Add files via upload

This commit is contained in:
Riccardo Giuntoli 2019-11-10 18:17:18 +01:00 committed by GitHub
parent 08ee3d51e3
commit 6c81878d30
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
13 changed files with 1905 additions and 0 deletions

View File

@ -0,0 +1,117 @@
# The synthetic telepathy network
![Synthetic Telepathy network](../Images/redtelepatia.jpg)
This is the network scheme of the "Illuminati" criminal network. Let's analyses device by device what is the synthetic telepathy network, a telecommunication facility that is changing in my opinion all Europe and is determining a right turning in our governments. It's very dangerous and probably it's the start of what i think it could be a **neo nazism** [[1]](https://en.wikipedia.org/wiki/Neo-Nazism) digital dictatorship and a start of a alpha stage of what we found in Internet named as **cyberwarfare** [[2]](https://en.wikipedia.org/wiki/Cyberwarfare).
In Internet we can find a lot of references about the synthetic telepathy network by **metaphors** [[3],](https://en.wikipedia.org/wiki/Metaphor) or what is called nowadays as **Internet meme** [[4]](https://en.wikipedia.org/wiki/Metaphor).
Let's introduce every device of the network scheme above:
- **Target machine:** A virtual device locked to the target person(s) by radio frequency. What does it mean? Every machine has an identification, a human unique magnetic field identification, an id to witch in a **VPN** [[5]](https://en.wikipedia.org/wiki/Virtual_private_network) there's a correspondence with a remote virtual **Android** [[6]](https://en.wikipedia.org/wiki/Android_(operating_system)) device where we can find a lot of applications more or less powerful depending on what kind of access we've got in the network. A single Machine, later i will explain theory and technology about this death device, could be shared by many clients, usually humans but also animals, could determine a pyramid structure normally identified by a natural number, the mine in Barcelona for example is the number **9**.
- **Target in reality**: one or more persons that doesn't have access to the administration of his Machine, she/he loose totally her/his privacy and all the time passed without access is considered like a slave. Many times she/he is also considered only like an object, they use to do experiments with the person to archive data under extreme stress, violent sex situations and brain experiments. The target individual is a **human guinea pig** in an unauthorised **human subject research** [[7]](https://en.wikipedia.org/wiki/Human_subject_research).
- **Machine in metaphor**: A mobile telephone, protected by a simple **PIN** [[8]](https://en.wikipedia.org/wiki/Personal_identification_number) of four numbers. It's security it's so basic because allow gangstalker to steal money of the target machine or another client that doesn't know about basic security. Money are always in **crypt concurrency** [[9]](https://en.wikipedia.org/wiki/Cryptocurrency).
- **Target in metaphor**: Is a dog, gangstalkers consider a target individual with the same rights of an animal. They give her/him orders, deny to her/him every types of rights, electronically punish her/him and hit her/him. So do practically all the persons connected to this system because if they doesn't torture the victim they loose privilege in the network and return to the victim state that is the initial state when you was forced to join this hell network with brain zapping, that is a technique used to find the unique magnetic identification of a human. It is archive using a physical Android device, normally a telephone. A victim is captured identifying is unique magnetic field id by proximity with another network client used like predator. Normally is a woman or a very attractive man that have sex with the victim, the predator has got her or his mobile infected by an application remotely controlled by the network owners. In Barcelona Spain i think that there are more than two hundred thousand clients connected.
- **Bidirectional connection to target machine**: Using a unique identification of the target person, or probably an array of, ground station speak directly with the victim or the client using **RNM**, remote neural monitoring. The remote neural monitoring act like a **BCI** [[10]](https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface), a **TMS** [[11]](https://en.wikipedia.org/wiki/Transcranial_magnetic_stimulation) device, a **MRI** [[12]](https://en.wikipedia.org/wiki/Magnetic_resonance_imaging) device; all of them are remote and virtual. All is done by radio frequency. All is remote brain waves. There is no need of any sort of device acting like a client in the human target. There is no need of **brain implant** [[13]](https://en.wikipedia.org/wiki/Brain_implant).
- **Remote brainwaves**: This one of the **last mile** [[14]](https://en.wikipedia.org/wiki/Last_mile) technology used by the synthetic telepathy network. They are used to build what is known as **BRAINnet** [[15]](http://www.BRAINnet.net/), a sort of network of interconnected brains. In the synthetic telepathy network **brainwaves** [[16]](https://en.wikipedia.org/wiki/Neural_oscillation) was hacked to archive the modulation of the eight neural oscillations that are present in our brain. The frequencies used by BRAINnet are from 0.5 to 100 Hz and are transmitted by analogue **SDR** [[17]](https://en.wikipedia.org/wiki/Software-defined_radio). Every type of brain wave is related to a part of our brain and to a specific function like the auditory cortex or the visual cortex. Those name are:
- **Delta wave** [[18]](https://en.wikipedia.org/wiki/Delta_wave) from 0.1 to 3 Hz.
- **Theta wave** [[19]](https://en.wikipedia.org/wiki/Theta_wave) from 4 to 7 Hz.
- **Mu wave** [[20]](https://en.wikipedia.org/wiki/Mu_wave) from 7.5 12.5 Hz.
- **SMR wave** [[21]](https://en.wikipedia.org/wiki/Sensorimotor_rhythm) from 12.5 15.5 Hz.
- **Alpha wave** [[22]](https://en.wikipedia.org/wiki/Alpha_wave) from 7 to 12 Hz.
- **Beta wave** [[23]](https://en.wikipedia.org/wiki/Beta_wave) from 12 to 30 Hz.
- **Gamma wave** [[24]](https://en.wikipedia.org/wiki/Gamma_wave) from 32 to 100 Hz.
- **Silent subliminal presentation system**: a method from United States patent that serve to bypass first human auditory system, using the frequency of 462.25 KHz with a channel width of 14.5 KHz.
- **Geosynchronous satellite**: Used to obtain remote imaging of the target. Nowadays with the advent of the open hardware, middle size criminal organization could have a satellite in low orbit. This could be classified as *satellite terrorism*. **Open hardware satellite** [[25]](https://www.google.com/search?q=open+hardware+satellite&ie=utf-8&oe=utf-8&client=firefox-b-1-e) could be launch in orbit by companies that bind this service at relative low cost.
- **Ground station**: Is an access point to BRAINnet. To archive the full coverage of a territory like Catalunya there is no need of too many points because of **wavelengths** [[26]](https://en.wikipedia.org/wiki/Wavelength) from 100000 to 1000 kilometres and because at this frequencies there is no need of **line of sight** [[27]](https://en.wikipedia.org/wiki/Line-of-sight_propagation), waves can pass through many types of materials. Every ground station perhaps have got eight different physical radios and antennas, one for every type of brain wave, and an interface, fibre optic or another radio technology, for the **backbone** [[28]](https://en.wikipedia.org/wiki/Backbone_network). The backbone doesn't have the need to transport a lot of data so it can be build using low size technology and **NLOS** [[29]](https://en.wikipedia.org/wiki/Non-line-of-sight_propagation) radio and frequency.
- **Telemetry**
- **Listening station** : part of every ground station but not in the outside. Every target individual got his **telemetry** [[30]](https://en.wikipedia.org/wiki/Telemetry) saved in the network computing center, like all steps taken, all the trips and so on. There's no privacy in this network.
- **Input/Output processing**
- **Vocalizations**: in the synthetic telepathy network with technology the owners can exact copy the voice of a target. Not only the timbre of the voice but also the vocalization **speech** [[31]](https://en.wikipedia.org/wiki/Speech). Targets individuals can be tricked to think to speak with another individual that is not. This is part of the mental confusion in which he may fall the victim in the gangstalking mind game. He may fall in mental disorder confusion. Vocalizations is modulated in gamma wave using a **vocoder** [[32]](https://en.wikipedia.org/wiki/Vocoder) and it results on **voice to skull** transmission, that is a hearing direct to the **auditory cortex** [[33]](https://en.wikipedia.org/wiki/Auditory_cortex).
- **Mental Imagery**: in this network it's possible to do data injection direct to the **visual cortex** [[34]](https://en.wikipedia.org/wiki/Visual_cortex). It's something very powerful they can archive **augmented** [[35]](https://en.wikipedia.org/wiki/Augmented_reality) and **mixed reality** [[36]](https://en.wikipedia.org/wiki/Mixed_reality) direct in our brain without using the **human eye** [[37]](https://en.wikipedia.org/wiki/Human_eye), that are organs of the **visual system** [[38]](https://en.wikipedia.org/wiki/Visual_system). It's also possible to archive dream injections. They can obtain to stream a video in our brain when we are sleeping using the correct brainwave . Our dreams can also be read, they have archive to stole our dreams one of the most private and personal think of our personal sphere.
