1st. It records all information.
2nd. Then a series of washes, the key flagged data.
3rd. Then it IS decyphered for code.
4th. It ends up in the proper analyses group.
5th. Then IT'S fictional-lies-ed for propaganda control and deeming.
The pathways have not once inferred, you are innocent and being fucked with buy their guv-mint.
Because that would reak of tyranny.
If you became conscious.
Of IT!
They mostly come at night.
MOSTLY
And they're the creation of the industrial elite.

No comments:
Post a Comment