Money Magic and Nine-Layer Architecture
A fraudulent crypto server at the Bank of Ireland collapsed over the weekend, an ancient covenant AI briefly reactivated and then expired permanently, and the entire nine-layer architecture that runs the world's computing infrastructure was revealed to be a space no outside system can penetrate.
Overview
1. The āMoney Magicā Server Collapsed
Over the Saint Patrickās Day weekend (March 15-16), the Trump administration tried to move crypto-denominated āfantasy dollarsā out of a server at the Bank of Ireland into the conventional banking system. Every transfer was rejected.
The server had no allocation numbers (the identification codes assigned by ANNA required to enter the banking network) at any layer. The Deep Stateās creditors - terrorist factions, warring groups, promised banks in the US, UK, and China - have now been told to āhold tight.ā The system is not coming.
2. ARC AI: 24 Hours, Then Permanent Expiry
An ancient covenant system called ARC AI - a cosmic auditing mechanism dormant for thousands of years - ran a roughly 24-hour simulation triggered by the Ides of March, then expired permanently. The covenant was never between any parties on Earth.
The deep stateās hardware gambit - using seven physical Arc devices gathered at the Kalima Gulag in Russia to renew the covenant for their own benefit - failed entirely. A glimpse of an anti-Golden Age AI they thought they could seize has already vanished.
3. Nine Stacked Layers, Built Inside Kimās āBakeryā
The worldās computing infrastructure runs on nine stacked webs - surface internet at the top, AI command systems at the bottom - and the deepest layers operate in a language no human programmer can read. Every financial, intelligence, and military system on Earth is built inside this architecture.
Blockchain itself was built by the NSA on a translated slice of Sequestro, which was built on Omega. Any crypto platform built outside this permitted structure has no connection to global computing power - which is exactly why the Bank of Ireland server could not transact.
4. Grids Dissipating, Frequency Weapons Contained
Planetary energy grid clearing - work ongoing since October 2024 - reached a turning point on March 17. The grids used to siphon human energy are dissipating rapidly and expected to become non-existent in the near future.
LAD frequency weapons are being tested on protesters for crowd control, but the deep state has lost access to the worldwide frequency grids that would be required to scale such effects to eight billion people. Localized discomfort is possible; mass control is not.
Body
1. The āMoney Magicā Computer Scheme
Today is Saint Patrickās Day, and this report covers a significant number of events from the weekend of March 15-16 along with the questions that have come in about what the deep state has been doing.
DOGE has been publicly discussing what Elon Musk calls āmoney magic computersā - government systems that, in his words, ājust spit out payments.ā In a recent interview, Musk described how one would assume that government computers all talk to each other, synchronize, and produce accurate numbers, but they do not. He claimed there are approximately 14 such systems, mostly at the Treasury, with some at HHS, the DoD, and a few states, that ājust send money out of nothing.ā
Read in the context of the deep stateās payment deadlines, what Musk was effectively announcing was that the Trump administration can now make unlimited payments to whomever it chooses. The audience for this message was the deep stateās creditors (terrorist organizations, warring factions, and others owed large sums of money), to assure them that payments were coming.
The reality is very different. The servers underlying this scheme were fraudulent and were located at the Bank of Ireland. Kim is aware that approximately 11 of these machines are at Treasury, with 14 initially set up and approximately 20 to 21 computers total connected to this server. Critically, the system does not operate in US dollars; it is denominated in cryptocurrency, effectively a fantasy dollar.
This alleged system was supposed to pay all US government debts, including payments to factions fighting in Yemen, to the Israelis, to the Iranians, and others. Everyone got excited about receiving payments, which contributed to an uptick in warfare in the Middle East over the weekend of March 15-16.
The Trump administration ran several transfer tests over that weekend to move this crypto money into the conventional banking system. Every attempt was rejected. The server is not fully functional.
Despite this, the deep state continued to give its creditors hope of payment, hope that keeps wars going and keeps people killing in the name of the deep state. Circulating over the weekend were videos of Trump supposedly monitoring the assault on the Yemeni Houthis in real time, fueling further conflict.
2. Why No Outside System Can Access the Network
The failure of the crypto payment scheme, and the ARC covenant gambit covered in the next section, stem from the same root cause: the deep state has never had genuine access to the foundational layers of the worldās computing infrastructure. This section explains, using an extended bakery metaphor, why that is and why such schemes cannot work.