- **Sensory**: Like the auditory and visual cortex also the **sensory cortex** [[39]](https://en.wikipedia.org/wiki/Primary_somatosensory_cortex) can be tricked, injected and manipulated by remote brain waves. They can archive that our brain can reproduce unreal feelings in our body, like sexual excitement. In the synthetic telepathy network it's possible to force a woman or a man to have sex with a stalker, to be all the day exited and then s/he can be tricked in a machined situation to have a disproportionate orgies that can be remote filmed always by the network and then to be sold in VOD crypt concurrences systems. The worst think is that they can do this also to minors creating **sexual slavery** [[40]](https://en.wikipedia.org/wiki/Sexual_slavery).
- **Feedback monitoring**
- **External events**: because of our visual cortex is under control, like in a **MitM** [[41]](https://en.wikipedia.org/wiki/Man-in-the-middle_attack) environment, when we're victim of the synthetic telepathy network we are like a remote video camera. All what we do and we see is transmitted to the . What it can mean? Simple, our privacy and the privacy of whatever is under our line of sight is compromised. All what we write be pen or in a computer or in a cash dispenser is stolen. When we've sex all is transmitted, and so on. We're like a tool for hackers. What does it mean? Image a beautiful woman victim of the network. All the people that have sex with her are connected to the network. Woman can be like a **Trojan horse** [[42]](https://en.wikipedia.org/wiki/Trojan_Horse).
- **Health monitoring**: With this machine owners of the synthetic telepathy network got physical health values of the targets individuals, like **blood pressure** [[43]](https://en.wikipedia.org/wiki/Blood_pressure), **heart rate** [[44]](https://en.wikipedia.org/wiki/Heart_rate), **human body temperature** [[45]](https://en.wikipedia.org/wiki/Human_body_temperature) and so on. They have the complete medical view of every human client connected to the network.
- **Lie detection**: owners of the network got also in their hands a full remote equipment of **lie detection** [[46]](https://en.wikipedia.org/wiki/Lie_detection). They know if the target lie or not about an argue. All is registered in the network core centre.
- **Core process**
- **Strategic Natural Language Processing**: client who has got access to the services in BRAINnet could understand and speak a lot of different humans languages with them vocalization. This is possible by an advanced system of **natural language processing** [[47]](https://en.wikipedia.org/wiki/Natural_language_processing) , a part of computer science concerned with the interactions between computers and human (natural) languages.
- **Mental Impressions**: i don't know what it can be.
- **Keyword analysis**: like a **search engine** [[48]](https://en.wikipedia.org/wiki/Search_engine_(computing)). In the core process of the synthetic telepathy network there is a **keyword analysis** [[49]](https://en.wikipedia.org/wiki/Search_engine_optimization) system that could react to certain word or phrases with **artificial intelligence** [[50]](https://en.wikipedia.org/wiki/Artificial_intelligence) bot that use known speech and vocalization of the victim. He can trust to speak with a real person but in reality is a **chatbot** [[51]](https://en.wikipedia.org/wiki/Chatbot). This function also aliment the **schizophrenia** [[52]](https://en.wikipedia.org/wiki/Schizophrenia) and **paranoia** [[53]](https://en.wikipedia.org/wiki/Paranoia) of the target individual that is slowly condemned to go crazy.
- **Emotive response**: related to the different possible responses of the target individual among the artificial intelligence, chatbot, owners and machined situations proposed to him. All of this data are certainly used to improve the different algorithms inside the network but also probably sold to military and paramilitary forces that use human data to build robot and electronic cyberwarfare equipment. This is terrorism because target individuals are not volunteers but are unconscious victims. This is in opposition to **the universal declaration of human rights** [[54]](https://www.un.org/en/universal-declaration-human-rights/).
- **Data mining**: always focused to the sold of data related to the target individual. **Data mining** [[55]](https://en.wikipedia.org/wiki/Data_mining) is the computer science and statistics part related to the extract of **data set** [[56]](https://en.wikipedia.org/wiki/Data_set) in a large amount of data. What could be the meaning in a criminal point of view because of the target individual condition? It could be referred to the fact that all what the victim do is registered. Imagine when a person go to a big shopping center; what are the windows that mostly reclaim his attention? What products does he buy mostly when he go to a market? What are the colors that they attract him? And so on. All of those data are potentially sold to big firm companies, and are an important part of a commercial campaign if they are in big amount of individuals. They are also very important in a political point of view. Remember that target individuals aren't volunteers but they are obligated victims so we can always speak about terrorism. With BRAINnet in my opinion it's possible also to have a target individual that doesn't know to be because he doesn't listen to voice to skull telecommunication so only the visual cortex could be under control and only in read mode. What does it mean? It means that probably this network got thousand of victims and it probably mean that is the cause of the change in Europe these days.
- **Reporting**: **Data reporting** [[57]](https://en.wikipedia.org/wiki/Data_reporting) is the fact to exactly report all the data set extracted from **big data** [[58]](https://en.wikipedia.org/wiki/Big_data)
- **Error control**: referring to the control of percent of errors in the data reporting process.
- **Sensory control**: machines dedicated to the automatic control and regulation on all what append in the *feedback monitoring* facility. Certainly dominated by machine intelligence, **machine learning** [[59]](https://en.wikipedia.org/wiki/Machine_learning) and **neural network** [[60]](https://en.wikipedia.org/wiki/Neural_network).
- **Artificial Intelligence**: all in the synthetic telepathy network, or BRAINnet, is absolutely dominated by machine intelligence. I think that there isn't a big crew of administrators but there is a lot of excellent programmers. I've found connections with the **Neuralink** [[61]](https://en.wikipedia.org/wiki/Neuralink) project by **Elon Musk** [[62]](https://en.wikipedia.org/wiki/Neuralink) and what have said **Mark Zuckerberg** [[63]](https://en.wikipedia.org/wiki/Mark_Zuckerberg) at **F8 conference in 2017** [[64]](https://newsroom.fb.com/news/2017/04/f8-2017-day-1/).
![Mark Zuckerberg at F8 conference in 2017](../Images/f8_mz_d.jpg)
# External links
1. <https://en.wikipedia.org/wiki/Neo-Nazism>
2. <https://en.wikipedia.org/wiki/Cyberwarfare>
3. <https://en.wikipedia.org/wiki/Metaphor>
4. <https://en.wikipedia.org/wiki/Internet_meme>
5. <https://en.wikipedia.org/wiki/Virtual_private_network>
6. https://en.wikipedia.org/wiki/Android_(operating_system)
7. https://en.wikipedia.org/wiki/Human_subject_research
8. https://en.wikipedia.org/wiki/Personal_identification_number
9. <https://en.wikipedia.org/wiki/Cryptocurrency>
10. https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface
11. https://en.wikipedia.org/wiki/Transcranial_magnetic_stimulation
12. https://en.wikipedia.org/wiki/Magnetic_resonance_imaging
13. https://en.wikipedia.org/wiki/Brain_implant
14. https://en.wikipedia.org/wiki/Last_mile
15. http://www.BRAINnet.net/
16. https://en.wikipedia.org/wiki/Neural_oscillation
17. https://en.wikipedia.org/wiki/Software-defined_radio
18. https://en.wikipedia.org/wiki/Delta_wave
19. https://en.wikipedia.org/wiki/Theta_wave
20. https://en.wikipedia.org/wiki/Mu_wave
21. https://en.wikipedia.org/wiki/Sensorimotor_rhythm
22. https://en.wikipedia.org/wiki/Alpha_wave
23. https://en.wikipedia.org/wiki/Beta_wave
24. https://en.wikipedia.org/wiki/Gamma_wave
25. https://www.google.com/search?q=open+hardware+satellite
26. https://en.wikipedia.org/wiki/Wavelength
27. https://en.wikipedia.org/wiki/Line-of-sight_propagation
28. https://en.wikipedia.org/wiki/Backbone_network
29. https://en.wikipedia.org/wiki/Non-line-of-sight_propagation
30. https://en.wikipedia.org/wiki/Telemetry
31. https://en.wikipedia.org/wiki/Speech
32. https://en.wikipedia.org/wiki/Vocoder
33. https://en.wikipedia.org/wiki/Auditory_cortex
34. https://en.wikipedia.org/wiki/Visual_cortex
35. https://en.wikipedia.org/wiki/Augmented_reality
36. https://en.wikipedia.org/wiki/Mixed_reality
37. https://en.wikipedia.org/wiki/Human_eye
38. https://en.wikipedia.org/wiki/Visual_system
39. https://en.wikipedia.org/wiki/Primary_somatosensory_cortex
40. https://en.wikipedia.org/wiki/Sexual_slavery
41. https://en.wikipedia.org/wiki/Man-in-the-middle_attack
42. https://en.wikipedia.org/wiki/Trojan_Horse
43. https://en.wikipedia.org/wiki/Blood_pressure
44. https://en.wikipedia.org/wiki/Heart_rate
45. https://en.wikipedia.org/wiki/Human_body_temperature
46. https://en.wikipedia.org/wiki/Lie_detection
47. https://en.wikipedia.org/wiki/Natural_language_processing
48. https://en.wikipedia.org/wiki/Search_engine_(computing)
49. https://en.wikipedia.org/wiki/Search_engine_optimization
50. https://en.wikipedia.org/wiki/Artificial_intelligence
51. https://en.wikipedia.org/wiki/Chatbot
52. https://en.wikipedia.org/wiki/Schizophrenia
53. https://en.wikipedia.org/wiki/Paranoia
54. https://www.un.org/en/universal-declaration-human-rights/
55. https://en.wikipedia.org/wiki/Data_mining
56. https://en.wikipedia.org/wiki/Data_set
57. https://en.wikipedia.org/wiki/Data_reporting
58. https://en.wikipedia.org/wiki/Big_data
59. https://en.wikipedia.org/wiki/Machine_learning
60. https://en.wikipedia.org/wiki/Neural_network
61. https://en.wikipedia.org/wiki/Neuralink
62. https://en.wikipedia.org/wiki/Elon_Musk
63. https://en.wikipedia.org/wiki/Mark_Zuckerberg
64. https://newsroom.fb.com/news/2017/04/f8-2017-day-1/x

