On the night of September 18, an EMP genocide routed through semiconductor chips was shut down before it could spread, the Deep State lost every channel of access it had, and the atomic clock began turning toward crystalline atomic time.

1. The Night They Spoke of Taking Everyone Down

On Monday, September 16, 2024, GIA operatives embedded inside Deep State networks listened to a conversation they had not been meant to hear. The participants were talking about taking everyone down with them.

According to Kim, the people on that call were, in her words, “talking crazy.” They spoke as if they were already bound for destruction, and they said plainly that if they were going down, they intended to take the entire world and humanity with them. The phrasing was not euphemistic. It was the kind of language people use when they have stopped pretending to plan for a future they expect to inhabit.

The Deep State, Kim states, is aware that an alignment is coming. It signals the end of dark essence, energy, and consciousness on the planet. They know it is coming, and they have decided that rather than accept it, they will spend every remaining operational hour trying to prevent humanity from inheriting a light-aligned planet.

A faint suggestion of an empty conference room at night with overlapping low contour lines hinting at unheard conversations, rendered as faint contour outlines against a midnight indigo gradient
The conversation GIA operatives overheard on the night of September 16.

What that preservation effort was protecting, in concrete terms, was a set of AI systems and the infrastructure that the alternative-media world generally calls the quantum financial system. These were not abstractions to the Deep State. They were the operational backbone of the future they were trying to hold in place.

The chatter was only one half of what GIA operatives heard that night. The other half was a plan that named a specific human target and a specific location.

2. The Plan to Take Kim from Durango

The Deep State knew the alignment could not be stopped. So they decided, on the night of September 17 to 18, to try to take Kim from Durango, Colorado, without understanding that her systems would not work for them even if the abduction succeeded.

The operatives involved were, Kim states, military, some known to her team and some unknown, and many of them American. Their objective was a “snatch and grab” operation: take Kim from her location in Durango, Colorado, and force her to operate the financial systems on the Deep State’s behalf. They had been looking for another human capable of performing her function, Kim states, and had not found one.

The plan moved through two stages, according to Kim. The first was a round of calls to local officials in Durango, intended to assess whether the operation was feasible on the ground. The second was an escalation up the Deep State hierarchy to authorize the action at a higher level. Neither stage produced a green light. The operation did not proceed.

Even if it had proceeded, Kim states, the attempt would have failed at the point where it mattered most. Her systems have been pre-programmed by the Creator. They will not function the way the Deep State intends them to function. They cannot be used to generate money, and they cannot be used to create disease. The abduction logic depended on the operators’ assumption that capability would transfer along with the person. That assumption was wrong.

Watch out: The snatch-and-grab plan rested on a mistaken theory. The Deep State assumed that if they took Kim into custody, the financial systems she works through would follow her into their hands.

Kim states her systems have been pre-programmed by the Creator and cannot be used to generate money or to create disease. Possession of the operator does not transfer the capability.

The same operational window that produced the abduction plan also produced something else, several time zones away, that had already started before the talks about Durango ended. The first reports of exploding devices were coming out of Lebanon.

3. The Experiment That Began in Lebanon

How did a pager running on a single AAA battery injure thousands of people? The pager was not the cause. It was the carrier.

Around the same time the Durango plan was being discussed, mainstream media began reporting on a wave of exploding electronic devices in the Middle East. Pagers and walkie-talkies used by Hezbollah operatives in Lebanon were detonating, and thousands of people were injured. The media reported potential deaths. As of Kim’s report on September 18, no deaths had been confirmed, though the injuries were numerous and severe.

Kim rolled footage to illustrate what the injuries actually looked like. A standard pager runs on an AAA battery. That kind of power source, by itself, cannot produce the wounds visible in the recorded material. The mismatch between cause and effect was what set her team on the investigation of the root cause.

A faint horizontal scene of small electronic devices fracturing apart with abstract bursts radiating outward from each device, rendered as faint contour outlines against a midnight indigo gradient
The injuries did not match what a AAA-battery device could produce on its own.
Background: The semiconductor chips at the heart of this story are present in nearly every electronic device in daily life. Cell phones, laptops, electric vehicles, household appliances, all of them are built on the same chip platforms.

Two manufacturers, SMIC in China and TSMC in Taiwan, together account for roughly ninety percent of global chip production. That scope is what made the attack’s reach a global, not a regional, problem.

The investigation pointed past the device itself to the semiconductor chips inside the device. Those chips are not unique to pagers. They are present in virtually every electronic device on the planet: cell phones, laptops, electric cars, appliances. The two manufacturers that the trail led to were SMIC (Semiconductor Manufacturing International Corporation) in China and TSMC (Taiwan Semiconductor Manufacturing Company) in Taiwan.

