mirror of
https://github.com/noplacenoaddress/RNMnetwork.git
synced 2025-03-25 16:38:27 -04:00
Add files via upload
This commit is contained in:
parent
305330a370
commit
491691e66a
69779474_720902378352277_2238194920659615744_n.jpgChapter four - laws.mdChapter one - gangstalking.mdChapter three - machine.mdChapter three - services.mdChapter two - cyberstalking.mdComprehensive_List_of_Relevant_Pathways_for_the_Visual_System.pngGray722.pngGray722.svgResting_State_Networks_and_their_topographic_EEG_signatures.jpgVisual-association-areas-Primary-Cortex-Areas-627x550.webpbjork-tv.pngf8_mz_d.jpg
BIN
69779474_720902378352277_2238194920659615744_n.jpg
Normal file
BIN
69779474_720902378352277_2238194920659615744_n.jpg
Normal file
Binary file not shown.
After ![]() (image error) Size: 77 KiB |
16
Chapter four - laws.md
Normal file
16
Chapter four - laws.md
Normal file
@ -0,0 +1,16 @@
|
||||
# Laws violated by BRAINnet
|
||||
|
||||
### Crimes and internationals laws about gangstalking and gaslighting
|
||||
|
||||
Is gangstalking and gaslighting only related to drug debt or another kind of debt? Absolutely not. And this is another reality that no one speak about. In fact who fall down in the gaslight vortex has very few opportunities to survive without commit suicide to himself. Who fall down in that word of shit will be threated like a dog, like an animal, like an **human guinea pig**. A person that is connected to the network in the infographic upon will lost eleven articles of the **Universal Declaration of Humans Rights**:
|
||||
|
||||
- article 1: all human beings are born free and equal in dignity and rights. [...]
|
||||
- when a victim is inserted in the synthetic telepathy network, aka gangstalking and gaslighting network, lost is freedom because of the lost of privacy. Stalkers first of all can read his mind, see what he see via his brain in a sort of man-in-the-middle attack between the auditory and visual cortex. Can also change what the victim receive about the external world with a sort of data injection attack; voice onfly rewrite, voice carbon copy, augmented reality objects injected and so on. Speaking about dignity and rights when the victim suffer street teather and gaslighting is public humillated and induct to suicide.
|
||||
- article 2: everyone is entitled to all the rights and freedoms set forth in this Declaration, without distinction of any kind, [...]. Furthermore, no distinction shall be made on the basis of the political, jurisdictional or international status of the country or territory wich a person belongs, [...].
|
||||
- why victim loose the second article is the same motivation of the first
|
||||
- article 3: everyone has the right to life, liberty and the security of person.
|
||||
- also this article is destroyed when it speaks about liberty and like the second is for the reasons explained in the first.
|
||||
- article 4: no one shall be held in slavery or servitude: slavery and the slave trade shall be prohibited in all their forms.
|
||||
-
|
||||
|
||||
1.
|
@ -13,7 +13,7 @@ From this verb we can extract the noun **stalking** [[5]](https://en.wikipedia.o
|
||||
|
||||
1. Hunting for game by moving silently and stealthily or by waiting in ambush.
|
||||
2. The crime of following or **harassing** another person, causing him or her to fear death or injury.
|
||||
3. The removal of stalks from bunches of grapes prior to winemaking.
|
||||
3. The removal of stalks from bunches of grapes prior to wine making.
|
||||
|
||||
We can appreciate in bold two times words with root in the verb **to harass**, from old French:
|
||||
|
||||
@ -21,13 +21,13 @@ We can appreciate in bold two times words with root in the verb **to harass**, f
|
||||
2. To annoy endlessly or systematically; to molest.
|
||||
3. To put excessive burdens upon; to subject to anxieties.
|
||||
|
||||
We speak about **gangstalking** [[6]](https://www.urbandictionary.com/define.php?term=gang%20stalking) when we refer to the stalking of an individual by a large number of people who coordinate their stalking activities. Normally used by criminals organizations to claim a drogue debt, to induct to suicide an opposer, to aniquilate a political figure, to limit a expecially creative brain or to generate thousand millons euro.
|
||||
We speak about **gangstalking** [[6]](https://www.urbandictionary.com/define.php?term=gang%20stalking) when we refer to the stalking of an individual by a large number of people who coordinate their stalking activities. Normally used by criminals organizations to claim a drogue debt, to induct to suicide an opposer, to annihilate a political figure, to limit a especially creative brain or to generate thousand millions euro.
|
||||
|
||||
Has you can see in the image on top of the paragraph i've used the Spanish name "**Luz de Gas**" [[7]](https://ca.wikipedia.org/wiki/Fer_llum_de_gas) that is the traduction of **gaslighting** [[8]](https://en.wikipedia.org/wiki/Gaslighting) that is a form of psychological manipulation in which a person seeks to sow seeds of doubt in a **targeted individual** [[9]](https://www.urbandictionary.com/define.php?term=targeted%20individual) or in members of a targeted group, making them question their own memory, perception, and sanity. Using persistent denial, misdirection, contradiction, and lying, gaslighting involves attempts to destabilize the victim and delegitimize the victim's belief.
|
||||
Has you can see in the image on top of the paragraph I've used the Spanish name "**Luz de Gas**" [[7]](https://ca.wikipedia.org/wiki/Fer_llum_de_gas) that is the translation of **gaslighting** [[8]](https://en.wikipedia.org/wiki/Gaslighting) that is a form of psychological manipulation in which a person seeks to sow seeds of doubt in a **targeted individual** [[9]](https://www.urbandictionary.com/define.php?term=targeted%20individual) or in members of a targeted group, making them question their own memory, perception, and sanity. Using persistent denial, misdirection, contradiction, and lying, gaslighting involves attempts to destabilize the victim and to invalidate the victim's belief.
|
||||
|
||||
From the name of "Luz de Gas", a practice that without technology was executed also by the franquist falangist in the Catalan Republic, we can arrive to the word of a defunct masonry whos name is "**illuminati**" [[10]](https://www.nationalgeographic.com/archaeology-and-history/magazine/2016/07-08/profile-adam-weishaupt-illuminati-secret-society/). In Italy and in all over the world nowadays is utilized by a pseudo digital dictature that is doing terrorism in Europe. Does illuminati really exist? For sure simply search the hashtag **#illuminati** [[11]](https://www.instagram.com/explore/tags/illuminati/) [[12]](https://twitter.com/search?q=%23illuminati&src=typd) in Twitter or in Instagram, in this one with infographics this masonry have got more than two millons of results. It's all about the audiovisual industry.
|
||||
From the name of "Luz de Gas", a practice that without technology was executed also by the Franco's phalanx in the Catalan Republic, we can arrive to the word of a defunct masonry which name was "**illuminati**" [[10]](https://www.nationalgeographic.com/archaeology-and-history/magazine/2016/07-08/profile-adam-weishaupt-illuminati-secret-society/). In Italy and in all over the world nowadays is utilized by a pseudo digital dictatorship that is doing terrorism in Europe. Does illuminati really exist? For sure simply search the hashtag **#illuminati** [[11]](https://www.instagram.com/explore/tags/illuminati/) [[12]](https://twitter.com/search?q=%23illuminati&src=typd) in Twitter or in Instagram, in this one with infographics this masonry have got more than two millons of results. It's all about the audiovisual industry.