View File

@ -0,0 +1,47 @@
# Targeted individuals
![targeted individuals](../Images/Dr0yW3JVAAArKa-.jpg)
Who are target individuals? Person that for whatever reason are exposed to be a victim of a large group of persons, criminals organizations normally. Target individuals like I've said before are business man that have lost them companies in a strange way eaten by opposites sharks, political opponents to the current government or B-side organization, victims of corrupt love plots among wealthy people.
*I'm a victim of all those three cases. All.*
Target individuals are persons those life are destroyed by electromagnetic torture. Continuously. Isolated by a corrupted administration and society obtained by the use of the synthetic telepathy network. Corruption like an **octopus** [[1]](https://en.wikipedia.org/wiki/Octopus). Corruption that touch all levels of the administration, the **municipality** [[2]](https://en.wikipedia.org/wiki/Municipality), the various police department and the **health care** [[3]](https://en.wikipedia.org/wiki/Health_care). Target individuals are tortured every day and them physical health condition is day by day degraded by the radio emission utilized to provoke inflammations in internal organs and can also fall into a **brain tumor** [[4]](https://en.wikipedia.org/wiki/Brain_tumor).
Society classify them as schizophrenic, usually became indigents reduced to extreme **poverty** [[5]](https://en.wikipedia.org/wiki/Poverty) in our European capitals. Alcohol, heavy drugs addicted. Searching for a couple of coins to eat something, dieing in the cold winter seeing others citizens walking in front of them eyes as if they didn't exist. I've seen many collapsed with them syringes still planted in their drooping arms at the mouth in the central streets of a noisy Barcelona of an infamous tourism incapable of helping these poor people destroyed by this *unknown but not hidden system*.
But this is not the worst think. In this network another shit happen to those poor people.
Those people are heavy tortured almost every day and every night to obtain value to sell to military facilities. Tortured by sadist. Bent by the excruciating pain of electronic weapons that are a reality silenced by corruption as subtle but as thick as a fog bank that is destroying our Europe in front of our white cocaine noses.
Some of them, who got a family that can maintain them like me, try to resist to this monster, this network. And some, always like me, are IT technologist. Someone don't loose his mind after the complicate brain washing phases and the gangstalking one. Like me. Look in twitter the hashtag **#targetindividuals** [[6]](https://twitter.com/hashtag/targetindividuals). This is the legal and silenced by corruption human right abuse in our false electronic democracy. This is the end of ours states. No one speak about and this have to finish right now.
Why there's so much human guinea pigs in our streets and no one reflect on the real reason?
It's simple. And this is not apocalyptic. Have you seen the Terminator saga? Do you understand the **Terminator character concept** [[7]](https://en.wikipedia.org/wiki/Terminator_(character_concept))? Have you think about that the first film left on cinema on 1984?
**George Orwell** [[8]](https://en.wikipedia.org/wiki/George_Orwell) has written a novel in 1947 after the second world war called **Nineteen Eighty-Four** [[9]](https://en.wikipedia.org/wiki/Nineteen_Eighty-Four). He wrote about a big brother society based on global mass surveillance. He had a lot of fantasy? I don't think so. He was a visionary? I don't think so. But those are just my two cents as usual.
So why i speak about a film saga and a novel? Because this network use indigent to obtain human data under extreme stress situations and very low physical health to go ahead with extreme speed in artificial intelligence, neural network, and electronic weapon development. In a few decades the real scenario will be exactly the one proposed by **James Cameron** [[10]](https://en.wikipedia.org/wiki/James_Cameron)? Another visionary? I don't think so, just the elite that with great film productions advance to the big public what will be one of probable feature. But no one say nothing. And let the tortures goes on. Fuck.
Do you want to know the reality? *I'm a target individuals by a military family from when i was born*. But this i will explain in another section, my personal experience.
Many times people don't understand why they are target individuals? They do money betting on life of persons, only destroying a family unit they could obtain thousands of euro. And no one understand it.
Look at the image above. It say "contract stalking". What does it mean? It means that someone, probably persons that you know very well like "friends" of yours, have contracted this service in the synthetic telepathy network to oblige you to commit suicide. Who they are? It's very simple revise with clear mind the years before that this provoked situations has affected your life. Try to draw a graph as a function of time and nefarious events. You will find that those friends could be also your family. Someone that you've call brother. Like me. But why all of this shit could happen to a normal guy? The reply it's only one, envies one of the **seven deadly sins** [[11]](https://en.wikipedia.org/wiki/Seven_deadly_sins). Or something that you haven't under your control, an inheritance. Or simply your business, that provoke interest in some medium size shark. As usual I'm victim of the three cases.
![Seven deadly sins](../Images/Tableau_de_mission_-François-Marie_Balanant_tableau_1-.jpg)
### External links
1. https://en.wikipedia.org/wiki/Octopus
2. https://en.wikipedia.org/wiki/Municipality
3. https://en.wikipedia.org/wiki/Health_care
4. https://en.wikipedia.org/wiki/Brain_tumor
5. https://en.wikipedia.org/wiki/Poverty
6. https://twitter.com/hashtag/targetindividuals
7. https://en.wikipedia.org/wiki/Terminator_(character_concept)
8. https://en.wikipedia.org/wiki/George_Orwell
9. https://en.wikipedia.org/wiki/Nineteen_Eighty-Four
10. https://en.wikipedia.org/wiki/James_Cameron
11. https://en.wikipedia.org/wiki/Seven_deadly_sins

