Jade 2 software jade helm

The jade in jade helm 15 is an ai software program the. Most people by now have heard of jade helm 15, but few people actually get why a computer program is going to be running our military or how that is possible. A newly released analysis of the jade helm exercise reveals both sides of the debate are right, but for the wrong reasons. Jade helm fulfills the united states program for general and complete disarmament in a peaceful world state dept pub no.

Jade helm 15 and the january phase 2 coded observation. Jade is a knowledgebased system that uses highly structured information that takes advantage of data hierarchies. Covert skynet on jul 17, 2015 the jade 2 system is a network centric software based artificial intelligence program at the helm ie jade helm. The real existential threat jade helm poses, offers a strategic opportunity for the two factions of the debate to unite to prevent a future takeover of humanity by a threat that may have an alien origin. Rtlsdr software defined radio is a hobby product and requires some technical computer knowledge. Jade helm 2 software system reports strands ski shop. The jade helm 15 conspiracy theories were based on the jade helm 15 united states military training exercise which took place in multiple u. E is an ai system developed by certain contractors for the u. Secondly, the military equipment moved for jade helm 15 is still in place and will still be used at a later date, whether it be during this drill or another, it is. Jade uses dialog initiated both by the user and by. Uwex 16 the successor of jade helm 15 psychological warfare is afoot. Computer program that targets militants, barack obama is a christian, patriot, libertarian, rebel, peace activist. Jade helm 2017 reportedly occurred, at least in part, between may 2 and 5, 2017, according to one official u. But im not sure the term just has any reference to reality when the government uses it.

Jade helm returns in 2016 as unconventional warfare. Generals will no longer be need to direct warfare, it will be directed by a network centric software base, with artificial intelligence at the helm. The jade helm 15 conspiracy theories were based on the jade helm 15 united states military. On may 2, 2015, texas senator ted cruz told the south carolina republican partys annual convention that he. From the trenches world report powered by wordpress and the stix theme. The jade in jade helm is a cognitive ai software based network centric warfare system at the helm. Our missouri senators and house of reps have overidden gov jay dicknuts veto of gun rights somissouri becomes the 11th constituional carry state, on jan 1 2017,we will now be able to exercise 2nd amendment right to carry concealed without a permit,we also have added stand your ground no retreat jade helm 15 back in washington.

The exercise, which involved 1,200 personnel from four of the five branches of the u. This started out as a super computer jade1 that was created to control a army of ais jade helm. Like the first, jade 2 is still moving its way into public and private suburban u. Jade ii is the name of the software and apparently the 2007 experimental run of said software. Jade helm 15 is precognitive technology software, its synthetic. Press question mark to learn the rest of the keyboard shortcuts. Jade helm offers strategic opportunity to prevent alien. Jade helm joint assistant for development and execution is a documented military battlefield procedure. Update on jade 2 software as it relates to geoint updating in the exercise area. Published on april 12, 2015 jade is an acronym for the ai software that will be at the helm of the jade helm 15 military exercise. Jade helm returns in 2016 as unconventional warfare exercise 16 jade helm 16 or unconventional warfare exercise 16 uwex 16 has kicked off the new year by continuing the operations of jade helm 15. An immediate jade helm 15 safety time out should be followed by a call to the united states. Jade helm 15, the huge army specialoperations training exercise.

When submitting, please put the date and source at the end of title in format. It is important to keep in mind that the jade 2 system is not just associated with jade helm 15 but for more extensive and been in place for years. The jade in jade helm 15 is an ai software program from. While jade helm will be one of the largest military training exercises ever. The point of this thread is that has advanced and will be vital hence the namesake in jade helm 15. Here we have a recent video by youtube user highimpactflix where he speaks to a couple of police officers in tulsa, oklahoma regarding what is really going on inside on of the walmarts that has been closed due to alleged plumbing issues. He has asked the pentagon for answers on jade helm 15, may 2. The jade in jade helm is an ai software program published on april 12, 2015 the jade in jade helm is an ai software program. This report brings in the new year 2017, by incorporating the january phase 2 elements previously reported on, and by showing and discussing a new understanding of jade helm 15 and how january 15, plays into the bigger plan that leads to january 23, 2017, a date coded and broadcast as being key and significant to the. This happens to be tishri 2 the new year on the biblical calendar. Software program artificial intelligence for a maniacal plan link to above video. Recently obtained department of defense documents reveal the true nature of jade helm 2015. Military planners will observe how civilians respond to a military presence in their communities, and this information will likely be added to armed forces databases for future force deployment planning. Jade uses artificial intelligence ai technology with casebased and generative planning methods to provide the ability to develop largescale and complex plans in minimal time.

Game content and materials are trademarks and s of their respective publisher and its licensors. This eight week program will coordinate military, local law enforcement and emergency services in a mysterious program. In short, jade helm will not be battles directed by generals and military commanders, but by a computer. The jh15 is named for the jade helm 15 military exercises being conducted across 10 states during the weeks of july 15, 2015 through september 15, 2015.

Army special operations commands unconventional warfare exercise 16 uwex 16 is scheduled in at least three texas counties for march. The ii generation of jade has the capability for two way communication with drones throuh the occom technology which is one of the next generation integrations to this system. From my conversations with a insider federal senior law enforcement agent, i have learned the following is in process in texas and it marks the activation of jade helm 16. The jade in jade helm 15 is an ai software program level9news. Hysteria over jade helm exercise in texas was fueled by russians. Warfare as we know it is changing with the launching of jade helm 15. Today i will share with you what it is, how it works, and little glimpse into what is now on our door step ready for 2 wordsgo time. Jade helm 2017 reportedly occurred, at least in part, between may 2 and 5, 2017, according to. We may finally know what jade helm has stood for all along. Jade helm 16 is going live with the staffing of medical. This page was last edited on 26 august 2019, at 18. Now we are hearing about the ai aspects of the jade helm 2 system linked to the rollout of jade helm 15.

Theyre testing a new command and control protocol called the jade 2 system. It is a cognitive software program based on a network centric warfare system at the helm. Dod, international partners demonstrate, assess technologies at enterprise challenge. Defense contractor oligopoly genocidal control freaks. The ii generation of jade has the capability for two way communication with drones through the occom technology which is one of the next generation integrations to this system. A bastrop crowd made national news earlier this year by accusing a. Jade helm is a massive field training exercise to help special operations forces improve their survival, evasion, resistance, and escape capabilities.

362 350 1477 545 495 996 960 881 688 417 1212 1471 1247 866 520 593 89 1511 1184 970 1342 935 1165 1505 720 409 1345 1169 466 835 1037 413 56 284 53 1075 1137 102 1100 364