|
||||
|
||||
But what is a pseudo dictature? Is a form of a state under the declared state. *A B*-side of the democracy where black markets, stalkings, sexual harrassments, illegal control is done. Normally is regulated by a **pyramid structure **[[13]](https://en.wikipedia.org/wiki/Organization#Pyramids_or_hierarchies) with **paramilitary** [[14]](https://en.wikipedia.org/wiki/Paramilitary) or **mercenary** [[15]](https://en.wikipedia.org/wiki/Mercenary) forces controlling the victims that fall in with a gangstalking or the workers, drug sellers or prostitute.
|
||||
But what is a pseudo dictatorship? Is a form of a state under the declared state. *A B*-side of the democracy where black markets, stalkings, sexual harassments, illegal control is done. Normally is regulated by a **pyramid structure **[[13]](https://en.wikipedia.org/wiki/Organization#Pyramids_or_hierarchies) with **paramilitary** [[14]](https://en.wikipedia.org/wiki/Paramilitary) or **mercenary** [[15]](https://en.wikipedia.org/wiki/Mercenary) forces controlling the victims that fall in with a gangstalking or the workers, drug sellers or prostitute.
|
||||
|
||||
|
||||
|
||||
@ -37,15 +37,15 @@ But what is a pseudo dictature? Is a form of a state under the declared state. *
|
||||
|
||||

|
||||
|
||||
Basically gangstalking and gaslighting are based upon the sistematically destruction of your past and present. *Love, friendship, work, home, pets and your posessions are loose* in a short period of time. I've got a personal experience about a pattern used in these tortures. We can speak about "**target individuals**", and i use the plural because there are always two victim, **a men and his love**. It's simple, the man loose all his life like i've said before and the woman like one year after start to think that world have changed and that she'll meet with this man another time after a **sexual game**. *She thinks that this is a game, very similar to what we found in the internationals ready-made television formats*. The two targets are separeted and inducted to suicide with a mental destroyer situation, normally a gangstalking for him and a **gang bang** [[16]](https://en.wikipedia.org/wiki/Gang_bang) (manies) for her. The two in different time range, him usually one or half year before, are victims also of what is knowed as **brainwashing** [[17]](https://en.wikipedia.org/wiki/Brainwashing). The twos in different time laps are victims of stalkers that are normally **mind hackers** [[18]](https://www.gitbook.com/) that try to change the basics of them lifes. The man usually have no money, no friends and no sex. Go in **major depressive disorder** [[19]](https://en.wikipedia.org/wiki/Major_depressive_disorder) and tipically live of what he founds on the street, so the society classify them as indigents and sick with **diogenes syndrome** [[20]](https://en.wikipedia.org/wiki/Diogenes_syndrome) and **compulsive hoarding** [[21]](https://en.wikipedia.org/wiki/Compulsive_hoarding). The woman is blocked in a vortex of sex and orgies thinking that she is partaking in a game, every game for the women i think that has got one year of time with the goal of four years in total. All of this is brainwashing. First of all when the two separetes, that is the start of the loose of all his goods for the man, the woman is betrayed to go away from him with hoax. Next she's got a relation with a personal trainer or a figure like this to have got a perfect body in vision of the games that nothing more are than illegal pornography selled in video on demand bitcoin stores and be a victim of human trade every week.
|
||||
Basically gangstalking and gaslighting are based upon the systematically destruction of your past and present. *Love, friendship, work, home, pets and your possessions are loose* in a short period of time. I've got a personal experience about a pattern used in these tortures. We can speak about "**target individuals**", and i use the plural because there are always two victim, **a men and his love**. It's simple, the man loose all his life like I've said before and the woman like one year after start to think that world have changed and that she'll meet with this man another time after a **sexual game**. *She thinks that this is a game, very similar to what we found in the internationals ready-made television formats*. The two targets are separated and inducted to suicide with a mental destroyer situation, normally a gangstalking for him and a **gang bang** [[16]](https://en.wikipedia.org/wiki/Gang_bang) for her. The two in different time range, him usually one or half year before, are victims also of what is known as **brainwashing** [[17]](https://en.wikipedia.org/wiki/Brainwashing). The twos in different time laps are victims of stalkers that are normally **mind hackers** [[18]](https://www.gitbook.com/) that try to change the basics of them life. The man usually have no money, no friends and no sex. Go in **major depressive disorder** [[19]](https://en.wikipedia.org/wiki/Major_depressive_disorder) and typically live of what he founds on the street, so the society classify them as indigent and sick with **Diogenes syndrome** [[20]](https://en.wikipedia.org/wiki/Diogenes_syndrome) and **compulsive hoarding** [[21]](https://en.wikipedia.org/wiki/Compulsive_hoarding). The woman is blocked in a vortex of sex and orgies thinking that she is partaking in a game, every game for the women i think that has got one year of time with the goal of four years in total. All of this is brainwashing. First of all when the two separates, that is the start of the loose of all his goods for the man, the woman is betrayed to go away from him with hoax. Next she's got a relation with a personal trainer or a figure like this to have got a perfect body in vision of the games that nothing more are than illegal pornography sold in video on demand bitcoin stores and be a victim of human trade.
|
||||
|
||||
What is the final objective of these machinated steps? It's simple, but when you're experiencing them if your not very clever and intelligent the twos will die commiting **suicide**[[22]](https://en.wikipedia.org/wiki/Suicide). The final goal for the woman, if she doesn't kill herself, is to grew up like a sexual slave prostitute builded *to satisfy extreme desire for high class society individuals*.
|
||||
What is the final objective of these machinated steps? It's simple, but when you're experiencing them if your not very clever and intelligent the twos will die committing **suicide**[[22]](https://en.wikipedia.org/wiki/Suicide). The final goal for the woman, if she doesn't kill herself, is to grew up like a sexual slave prostitute build *to satisfy extreme desire for high class society individuals*.
|
||||
|
||||
Normally the man, who has lost everything, commit suicide because see her in porn movies and images found on the web, deep web, and many others technological platform. The woman when the man loose his life understand that this was not a game and commit suicide also or terminate in heavy drug adiction like **heroine** [[23]](https://en.wikipedia.org/wiki/Heroin) or **crack** [[24]](https://en.wikipedia.org/wiki/Crack_cocaine) working like a low level prostitute.
|
||||
Normally the man, who has lost everything, commit suicide because see her in porn movies and images found on the web, deep web, and many others technological platform. The woman when the man loose his life understand that this was not a game and commit suicide also or terminate in heavy drug addiction like **heroine** [[23]](https://en.wikipedia.org/wiki/Heroin) or **crack** [[24]](https://en.wikipedia.org/wiki/Crack_cocaine) working like a low level prostitute.
