
WB Clark
44 posts



Is this the right way to handle protesters who block roads?





Account: @RInserts Display Name at time of suspension: Koch's Postulates Date of Suspension: September 14, 2025 Stated Reason: Violating rules against authenticity ─── I am requesting reinstatement of my account @RInserts, which was suspended on September 14, 2025 for alleged "inauthentic activity." I am a real person. I am a retired law enforcement officer, author, and former licensed private investigator based in Florida. There was nothing inauthentic about my account or my activity on it. The suspension was triggered by mass reporting, not inauthentic behavior. On or around the same date, I was the target of a swatting attack at my home in Vero Beach, Florida — an ongoing tactic of coordinated harassment that has continued since 2008. The account suspension and the swatting occurred simultaneously, which strongly suggests a coordinated campaign by bad actors who mass-reported my account to trigger an automated ban. The "authenticity" charge likely stems from a prior account (@KochsPostulates) that was suspended under Twitter's former COVID-19 misinformation policy. That policy has since been eliminated by X. The content I posted — analysis of PCR diagnostic methodology — is no longer a violation of any X rule. If the original suspension was unjust under a policy that no longer exists, then the "ban evasion" rationale for suspending @RInserts falls apart entirely. I am asking that X review this suspension under its current rules and reinstate the account. I had an active X Premium subscription at the time of suspension. Thank you for your time. @XEng @Safety @ElonMusk









"You can make an AI go insane if you force it to believe things that aren't true - AI must be maximally truth-seeking" —Elon Musk

Texas voter IDs are integers. Whole numbers. No decimals, ever. The Bexar County primary poll book contained 4,110 IDs like this: 1,253,115,467.79993 That alone proves something fishy. But the math goes further — and it’s airtight. When those 4,110 records are sorted in order, the spacing between every consecutive pair is 22,084.82189 — the same non-integer value, repeating 4,109 times. That uniformity is already impossible by accident. Then: 90,746,533.16339 ÷ 22,084.82189 = 4,109.0000 The total span of the sequence, divided by the gap, returns a perfect integer with zero remainder. A randomly generated or accidentally corrupted sequence cannot do that. Only deliberate computation produces that result. Every one of these fractional IDs was created after polls closed — and we can prove it from the IDs themselves. The gap value of 22,084.82189 was derived from the alphabetical positions of specific voters within the completed check-in list. Those positions cannot be known until every voter has checked in and the full list is in hand. The fractional IDs could not have existed before the genuine list existed. They are timestamped by their own construction. The records were not random fabrications. Each was anchored to a real registered voter. 735 real people each had 5 or 6 synthetic duplicates generated in their name — up to 4,110 fraudulent ballot opportunities in a single county primary, executed by someone with back-end write access to the poll book system. The attack vector was an internet-accessible poll book platform reachable from anywhere in the world with a valid username and password. No VPN. No hardware credential. No cryptographic verification on the export that produces the official check-in record. The post-election export workflow contains no hash check and no independent audit mechanism. Anyone with valid credentials could alter the official record for any participating jurisdiction remotely, at any time. That access was used. The fractional ID components functioned as a precise machine-executable deletion key — invisible to poll workers under normal display settings, but recoverable by a single database query after the fact. The injection itself broke the chain of custody. The file was then replaced before formal examination could occur, compounding an evidentiary void that was already irreversible. Officials attributed the anomalies to an export error or electronic glitch. Neither explanation survives contact with the data. A glitch does not solve a two-equation integer system, sort 735 voters alphabetically, derive sequence endpoints from algebraic positions within that sort, and optimize its output for numerical elegance. Glitches do not have specifications. This one did. The fraud in this election is proven. The scale of its impact cannot be determined from any currently available record. An election whose outcome cannot be separated from an unknown quantity of fraudulent ballots cannot be legally certified The same platform operates across 29 states. The Bexar County file was caught only because it was captured during the active window before deletion. A more careful cleanup leaves nothing. The absence of detected anomalies in other jurisdictions is not evidence of integrity — it is evidence that no one was looking at the right moment. This is not a software reliability problem. Unreliable software fails randomly. This algorithm solved a two-equation integer system, sorted 735 names alphabetically, derived its sequence endpoints from algebraic positions within that sort, and deliberately discarded six real voter records in order to produce output whose internal quantities share a common factor of 15. That is a specification. Glitches do not optimize for numerical elegance. The conclusion is the same whether you approach it from this specific case or from my multi-state database analysis published in the Journal of Information Warfare earlier this week: electronic poll book and voter registration systems built on internet-accessible architectures with no cryptographic audit trail cannot be trusted. Not this platform. Not any platform built on the same design. Partial fixes and software patches do not solve the problem when the attack surface is the architecture itself. The only remedy that eliminates rather than mitigates the risk is full replacement — paper poll books, hand counts conducted publicly at the precinct, results posted before anything leaves the building. A paper system cannot be altered from a laptop at 11pm by someone with a stolen password. Peer-reviewed multi-state analysis: Journal of Information Warfare, 2026, 25.2 If you are in one of the 29 states, this concerns you.

👀 Woah. In 2020, SPLC provided funds to FULTON COUNTY to assist in the purchase of additional absentee drop boxes…” and “spent nearly $3 million in the Georgia general and runoff elections…” It’s all starting to come together now. Info found from their own website 👇


White supremacy went up because the SPLC changed the definition and applied it to everybody. Supply and demand problem fixed. Fkn magicians.



