Watssup, I know this should probably go under the "Truth" section, but I found the Mylow section more appropriate, hopefully you agree.
Now that the final Mylow project has been sufficiently proven false by several attentive members I would like to bring forward something which you may not agree with.
After my initial reaction of disappointment and even slight anger directed at Mylow I decided to go back into the archives of all his recordings:
http://www.youtube.com/profile?user=LRCan1&view=videos&start=80
...and see if I could spot the now infamous fish line belt drive.
I could not find it in any of the initial setup videos.
Then it struck me... Mylow was on the level.
Please keep reading.
If you watch Video #1 through video #32 you will notice several things.
Mylow´s dialogue & behaviour is completely different than in the videos with the "other" setup. He is much more relaxed, DESPITE the attacks that he received from day one on Youtube. He simply ignores these attacks with a few snide remarks in reference.
He shows a device running starting at video #6 with a miniature version of the HJ rotor magnets which are grouped in 2 x 3 with one group of 4, and almost identical spacings.
No wire I can detect, and the complete left side of the device is shown.
Now, all of a sudden things start to become ugly.
First, Sterling gets involved. Next thing we know Mylow retreats because he has been threatened by someone who he was introduced to by his lawyer. The device as shown is taken and later returned. He screams he faked it.
All of a sudden Mylow starts posting again, but this time with bar-rotor magnets and different stator. Enter the fishline era. Mylow is no longer relaxed at all and changes his presentations.
The sage continues, Mylow has a nervous breakdown on camera, directing more and more anger towards the skeptics. He has a presentation with his brother with only six rotor magnets, and the hints in the direction of fake are almost too clear to ignore. ClickClick.
Finally, OU members with eagle eyes spot the anomaly of the wire & the final Mylow project is over.
Here is my theory.
Mylow, up to the point of Sterling´s involvement (coincidence?) was on the level.
He did manage to get real rotation in the initial configuration shown.
This is brought to the attention of an unnamed third party, who alerts the designated contact in the NSA. (Or whatever- A congressman seems to have confirmed the agents visit).
I think that during that meeting with the agent & the lawyer several things were discussed in a very serious tone with Mylow. The fact that his device was removed or not is not relevant. What is relevant is that at a certain point Mylow was leaned on by government, and leaned on hard. He could either cooperate to clean up this mess or face federal charges for obstruction of justice, endangerment of national security, and without doubt a host of other "offences".
Mylow chose to cooperate. A team of assistants was brought into Chicago to assist Mylow in directing the operation and to make sure Mylow did not screw this up for his own good. The plan was to continue the saga with a different model, but this model needed to be faked because it does not work. The fake had to be elaborate, but not so obvious as to spot it right away. I urge you to watch the evolution of the videos and note Mylows attitude.
The only way this could have ended was the exposure of Mylow as a fake, for which he would receive immunity from prosecution for his previous project & possible a monetary compensation.
The presentation with his brother was a prelude to the deliberate exposure of the fake. His final videos (including the one he lost his temper) were the icing on the cake. Now look at his last three videos. Look at his eyes. He is forced to lie.
So far my theory.
The reasons for the way this project ended are obvious:
Mylow was onto something and presented something he shouldn´t have.
Mylow was forced to self destruct to misdirect attention from the original project using a secondary project that does not work. The attention to the initial configuration had to be redirected at all costs.
You will not hear from Mylow again, mark my words.
For what it is worth, I will try and replicate his original project using the exact same materials once I can lay my hands on them, especially the rotor magnets seem a challenge at this time.
Succesfully replicating his original design is the only way to confirm or negate my theory.
Thanks for listening.
AZ
Interesting theory. Here's something that will make it more exotic and worth writing a book about.
What if mylow put secret messages in his NSA w/e approved videos ;D . What if, when he was saying "every magnet is different" he really meant to use different magnets i.e. his original stone henge magnets. What if in his videos he was secretly pointing towards fakery and trying to expose the truth. Yes things would get a lot different and the crap mountain would reach the moon.
Well I for one am determined to get to the bottom of this... My hunches have proven quite accurate all throughout my life.
I tell you one thing, if I can get a model anywhere near running I am not making the same mistake that Mylow made. In the (unlikely) scenario where I can get a running model I will go into lockdown mode, and anyone setting foot on my land who I do not know will face deadly force from the .50 cal twins.
I have learnt more about government and the way it operates to preserve itself in the last three years than I care to recount thank you very much.