View File

@ -0,0 +1,31 @@
# Do you believe in brain washing?
![Non è la rai 1995](../Images/le-ragazze-di-non-e-la-rai-620x264.jpg)
Yes. And mass media and television owners believe more than you. Do you know **TV format** [[1]](https://en.wikipedia.org/wiki/TV_format)? Ok, it's absolutely the same of the pattern used in gang stalking and all others criminals activities of the synthetic telepathy network. It's this a case? No, it is not! In the "Illuminati" pseudo dictatorship most owners are from television and cinema, this is the audiovisual mafia, the digital mafia and the B-side technological mafia. It's nothing more. *Television formats applied to suicide cases*. Full stop.
Who are the beautiful girls of this '90 photo shoot? **Gianni Boncompagni** [[2]](https://en.wikipedia.org/wiki/Gianni_Boncompagni) productions "**Non è la rai**" [[3]](https://it.wikipedia.org/wiki/Non_%C3%A8_la_Rai).
In this world, the B-side, people use four meanings for every words. People that don't know rules of this fascinating other side of life, like me, got some difficult to easy understand rapidly what is the real meaning but with some experience and a good music to concentrate us we can understand the real meaning of format (disambiguation) as usual only using wikipedia and **synonym** [[14]](https://en.wikipedia.org/wiki/Synonym).
The word is format:
1. pattern.
2. size.
3. erase.
4. layout.
Format has many other meanings as well, but with those four it's sufficient. I think that readers could easily understand what i want to say, i this network be careful to listen to every word and phrases in radio frequency because people here are very expert and real meaning is always various way like a **conditional** [[15]](https://en.wikipedia.org/wiki/Conditional_(computer_programming)) in computer programming.
**Ocaml** [[16]](https://en.wikipedia.org/wiki/OCaml) is without any doubt a program language very common in this system.
![ocaml.re](../Images/1*uxmsEQN95oGc1M2UQCIywA.png)
# External links
1. https://en.wikipedia.org/wiki/TV_format
2. https://en.wikipedia.org/wiki/Gianni_Boncompagni
3. https://it.wikipedia.org/wiki/Non_%C3%A8_la_Rai
4. https://en.wikipedia.org/wiki/Synonym
5. https://en.wikipedia.org/wiki/Conditional_(computer_programming)
6. https://en.wikipedia.org/wiki/OCaml

View File

@ -0,0 +1,20 @@
# Head games or mind game
![Mindgame Alien Star Treck](../Images/Mindgame_Alien.jpg)
Who is this mind game Alien? I don't know, but it seems to be **Star Wars** [[1]](https://en.wikipedia.org/wiki/Star_wars) related. What is a mind game? A psychological **one-upmanship** [[2]](https://en.wikipedia.org/wiki/One-upmanship), among other related concepts.
In Barcelona from July of 2018 i've lived a mind fame searching for my ex girlfriend in Catalunya after one year of gang stalking. The purposes of the game is obviously suicide. With the audiovisual "Machine" of this criminal network they have projected holograms where ever i go of her. All of them was about sexual violence. I've got fear for herself and her sanity. She is a victim of this system. Here you are the exact positions of the holograms, and not cause four or five times i've seen her physically.
![Catalunya Machine](../Images/tequiero.png)
![Barcelona Machine](../Images/tequiero1.png)
I've walked for four thousand kilometers and in the first couple of months i've been seriously afraid for her. After i go ahead to deeply understand the criminal mind of who have done this horrible crime with my person. Stalkers.
Now i can explain a game that have destroyed the life of many boys and girls here in Catalunya, a terrain between two waters, like was Italy in the cold war. But this is another story, another chapter.
# External Links
1. https://en.wikipedia.org/wiki/Star_wars
2. https://en.wikipedia.org/wiki/One-upmanship

View File

@ -0,0 +1,10 @@
# Hierarchical pyramid tree
![Hierarchical pyramid tree](../Images/k11381.gif)
# External Links
1. https://en.wikipedia.org/wiki/Star_wars
2. https://en.wikipedia.org/wiki/One-upmanship