|
||||
|
||||
This "game" is reality is a recurrent pattern where a love is forcely broken and two people commit suicide. The pattern is shaped every time upon the victims using a series of variables, like in information technology are the parameters in the invocation of the program. With this crime, gangstalker can gain **billons euro**, alimenting **terrorism** [[25]](https://en.wikipedia.org/wiki/Terrorism) in a silent mode. How is possible to gain such amount of money with this **criminal pattern**? It's simple, they bet on all about the life of the two target individulas, and the woman in engaged in **sexual harassment** [[26]](https://en.wikipedia.org/wiki/Sexual_harassment) ,**human traffic** [[27] ](https://en.wikipedia.org/wiki/Human_Traffic)and **forced prostitution** [[28]](https://en.wikipedia.org/wiki/Forced_prostitution). They use her to do sexual favoures to big drugs clients, rich casino players or so on. She doesn't gain. When she lost her naturally protection about sexual violence they sell her to ultra high class customers that simply enslave her or kill her in a ritual.
|
||||
This "game" is reality is a recurrent pattern where a love is forcedly broken and two people commit suicide. The pattern is shaped every time upon the victims using a series of variables, like in information technology are the parameters in the invocation of the program. With this crime, gangstalker can gain **billions euro**, alimenting **terrorism** [[25]](https://en.wikipedia.org/wiki/Terrorism) in a silent mode. How is possible to gain such amount of money with this **criminal pattern**? It's simple, they bet on all about the life of the two target individuals, and the woman in engaged in **sexual harassment** [[26]](https://en.wikipedia.org/wiki/Sexual_harassment) ,**human traffic** [[27] ](https://en.wikipedia.org/wiki/Human_Traffic)and **forced prostitution** [[28]](https://en.wikipedia.org/wiki/Forced_prostitution). They use her to do sexual favors to big drugs clients, rich casino players or so on. She doesn't gain. When she lost her naturally protection about sexual violence they sell her to ultra high class customers that simply enslave her or kill her in a ritual.
|
||||
|
||||
*I'll explain step by step how this game with the help of a lot of technology is the real plague of our democracy, and the cause of the right turning in the Europe of the XXI siegle.*
|
||||
*I'll explain step by step how this game with the help of a lot of technology is the real plague of our democracy, and the cause of the right turning in the Europe of the XXI single.*
|
||||
|
||||
|
||||
|
||||
|
75
Chapter three - machine.md
Normal file
75
Chapter three - machine.md
Normal file
@ -0,0 +1,75 @@
|
||||
# The remote brainwaves machine
|
||||
|
||||

|
||||
|
||||
In the last chapter we speak about the target machine, a virtual system under which many clients, conscious or not, are organized in a pyramid structure. But what is exactly the machine, or **M** [[1]](https://en.wikipedia.org/wiki/M_(James_Bond))? First of all there is practically no public document speaking about, so it's like a secret or something similar, many people know about it, someone can technically explain it, but no one write about. Why? I really don't know the real reason and i strongly believe in the **open source model** [[2]](https://en.wikipedia.org/wiki/Open-source_model) and i will try here to explain what I've understand about with some background and knowledge about computer science, telecommunication, neuroscience and ham radio.
|
||||
|
||||
In 1988 the Iceland artist **Björk Guðmundsdóttir** [[3]](https://en.wikipedia.org/wiki/Bj%C3%B6rk) speak about the **analog television** [[4]](https://en.wikipedia.org/wiki/Analog_television) with a fascinated voice Here is part of her logic-defying monologue:
|
||||
|
||||
*This beautiful television has put me, like I said before, in all sorts of situations.*
|
||||
|
||||
*I remember being very scared because an Icelandic poet told me that not like in cinemas, where the thing that throws the picture from it just sends light on the screen, but this is different. This is millions and millions of little screens that send light, some sort of electric light, I'm not really sure.*
|
||||
|
||||
*But because there are so many of them, and in fact you are watching very many things when you are watching TV. Your head is very busy all the time to calculate and put it all together into one picture.*
|
||||
|
||||
*And then because you're so busy doing that, you don't watch very carefully what the program you are watching is really about. So you become hypnotized. So all that's on TV, it just goes directly into your brain and you stop judging it's right or not.*
|
||||
|
||||
*You just swallow and swallow. This is what an Icelandic poet told me.*
|
||||
|
||||
*And I became so scared to television that I always got headaches when I watched it. Then, later on, when I got my Danish book on television, I stopped being afraid because I read the truth, the scientifical truth and it was much better.*
|
||||
|
||||
*You shouldn't let poets lie to you.*
|
||||
|
||||
Image to have en front of yours eye a **cathode ray tube** [[5]](https://en.wikipedia.org/wiki/Cathode-ray_tube) that projects all the reality in our line of sight more some object like in an augmented reality system or completely rewrite all the world before us with a totally computer graphic ambient, something like interactive architectural visualization made by **unreal engine** [[6]](https://en.wikipedia.org/wiki/Unreal_Engine) **four** [[7]](https://www.unrealengine.com/en-US/); this is what they call as **immersion in virtual reality** [[8]](https://en.wikipedia.org/wiki/Immersion_(virtual_reality)) but without any hardware device.
|
||||
|
||||
Image to have surrounding your ears a special headphone that reproduce all the audio around you but add a voice chat, could duplicate on the fly the exact voice of a human or any type of sound or audio, could rewrite on the fly the voice of a person speaking with you and so on. Something that could emulate what is nowadays call **3D audio effect** [[9]](https://en.wikipedia.org/wiki/3D_audio_effect).
|
||||
|
||||
Image also but not only to have all your **nervous system** [[10]](https://en.wikipedia.org/wiki/Nervous_system) and **muscles** [[11]](https://en.wikipedia.org/wiki/Muscle) connected by **acupuncture** [[12]](https://en.wikipedia.org/wiki/Acupuncture) and **electrodes** [[13]](https://en.wikipedia.org/wiki/Electrode) to a perfect human body reproduction external and internal. They can torture you without touching you but only reproducing the **pain** [[14]](https://en.wikipedia.org/wiki/Pain) remotely stimulating your **nerves** [[15]](https://en.wikipedia.org/wiki/Nerve) and your **brain** [[16]](https://en.wikipedia.org/wiki/Brain).
|
||||
|
||||
Image also to have your brain divided in **Dyson spheres** [[17]](https://en.wikipedia.org/wiki/Dyson_sphere) each sphere act like a unix terminal **tty** [[18]](https://en.wikipedia.org/wiki/Tty_(unix)) providing to our brain what it can be described as real **human multitasking** [[19]](https://en.wikipedia.org/wiki/Human_multitasking).
|
||||
|
||||
This seems to be a science fiction film but it's true and it's up and running. It's what i can describe as the more powerful tool product by computer science applied to human being but if used with the only goal the archive more money than possible it's the nightmare of the democracy in our old but great **European Union** [[20]](https://en.wikipedia.org/wiki/European_Union); *world have to know*.
|
||||
|
||||
### The visual system read and MitM remote device
|
||||
|
||||

|
||||
|
||||
|
||||
|
||||
The human visual system is composed by:
|
||||
|
||||
- **Cornea** [[21]](https://en.wikipedia.org/wiki/Cornea) and **Lens** [[22]](https://en.wikipedia.org/wiki/Lens_(anatomy)): reflect light into a small image and shine it on the **retina** [[23]](https://en.wikipedia.org/wiki/Retina).
