, and finally Ottoman Empires until 1918. Only after the withdrawal of the French and British after 1947 would the land feature independent rule as the states of Israel, Lebanon, and Syria for the first time in over two thousand years. But conflict has rarely left the land; it remains a crucible of violence and war until this very day.
Thus the land of Canaan, which would become the land of Israel and Palestine, has always been well favored but unfortunately placed in an area of strategic significance for whatever major powers existed in a given day and place. It would only enjoy truly independent rule during times of civilizational collapse and weakness elsewhere. Yet it remains reckoned as holy land by three major world religions, and such has certainly exacerbated the conflicts and tensions within that land. Yet, in Christ we do not prostrate before God in a given geographical location; we prostrate before God in spirit and in truth, for the Spirit of God no longer dwells in a certain building in a certain location but among His people wherever they are. May we faithfully serve God in Christ and obtain in Him the resurrection of life!
Ethan
submitted by deverbovitae to u/deverbovitae [link] [comments]


2024.03.31 01:35 sheldonalpha5 The scourge of Glottocentrism

Glottocentrism privileges language as the only aspect of a person’s identity. It perpetuates essentialist views, simplifying complex linguistic and cultural identities into rigid categories, which do not accurately reflect the complexity of human experience. Glottocentrism not only prioritises one language over others but also overlooks or diminishes other aspects of a person's identity, such as class, gender, sexuality, religion, etc. It reduces individuals or groups to merely their linguistic identity, erasing the richness and complexity of their overall identity.
And that’s where Glottocentrism becomes a nice segue for racism when language is used as a proxy for ‘ethnicity’. By centring language as the raison d’être of one’s life, it reinforces hierarchies and discrimination both within the language group and without. This, in turn, perpetuates systemic inequalities and marginalises communities who may not speak the same language but are otherwise caught in similar spaces and situations due to historical reasons. It destroys any chance of building broader solidarity and implodes in its insular rage.
Glottocentrists often take refuge in ‘ethnicity’, as if it were a simple concept and natural one like water. Ethnicity is not natural; it is as constructed as language. Ethnicity is a label that collapses the complexity of a person’s identity and is often undefinable. For it to make any sense, other equally contentious concepts, such as culture and history, must be invoked as if they are pretty straightforward and uncomplicated. Using ethnicity to defend glottocentrism only further perpetuates simplistic and reductionist views of identity.
It is a circular argument that can only lead you back to where you started, like a dog chasing its own tail in an endless loop of logic.
Glottocentrism, in a nutshell, is the robe of a person whose only sense of self-worth comes from hearing themselves make glottal noises that a handful of people don’t find gibberish.
In the context of Kashmir, Glottocentrism only helps our occupiers. Why else do you think that our occupier (India) is so keen on promoting the various languages of Kashmir? Which coloniser in history has promoted the languages of the people they have colonised? It is the project that helps bolster the ‘5 district’ myth that the Indian state loves to peddle.
No wonder Gaurav Arya advocates this line that only Koshur speakers are Kashmiri, and the most rabid supporters of this line are the America based Pandits who invoke it claim they are the “racially pure” Aryans and the ONLY indigenous people of Kashmir victimised by “centuries of Islamic invasions”, such as Radhika Koul (previously at Yale https://thekoshurfellowship.wordpress.com/about/ now at Stanford https://www.cmc.edu/academic/faculty/profile/radhika-koul. She has Panun Kashmir antecedents https://www.indiatoday.in/magazine/nation/story/20101115-jammu-and-kashmir-revenge-of-the-lambs-744698-2010-11-05).
Kashmir (the state) is a multicultural and multilingual space. Heck, Kasheer is a multilingual, multicultural, and multireligious space regardless of the attempts to homogenise it in either direction.
Kashmiri is a political identity, first and foremost. It is not a linguistic identity so this language noncery is not going to keep it from being erased, it is doing the reverse and accelerating its disappearance. Only a person who lacks self-awareness and is living in an echo chamber can think that language is the beginning and end of the world; it might be the case in other places, but not in Kashmir. Either way, monolingualism is a disease and Glottocentrism is terminal.
submitted by sheldonalpha5 to Mulk_e_Kashmir [link] [comments]


http://swiebodzin.info