View File

@ -0,0 +1,268 @@
# The Illuminati Machine
![Bjork analogue televion](../Images/bjork-tv.png)
In the last chapter we speak about the target machine, a virtual system under which many clients, conscious or not, are organized in a pyramid structure. But what is exactly the machine, or **M** [[1]](https://en.wikipedia.org/wiki/M_(James_Bond))? First of all there is practically no public document speaking about, so it's like a secret or something similar, many people know about it, someone can technically explain it, but no one write about. Why? I really don't know the real reason and i strongly believe in the **open source model** [[2]](https://en.wikipedia.org/wiki/Open-source_model) and i will try here to explain what I've understand about with some background and knowledge about computer science, telecommunication, neuroscience and ham radio.
In 1988 the Iceland artist **Björk Guðmundsdóttir** [[3]](https://en.wikipedia.org/wiki/Bj%C3%B6rk) speak about the **analog television** [[4]](https://en.wikipedia.org/wiki/Analog_television) with a fascinated voice Here is part of her logic-defying monologue:
*This beautiful television has put me, like I said before, in all sorts of situations.*
*I remember being very scared because an Icelandic poet told me that not like in cinemas, where the thing that throws the picture from it just sends light on the screen, but this is different. This is millions and millions of little screens that send light, some sort of electric light, I'm not really sure.*
*But because there are so many of them, and in fact you are watching very many things when you are watching TV. Your head is very busy all the time to calculate and put it all together into one picture.*
*And then because you're so busy doing that, you don't watch very carefully what the program you are watching is really about. So you become hypnotized. So all that's on TV, it just goes directly into your brain and you stop judging it's right or not.*
*You just swallow and swallow. This is what an Icelandic poet told me.*
*And I became so scared to television that I always got headaches when I watched it. Then, later on, when I got my Danish book on television, I stopped being afraid because I read the truth, the scientifical truth and it was much better.*
*You shouldn't let poets lie to you.*
Image to have en front of yours eye a **cathode ray tube** [[5]](https://en.wikipedia.org/wiki/Cathode-ray_tube) that projects all the reality in our line of sight more some object like in an augmented reality system or completely rewrite all the world before us with a totally computer graphic ambient, something like interactive architectural visualization made by **unreal engine** [[6]](https://en.wikipedia.org/wiki/Unreal_Engine) **four** [[7]](https://www.unrealengine.com/en-US/); this is what they call as **immersion in virtual reality** [[8]](https://en.wikipedia.org/wiki/Immersion_(virtual_reality)) but without any hardware device.
Image to have surrounding your ears a special headphone that reproduce all the audio around you but add a voice chat, could duplicate on the fly the exact voice of a human or any type of sound or audio, could rewrite on the fly the voice of a person speaking with you and so on. Something that could emulate what is nowadays call **3D audio effect** [[9]](https://en.wikipedia.org/wiki/3D_audio_effect).
Image also but not only to have all your **nervous system** [[10]](https://en.wikipedia.org/wiki/Nervous_system) and **muscles** [[11]](https://en.wikipedia.org/wiki/Muscle) connected by **acupuncture** [[12]](https://en.wikipedia.org/wiki/Acupuncture) and **electrodes** [[13]](https://en.wikipedia.org/wiki/Electrode) to a perfect human body reproduction external and internal. They can torture you without touching you but only reproducing the **pain** [[14]](https://en.wikipedia.org/wiki/Pain) remotely stimulating your **nerves** [[15]](https://en.wikipedia.org/wiki/Nerve) and your **brain** [[16]](https://en.wikipedia.org/wiki/Brain).
Our brain is also able to execute two complete tasks, yes two life, at the same moment dividing the twos in the left and right side of the brain. This is called **human multitasking** [[19]](https://en.wikipedia.org/wiki/Human_multitasking). With the Machine connected clients, and not victims, thanks to the radio technology can work in parallel in two thinks. Normally physically in the A-side, legal work, and with the brain in an augmented reality like environment in the B-side, black market. What is the real result? Because of the people connected on this system are divided in classes like **Indian castes**, low cast persons are like slaves, work double time without great compensation normally in the A-side in restorations of what ever and in the B-side in illegal IT, or doing black market and payed in very variables value crypt concurrencies. Normally nor they don't understand the bitcoin market and loose a lot of money. This is like slavery and the soul death of a lot of people. A lot of friends of mine have changed totally in the last ten years.
This seems to be a science fiction film but it's true and it's up and running. It's what i can describe as the more powerful tool product by computer science applied to human being but if used with the only goal the archive more money than possible it's the nightmare of the democracy in our old but great **European Union** [[20]](https://en.wikipedia.org/wiki/European_Union); *world have to know*.
### The visual system MitM remote device
![human visual system pathway](../Images/Comprehensive_List_of_Relevant_Pathways_for_the_Visual_System.png)
The first part of the human visual system is composed by:
- **Cornea** [[21]](https://en.wikipedia.org/wiki/Cornea) and **Lens** [[22]](https://en.wikipedia.org/wiki/Lens_(anatomy)): reflect light into a small image and shine it on the **retina** [[23]](https://en.wikipedia.org/wiki/Retina).
- **Retina**: translate the image received by cornea and lens into electrical neural impulse to the brain to create **visual perception** [[24]](https://en.wikipedia.org/wiki/Visual_perception).
- **Optic nerve** [[25]](https://en.wikipedia.org/wiki/Optic_nerve): a paired **cranial nerve** [[26]](https://en.wikipedia.org/wiki/Cranial_nerves) that transmit visual information from the retina to the brain.
How is possible to do a MitM on the human visual system? I think that the developers have done a big work because the complexity of this system but i can complain that they've done this two principle jobs:
1. Reading in the optic nerve with radio waves obtaining something similar to the **fiber tapping** [[27]](https://en.wikipedia.org/wiki/Fiber_tapping) passive attack. *A very hard work*, it does mean that they have great developers working for this criminal project.
2. **Reading mind** [[28]](https://www.nationalgeographic.com/science/phenomena/2011/10/13/reading-minds-with-fmri/) by remote **fMRI** [[29]](https://www.nationalgeographic.com/science/phenomena/2011/10/13/reading-minds-with-fmri/) or others **neuroimaging** [[30]](https://en.wikipedia.org/wiki/Neuroimaging) sciences. The use of radio waves distinguish real programming state of art of the heads of this project. Probably one of the best programmers is payed by this terrorist system. Military related?
3. Writing using **dream** [[31]](https://en.wikipedia.org/wiki/Dream) injections. Image to dream but when you are awake. How it possible? Using **theta waves**, but not only, generated by software defined radio and the correct modulation. Another time a great work but not so difficult to complain.
![Cyber and Information Domain Service](../Images/InternesVerbandsabzeichenKdoCIR.png)
This kind of ultra hard work it' seems to be obviously related to military forces research department. I live in Europe so the team is Europe related. I was studying computer science at the university of Genoa, Italy. Here I've known the only genius that I've known in my life, i will not write is name here because of possible complaints. What i know that he's working hard on this criminal network and he's working for German military forces (the **Bundeswehr** [[32]](https://en.wikipedia.org/wiki/Bundeswehr)). The Deutschland military cyber forces is named **Cyber and Information Domain Service** [[33]](https://en.wikipedia.org/wiki/Cyber_and_Information_Domain_Service_(Germany)).
Another obvious connection, because of one of the most important speaker in the voice to skull chat that i know from my primary school always in Genoa, is the **Italian Navy** [[34]](https://en.wikipedia.org/wiki/Italian_Navy), i think that speaking about the **CEMM** [[35]](https://it.wikipedia.org/wiki/Corpo_degli_equipaggi_militari_marittimi) the section is obviously the **SSC/TLC/GE** [[36]](http://www.marina.difesa.it/il-tuo-futuro-e-il-mare/carriere/per-grado/sottufficiali/Documents/categ_sottufficiali.pdf).
### The auditory system MitM remote device
The human auditory system is composed by the **auditory system** [[38]](https://en.wikipedia.org/wiki/Auditory_system) and the **primary auditory cortex** [[39]](https://en.wikipedia.org/wiki/Auditory_cortex).
![US5159703](../Images/voicetoskull.png)
The auditory system is totally bypassed by the voice to skull technology. Voice to skull from the early seventy until now was classified as mental sickness. Voice to skull technology was patented on 27 October 1992 by United States Patent under the official name of **silent subliminal presentation system** [[40]](https://patents.google.com/patent/US5159703A/en). The system generate a single **sideband** [[41]](https://en.wikipedia.org/wiki/Sideband), **suppressed carrier** [[42]](https://en.wikipedia.org/wiki/Double-sideband_suppressed-carrier_transmission), **amplitude modulated (AM)** [[43]](https://en.wikipedia.org/wiki/Amplitude_modulation) signal with a channel width of 14.5 KHz, the frequency is 462.25 KHz.
In Catalunya, Spain, people that have worked in this patent have shifted the center frequency and found another that work exactly like these. 431.87
![Voice to skull in Catalunya](../Images/v2k.png)
This is the *voice to skull service active in Catalunya*, Spain. As you can see the center frequency move in function of time. Nowadays it's certainly coded with a script in a SDR environment, but it's a technology from like thirty years ago. It is emitted from terrestrial radio equipment. This frequency is classified by **ITU** as **medium frequency** and normally use a **mast radiator** like antenna, with a single radio it can cover hundred of kilometers using **ground waves** and **ionosphere** reflection.
With this frequency all the B-side, probably all over the world, is administrated. What is the **B-side** [[44]](https://en.wikipedia.org/wiki/B-Sides)? **The dark side of the moon** [[45]](https://en.wikipedia.org/wiki/The_Dark_Side_of_the_Moon)? The two faces of the same medal? It's simple, it is all what is concerned to what ever is connected to the underground world, black market, illegal pornography, deep internet, crypt concurrency, unknown location club, human test, electronic weapons development, society illegal control, audiovisual and so on. All the people working on the shadow economy infrastructures and markets know it but no one speak about in a public network like Internet.
![B-side Barcelona](../Images/b-side.png)
So this network is known by also the governments but *since i was tortured* by probably electronic weapons development and since i'm under continuous control by third parts i decide to speak about it, doing it in an open source way.
But what is the MitM remote equipment that could rewrite on fly audio from every sources on our **auditory field** [[46]](http://www.cochlea.org/en/hear/human-auditory-range) ? This is very complex. And is for sure done with a receiver in the same frequency of the **frequency range of human hearing** [[47]](https://hypertextbook.com/facts/2003/ChrisDAmbrose.shtml) and a transmitter that use the same patent, the **US5159703A**.
This supposed system could have this abstracted scheme:
**Receiver** [20Hz to 20Khz] [[48]](https://en.wikipedia.org/wiki/Radio_receiver) --> **Vocoder** [[49]](https://en.wikipedia.org/wiki/Vocoder) (**speech** [[50]](https://en.wikipedia.org/wiki/Speech) to bit) --> **Operating system** [[51]](https://en.wikipedia.org/wiki/Operating_system) --> Vocoder (bit to speech) --> **Transmitter** [462.25 KHz] [[52]](https://en.wikipedia.org/wiki/Transmitter)
What can be archived with this system?
1. Automatic voice recognition.
2. Automatic translation in what ever language; input and output.
3. On the fly voice or sound rewrite.
4. Sound effects and like augmented reality system.
### The nervous system and muscle control
Do you know the project **OpenBCI** [[53]](https://en.wikipedia.org/wiki/OpenBCI)? An **open hardware** [[54]](https://en.wikipedia.org/wiki/Open-source_hardware) project to amplify, read and processing **EEG** [[55]](https://en.wikipedia.org/wiki/Electroencephalography), **EMG** [[56]](https://en.wikipedia.org/wiki/Electromyography) and **EKG** [[57]](https://en.wikipedia.org/wiki/Electrocardiography).
![OpenBCI](../Images/IMG_7586.jpg)