|
||||
- **Retina**: translate the image received by cornea and lens into electrical neural impulse to the brain to create **visual perception** [[24]](https://en.wikipedia.org/wiki/Visual_perception).
|
||||
- **Optic nerve** [[25]](https://en.wikipedia.org/wiki/Optic_nerve): a paired **cranial nerve** [[26]](https://en.wikipedia.org/wiki/Cranial_nerves) that transmit visual information from the retina to the brain.
|
||||
|
||||
|
||||
|
||||
### External links
|
||||
|
||||
1. https://en.wikipedia.org/wiki/M_(James_Bond)
|
||||
2. https://en.wikipedia.org/wiki/Open-source_model
|
||||
3. [https://en.wikipedia.org/wiki/Bj%C3%B6rk](https://en.wikipedia.org/wiki/Björk)
|
||||
4. https://en.wikipedia.org/wiki/Analog_television
|
||||
5. https://en.wikipedia.org/wiki/Cathode-ray_tube
|
||||
6. https://en.wikipedia.org/wiki/Unreal_Engine
|
||||
7. https://www.unrealengine.com/en-US/
|
||||
8. https://en.wikipedia.org/wiki/Immersion_(virtual_reality)
|
||||
9. https://en.wikipedia.org/wiki/3D_audio_effect
|
||||
10. https://en.wikipedia.org/wiki/Nervous_system
|
||||
11. https://en.wikipedia.org/wiki/Muscle
|
||||
12. https://en.wikipedia.org/wiki/Acupuncture
|
||||
13. https://en.wikipedia.org/wiki/Electrode
|
||||
14. https://en.wikipedia.org/wiki/Pain
|
||||
15. https://en.wikipedia.org/wiki/Nerve
|
||||
16. https://en.wikipedia.org/wiki/Brain
|
||||
17. https://en.wikipedia.org/wiki/Dyson_sphere
|
||||
18. https://en.wikipedia.org/wiki/Tty_(unix)
|
||||
19. https://en.wikipedia.org/wiki/Human_multitasking
|
||||
20. https://en.wikipedia.org/wiki/European_Union
|
||||
21. https://en.wikipedia.org/wiki/Cornea
|
||||
22. https://en.wikipedia.org/wiki/Lens_(anatomy)
|
||||
23. https://en.wikipedia.org/wiki/Retina
|
||||
24. https://en.wikipedia.org/wiki/Visual_perception
|
||||
25. https://en.wikipedia.org/wiki/Optic_nerve
|
||||
26. https://en.wikipedia.org/wiki/Cranial_nerves
|
||||
|
2
Chapter three - services.md
Normal file
2
Chapter three - services.md
Normal file
@ -0,0 +1,2 @@
|
||||
# Services bind by BRAINnet
|
||||
|
@ -6,19 +6,19 @@
|
||||
|
||||
|
||||
|
||||
In the last twenty years, gangstalking has evolved and it has evolved very rapidly using IT technology and telecomunications, touching what is knowed as **cyberstalking** [[1]](https://en.wikipedia.org/wiki/Cyberstalking) or **cyber gangstalking**. Normally in a gangstalking crew there's a lot of **hackers** [[2]](https://en.wikipedia.org/wiki/Hacker), **crackers** [[3]](http://www.catb.org/jargon/html/C/cracker.html) and **ham radio** [[4]](https://en.wikipedia.org/wiki/Amateur_radio) telecomunications experts, like **satellite** [[5]](https://en.wikipedia.org/wiki/Satellite), **ELF** [[6]](https://en.wikipedia.org/wiki/Extremely_low_frequency), **ULF** [[7]](https://en.wikipedia.org/wiki/Ultra_low_frequency), **WPT** [[8]](https://en.wikipedia.org/wiki/Wireless_power_transfer), **HF** [[9]](https://en.wikipedia.org/wiki/High_frequency), **VHF** [[10]](https://en.wikipedia.org/wiki/Very_high_frequency) and **UHF** [[11]](https://en.wikipedia.org/wiki/Ultra_high_frequency).
|
||||
In the last twenty years, gangstalking has evolved and it has evolved very rapidly using IT technology and telecommunications, touching what is known as **cyberstalking** [[1]](https://en.wikipedia.org/wiki/Cyberstalking) or **cyber gangstalking**. Normally in a gangstalking crew there's a lot of **hackers** [[2]](https://en.wikipedia.org/wiki/Hacker), **crackers** [[3]](http://www.catb.org/jargon/html/C/cracker.html) and **ham radio** [[4]](https://en.wikipedia.org/wiki/Amateur_radio) telecommunications experts, like **satellite** [[5]](https://en.wikipedia.org/wiki/Satellite), **ELF** [[6]](https://en.wikipedia.org/wiki/Extremely_low_frequency), **ULF** [[7]](https://en.wikipedia.org/wiki/Ultra_low_frequency), **WPT** [[8]](https://en.wikipedia.org/wiki/Wireless_power_transfer), **HF** [[9]](https://en.wikipedia.org/wiki/High_frequency), **VHF** [[10]](https://en.wikipedia.org/wiki/Very_high_frequency) and **UHF** [[11]](https://en.wikipedia.org/wiki/Ultra_high_frequency).
|
||||
|
||||
Gangstalking is the *B-side of the audiovisual industry*.
|
||||
|
||||
**Neuroscience** is another gangstalking IT branch. With the grow up of **BCI** [[12]](https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface), and the fall down of the price of them with **Arduino** [[13]](https://en.wikipedia.org/wiki/Arduino) and other **open hardware** [[14]](https://en.wikipedia.org/wiki/Open-source_hardware) solutions, **neuroscience** [[15]](https://en.wikipedia.org/wiki/Neuroscience) is now low cost.
|
||||
|
||||
What in the **cold war** [[16]](https://en.wikipedia.org/wiki/Cold_War) was patented by US researcher with various acronym like **V2K** knowed also as "voice to skull" [[17]](https://sites.google.com/site/targetedindividuals101/home/v2k) or "infrasound" [[18]](https://en.wikipedia.org/wiki/Infrasound), **MKULTRA** [[19]](https://en.wikipedia.org/wiki/Project_MKUltra), knowed also as CIA mind control program, **TMS** [[20]](https://en.wikipedia.org/wiki/Transcranial_random_noise_stimulation), transcranial magnetic stimulation also in remote, and **NLP** [[21]](https://en.wikipedia.org/wiki/Neuro-linguistic_programming), neuro-linguistic programming (see also methods [[22]](https://en.wikipedia.org/wiki/Methods_of_neuro-linguistic_programming)) synthetic hypnosis , could be found in my personal repository [[23]](https://drive.google.com/drive/folders/1p_ZjYQu33qaeZTE89Ae48biWiBG9EPcK) and it is actively used by gangstalker and hackers. Also in wikileaks we can found some information more about those technologies.