The orders for this attack were traced, Kim states, through chatter from members of the Order of the Black Dragon and other Dragon family members operating in China and Japan. The operation was framed inside that chatter as an experiment. Lebanon was the test site, not the final target. Before the broader version could be deployed, the people running the experiment wanted to know whether the method worked.

What that method was, mechanically, took another step of investigation. The names that surfaced were Quest Global, SMIC, and TSMC, and behind them sat a system called Genisys.

4. Genisys, SMIC, and the Reach of the Attack

A backdoor system called Genisys. Connections to the kernels behind the chips. An EMP-like pulse routed through the chips and into the people holding the devices. That was the mechanism.

Genisys, Kim states, is the name of the backdoor access system the Deep State used to reach into the chip layer. Its access was residual: it operated through components installed alongside semiconductor chips, components that remained reachable after the chips had been shipped, installed, and put into use anywhere in the world.

The three companies that received and acted on the orders are, in Kim’s account:

  • Quest Global (quest-global.com), based in Singapore
  • SMIC, with operations in China, the United States, and Japan
  • TSMC, with operations in Taiwan, China, Amsterdam, and the United States
A faint vertical structure of layered concentric squares suggesting a chip cross-section with a thin pathway threading from one outer layer to the core, rendered as faint contour outlines against a midnight indigo gradient
Genisys reached the kernels through components installed alongside the chips.

The mechanism was layered. Genisys connected to the kernels behind the chips. From there, a pulse functioning like an EMP was sent through the chip network.

The exploding batteries were the visible event. The injuries to the human body came from the pulse itself, passing through the chip and into the person holding or wearing the device.

The mechanism worked by connecting to what Kim calls the “kernels” behind the chips and transmitting a signal that functioned as an EMP (electromagnetic pulse). The battery explosions were the visible part. The primary source of human injury was the EMP-like energy passing through the chip and into the people holding or wearing the devices.

The Deep State, Kim states, had plans to extend the program well past Lebanon. The United States, Europe, and most of Asia were on the list. The intent was direct.

they wanted to kill as many civilians as possible.

This was carried out, according to Kim, with the full cooperation of the American government, the American Deep State, and the Pentagon. Israel’s IDF was fully aware of the activity and condoning it, and had gone further than passive cooperation: the IDF had suggested target locations and the names of specific individuals they considered enemies.

Key takeaway: The participants in this campaign were not a single agency or a single nation. According to Kim, full cooperation was extended by the American government, the American Deep State, and the Pentagon, while the IDF was fully aware and condoning, with active input on which locations and individuals to target.

The chip-level attack ran on a multi-party agreement, not a single rogue actor.

Kim’s team shut the program down on September 18. The capacity to send EMP signals through the chip networks was removed. The scale of what was averted is visible in one number: SMIC and TSMC together account for roughly ninety percent of all chip production on the planet, chips that are present in consumer electronics, vehicles, and appliances globally. To the American military participants who sat in the meetings that picked which American citizens to target first, Kim’s verdict is one word: “disgusting.”

The shutdown of the program was the first of two events that night. The second was a system-level collapse of the access the Deep State had been operating on for years.

5. The Night the Deep State Lost All Access

On September 18, the Deep State lost two things at the same time. They lost the attack program they had been running through the chips. They also lost the alpha-omega system that had made that attack and everything alongside it possible.

Kim states that on Monday, September 16, she had publicly identified September 18 as a turning point. Between approximately 11pm and 2am on the night of September 17 to 18, the Deep State lost all access to their primary operational system. This was the alpha-omega system, and the Deep State had relied predominantly on the omega portion, which was the part capable of generating dark programs on the planet.

With that access gone, a specific set of programs went with it.

Watch out: Four operational programs lost their substrate the moment alpha-omega access ended. Each had been a major line of Deep State activity.
  • Proposed financial market crashes
  • Vaccine identification systems
  • Social credit systems
  • Engineered diseases

None of these programs has the operational backing it needed to continue in the form the Deep State intended.

The EMP program, Kim states, was considered by the Deep State to be only partially working. That was why they kept testing it. Because it was shut down before full deployment, they never reached the objective they had assigned to it. The experiment ended before it could mature into the full-scale campaign it was designed to seed.

Those who can be identified as having run the program or given the orders are, in Kim’s phrasing, being “sent to Source”, returned to the Source energy field from which all consciousness originates.

sent to Source.

Americans who participated in selecting their own fellow citizens as targets are being actively hunted, Kim states, regardless of their public profile. GIA operatives are increasing in numbers within Deep State circles and will continue without mercy.