They are all liars & killers - no exception.
"khhhhc... update on 'The Zodiac', over."
"khhhchc.. go ahead."
"khhc.. we may want to keep the SGSC option open. over."
"khhc.. roger. out"
Quote from: Psyclone on May 18, 2009, 03:26:33 PM
"khhhhc... update on 'The Zodiac', over."
"khhhchc.. go ahead."
"khhc.. we may want to keep the SGSC option open. over."
"khhc.. roger. out"
ECHELON is alive and listening.... 8)
Want proof? Here a few trigger words:
Rewson, SAFE, Waihopai, INFOSEC, ASPIC, MI6, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, The Artful Dodger, NAIA, SAPM, ASU, ASTS, National Information Infrastructure, InfoSec, SAO, Reno, Compsec, JICS, Computer Terrorism, Firewalls, Secure Internet Connections, RSP, ISS, JDF, Ermes, Passwords, NAAP, DefCon V, RSO, Hackers, Encryption, ASWS, CUN, CISU, CUSI, M.A.R.E., MARE, UFO, IFO, Pacini, Angela, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, SALDV, PEM, resta, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, SAMU, COSMOS, DATTA, Furbys, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, ram, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, SADCC, NSLEP, Daffy Duck, SACLANTCEN, FALN, 877, NAVELEXSYSSECENGCEN, BZ, CANSLO, CBNRC, CIDA, JAVA, rsta, Active X, Compsec 97, RENS, LLC, DERA, JIC, rip, rb, Wu, RDI, Mavricks, BIOL, Meta-hackers, ^?, SADT, Steve Case, Tools, RECCEX, Telex, Aldergrove, OTAN, monarchist, NMIC, NIOG, IDB, MID/KL, NADIS, NMI, SEIDM, BNC, CNCIS, STEEPLEBUSH, RG, BSS, DDIS, mixmaster, BCCI, BRGE, Europol, SARL, Military Intelligence, JICA, Scully, recondo, Flame, Infowar, FRU, Bubba, Freeh, Archives, ISADC, CISSP, Sundevil, jack, Investigation, JOTS, ISACA, NCSA, ASVC, spook words, RRF, 1071, Bugs Bunny, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, JIC, bce, Lacrosse, Flashbangs, HRT, IRA, EODG, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, site, SASSTIXS, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, SARD, LABLINK, USACIL, SAPT, USCG, NRC, ~, O, NSA/CSS, CDC, DOE, SAAM, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, LLNL, bemd, SGC, UNCPCJ, CFC, SABENA, DREO, CDA, SADRS, DRA, SHAPE, bird dog, SACLANT, BECCA, DCJFTF, HALO, SC, TA SAS, Lander, GSM, T Branch, AST, SAMCOMM, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, benelux, SAS, SBS, SAW, UDT, EODC, GOE, DOE, SAMF, GEO, JRB, 3P-HV, Masuda, Forte, AT, GIGN, Exon Shell, radint, MB, CQB, TECS, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, SART, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, diwn, 747, ASIC, 777, RDI, 767, MI5, 737, MI6, 757, Kh-11, EODN, SHS, ^X, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, NSS, Duress, RAID, Uziel, wojo, Psyops, SASCOM, grom, NSIRL, D-11, DF, ZARK, SERT, VIP, ARC, S.E.T. Team, NSWG, MP5k, SATKA, DREC, DEVGRP, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, MEU/SOC,PSAC, PTT, RFI, ZL31, SIGDASYS, TDM. SUKLO, Schengen, SUSLO, TELINT, fake, TEXTA. ELF, LF, MF, Mafia, JASSM, CALCM, TLAM, Wipeout, GII, SIW, MEII, C2W, Burns, Tomlinson, Ufologico Nazionale, Centro, CICAP, MIR, Belknap, Tac, rebels, BLU-97 A/B, 007, nowhere.ch, bronze, Rubin, Arnett, BLU, SIGS, VHF, Recon, peapod, PA598D28, Spall, dort, 50MZ, 11Emc Choe, SATCOMA, UHF, The Hague, SHF, ASIO, SASP, WANK, Colonel, domestic disruption, 5ESS, smuggle, Z-200, 15kg, DUVDEVAN, RFX, nitrate, OIR, Pretoria, M-14, enigma, Bletchley Park, Clandestine, NSO, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Enemy of the State, SARA, Rapid Reaction, JSOFC3IP, Corporate Security, OSAll, 192.47.242.7, Baldwin, Wilma, ie.org, cospo.osis.gov, Police, Dateline, Tyrell, KMI, 1ee, Pod, 9705 Samford Road, 20755-6000, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, M-x spook, Z-150T, Steak Knife, High Security, Security Evaluation, Electronic