|
||||
What in the **cold war** [[16]](https://en.wikipedia.org/wiki/Cold_War) was patented by US researcher with various acronym like **V2K** known also as "voice to skull" [[17]](https://sites.google.com/site/targetedindividuals101/home/v2k) or "infrasound" [[18]](https://en.wikipedia.org/wiki/Infrasound), **MKULTRA** [[19]](https://en.wikipedia.org/wiki/Project_MKUltra), known also as CIA mind control program, **TMS** [[20]](https://en.wikipedia.org/wiki/Transcranial_random_noise_stimulation), transcranial magnetic stimulation also in remote, and **NLP** [[21]](https://en.wikipedia.org/wiki/Neuro-linguistic_programming), neuro-linguistic programming (see also methods [[22]](https://en.wikipedia.org/wiki/Methods_of_neuro-linguistic_programming)) synthetic hypnosis , could be found in my personal repository [[23]](https://drive.google.com/drive/folders/1p_ZjYQu33qaeZTE89Ae48biWiBG9EPcK) and it is actively used by gangstalker and hackers. Also in wikileaks we can found some information more about those technologies.
|
||||
|
||||
But is gangstalkers connected to the US secret services and goverments? No, probably not. It's very common that they are using the public patents and leaks from **Julian Assange** [[24]](https://en.wikipedia.org/wiki/Julian_Assange) team to improve the synthetic telepathy network, nowadays an information technology evolution of a part of the radio television broadcast system.
|
||||
But is gangstalkers connected to the US secret services and governments? No, probably not. It's very common that they are using the public patents and leaks from **Julian Assange** [[24]](https://en.wikipedia.org/wiki/Julian_Assange) team to improve the synthetic telepathy network, nowadays an information technology evolution of a part of the radio television broadcast system.
|
||||
|
||||
|
||||
|
||||
### The synthetic telepathy network
|
||||
### The synthetic telepathy network, an introduction to
|
||||
|
||||
|
||||
|
||||
@ -26,40 +26,53 @@ But is gangstalkers connected to the US secret services and goverments? No, prob
|
||||
|
||||
|
||||
|
||||
Let's analyse device by device what is the synthetic telepathy network, a telecomunication facility that is changing in my opinion all Europe and is determining a right turning in our goverments. It's very dangerous and probably it's the start of what i think it could be a **neo nazism** [[25]](https://en.wikipedia.org/wiki/Neo-Nazism) digital dictature and a start of a alpha stage of what we found in Internet named as **cyberwarfare** [[26]](https://en.wikipedia.org/wiki/Cyberwarfare).
|
||||
Let's analyse device by device what is the synthetic telepathy network, a telecommunication facility that is changing in my opinion all Europe and is determining a right turning in our governments. It's very dangerous and probably it's the start of what i think it could be a **neo nazism** [[25]](https://en.wikipedia.org/wiki/Neo-Nazism) digital dictatorship and a start of a alpha stage of what we found in Internet named as **cyberwarfare** [[26]](https://en.wikipedia.org/wiki/Cyberwarfare).
|
||||
|
||||
The synthetic telepathy network is described in real world by **methaphors** [[27],](https://en.wikipedia.org/wiki/Metaphor) or what is called nowadays as **Internet meme** [[28]](https://en.wikipedia.org/wiki/Metaphor).
|
||||
In Internet we can find a lot of references about the synthetic telepathy network by **metaphors** [[27],](https://en.wikipedia.org/wiki/Metaphor) or what is called nowadays as **Internet meme** [[28]](https://en.wikipedia.org/wiki/Metaphor).
|
||||
|
||||
Let's introduce every device of the network scheme above:
|
||||
|
||||
- **Target machine:** A virtual device locked to the target person(s) by radio frequency. What does it mean? Every machine has an identification, a human unique magnetic field identification, an id to witch in a **VPN** [[29]](https://en.wikipedia.org/wiki/Virtual_private_network) there's a correspondence with a remote virtual **Android** [[30]](https://en.wikipedia.org/wiki/Android_(operating_system)) device where we can find a lot of applications more or less powerful depending on what kind of access we've got in the network. A single Machine, later i will explain theory and technology about this death device, could be shared by many clients, usually humans but also animals, could determine a pyramid structure normally identified by a natural number, the mine in Barcelona for example is the number **9**.
|
||||
- **Target in reality**: one or more persons that doesn't have access to the administration of his Machine, she/he loose totally her/his privacy and all the time passed without access is considered like a slave. Many times she/he is also considered only like an object, they use to do experiments with the person to archive data under extreme stress, violent sex situations and brain experiments. The target individual is a **human guinea pig** in an unauthorised **human subject research** [[31]](https://en.wikipedia.org/wiki/Human_subject_research).
|
||||
- **Machine in metaphor**: A mobile telephone, protected by a simple **PIN** [[32]](https://en.wikipedia.org/wiki/Personal_identification_number) of four numbers. It's security it's so basic because allow gangstalker to steal money of the target machine or another client that doesn't know about basic security. Money are always in **crypt concurrency** [[33]](https://en.wikipedia.org/wiki/Cryptocurrency).
|
||||
- **Target in metaphor**: Is a dog, gangstalkers consider a target individual with the same rights of an animal. They give her/him orders, deny to her/him every types of rights, electronically punish her/him and hit her/him. So do practically all the persons connected to this system because if they doesn't torture the victim they loose privilege in the network and return to the victim state that is the initial state when you was forced to join this hell network with brain zapping, that is a technique used to find the unique magnetic identification of a human. It is archive using a physical Android device, normally a telephone. A victim is captured identifying is unique magnetic field id by proximity with another network client used like predator. Normally is a woman or a very attractive man that have sex with the victim, the predator has got her or his mobile infected by an application remotely controlled by the network owners. In Barcelona Spain i think that there are more than two hundred thousand clients connected.
|
||||
- **Bidirectional connection to target machine**: Using a unique identification of the target person, or probably an array of, ground station speak directly with the victim or the client using **RNM**, remote neural monitoring. The remote neural monitoring act like a **BCI** [[34]](https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface), a **TMS** [[35]](https://en.wikipedia.org/wiki/Transcranial_magnetic_stimulation) device, a **MRI** [[36]](https://en.wikipedia.org/wiki/Magnetic_resonance_imaging) device; all of them are remote and virtual. All is done by radio frequency. All is remote brain waves. There is no need of any sort of device acting like a client in the human target. There is no need of **brain implant** [[37]](https://en.wikipedia.org/wiki/Brain_implant).
|
||||
- **Remote brainwaves**: This is the **last mile** [[38]](https://en.wikipedia.org/wiki/Last_mile) technology used by the synthetic telepathy network. They are used to build what is known as **BRAINnet** [[39]](http://www.BRAINnet.net/), a sort of network of interconnected brains. In the synthetic telepathy network **brainwaves** [[40]](https://en.wikipedia.org/wiki/Neural_oscillation) was hacked to archive the modulation of the eight neural oscillations that are present in our brain. The frequencies used by BRAINnet are from 0.5 to 100 Hz and are transmitted by analogue **SDR** [[41]](https://en.wikipedia.org/wiki/Software-defined_radio). Every type of brain wave is related to a part of our brain and to a specific function like the auditory cortex or the visual cortex. Those name are:
|
||||
- **Delta wave** [[42]](https://en.wikipedia.org/wiki/Delta_wave) from 0.1 to 3 Hz.
