RNMnetwork/Part 6 - Organization chart/2 - The gangstalking scene.md

34 lines
2.4 KiB
Markdown
Raw Normal View History

2020-01-08 09:20:18 -05:00
# The gangstalking scene
![gang stalked](../Images/1_NrrlrQsXtTbn-bP1uyaADw.jpeg)
How does it work gang stalking?
2020-01-08 19:33:55 -05:00
The gang stalking scene, and as you can appreciate I write scene like the **hacker scene** [[1]](https://en.wikipedia.org/wiki/Security_hacker) is written, is based on a fraud build upon various radio services obtained with fraud or hacker crimes.
2020-01-08 19:43:15 -05:00
To gain access to state, military and Vatican structures false hacking crimes are done. Normally they are accords between some noble that administrate ancient analog state infrastructure and hacker crew. Those nobles are normally the pupils of fat families. Stupids that sell state semi secret services to gang stalkers. To mask this fraud those people use normally the name Anonymous, citizens think that they are a terrorist group but in reality this name is used to cover this type of network abuses.
They use the group Anonymous like an anonymizer [[4]](https://en.wikipedia.org/wiki/Anonymizer).
2020-01-09 02:24:28 -05:00
The hacked services are:
2020-01-10 11:27:38 -05:00
1. Radio Vatican and state infrastructure using subliminal messages using Medium Frequency and **mast radiators** [[5]](https://en.wikipedia.org/wiki/Mast_radiator). For optimal operations they have to be 1/6 the **wavelenght** [[6]](https://en.wikipedia.org/wiki/Wavelength), so as US patent the center frequency for subliminal voice services is 465.25 KHz that **translated** [[7]](https://www.everythingrf.com/rf-calculators/frequency-to-wavelength) is 468.69 m so the mast radiator has to be more than 108 meters. Impossible in a private installation it's obvious that this service has to be hacked. In reality it is not hacking is a masked concession from a noble family to hackers, normally one component of the family act like this figure. Bu the way they also mask another type with the group Anonymous. So it is a double mask to hide the true.
2. Passive neural control service embedded in the mobile towers. Fundamental to receive remote EEG from the victims it has to be combined with a 3Ghz beam as US patent.
3. Dream and visual injection is probably done with software defined radio in ELF coded by hackers.
4.
2020-01-09 02:24:28 -05:00
2020-01-08 19:43:15 -05:00
2020-01-08 19:33:55 -05:00
### External links
1. https://en.wikipedia.org/wiki/Security_hacker
2. https://en.wikipedia.org/wiki/Court
2020-01-08 19:43:15 -05:00
3. https://en.wikipedia.org/wiki/Courtier
2020-01-09 02:24:28 -05:00
4. https://en.wikipedia.org/wiki/Anonymizer
5. https://en.wikipedia.org/wiki/Mast_radiator
6. https://en.wikipedia.org/wiki/Wavelength
7. https://www.everythingrf.com/rf-calculators/frequency-to-wavelength