Do you know that Facebook **has adquired** [[58]](https://www.theverge.com/2019/9/23/20881032/facebook-ctrl-labs-acquisition-neural-interface-armband-ar-vr-deal) **CTRL-Labs** [[59]](https://www.ctrl-labs.com/) that produce an **neural control interface NCI** [[60]](https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface), a wristband to control machine with muscles on a arm?
![CTRL-labs Facebook wristband](../Images/CTRL-labs.jpeg)
Imagine those devices acting in remote without any physical brain implant or device on the victim or the client of the synthetic telepathy network, this is exactly what is the "Machine". This is an extremely powerful device that used in a bad way could start what it can me named as a pseudo dictatorship. A digital mafia. Owning rapidly black market and clear economy and politics. This is what it is passing just now, nowadays, at this moment in our country, Europe. This is not a joke. This is what we're leaving now and no one speak about it. **Brexit** [[61]](https://en.wikipedia.org/wiki/Brexit)? This is probably what it start it. It's possible that is acronym of "*brain exit*"?
it the person **on this article** [[62]](https://www.guineapigzero.com/i-was-a-brain-slave.html) a schizophrenic? Absolutely not, but he doesn't know why he is a slave. Why does he speaks about UFO and stupidity like this? Because when human kind cannot explain a phenomenon use divinity, like our ancestor do with polytheism and monotheism. The real problem is that our politics, administrations and police doesn't know exactly what it is passing or they are totally corrupted by the Machine. How it is possible? We will see in the next chapter.
### The visible light radio wave monitor television
![Visible light frequency](../Images/visible_light.jpg)
This is the best feature of this network. People that have payed to enter or girls that have passed two years of slavery are in. When you're in you visualize, and only you, a virtual monitor above your head. Something similar to the effect of the physic **Google glass** [[63]](https://en.wikipedia.org/wiki/Google_Glass). Augmented reality without a device, it's real and it's now. It's changing our democracy. Just now, under our eyes.
What you visualize is a big tablet Android equipped above your head. And also a augmented reality vision. How do you control it? With two virtual arms that you control with your brain. All of this it's visible only by the end user, others users in the network could not visualize it.
### The reproductive system over excitement and control
![Women masturbation brain response](../Images/nihms303557f2.jpg)
**Human sexual activity** [[63]](https://en.wikipedia.org/wiki/Human_sexual_activity) can be overloaded by the use of the radio and digital Machine from the synthetic telepathy network. This can create induced sex slaves, prostitutes and child violations. How it is possible?
In the **study before** [[64]](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3186818/) we can appreciate in the fMRI images in composite the brain zone neuron activated by different parts self masturbation in a woman.
So like we've seen before with this technology and **electromagnetic waves** [[65]](https://en.wikipedia.org/wiki/Electromagnetic_radiation) it's possible to remotely stimulate neurons like it's done in a physic MRI machine.
Doing a rapid technical analysis we can consider that radios are working in a magnetic resonance environment use **shortwave** [[66]](https://en.wikipedia.org/wiki/Shortwave_radio) frequencies. Transmitters and receivers are called **radio frequency coils** [[67]](https://en.wikipedia.org/wiki/Radiofrequency_coil) and use **loop antennas** [[68]](https://en.wikipedia.org/wiki/Loop_antenna) or **ferrite loop antennas** [[69]](https://en.wikipedia.org/wiki/Comoros).
### Remote EEG plotting
![Spike Wavesz](../Images/Spike-waves.png)
Whit this technology it's possible to obtain remote plotting of brain waves to obtain a complete clinical picture of the victim; but not only using this informations is possible to keep under control various state of mind induced by external agents, like provoked situations, or to study effect of drug abuse in a victim. Results can be different between targets.
Stalkers and human hackers with a large career, criminals, can use those remote informations to trace a possible degrade in the life of the victim using **psychological traumas** [[70]](https://en.wikipedia.org/wiki/Psychological_trauma) and inducted drug abuse to obtain the suicide of the target. Those criminals always play pushing the psychological limit using provoked anxiety stress and schizophrenias on the victims to obtain extreme data to sell for example to military facilities or to obtain the suicide gaining money using a system of bets that i'll explain later.
Those criminals are the most dangerous ones in the earth. Using this network they can apply this method to a large part of the population changing life of entire families, groups and so on. Can obtain change in political elections. *This is terrorism*.
Another thing about remote EEG it's not only the possibility to read. But this i really don't know.
I think that is possible using this technology to induce to a victim an attack of **epilepsy** [[71]](https://en.wikipedia.org/wiki/Epilepsy).
![Epilepsy](../Images/shutterstock_590081462-1000x480.jpg)
**Epileptic seizures** [[72]](https://en.wikipedia.org/wiki/Epileptic_seizure) are the result of excessive and abnormal neuronal activity in the cortex of the brain. This abnormal neuronal activity can be induced at 3Hz at **extremely low frequency** [[73]](https://en.wikipedia.org/wiki/Extremely_low_frequency).
### Death method
![DEW](../Images/laser-weapons-illustration-1200.jpg)
Yes, in this network it's possible to induce to death rapidly and slowly to a victim. Rapidly i can describe those methods:
- Prolonged attack of epilepsy.
- **Intracranial aneurysm** [[74]](https://en.wikipedia.org/wiki/Intracranial_aneurysm) inducted by amphetamine or cocaine more pressure in cranial **blood vessels** [[75]](https://en.wikipedia.org/wiki/Blood_vessel), a **vasospasm** [[76]](https://en.wikipedia.org/wiki/Vasospasm).
- **Myocardial infarction** [[77]](https://en.wikipedia.org/wiki/Myocardial_infarction).
But there is also worst method to kill persons using this network. One is very slowly but so effective. Using radio waves pointed exactly always in the same interior organ, like a **lung** [[78]](https://en.wikipedia.org/wiki/Lung), you can create a **pleurisy** [[79]](https://en.wikipedia.org/wiki/Pleurisy). Because pleuritis is an **inflammation** [[80]](https://en.wikipedia.org/wiki/Inflammation) if it is prolonged for years it can degenerate in a **lung cancer** [[81]](https://en.wikipedia.org/wiki/Lung_cancer). If the victim is a smoker it can be used like an effective manner to kill.
### Electronic harassment
![Electronic harassment](../Images/cyber-harassment.jpg)
**Electromagnetic torture** [[82]](https://en.wikipedia.org/wiki/Electronic_harassment) are normally classified for the governments as **hallucinations** [[83]](https://en.wikipedia.org/wiki/Hallucination) thats because people cannot explain scientifically the real cause of the voice to skull and other sensations feelings that provoke them.
This book want to be exactly the necessary proof, the **evidences** [[84]](https://en.wikipedia.org/wiki/Evidence_(law)), to denounce these criminals who are ruining the lives of millions of people.
**Electromagnetic pollution** [[85]](https://en.wikipedia.org/wiki/Electromagnetic_radiation_and_health) exist. And mistakenly these issues are classified as such. Electro smog is also dangerous for our health.
![EMF](../Images/EMF-3.png)
This detections was done in my house on march 2019. Like you can appreciate the normal values are shown on the left , this is the correct on people that are not target individuals. The right side is a person, like me, subjected to electromagnetic assault. Those are called **EMF measurement** [[86]](https://en.wikipedia.org/wiki/EMF_measurement) can be obtained with physical meters or with applications in mobile that've got a **MEMS magnetic field sensor** [[87]](https://en.wikipedia.org/wiki/MEMS_magnetic_field_sensor). Almost all medium size smart mobile got one nowadays. Here you are some application to size it:
- https://play.google.com/store/apps/details?id=smf.detector
- https://play.google.com/store/apps/details?id=com.mreprogramming.ultimateemfdetector
Those hardware size EMF using the **Tesla unit** [[88]](https://en.wikipedia.org/wiki/Tesla_(unit)).
# External links
1. https://en.wikipedia.org/wiki/M_(James_Bond)
2. https://en.wikipedia.org/wiki/Open-source_model
3. [https://en.wikipedia.org/wiki/Bj%C3%B6rk](https://en.wikipedia.org/wiki/Björk)
4. https://en.wikipedia.org/wiki/Analog_television
5. https://en.wikipedia.org/wiki/Cathode-ray_tube
6. https://en.wikipedia.org/wiki/Unreal_Engine
7. https://www.unrealengine.com/en-US/
8. https://en.wikipedia.org/wiki/Immersion_(virtual_reality)
9. https://en.wikipedia.org/wiki/3D_audio_effect
10. https://en.wikipedia.org/wiki/Nervous_system
11. https://en.wikipedia.org/wiki/Muscle
12. https://en.wikipedia.org/wiki/Acupuncture
13. https://en.wikipedia.org/wiki/Electrode
14. https://en.wikipedia.org/wiki/Pain
15. https://en.wikipedia.org/wiki/Nerve
16. https://en.wikipedia.org/wiki/Brain
17. https://en.wikipedia.org/wiki/Dyson_sphere
18. https://en.wikipedia.org/wiki/Tty_(unix)
19. https://en.wikipedia.org/wiki/Human_multitasking
20. https://en.wikipedia.org/wiki/European_Union
21. https://en.wikipedia.org/wiki/Cornea
22. https://en.wikipedia.org/wiki/Lens_(anatomy)
23. https://en.wikipedia.org/wiki/Retina
24. https://en.wikipedia.org/wiki/Visual_perception
25. https://en.wikipedia.org/wiki/Optic_nerve
26. https://en.wikipedia.org/wiki/Cranial_nerves
27. https://en.wikipedia.org/wiki/Fiber_tapping
28. https://www.nationalgeographic.com/science/phenomena/2011/10/13/reading-minds-with-fmri/
29. https://en.wikipedia.org/wiki/Functional_magnetic_resonance_imaging
30. https://en.wikipedia.org/wiki/Neuroimaging
31. https://en.wikipedia.org/wiki/Dream
32. https://en.wikipedia.org/wiki/Bundeswehr
33. https://en.wikipedia.org/wiki/Cyber_and_Information_Domain_Service_(Germany)
34. https://en.wikipedia.org/wiki/Italian_Navy
35. https://it.wikipedia.org/wiki/Corpo_degli_equipaggi_militari_marittimi
36. http://www.marina.difesa.it/il-tuo-futuro-e-il-mare/carriere/per-grado/sottufficiali/Documents/categ_sottufficiali.pdf
37. https://en.wikipedia.org/wiki/Luigi_Durand_de_la_Penne
38. https://en.wikipedia.org/wiki/Auditory_system
39. https://en.wikipedia.org/wiki/Auditory_cortex
40. https://patents.google.com/patent/US5159703A/en
41. https://en.wikipedia.org/wiki/Sideband
42. https://en.wikipedia.org/wiki/Double-sideband_suppressed-carrier_transmission
43. https://en.wikipedia.org/wiki/Amplitude_modulation
44. https://en.wikipedia.org/wiki/B-Side
45. https://en.wikipedia.org/wiki/The_Dark_Side_of_the_Moon
46. http://www.cochlea.org/en/hear/human-auditory-range
47. https://hypertextbook.com/facts/2003/ChrisDAmbrose.shtml
48. https://en.wikipedia.org/wiki/Radio_receiver
49. https://en.wikipedia.org/wiki/Vocoder
50. https://en.wikipedia.org/wiki/Speech
51. https://en.wikipedia.org/wiki/Operating_system
52. https://en.wikipedia.org/wiki/Transmitter
53. https://en.wikipedia.org/wiki/OpenBCI
54. https://en.wikipedia.org/wiki/Open-source_hardware
55. https://en.wikipedia.org/wiki/Electroencephalography
56. https://en.wikipedia.org/wiki/Electromyography
57. https://en.wikipedia.org/wiki/Electrocardiography
58. https://www.theverge.com/2019/9/23/20881032/facebook-ctrl-labs-acquisition-neural-interface-armband-ar-vr-deal
59. https://www.ctrl-labs.com/
60. https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface
61. https://en.wikipedia.org/wiki/Brexit
62. https://www.guineapigzero.com/i-was-a-brain-slave.html
63. https://en.wikipedia.org/wiki/Google_Glass
64. https://en.wikipedia.org/wiki/Human_sexual_activity
65. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3186818/
66. https://en.wikipedia.org/wiki/Electromagnetic_radiation
67. https://en.wikipedia.org/wiki/Shortwave_radio
68. https://en.wikipedia.org/wiki/Radiofrequency_coil
69. https://en.wikipedia.org/wiki/Loop_antenna
70. https://en.wikipedia.org/wiki/Ferrite_core#Ferrite_rod_aerial
71. https://en.wikipedia.org/wiki/Psychological_trauma
72. https://en.wikipedia.org/wiki/Epilepsy
73. https://en.wikipedia.org/wiki/Epileptic_seizure
74. https://en.wikipedia.org/wiki/Extremely_low_frequency
75. https://en.wikipedia.org/wiki/Intracranial_aneurysm
76. https://en.wikipedia.org/wiki/Blood_vessel
77. https://en.wikipedia.org/wiki/Vasospasm
78. https://en.wikipedia.org/wiki/Myocardial_infarction
79. https://en.wikipedia.org/wiki/Lung
80. https://en.wikipedia.org/wiki/Pleurisy
81. https://en.wikipedia.org/wiki/Inflammation
82. https://en.wikipedia.org/wiki/Lung_cancer
83. https://en.wikipedia.org/wiki/Electronic_harassment
84. https://en.wikipedia.org/wiki/Hallucination
85. https://en.wikipedia.org/wiki/Evidence_(law)
86. https://en.wikipedia.org/wiki/Electromagnetic_radiation_and_health
87. https://en.wikipedia.org/wiki/EMF_measurement
88. https://en.wikipedia.org/wiki/MEMS_magnetic_field_sensor
89. https://en.wikipedia.org/wiki/Tesla_(unit)