|
||||
- **Theta wave** [[43]](https://en.wikipedia.org/wiki/Theta_wave) from 4 to 7 Hz.
|
||||
- **Mu wave** [[44]](https://en.wikipedia.org/wiki/Mu_wave) from 7.5 12.5 Hz.
|
||||
- **SMR wave** [[45]](https://en.wikipedia.org/wiki/Sensorimotor_rhythm) from 12.5 15.5 Hz.
|
||||
- **Alpha wave** [[46]](https://en.wikipedia.org/wiki/Alpha_wave) from 7 to 12 Hz.
|
||||
- **Beta wave** [[47]](https://en.wikipedia.org/wiki/Beta_wave) from 12 to 30 Hz.
|
||||
- **Gamma wave** [[48]](https://en.wikipedia.org/wiki/Gamma_wave) from 32 to 100 Hz.
|
||||
- **Geosynchronous satellite**: Used to obtain remote imaging of the target. Nowadays with the advent of the open hardware, middle size criminal organisation could have a satellite in low orbit. This could be classified as *satellite terrorism*. **Open hardware satellite** [[49]](https://www.google.com/search?q=open+hardware+satellite&ie=utf-8&oe=utf-8&client=firefox-b-1-e) could be launch in orbit by companies that bind this service at relative low cost.
|
||||
- **Ground station**: Is an access point to BRAINnet. To archive the full coverage of a territory like Catalunya there is no need of too many points because of **wavelengths** [[50]](https://en.wikipedia.org/wiki/Wavelength) from 100000 to 1000 kilometres and because at this frequencies there is no need of **line of sight** [[51]](https://en.wikipedia.org/wiki/Line-of-sight_propagation), waves can pass through many types of materials. Every ground station perhaps have got eight different physical radios and antennas, one for every type of brain wave, and an interface, fibre optic or another radio technology, for the **backbone** [[52]](https://en.wikipedia.org/wiki/Backbone_network). The backbone doesn't have the need to transport a lot of data so it can be build using low size technology and **NLOS** [[53]](https://en.wikipedia.org/wiki/Non-line-of-sight_propagation) radio and frequency.
|
||||
- **Telemetry**
|
||||
- **Listening station** : part of every ground station but not in the outside. Every target individual got his **telemetry** [[54]](https://en.wikipedia.org/wiki/Telemetry) saved in the network computing centre, like all steps taken, all the trips and so on. There's no privacy in this network.
|
||||
- **Input/Output processing**
|
||||
- **Vocalisations**: in the synthetic telepathy network with technology the owners can exact copy the voice of a target. Not only the timbre of the voice but also the vocalisation **speech** [[55]](https://en.wikipedia.org/wiki/Speech). Targets individuals can be tricked to think to speak with another individual that is not. This is part of the mental confusion in which he may fall the victim in the gangstalking mind game. He may fall in mental disorder confusion. Vocalisations is modulated in gamma wave using a **vocoder** [[56]](https://en.wikipedia.org/wiki/Vocoder) and it results on **voice to skull** transmission, that is a hearing direct to the **auditory cortex** [[57]](https://en.wikipedia.org/wiki/Auditory_cortex).
|
||||
- **Mental Imagery**: in this network it's possible to do data injection direct to the **visual cortex** [[58]](https://en.wikipedia.org/wiki/Visual_cortex). It's something very powerful they can archive **augmented** [[59]](https://en.wikipedia.org/wiki/Augmented_reality) and **mixed reality** [[60]](https://en.wikipedia.org/wiki/Mixed_reality) direct in our brain without using the **human eye** [[61]](https://en.wikipedia.org/wiki/Human_eye), that are organs of the **visual system** [[62]](https://en.wikipedia.org/wiki/Visual_system). It's also possible to archive dream injections. They can obtain to stream a video in our brain when we are sleeping using the correct brainwave . Our dreams can also be read, they have archive to stole our dreams one of the most private and personal think of our personal sphere.
|
||||
- **Sensory**: Like the auditory and visual cortex also the **sensory cortex** [[63]](https://en.wikipedia.org/wiki/Primary_somatosensory_cortex) can be tricked, injected and manipulated by remote brain waves. They can archive that our brain can reproduce unreal feelings in our body, like sexual excitement. In the synthetic telepathy network it's possible to force a woman or a man to have sex with a stalker, to be all the day exited and then s/he can be tricked in a machined situation to have a disproportionate orgies that can be remote filmed always by the network and then to be sold in VOD crypt concurrences systems. The worst think is that they can do this also to minors creating **sexual slavery** [[64]](https://en.wikipedia.org/wiki/Sexual_slavery).
|
||||
- **Feedback monitoring**
|
||||
- **External events**: because of our visual cortex is under control, like in a **MitM** [[65]](https://en.wikipedia.org/wiki/Man-in-the-middle_attack) environment, when we're victim of the synthetic telepathy network we are like a remote video camera. All what we do and we see is transmitted to the . What it can mean? Simple, our privacy and the privacy of whatever is under our line of sight is compromised. All what we write be pen or in a computer or in a cash dispenser is stolen. When we've sex all is transmitted, and so on. We're like a tool for hackers. What does it mean? Image a beautiful woman victim of the network. All the people that have sex with her are connected to the network. Woman can be like a **Trojan horse** [[66]](https://en.wikipedia.org/wiki/Trojan_Horse).
|
||||
- **Health monitoring**: With this machine owners of the synthetic telepathy network got physical health values of the targets individuals, like **blood pressure** [[67]](https://en.wikipedia.org/wiki/Blood_pressure), **heart rate** [[68]](https://en.wikipedia.org/wiki/Heart_rate), **human body temperature** [[69]](https://en.wikipedia.org/wiki/Human_body_temperature) and so on. They have the complete medical view of every human client connected to the network.
|
||||
- **Lie detection**: owners of the network got also in their hands a full remote equipment of **lie detection** [[70]](https://en.wikipedia.org/wiki/Lie_detection). They know if the target lie or not about an argue. All is registered in the network core centre.
|
||||
- **Core process**
|
||||
- **Strategic Natural Language Processing**: client who has got access to the services in BRAINnet could understand and speak a lot of different humans languages with them vocalisation. This is possible by an advanced system of **natural language processing** [[71]](https://en.wikipedia.org/wiki/Natural_language_processing) , a part of computer science concerned with the interactions between computers and human (natural) languages.
|
||||
- **Mental Impressions**: i don't know what it can be.
|
||||
- **Keyword analysis**: like a **search engine** [[72]](https://en.wikipedia.org/wiki/Search_engine_(computing)). In the core process of the synthetic telepathy network there is a **keyword analysis** [[73]](https://en.wikipedia.org/wiki/Search_engine_optimization) system that could react to certain word or phrases with **artificial intelligence** [[74]](https://en.wikipedia.org/wiki/Artificial_intelligence) bot that use known speech and vocalisation of the victim. He can trust to speak with a real person but in reality is a **chatbot** [[75]](https://en.wikipedia.org/wiki/Chatbot). This function also aliment the **schizophrenia** [[76]](https://en.wikipedia.org/wiki/Schizophrenia) and **paranoia** [[77]](https://en.wikipedia.org/wiki/Paranoia) of the target individual that is slowly condemned to go crazy.