Surveillance, MI-17, ISR, NSAS, Counterterrorism, real, spies, IWO, eavesdropping, debugging, CCSS, interception, COCOT, NACSI, rhost, rhosts, ASO, SETA, Amherst, Broadside, Capricorn, NAVCM, Gamma, Gorizont, Guppy, NSS, rita, ISSO, submiss, ASDIC, .tc, 2EME REP, FID, 7NL SBS, tekka, captain, 226, .45, nonac, .li, Tony Poe, MJ-12, JASON, Society, Hmong, Majic, evil, zipgun, tax, bootleg, warez, TRV, ERV, rednoise, mindwar, nailbomb, VLF, ULF, Paperclip, Chatter, MKULTRA, MKDELTA, Bluebird, MKNAOMI, White Yankee, MKSEARCH, 355 ML, Adriatic, Goldman, Ionosphere, Mole, Keyhole, NABS, Kilderkin, Artichoke, Badger, Emerson, Tzvrif, SDIS, T2S2, STTC, DNR, NADDIS, NFLIS, CFD, BLU-114/B, quarter, Cornflower, Daisy, Egret, Iris, JSOTF, Hollyhock, Jasmine, Juile, Vinnell, B.D.M., Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, rusers, Covert Video, Intiso, r00t, lock picking, Beyond Hope, LASINT, csystems, .tm, passwd, 2600 Magazine, JUWTF, Competitor, EO, Chan, Pathfinders, SEAL Team 3, JTF, Nash, ISSAA, B61-11, floss, Alouette, executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Tarawa, COSMOS-2224, COSTIND, hit word, hitword, Hitwords, Regli, VBS, Leuken-Baden, number key, Zimmerwald, DDPS, GRS, AGT. AMME, ANDVT, Type I, Type II, VFCT, VGPL, WHCA, WSA, WSP, WWABNCP, ZNI1, FSK, FTS2000, GOSIP, GOTS, SACS STU-III, PRF, PMSP, PCMT, I&A, JRSC, ITSDN, Keyer, KG-84C, KWT-46, KWR-46, KY-75, KYV-5, LHR, PARKHILL, LDMX, LEASAT, SNS, SVN, TACSAT, TRANSEC, DONCAF, EAM, DSCS, DSNET1, DSNET2, DSNET3, ECCM, EIP, EKMS, EKMC, DDN, DDP, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, SUW, J2, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, Fernspah, MYK, GAFE, forcast, import, rain, tiger, buzzer, N9, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, freedom, Macintosh Internet Security, OC3, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, Z, WTO, sweeping, SURSAT, 5926, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, NAIAG, Cypherpunks, NARF, 127, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, J-6, Pornstars, AVN, Playboy, ISSSP, Anonymous, W, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, SUBACS, the, Elvis, quiche, DES, 1*, N-ISDN, NLSP, OTAR, OTAT, OTCIXS, MISSI, MOSAIC, NAVCOMPARS, NCTS, NESP, MILSATCOM, AUTODIN, BLACKER, C3I, C4I, CMS, CMW, CP, SBU, SCCN, SITOR, SHF/DOD, Finksburg MD, Link 16, LATA, NATIA, NATOA, sneakers, UXO, (), OC-12, counterintelligence, Shaldag, sport, NASA, TWA, DT, gtegsc, nowhere, .ch, hope, emc, industrial espionage, SUPIR, PI, TSCI, spookwords, industrial intelligence, H.N.P., SUAEWICS, Juiliett Class Submarine, Locks, qrss, loch, 64 Vauxhall Cross, Ingram Mac-10, wwics, sigvoice, ssa, E.O.D., Vx, SEMTEX, penrep, racal, OTP, OSS, Siemens, RPC, Met, CIA-DST, INI, watchers, keebler, contacts, Blowpipe, BTM, CCS, GSA, Kilo Class, squib, primacord, RSP, Z7, Becker, Nerd, fangs, Austin, no|d, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, BROMURE, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Starr, Wackenhutt, EO, burhop, Wackendude, mol, Shelton, 2E781, F-22, 2010, JCET, cocaine, Vale, IG, Kosovo, Dake, 36,800, GBC, Hillal, Pesec, Hindawi, GGL, NAICC, CTU, botux, Virii, CCC, ISPE, CCSC, Scud, SecDef, Magdeyev, VOA, Kosiura, Small Pox, Tajik, +=, Blacklisted 411, TRDL, Internet Underground, BX, XS4ALL, wetsu, muezzin, Retinal Fetish, WIR, Fetish, FCA, Yobie, forschung, emm, ANZUS, Reprieve, NZC-332, edition, cards, mania, 701, CTP, CATO, Phon-e, Chicago Posse, NSDM, l0ck, beanpole, spook, keywords, QRR, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, NSWT, press-release, WISDIM, burned, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Enforcers, e-gold, Digicash, zip, SWAT, Ortega, PPP, NACSE, crypto-anarchy, ^X, AT&T, SGI, SUN, MCI, Blacknet, ISM, JCE, Middleman, KLM, Blackbird, NSV, GQ360, X400, Texas, jihad, SDI, BRIGAND, Uzi, Fort Meade, *&, gchq.gov.uk, supercomputer, bullion, 3, NTTC, Blackmednet, :, Propaganda, ABC, Satellite