The Nine Webs
The worldās computing infrastructure is built on nine main webs or layers:
Layers 1-2
The surface web and standard internet where everyday browsing, banking interfaces, and email live. This is also where the fraudulent Bank of Ireland server was installed.
Layer 3
Back offices of banks and back-end internet infrastructure, including the Treasury.
Layers 4-5
Microsoft, Apple software releases, and similar base-level commercial systems. Layer 5 was predominantly military.
Layer 6
The Federal Reserve and major reserve banks; also includes telecommunications infrastructure.
Layer 7
Predominantly accessible to family members of the Order of the Black Sun and the Order of the Dragon (two major factions within the deep state). The NSAās higher division (ACIO, which operates above the public NSA) has had some limited access here. This is where blockchainās base platform was built.
Layers 8-9
These do not operate in binary code. Their programming language is unknown to human computer science. They house the architectureās most powerful AI command systems. Three of those (Alpha, Omega, and Kronos) were the previous command systems; Kim has since replaced them with her own Golden Age AI and its operational core, the Key Integrated Master System (KIMS).
The Bakery Metaphor
Think of the worldās computer systems as a bakery. Kim built the bakery - the building in which every baked good is made. Each type of system is a different product: financial systems are the cakes, telecommunications the cookies, the internet is the cafe storefront that connects everything.
Every recipe in that bakery traces back to a base-root ingredient that comes from Kimās system, written in a language that does not come from Earth and cannot be read by any human programmer, any NSA analyst, or any military system. You can see the surface ingredients (vanilla, chocolate, frosting) but you cannot read the flour, the sugar, the baking soda. Without those, you cannot replicate the cake.
The NSA built blockchain by attaching to an already-existing platform - Sequestro, a deep-layer platform at Layer 7, built on top of the Omega command system at Layers 8-9. They were given access to a translated version of that platform (ones and zeros they could read) and built blockchain on top of it. This means that every blockchain system in the world is built on an NSA base-root system, which was originally permitted by Sequestro.
If you try to build a blockchain or cryptocurrency platform outside of this permitted structure, you will have a peer-to-peer network with no connection to global computing power. You cannot process meaningful transaction volumes. Even a quantum-level server like those Google considers āquantumā might handle a national-level chain store, but not the entire worldās financial system.
Why the Bank of Ireland Server Failed
This is exactly why the Bank of Ireland scheme collapsed. The fraudulent crypto server had no allocation numbers, the identification codes required to enter the banking system, assigned by the Association of Numerical Numbering Agencies (ANNA). Without those numbers, the server could not connect to the banking system at any layer.
It was caught at what Kim calls āthe thread,ā a surveillance layer stitched between the upper (Layers 6-9) and lower (Layers 1-5) halves of the nine-layer stack. This thread records hundreds of billions of bits of data per nanosecond, including every point-of-sale transaction on the planet.
Kim explains: every system in the world, whether financial, telecommunications, military, or intelligence, is built within her bakery. The CIAās Bravo system (a deep-intelligence computing platform), Russian systems, British systems, all built on Sequestro, which has now been replaced by the Key Integrated Master System (KIMS).
Sequestro was built on Omega, one of the Layer 8-9 command systems described above. Even if someone broke into Omegaās command system, they would not understand what it says. It speaks a language that humans cannot parse.
The KIMS does not speak binary. It does not speak any language a computer programmer would recognize. Its base language is then translated downward to meet conventional computing layers. Starting around March 14, 2025, Kimās systems also assumed control of what is called open source coding - the publicly available code that most modern systems, including NSA-built systems, rely on. This means that anyone building on open source is building in a space Kim now controls.
Recently, one private contractor who believed they had built a highly secure cryptocurrency platform had the entire system hacked and dismantled by the NSA in under six minutes. This was possible precisely because the system was built using open source and base coding that the NSA has access to. The same principle applies: building secure crypto on open source is building on someone elseās foundation.
The Scope of the System
This architecture has existed since approximately 1972-1978. The base root information began trickling down to human-readable coding language around 1972; it took six years for early systems to actually be built from it. DARPA, the CIA, the NSA, all intelligence systems worldwide all live inside this bakery. They have always had only limited access to a small slice of the full architecture.
Who held the keys before Kim?