|
||||
- **Emotive response**: related to the different possible responses of the target individual among the artificial intelligence, chatbot, owners and machined situations proposed to him. All of this data are certainly used to improve the different algorithms inside the network but also probably sold to military and paramilitary forces that use human data to build robot and electronic cyberwarfare equipment. This is terrorism because target individuals are not volunteers but are unconscious victims. This is in opposition to **the universal declaration of human rights** [[78]](https://www.un.org/en/universal-declaration-human-rights/).
|
||||
- **Data mining**: always focused to the sold of data related to the target individual. **Data mining** [[79]](https://en.wikipedia.org/wiki/Data_mining) is the computer science and statistics part related to the extract of **data set** [[80]](https://en.wikipedia.org/wiki/Data_set) in a large amount of data. What could be the meaning in a criminal point of view because of the target individual condition? It could be referred to the fact that all what the victim do is registered. Imagine when a person go to a big shopping centre; what are the windows that mostly reclaim his attention? What products does he buy mostly when he go to a market? What are the colours that they attract him? And so on. All of those data are potentially sold to big firm companies, and are an important part of a commercial campaign if they are in big amount of individuals. They are also very important in a political point of view. Remember that target individuals aren't volunteers but they are obligated victims so we can always speak about terrorism. With BRAINnet in my opinion it's possible also to have a target individual that doesn't know to be because he doesn't listen to voice to skull telecommunication so only the visual cortex could be under control and only in read mode. What does it mean? It means that probably this network got thousand of victims and it probably mean that is the cause of the change in Europe these days.
|
||||
- **Reporting**: **Data reporting** [[81]](https://en.wikipedia.org/wiki/Data_reporting) is the fact to exactly report all the data set extracted from **big data** [[82]](https://en.wikipedia.org/wiki/Big_data)
|
||||
- **Error control**: referring to the control of percent of errors in the data reporting process.
|
||||
- **Sensory control**: machines dedicated to the automatic control and regulation on all what append in the *feedback monitoring* facility. Certainly dominated by machine intelligence, **machine learning** [[83]](https://en.wikipedia.org/wiki/Machine_learning) and **neural network** [[84]](https://en.wikipedia.org/wiki/Neural_network).
|
||||
- **Artificial Intelligence**: all in the synthetic telepathy network, or BRAINnet, is absolutely dominated by machine intelligence. I think that there isn't a big crew of administrators but there is a lot of excellent programmers. I've found connections with the **Neuralink** [[85]](https://en.wikipedia.org/wiki/Neuralink) project by **Elon Musk** [[86]](https://en.wikipedia.org/wiki/Neuralink) and what have said **Mark Zuckerberg** [[87]](https://en.wikipedia.org/wiki/Mark_Zuckerberg) at **F8 conference in 2017** [[88]](https://newsroom.fb.com/news/2017/04/f8-2017-day-1/).
|
||||
|
||||

|
||||
|
||||
|
||||
|
||||
- **Target machine:** A device virtually locked to the target person(s). What does it mean? Simple; in gangstalking for example, but it's valid in a lot of services more that are implemented by this network owned by a family of militaries connected with the Italian Navy based on Genova, every machine has an identificator, a brain unique identificator, an id to witch in a **VPN** [[29]](https://en.wikipedia.org/wiki/Virtual_private_network) there's a correspondence with a **CMS** [[30]](https://en.wikipedia.org/wiki/Content_management_system) with a lot of devices remote controllables by various iot or so on. A "M"achine, later i will explain theory and technology about this death device, could be shared by many clientes, usually humans but also animals.
|
||||
- **Target in reality**: one or more persons that doesn't have access to the administration of his "M"achine, she/he loose totally her/his privacy and all the time passed without access is considered like a slave. Many times she/he is also considered only like an object, they use to do experiments with the person to archieve data under extreme stress, violent sex situations and brain experiments. The target individual is a **human guinea pig**.
|
||||
- **Machine in methaphor**: A mobile telephone, protected by a simple PIN of four numbers. It's security it's so basic because allow gangstalker to steal money of the target machine or another client that doesn't know about basic security. Money are always in **cryptoconcurrency** [[31]](https://en.wikipedia.org/wiki/Cryptocurrency).
|
||||
- **Target in methaphor**: Is a dog, gangstalkers consider a target individual with the same rights of an animal. They give her/him orders, deny to her/him every types of drets, electronically punish her/him and hit her/him. So do practically all the persons connected to this system because if they doesn't torture the victim they loose privilege in the network and return to the victim state that is the initial state when you was forced to join this hell network with brain zapping. In Barcelona Spain i think that there are more than two hundred thousand clients connected.
|
||||
- **Bidirectional connection to target machine**: Using a unique identificator of the target person, or probably an array of, satellite speak directly with the victim or the client using RNM, remote neural monitoring. The remote neural monitoring act like a remote BCI, a brain control interface, a TMS, transcacranial magnetic interface, remote device and a remote MRI, magnetic resonance imaging, device.
|
||||
|
||||
**Geosynchronous satellite**:
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
### Services brinded by the synthentic telephaty network
|
||||
|
||||
|
||||
|
||||
### Crimes and internationals laws about gangstalking and gaslighting
|
||||
|
||||
Is gangstalking and gaslighting only related to drug debt or another kind of debt? Absolutely not. And this is another reality that no one speak about. In fact who fall down in the gaslight vortex has very few opportunities to survive without commit suicide to himself. Who fall down in that word of shit will be threated like a dog, like an animal, like an **human guinea pig**. A person that is connected to the network in the infographic upon will lost eleven articles of the **Universal Declaration of Humans Rights**:
|
||||
|
||||
- article 1: all human beings are born free and equal in dignity and rights. [...]
|
||||
- when a victim is inserted in the synthetic telepathy network, aka gangstalking and gaslighting network, lost is freedom because of the lost of privacy. Stalkers first of all can read his mind, see what he see via his brain in a sort of man-in-the-middle attack between the auditory and visual cortex. Can also change what the victim receive about the external world with a sort of data injection attack; voice onfly rewrite, voice carbon copy, augmented reality objects injected and so on. Speaking about dignity and rights when the victim suffer street teather and gaslighting is public humillated and induct to suicide.
|
||||
- article 2: everyone is entitled to all the rights and freedoms set forth in this Declaration, without distinction of any kind, [...]. Furthermore, no distinction shall be made on the basis of the political, jurisdictional or international status of the country or territory wich a person belongs, [...].
|
||||
- why victim loose the second article is the same motivation of the first
|
||||
- article 3: everyone has the right to life, liberty and the security of person.
|
||||
- also this article is destroyed when it speaks about liberty and like the second is for the reasons explained in the first.
|
||||
- article 4: no one shall be held in slavery or servitude: slavery and the slave trade shall be prohibited in all their forms.