phones, IWIS, PDD, Planet-1, ISTA, rs9512c, Jiang Zemin, South Africa, Sergeyev, Montenegro, Toeffler, Rebollo, sorot, Yucca Mountain, FARC, Toth, Xu Yongyue, Bach, Razor, AC, cryptanalysis, nuclear, 52 52 N - 03 03 W, Morgan, Canine, GEBA, INSCOM, MEMEX, Stanley, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, WASS, WID, Dolch, secure shell, screws, Black-Ops, O/S, Area51, SABC, basement, ISWG, $@, data-haven, NSDD, black-bag, rack, TEMPEST, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, ISAF, unclassified, Sayeret Tzanhanim, PARASAR, Gripan, pirg, curly, Taiwan, guest, utopia, NSG, orthodox, CCSQ, Alica, SHA, Global, gorilla, Bob, UNSCOM, Fukuyama, Manfurov, Kvashnin, Marx, Abdurahmon, snullen, Pseudonyms, MITM, NARF, Gray Data, VLSI, mega, Leitrim, Yakima, NSES, Sugar Grove, WAS, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, XM, Parvus, NAVSVS, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, blow out, BUDS, WQC, Flintlock, PABX, Electron, Chicago Crust, e95, DDR&E, 3M, KEDO, iButton, R1, erco, Toffler, FAS, RHL, K3, Visa/BCC, SNT, Ceridian, STE, condor, CipherTAC-2000, Etacs, Shipiro, ssor, piz, fritz, KY, 32, Edens, Kiwis, Kamumaruha, DODIG, Firefly, HRM, Albright, .SC, Bellcore, rail, csim, NMS, 2c, FIPS140-1, CAVE, E-Bomb, CDMA, Fortezza, 355ml, ISSC, cybercash, NAWAS, government, NSY, hate, speedbump, joe, illuminati, BOSS, Kourou, Misawa, Morse, HF, xechelon.org, P415, ladylove, filofax, Gulf, lamma, Unit 5707, Sayeret Mat'Kal, Unit 669, Sayeret Golani, Lanceros, Summercon, NSADS, president, ISFR, freedom, ISSO, walburn, Defcon VI, DC6, Larson, P99, c4i.org, HERF pipe-bomb, 2.3 Oz., cocaine, $, imapct, Roswell, ESN, COS, E.T., credit card, b9, fraud, ST1, assasinate, virus, ISCS, ISPR, .VA, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, WWSV, Atlas, IWWSVCS, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, SASSTIXS, IWG, Lynch, 414, Face, Pixar, IRIDF, NSRB, eternity server, Skytel, Yukon, Templeton, Johohonbu, LUK, Jackson, Cohiba, Soros, Standford, niche, ISEP, ISEC, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, NSOF, DC7, Glock 26, snuffle, Patel, package, ISI, INR, INS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, LITE, PKK, HoHoCon, SISMI, ISG, FIS, MSW, Spyderco, UOP, SSCI, NIMA, HAMASMOIS, SVR, SIN, advisors, SAP, Monica, OAU, PFS, Aladdin, AG, chameleon man, Hutsul, CESID, Bess, rail gun, .375, Peering, CSC, Tangimoana Beach, Commecen, Vanuatu, Kwajalein, LHI, DRM, GSGI, DST, MITI, JERTO, SDF, Koancho, Blenheim, Rivera, Kyudanki, varon, 310, 17, 312, NB, CBM, CTP, Sardine, SBIRS, jaws, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, meta, Faber, SFPD, EG&G, ISEP, blackjack, Fox, Aum, AIEWS, AMW, RHL, Baranyi, WORM, MP5K-SD, 1071, WINGS, cdi, VIA, DynCorp, UXO, Ti, WWSP, WID, osco, Mary, honor, Templar, THAAD, package, CISD, ISG, BIOLWPN, JRA, ISB, ISDS, chosen, LBSD, van, schloss, secops, DCSS, DPSD, LIF, J-Star, PRIME, SURVIAC, telex, Analyzer, solo, embassy, Golf, B61-7, Maple, Tokyo, ERR, SBU, Threat, JPL, Tess, SE, Alex, EPL, SPINTCOM, FOUO, ISS-ADP, Merv, Mexico, SUR, Gorel, blocks, SO13, Rojdykarna, RSOC, USS Banner, S511, 20755, ytcracker, airframe, jya.com, Furby, PECSENC, football, Agfa, 3210, Crowell, moore, 510, OADR, Smith, toffee, FIS, N5P6, isn@c4i.org, EuroFed, SP4, Walnut, shelter, Crypto AG.
That should take a few cycles away.
(waves to satellite)
Interesting, Aquarius.
Has anyone seen a fish line in the earliest "channel rotor mag" vids (i guess it would have to be the 2 filmed before the "MIB" story)? A string seen in one of those would shut it all down...
Except for the REAL question of who, if anyone, was behind it all, and what was their goal ;)
I agree in the later videos he did not look or sound very credible at all, kind of furtive and nervous; preoccupied, struggling for words.
About the "NSA Visit" stuff, we are faced with a few choices to think about:
> That the NSA really came to his house after-all to check it out, took it, found it was a hoax, then sent it back. This would PARTIALLY explain the comment from the Congressional aid filtered third-hand through Sterling's friend.... Although presumably the "hoax" part SHOULD HAVE been mentioned along with the message if this was the case; Those in the Committee could possibly have had a good laugh over it, but what would be the point of not mentioning the "hoax" part in the communication back to the friend? It only makes them look like "suppressors" otherwise. So that scenario doesn't add-up all the way yet and leaves more questions than it answers.
Or, as you suggest as a possibility, it could be that they then "took over" and made it into an "operation"; completely manipulating Mylow from there on out.
> Or, going with the "Mylow and Brother as lone assassins" theory lol, that the whole NSA thing never happened, and someone lied about it. This would appear to be unlikely in Sterling's case, being duped is not the same as being a liar by a long shot (and it would be a very risky thing for him to claim for little gain; you don't want to mess with false claims about a U.S. Congressman who sits on the Homeland Security Committee for the hell of it). But it's possible someone there in the loop lied, so who knows for sure? Only Mylow, Sterling's friend, and the Congressional aid on the phone would, apparently. And if there was a lie; what were the motives for it? There's the real question.
"Mylow as simple prankster" having "confederates" to plant the story on Sterling?...That one sounds pretty absurd and would appear the least likely of all. This Congressional Office thingie appears to be the major "loose end" here.
The whole visit to Virginia to see the HJ grave is interesting. A strange thing for a prankster to do, it's no fun to travel 1,200 miles by car just for a hoot or two at other's expense, especially when it would be predicted to do little for his rising credibility problems... We were loudly calling for independent verifications by then; and nothing else except successful replications would help... That trip was a net "negative" for credibility; not a positive.
I do know, that besides going to the grave site Mylow did meet with at least one other person there (maybe more). Was the idea to lure these people over to his side, to gain their support? Or maybe to spread disinfo to them, that could then come out later from another direction and help his "cause"? Might have been. Assuming it was the "MIB controllers" behind it all, was he ordered to coopt the person or persons he met with into going along with the "kool-aid party", or with some particular plan, so they then would be later utterly discredited along with the revelation of "hoax" (possibly meant as a means of discrediting Howard Johnson's work too)? Hard to say... But then we must also start considering the role of the Peswiki -associated person who accompanied Mylow on the trip. Lol it gets convoluted ;)
Also, there is the possibility that the whole thing was an "MIB" operation from the get-go (perhaps "professional psy-ops" is a better description)... Which means it may not be NSA at all behind it, but some corporate interest or other quasi-government front, who knows. In this case the Congressional office may have gone along with it just out of common ground ;)
These are all kinda fun and interesting to think about, but there could be an element of deadly seriousness here as well: Personally, i don't like the idea of these pys-ops creeps possibly "messing" with us AT ALL. And if this was exposed to be the case, it shows that we, everyone involved including Sterling... Are victims not "perps". Or not, i'm not trying to push a specific theory here, only point out that there could be a tremendous amount we still don't know about this whole thing.
