The JADE In Jade Helm 15 Is An AI SOFTWARE Program

Source : http://www.thelibertybeacon.com/2015/05/21/the-jade-in-jade-helm-15-is-an-ai-software-program/

Published May 21, 2015, filed under MILITARY, Tyranny

wchildblog.com | 5.20.2015

The DOD’s GLOBAL INFORMATION GRID is going to be the primary framework for network-centric warfare.

JADE = Joint Assistant For Development and Execution: BBN Technologies, Raytheon in conjunction with DARPA

Level9News

“JADE” is an AI quantum computing technology that produces holographic battlefield simulations and has the ability to use vast amounts of data being collected on the human domain, to generate human terrain systems in geographic population centric locations, to identify and eliminate targets, insurgents, rebels or whatever labels that can be flagged as targets in a Global Information Grid for Network Centric Warfare environments.

The JADE II battle field system is cognitive and intuitive. It can examine prior executed battle plans and and devise ‘new and better’ strategies to increase the ‘kill chain’. The II generation of JADE has the capability for two way communication with drones throuh the OCCOM technology which is one of the next generation integrations to this system.

In short, JADE HELM will not be battles directed by Generals and Military Commanders, but by a computer. It is a cognitive software program based on a Network Centric Warfare System at the HELM.

Please get this information out, share, re-post. It would seem the Jade Helm 15 exercise is actually a system roll out and more diabolical than we originally imagined.

Published on 16 May 2015
RISE OF THE MACHINE

“JADE” is an A.I. quantum computing technology that produces holographic battlefield simulations and has the ability to use vast amounts of data being collected on the human domain to generate human terrain systems in geographic population centric locations to identify and eliminate targets, insurgents, rebels or whatever labels that can be flagged as targets in a Global Information Grid for Network Centric Warfare environments.

The JADE II battle field system is cognitive and intuitive. It can examine prior executed battle plans and and devise ‘new and better’ strategies to increase the ‘kill chain’. The II generation of JADE has the capability for two way communication with drones through the OCCOM technology which is one of the next generation integrations to this system.

In short, JADE HELM will not be battles directed by Generals and Military Commanders, but by a computer. It is a cognitive software program based on a Network Centric Warfare System at the HELM.

****************************************­****************************************­******
Please get this information out, share, re-post. It would seem the Jade Helm 15 exercise is actually a system roll out and more diabolical than we originally imagined.
****************************************­****************************************­******

Related Videos:
JADE HELM: “MASTERING THE HUMAN DOMAIN”-1033 Program & Exec Order 13684

AZ Governor’s Response To Resident’s Concerns With Jade Helm15

Robin Sage Is Jade Helm For Eastern US

Research Links:
Official US Defense Department Science Blog
http://science.dodlive.mil/2015/03/16…
DTIC News Wire 10 April 2015
http://www.dtic.mil/dtic/pdf/longrang…
Raytheon BBN Technologies
http://www.raytheon.com/ourcompany/bbn/
JADE Program continuation paper – Tuesday Presentation Details
http://www.dodccrp.org/files/13th_icc…
Mega Data Collection – GWEN Towers
http://www.trunews.com/local-police-d…
NSA Decryption Multipurpose Research Facility
http://censored31.blogspot.com/2012/0…
Is “The Cloud” an Integral Part of the NSA Data Center and Project Bumblehive…??

Recommended viewing on the subject:
Jade Helm – An Expose-Part 2-Infiltration
http://www.watchmanscry.com/News_aler…

http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA3980­21
The AFRL-IF-RS-TR-2001-171 ( Joint Assistant For Development and Execution (JADE) Final Technical Report can’t be opened in a browser, you have to download it and read it using Adobe or word/open office writer.
You can find it by Google: AFRL-IF-RS-TR-2001-171

Advertisements

One response to “The JADE In Jade Helm 15 Is An AI SOFTWARE Program

  1. The History of JADE II: Planetary Conquest By a Global A.I. Warfare System

    Published on 19 May 2015
    This report’s been put out for those viewers who had difficulty understanding all of the technical aspects of the previous report on the JADE II system. While viewing this report replace the term ‘Robot’ and think ‘System’ in the context of the JADE II network centric command and control warfare program.

    The explanations (subtitles) provided in this report are not meant to demonize technology. Technology in the right hands can feed the hungry, cure diseases, efficiently utilize resources and benefit humanity.
    However, history has shown us that the Military Industrial Machine has never used technological innovation to the betterment of humanity.

    Credits:
    The History Channel
    YouTube Channel: Control of Mobile Robots
    – – This person published the History Channel film used in this report I couldn’t find anywhere.

    Related Videos:
    The “JADE” In Jade Helm 15 Is An A.I. SOFTWARE Program

    JADE HELM: “MASTERING THE HUMAN DOMAIN”-1033 Program & Exec Order 13684

    AZ Governor’s Response To Resident’s Concerns With Jade Helm15

    Robin Sage Is Jade Helm For Eastern US

    In short, JADE HELM will not be battles directed by Generals and Military Commanders, but by a computer. It is a cognitive software program based on a Network Centric Warfare System at the HELM.

    Research Links:
    Official US Defense Department Science Blog
    http://science.dodlive.mil/2015/03/16
    DTIC News Wire 10 April 2015
    http://www.dtic.mil/dtic/pdf/longrang
    Raytheon BBN Technologies
    http://www.raytheon.com/ourcompany/bbn/
    JADE Program continuation paper – Tuesday Presentation Details
    http://www.dodccrp.org/files/13th_icc
    Mega Data Collection – GWEN Towers
    http://www.trunews.com/local-police-d
    NSA Decryption Multipurpose Research Facility
    http://censored31.blogspot.com/2012/0
    Is “The Cloud” an Integral Part of the NSA Data Center and Project Bumblehive…??

    Recommended viewing on the subject:
    Jade Helm – An Expose-Part 2-Infiltration
    http://www.watchmanscry.com/News_aler

    The AFRL-IF-RS-TR-2001-171 ( Joint Assistant For Development and Execution (JADE) Final Technical Report can’t be opened in a browser, you have to download it and read it using Adobe or word/open office writer.
    You can find it by Google: AFRL-IF-RS-TR-2001-171

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s