|
||||
-
|
||||
### External Links
|
||||
|
||||
1. https://en.wikipedia.org/wiki/Cyberstalking
|
||||
2. <https://en.wikipedia.org/wiki/Hacker>
|
||||
@ -90,14 +103,62 @@ Is gangstalking and gaslighting only related to drug debt or another kind of deb
|
||||
27. <https://en.wikipedia.org/wiki/Metaphor>
|
||||
28. <https://en.wikipedia.org/wiki/Internet_meme>
|
||||
29. <https://en.wikipedia.org/wiki/Virtual_private_network>
|
||||
30. <https://en.wikipedia.org/wiki/Content_management_system>
|
||||
31. <https://en.wikipedia.org/wiki/Cryptocurrency>
|
||||
32. <https://search.wikileaks.org/?query=&exact_phrase=mind+control&any_of=&exclude_words=&document_date_start=&document_date_end=&released_date_start=&released_date_end=&new_search=True&order_by=most_relevant#results>
|
||||
33. <>
|
||||
34.
|
||||
35. <https://en.wikipedia.org/wiki/Universal_Declaration_of_Human_Rights>
|
||||
36. <https://en.wikipedia.org/wiki/Brainwashing>
|
||||
37. <>
|
||||
38. <>
|
||||
39. <>
|
||||
40. <https://en.wikipedia.org/wiki/Sexual_slavery
|
||||
30. https://en.wikipedia.org/wiki/Android_(operating_system)
|
||||
31. https://en.wikipedia.org/wiki/Human_subject_research
|
||||
32. https://en.wikipedia.org/wiki/Personal_identification_number
|
||||
33. <https://en.wikipedia.org/wiki/Cryptocurrency>
|
||||
34. https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface
|
||||
35. https://en.wikipedia.org/wiki/Transcranial_magnetic_stimulation
|
||||
36. https://en.wikipedia.org/wiki/Magnetic_resonance_imaging
|
||||
37. https://en.wikipedia.org/wiki/Brain_implant
|
||||
38. https://en.wikipedia.org/wiki/Last_mile
|
||||
39. http://www.BRAINnet.net/
|
||||
40. https://en.wikipedia.org/wiki/Neural_oscillation
|
||||
41. https://en.wikipedia.org/wiki/Software-defined_radio
|
||||
42. https://en.wikipedia.org/wiki/Delta_wave
|
||||
43. https://en.wikipedia.org/wiki/Theta_wave
|
||||
44. https://en.wikipedia.org/wiki/Mu_wave
|
||||
45. https://en.wikipedia.org/wiki/Sensorimotor_rhythm
|
||||
46. https://en.wikipedia.org/wiki/Alpha_wave
|
||||
47. https://en.wikipedia.org/wiki/Beta_wave
|
||||
48. https://en.wikipedia.org/wiki/Gamma_wave
|
||||
49. https://www.google.com/search?q=open+hardware+satellite
|
||||
50. https://en.wikipedia.org/wiki/Wavelength
|
||||
51. https://en.wikipedia.org/wiki/Line-of-sight_propagation
|
||||
52. https://en.wikipedia.org/wiki/Backbone_network
|
||||
53. https://en.wikipedia.org/wiki/Non-line-of-sight_propagation
|
||||
54. https://en.wikipedia.org/wiki/Telemetry
|
||||
55. https://en.wikipedia.org/wiki/Speech
|
||||
56. https://en.wikipedia.org/wiki/Vocoder
|
||||
57. https://en.wikipedia.org/wiki/Auditory_cortex
|
||||
58. https://en.wikipedia.org/wiki/Visual_cortex
|
||||
59. https://en.wikipedia.org/wiki/Augmented_reality
|
||||
60. https://en.wikipedia.org/wiki/Mixed_reality
|
||||
61. https://en.wikipedia.org/wiki/Human_eye
|
||||
62. https://en.wikipedia.org/wiki/Visual_system
|
||||
63. https://en.wikipedia.org/wiki/Primary_somatosensory_cortex
|
||||
64. https://en.wikipedia.org/wiki/Sexual_slavery
|
||||
65. https://en.wikipedia.org/wiki/Man-in-the-middle_attack
|
||||
66. https://en.wikipedia.org/wiki/Trojan_Horse
|
||||
67. https://en.wikipedia.org/wiki/Blood_pressure
|
||||
68. https://en.wikipedia.org/wiki/Heart_rate
|
||||
69. https://en.wikipedia.org/wiki/Human_body_temperature
|
||||
70. https://en.wikipedia.org/wiki/Lie_detection
|
||||
71. https://en.wikipedia.org/wiki/Natural_language_processing
|
||||
72. https://en.wikipedia.org/wiki/Search_engine_(computing)
|
||||
73. https://en.wikipedia.org/wiki/Search_engine_optimization
|
||||
74. https://en.wikipedia.org/wiki/Artificial_intelligence
|
||||
75. https://en.wikipedia.org/wiki/Chatbot
|
||||
76. https://en.wikipedia.org/wiki/Schizophrenia
|
||||
77. https://en.wikipedia.org/wiki/Paranoia
|
||||
78. https://www.un.org/en/universal-declaration-human-rights/
|
||||
79. https://en.wikipedia.org/wiki/Data_mining
|
||||
80. https://en.wikipedia.org/wiki/Data_set
|
||||
81. https://en.wikipedia.org/wiki/Data_reporting
|
||||
82. https://en.wikipedia.org/wiki/Big_data
|
||||
83. https://en.wikipedia.org/wiki/Machine_learning
|
||||
84. https://en.wikipedia.org/wiki/Neural_network
|
||||
85. https://en.wikipedia.org/wiki/Neuralink
|
||||
86. https://en.wikipedia.org/wiki/Elon_Musk
|
||||
87. https://en.wikipedia.org/wiki/Mark_Zuckerberg
|
||||
88. https://newsroom.fb.com/news/2017/04/f8-2017-day-1/
|
||||
|
Binary file not shown.
After ![]() (image error) Size: 116 KiB |
BIN
Gray722.png
Normal file
BIN
Gray722.png
Normal file
Binary file not shown.
After ![]() (image error) Size: 86 KiB |
1430
Gray722.svg
Normal file
1430
Gray722.svg
Normal file
File diff suppressed because it is too large
Load Diff
After (image error) Size: 96 KiB |
BIN
Resting_State_Networks_and_their_topographic_EEG_signatures.jpg
Normal file
BIN
Resting_State_Networks_and_their_topographic_EEG_signatures.jpg
Normal file
Binary file not shown.
After ![]() (image error) Size: 430 KiB |
BIN
Visual-association-areas-Primary-Cortex-Areas-627x550.webp
Normal file
BIN
Visual-association-areas-Primary-Cortex-Areas-627x550.webp
Normal file
Binary file not shown.
After ![]() (image error) Size: 129 KiB |
BIN
bjork-tv.png
Normal file
BIN
bjork-tv.png
Normal file
Binary file not shown.
After ![]() (image error) Size: 424 KiB |
BIN
f8_mz_d.jpg
Normal file
BIN
f8_mz_d.jpg
Normal file
Binary file not shown.
After ![]() (image error) Size: 217 KiB |
Loading…
x
Reference in New Issue
Block a user