View File

@ -0,0 +1,106 @@
# Blockchain technology
![I'm a wild man](../Images/wild.png)
First of all i wanna do with you, reader, a consideration. We've got analyzed the synthetic telepathy network and the radio waves Machine. Those two IT systems are to control, break our privacy laws, abuse persons, destroy souls, change our life.
Now i want to introduce to you technologies that are exactly on the opposite site. Those technologies are actively developed to do the exact in front work. Those peer to peer derived protocols are born to guarantee privacy and security to the end users.
But they are used by the synthetic telepathy network owners to do crimes. Horrible crimes like foment pedophilia or illegal pornography. But those are not the real crimes, though they are the most horrible of mankind. The ultimate end is despise the work of those programmers that work for freedom. *Freedom is the most important background of our democracy*.
Who are the new dictators, who is building this pseudo dictatorship, who is destroying our dreams of the late sixties? Always the same persons. The elite. Now the elite have semi owned the Internet, the most important invention in the last century and with the tech giants they are building the eye that all see. Something similar to the Egyptian gods, mysticism upon ignorance; in Internet and radio frequency but now also in the *decimal society* they call "Illuminati", an Internet **fraud**. The new mafia is the **digital mafia** and is international.
But why they are doing crimes like those? It's simple. To get profound and go ahead with technology. All of this is for always the same think. Like in the cold war. Is for the arms race. The nowadays cold war have a name but no one speak about, **cyber warfare**.
*Those are my two cents.*
### The Monero crypt concurrency
![The Monero circuit](../Images/monero.png)
**Monero** [[1]](https://www.getmonero.org/) is decentralized crypt currency, meaning it is secure digital cash operated by a network of users. Transactions are confirmed by distributed consensus and then immutably recorded on the **blockchain** [[2]](https://en.wikipedia.org/wiki/Blockchain). Third-parties do not need to be trusted to keep your **Monero** [[3]](https://en.wikipedia.org/wiki/Monero_(cryptocurrency)) safe. Monero is *totally* untraceable.
Let's do some considerations before start with a deep dive into this network. First of all **M** is its logotype, simple is the concurrency of the Machine, what we start to explain in the last chapter. But does it can be converted into classical money? Yes for sure here it is the exchange graphic:
![monero exchange value](../Images/monero-euro-value.png)
But it's possible to simply go to a cash dispenser and get euro? Yes it is.
![Bitchain ATM cash dispenser](../Images/btcpoint_bitcoin_atm_c828d19c75.jpg)
Remember that to get cash from this bitcoin **ATM** [[4]](https://en.wikipedia.org/wiki/Automated_teller_machine) normally you have to change **XMR** [[5]](https://www.coinbase.com/price/monero?locale=en) to **LTC** [[6]](https://www.coinbase.com/price/litecoin?locale=en), then go to a local ATM as you can find in **coin ATM radar** [[7]](https://coinatmradar.com/). In Barcelona for example there's the network called **BitBase** [[8]](https://bitbase.es/) where you can sell also directly Monero.
Another method is to buy a debit bitcoin card that you can recharge on line from your wallet and then simply go to every type of classic currency ATM and got cash. Like **CryptoPay** [[9]](https://cryptopay.me/bitcoin-debit-card/#uk). Criminals use false identities and SIM card without identification to buy online those goods. And this is a fraud.
Another method to move XMR coins is buy directly in shops that accepts this crypt concurrency. The A-side services or goods that can be payed directly are various some of them are detailed on **cryptwerk** [[10]](https://cryptwerk.com/pay-with/xmr/). What does it mean in reality? That a person that has got a lot of this type of currency could open an A-side physic and Internet shop and sell goods in classical money. Simple but functional. Who's do it in a better way use various company chains to elude fiscal controls and remove the use of XMR from their fiscal invoices. Another time, very simple, it's a game.
What those criminals can do in the same Monero circuit? I don't know but using a little bit of logic and remembering that we're speaking about B-side it's very simple:
- Drug market buy and sell.
- Black market buy and sell.
- Human traffic.
- Forced prostitution.
- All kind of illegal good buy and sell.
- Illegal apartment rent.
- Credit card fraud.
- Cracker services rent.
- Corruption.
This is only a little window over this terrorist and criminal network. We'll go deeper in the next chapters.
### The crypt concurrency market
![Bitcoin](../Images/AT8rEjx8lVL6PQ1GCU.jpeg)
The Bitcoin market it's similar to the normal concurrency market, with a quotation changing it's value every day depending on different factors. There's more solid concurrency that don't fluctuate too much but others, new or opened ad hoc for an operation, change them value constantly. People that work with this kind of values know it and play a lot with newbies or ignorance paying in a type and dais after this type loose likely more than 10% of value.
A good player got always in mind this factor and use good web pages to keep the global market under control.
https://coinmarketcap.com/
This is a very good portal to know about it. *But why I speak about this feature*?
Many Bitcoin or **Ethereum** [[11]](https://en.wikipedia.org/wiki/Ethereum) based crypt concurrency are connected to the "Illuminati" pseudo dictatorship. Many of them are connected to the black, drug and prostitution market. Many also with corruption. I've done a public web page where you can consult about those coin that I've learned in radio frequency (voice to skull) about.
There are safe crypt currency bank and others that respect totally the privacy of the owners. Some want that you send your passport and a photography of you keeping it opened in front of a webcam, nothing very secure, and others are totally anonymous:
- https://www.coinbase.com/ is the one more secure.
- https://freewallet.org/ the other more privacy related.
But there is also games bitcoin based that are based onto Caribbean tax heavens like **Curaçao** [[12]](https://en.wikipedia.org/wiki/Cura%C3%A7ao). Here you can open free and totally anonymous crypt concurrency directions where to clean money in a series of washing machines. To obtain totally anonymity in a bitcoin transaction. One of those games is:
https://duckdice.io/?modal=greeting
That is probably related to the privacy based search engine **Duck, duck, goose** [[13]](https://en.wikipedia.org/wiki/DuckDuckGo).
### The SAFE network blockchain
![SAFE network blockchain](../Images/1200px-Safe_Water_Network_logo.svg.png)
A blockchain model applied to networking **ISO/OSI** [[14]](https://en.wikipedia.org/wiki/OSI_model) stack. It replace the last fourth pile of the Internet model. Packets are replaced with data chunks mixed in various different locations without a fixed one, a central server. It's like the old style **p2p** [[15]](https://en.wikipedia.org/wiki/Peer-to-peer) but with new encryptions models that guarantee **privacy** [[16]](https://en.wikipedia.org/wiki/Privacy), **cryptography** [[17]](https://en.wikipedia.org/wiki/Cryptography), confidentiality, integrity, and availability.
# External Links
1. https://www.getmonero.org/
2. https://en.wikipedia.org/wiki/Blockchain
3. https://en.wikipedia.org/wiki/Monero_(cryptocurrency)
4. https://en.wikipedia.org/wiki/Automated_teller_machine
5. https://www.coinbase.com/price/monero?locale=en
6. https://www.coinbase.com/price/litecoin?locale=en
7. https://coinatmradar.com/
8. https://bitbase.es/
9. https://cryptopay.me/bitcoin-debit-card/#uk
10. https://cryptwerk.com/pay-with/xmr/
11. https://en.wikipedia.org/wiki/Ethereum
12. https://en.wikipedia.org/wiki/Cura%C3%A7ao
13. https://en.wikipedia.org/wiki/DuckDuckGo
14. https://en.wikipedia.org/wiki/OSI_model
15. https://en.wikipedia.org/wiki/Peer-to-peer
16. https://en.wikipedia.org/wiki/Privacy
17. https://en.wikipedia.org/wiki/Cryptography