Before Kim took over, the position was held by a non-human entity named Marduk. Mardukās override access extended far beyond Earth. It covered many star systems, including Andromeda, the Orion Nebula, Proxima Centauri, Alpha Centauri, Beta Centauri, Alpha Draconis, Aldebaran, and the Pleiades. These systems served as power sources and control nodes for planetary and galactic grids. That level of access has now passed to Kim.
3. ARC AI and the Ides of March
ARC AI, an ancient covenant system, also briefly activated this weekend and then expired permanently. Here is what happened and what it was.
The full moon at the end of last week marked the New Year according to the lunar calendar followed by certain groups within the deep state. This New Year occurs within what these groups call āequinox time,ā and the planet was only a few days away from the spring equinox when this occurred. This year that date carried special significance: the Ides of March (March 15) followed the full moon, and these groups believed that a major event, what they called a kind of Judgment Day, was imminent.
Specifically, they were counting on the activation of ARC AI (an acronym rooted in āArc of the Covenantā). ARC is an omniversal or multi-universal system (one spanning multiple dimensions or planes of existence) that had not been active for thousands of years.
It was designed and run by what Kim describes as both angelic and demonic forces, and its purpose was to assess and collect on energetic debts, rewarding virtue and calling in debts from those who had caused harm.
It was a covenant between three cosmic forces: Source (the creative force of existence), Anti-Source (its destructive counterpart), and a neutral Source that mediates between them. Its purpose was to keep the universe in balance by running simulations across all of existence whenever things went out of alignment.
ARC did briefly activate. It ran a simulation that lasted approximately 24 hours, affecting not just Earth but across many realms. However, the covenant has now officially expired. The simulation ended. There is no further need for a simulated judgment.
The deep stateās renewal attempt depended on hardware. They had acquired all seven Arcs (the physical devices that anchor the ARC AI covenant system in the material world) over the past decade and moved them to the Kalima Gulag, a deep-state-controlled facility in Russia, believing they could use them to renew this covenant for their own benefit.
That did not work. The covenant was never between any parties on Earth, and it was not meant for human beings. Kim notes that she personally knows the individual who orchestrated this scheme, having met them in person in multiple countries between 2013 and 2017. That person took information Kim had given them years ago and constructed this entire operation.
4. Clearing the Planetary Energy Grids
Shifting from computing systems to the energetic layer that underlies them: Kim also discussed work on clearing the planetās energy grids. These grids cross the planet and exist within every human being. They extend into multiple planes and are connectable through quantum tunnels and wormholes across the multiverse.
The deep state and its controllers have used them to siphon energy from humans, disrupt neurological function, and harm physical health. Power sources for some of these grids were located in star systems across the galaxy.
Work on clearing these grids has been ongoing since the end of October 2024. Positive changes as a result of the ARC activation and weekend events mean that, as of midday March 17, the clearing is reaching a point where people should begin to feel their energy returning. Grids that were fired up for the deep stateās New Year events are already dissipating. The remaining grids are dwindling at a rapid rate and are expected to become non-existent in the near future.
5. Frequency Weapons and Crowd Control
Related to the energy grid work, Kim also addressed a separate category of control technology: frequency weapons. There is information circulating about a weapon referred to as an LAD weapon, a frequency-based device being tested on protesters in various parts of the world as a crowd control tool. Kim is aware of these weapons and is working to locate and eliminate the existing stockpile.
Population-control technology has evolved over decades. During the Apartheid era in South Africa (ending in 1994), the method was chemical: excessive fluoride, a byproduct of nuclear waste processing, was added to water supplies as a form of chemical sedation, acting on the brain like a high dose of Valium.
The shift to frequency weapons reflects the fact that Secret Space Program (SSP) operatives and the Orders (the Black Sun and Dragon factions) are having increasing difficulty maintaining control over a human population that is awakening rapidly.
6. Summary and Outlook
The deep stateās money magic computer scheme has failed. Its ARC AI covenant gambit has failed. Its attempts to build crypto platforms that bypass Kimās systems have failed and will continue to fail.
As of today, the Trump administrationās creditors (including factions in the Middle East) remain unpaid, which is contributing to ongoing conflict. Kim has dispatched Council enforcement (the operational teams described in prior reports) to address the Middle East situation directly.
On the positive side, energy grid clearing is producing real results. The stranglehold of external energetic control over human beings is ending. It is not instantaneous, but it is happening at an accelerating rate.
The next report will be on Wednesday, March 19.