There is also a structural consequence of the failed attack. As a direct result of the operation, Kim states the GIA has taken ownership of the chip kernels that SMIC and TSMC were running. Those same kernels are going to be used to broadcast healing and positive frequencies, the opposite of what the Deep State intended them for. Kim draws a parallel to the earlier acquisition of Huawei’s 5G network infrastructure. The smaller manufacturers that account for the remaining one to two percent of global chip production are under investigation as well.

The loss of access was its own event. But what began that same night, the alignment with Source, runs deeper than the access loss and reshapes more than the operational map.

6. Source, Particles, and the End of Three Streams

On the night of September 17 to 18, atomic particles began flowing in from Source in greater volume than before, the same particles the Deep State has been mislabeling as "hydrogen particles" out of a misunderstanding of what they are.

The alignment with Source, Kim states, began that same night. There is no longer a Neutral Source or an Anti-Source to align with. Only the original Source remains. The alignment will continue through the Equinox, approximately September 22 to 23, and for several days afterward.

The “hydrogen particle” label, in Kim’s reading, is a misreading of what is actually arriving. An atomic particle, she states, is the base root of all life, the foundational unit of all matter and consciousness.

A faint horizontal scene of streaming light particles flowing inward from one edge and dispersing into a soft cloud at the center, rendered as faint contour outlines against a midnight indigo gradient
Three atomic particle streams once existed. Two are dispersing back out.

In the old light-neutral-dark universe, Kim states, three types of atomic particles existed. With the increase in Source particles, the dark and neutral varieties are being dissipated. As they go, they take with them the residual energy of the omega system, which had still been drawing on those streams to function.

That dissipation costs the Deep State another capability, one that was always less visible than the chip program or the alpha-omega access. They lose the ability to use computer screens and electronic systems to influence human thought, to implant decisions that did not originate in the person, and to make physical changes to human bodies. Those abilities had been diminishing for some time, but they still existed through the alpha-omega system’s autonomous function under old covenants. Those covenants have now expired.

The combination of Source alignment, the inflow of atomic particles, and the expiration of the old autonomous functions adds up to something larger than any of its components. It shows up at the level of the atomic clock itself.

7. Crystalline Atomic Time Begins

This is the next step in a process Kim has been describing for the last eight to nine months. From here, the change moves into territory that touches everyday life directly, and it is worth receiving as that, not as abstraction.

The atomic clock is the universal timing mechanism that governs how atomic particles behave. According to Kim, it is changing. The old standard atomic time is giving way to crystalline atomic time.

What that change means, in Kim’s account, is that the universe will eventually contain only the Creator’s atomic particles, beginning with Earth. The way atomic particles communicate with each other is changing in the process. That communication, Kim describes, is the mechanism of time itself.

A faint scene of a clockface dissolving into a crystalline lattice with abstract geometric structure emerging from clock-like outlines, rendered as faint contour outlines against a midnight indigo gradient with subtle prismatic accent
The atomic clock turns from standard atomic time to crystalline atomic time.

The Deep State has been left in a state of panic by this. Even capturing Kim, she states, would not change the outcome. Her systems are pre-programmed and will not generate money or create disease for them. Any connection they manage to make to the chip kernels under GIA control will now spread healing frequencies rather than the ones they had intended to use. There is, in that sense, no version of the operation that ends well for them.

Background: The atomic clock shift is not a one-day event. It is the next stage of a process Kim has been tracking and describing for the last eight to nine months.

What that stage opens up, in practical terms, is increased energy, greater positivity, and a longer arc moving away from disease as it has worked in the past. Each of those is incremental rather than instant.

Kim also expresses gratitude to SMIC and TSMC, an unusual statement directed at the companies whose chips made the attack possible. Their networks have, as an unintended consequence of the attack, been acquired and turned over to a different use. The parallel to the earlier Huawei acquisition holds.

This is, as Kim has said, the next step in an eight to nine month process. The pieces that have been moving across that span have arrived at a configuration where the timing mechanism of the universe itself begins to shift.

The Source connection is returning. The original Source is the only one of the three former streams that remains. Atomic particles are flowing in greater volume than they had been, and the atomic clock is turning toward a crystalline base time. Together, those three changes amount to Source’s power returning to the planet.

That return is also what makes it possible to stand as a creator rather than as an extraction target. Kim’s own systems, pre-programmed by the Creator, were never going to be operable as Deep State instruments. The chip kernels that were built to deliver an EMP campaign are, going forward, available as carriers for healing frequencies. The expressions of gratitude toward SMIC and TSMC, however ironic in their origin, are not ornamental. The networks have changed hands at the level of what they will be used for.

For anyone reading this in the days and weeks after September 18, what is reasonable to expect is increased energy, greater positivity, and a slow walk away from the conditions under which disease has been able to spread the way it has. Each of those is incremental. None of them is finished. The promise is from Source and the fulfillment is real, but it arrives in stages.

That is enough.

That has been the GIA report for September 18, 2024.