Good points.
Please note that the Virginia visit was post-Sterling hence according to my theory part of the PsyOP.
I do not think this was a PsyOP from the start, but I am strongly suggesting that starting with the resurrection of Mylow after the "threat" the whole thing went into Government containment hands.
In this case I feel for Mylow...
I urge serious replicators to grab the archived YouTube videos of the original stonehenge setup just in case YouTube decides to invoke a violation.
Good luck to those who are willing.
AZ out.
So then nothing can ever be debunked or proven false because when you are exposed you just say MIB made me do it but I was really on the level.
Are you reading this, M? See, I told you so, the fakes are being accused of being fake fakes. So Mylow's faking is now considered proof (or at least evidence) that he wasn't faking.
I swear, you just cannot make this stuff up.
:D
That is absurd, no one is saying anything like that at all, as i suspect you well know...
You are just miffed that some people didnt clap for the required 10 minutes ;)
Eh, no one is offering these points as "proof" of anything, they are ideas worthy of debate.
Lol, but the problem is they are ideas that arn't following the current Party line... And thus the denigration and attack mentality ;)
I didn't like this when i saw this a couple weeks ago on the Mylow group either (going the other way). It doesn't matter who's doing it, its bad for the exchange of ideas (...and i often wonder if that is the actual point of it).
What's going on now i blame it on the "adrenalin addiction syndrome" lol... Polite discussion just doesn't seem ego-gratifying enough any more. Brow-beat them into submission! Impress your will on someone! Regular old debate pails in comparison to that fun lol ;)
I am reporting that video #41b (the last video of the original setup but with a new stator magnet) is proven a fake using audio analysis and LightRiders acceleration graph.
http://www.overunity.com/index.php?topic=7039.msg180263#msg180263
This only leaves #6 now, the one with the black stator magnet.
I hope LightRider can do an analysis here as well to determine without a doubt the validity of the device as shown in #6. It would save a lot of time & money for quite a few people, including myself.
AZ
Proof of people just want to believe, is what all of this is.
I would only partially agree with that, in that the "belief" part appears to be about what OTHERS want us to believe about this case ;)
I have just been pointed in the direction of "Shiloh".
This comes from Sterlings page: http://pesn.com/2009/05/16/9501541_How_Does_Mylow_Do_It/
"Is Mylow Shiloh?
One thing that has become clear to me as I've been covering this Mylow saga and the legend of Howard Johnson, is that Howard was very passionate about a prophecy to the effect that after he passed on, a person would come along who would be a very simple person who would carry on his work. He called him "Shiloh" and said "He will have a simple mind like a child." He would visit his gravesite, and that would be one way he would be identified. He instructed his family that this person was the one to whom his hitherto undisclosed drawings and effects should be passed on to.
Mylow explains that he chose the pseudonym "Mylow" because that was his dog's name -- one of his favorites. I can say that from my vantage point of hearing about the prophecy and observing Mylow, that he is a spot-on match to the prophecy.
Some years ago, Tom Bearden tried to convince HJ that John Bedini was that person. Bedini is an extremely gifted scientist, and hardly fits the "mind of a child" description. Mylow, on the other hand, fits that description to a tee."
Is it possible that Mylow was a fabrication of someone else who wants to put his hands on the Howard Johnson legacy?
Yes, that could be.
But who? Maybe someone who was close to HJ?
It had to be someone in close contact with Mylow from the start and before...
This does still not disprove the first setup, but does shed new light on the whole matter and certainly on the question of "Why". Thanks to Hans for drawing attention to it.
More thinking needed here for sure.
How about it ALFPARTS, care to comment here? (as you seem to ignore my private request I sent you for the original HJ notes)
AZ
This thread is now locked.
The others will also be locked in the coming days except for the Discussion thread.
Please refer to the main topic list of threads to see which ones are still open.
http://www.overunity.com/index.php?board=117.0