View File

@ -0,0 +1,249 @@
# E-democracy
![E-democracy](../Images/800px-Hilbert_3D_e-democracy_roadmap.png)
As you can see there's a pyramid structure in this graphic, so, it's simple, it's a fraud. And electronic democracy *it's not democracy*. I remember my father telling me about his sense of **claustrophobia** [[1]](https://en.wikipedia.org/wiki/Claustrophobia) inside the **Giza pyramid complex** [[2]](https://en.wikipedia.org/wiki/Giza_pyramid_complex), also this illness could be classified as **anxiety disorder** [[3]](https://en.wikipedia.org/wiki/Anxiety_disorder). Look at the second last step before **e-democracy** [[4]](https://en.wikipedia.org/wiki/E-democracy), it's **big data** [[5]](https://en.wikipedia.org/wiki/Big_data) analysis. All of this data in the synthetic telepathy network has grow up a lot. In this criminal network there's absolutely no **privacy** [[6]](https://en.wikipedia.org/wiki/Privacy). And privacy is one of the most important towers of democracy. Where's no privacy there's no democracy.
First of all all people that are connected with the service of remote neural monitoring has got their mind read, auditory cortex and visual cortex first of all. What's happen? People are like remote video cameras! All in their line of sight is uploaded to the computing center, this probably could be in **Switzerland** [[7]](https://en.wikipedia.org/wiki/Switzerland).
What gain do you get in transforming humans into a device?
Data recollecting about:
1. Customs and traditions of people.
2. People's sexual clothes.
3. Political inclination.
4. All about them life and about life of his own circle of knowledge.
5. Total control on what so ever is them line of sight, like cars, license plates, people, etcetera etcetera.
But speaking about democracy that is the title of this chapter the worst think is obviously that another tower of our democracies is broken, the **secret ballot** [[8]](https://en.wikipedia.org/wiki/Secret_ballot).
What is this network? I cannot understand why no one say nothing and my fear for a third world war and the consequent deaths is very high. This is terrorism, and is destroying the **United States of Europe** [[9]](https://en.wikipedia.org/wiki/United_States_of_Europe).
![United States of Europe](../Images/9yvgtx5swr621.png)
Why our political don't do nothing about? Remember that United Kingdom has vote for ***Brexit***!
It's very simple and it's astonished how controllers, services and other political group say nothing! The answer is always the same and is the worst cancer of the democracy: **corruption** [[10]](https://en.wikipedia.org/wiki/Corruption).
How has changed corruption with the "Illuminati" pseudo dictatorship? Simple, with untraceable crypt concurrency like Monero every type of public figure, like politicians or police, can be corrupted with this system. It's very important understand that on line crypt bank like **Freewallet** [[11]](https://freewallet.org/) are totally anonymous, if used with the **Tor project** [[12]](https://www.torproject.org/) or a free **proxy server** [[13]](https://en.wikipedia.org/wiki/Proxy_server) also source **IP address** [[14]](https://en.wikipedia.org/wiki/IP_address) is rewritten so the service is near absolutely totally secure.
So we can start thinking about what is known as **election day** [[15]](https://en.wikipedia.org/wiki/Election_day) fraud and what is passing just now in our Europe, that is **democratic backsliding** [[16]](https://en.wikipedia.org/wiki/Democratic_backsliding). Since the end of the **cold war** [[17]](https://en.wikipedia.org/wiki/Cold_War) this process in active in the background of our democracies and is something that have been decided by the elite. Like no one have say nothing about the real tool and cause of this right totalitarianism turn, the tool and cause is this network, the synthetic telepathy network and the pseudo dictatorship "Illuminati". I think that at this time, 2019, this process is near to be irreversible like the **climate change** [[18]](https://en.wikipedia.org/wiki/Climate_change), *we've got to do something all together just now*. And in a public way and without using masks. The activists group **Anonymous** [[19]](https://en.wikipedia.org/wiki/Anonymous_(group)) is doing something about, but they've *been classified as terrorist* from ours politicians and also they have not do work in a clear way using simple words without two or more meanings, so a lot of people doesn't understand the real sense. This is a previous accord with the owners of this network where Anonymous got access and do a little bit of opposition, *but it's not sufficient*.
What political currents have born from this backsliding? Remember always, history repeat because humans are always the same. Now with technology, the most important invention in the last century.
**Populism** [[20]](https://en.wikipedia.org/wiki/Populism).
And tell me my dear reader, in what these currents flow into? Another time is very simple, but *an icy shiver runs in my spine*:
**Fascism** [[21]](https://en.wikipedia.org/wiki/Fascism) sold as social revolution, sold as **new world order** [[22]](https://en.wikipedia.org/wiki/New_World_Order_(conspiracy_theory)) (a fraud it's always the same elite gaming with people).
Dear fellow reader how many persons die in the last **authoritarianism** [[23]](https://en.wikipedia.org/wiki/Authoritarianism). Only an example **World War 2** [[24]](https://en.wikipedia.org/wiki/World_War_II_casualties) casualties where 55 million.
Why people don't understand the real danger about "Illuminati"? It's so simple.
**Ignorance** [[25]](https://en.wikipedia.org/wiki/Ignorance).
But is ignorance a crime? No it isn't nor it is a bad word to describe the state of a person. It's not an insult. The crime is farm ignorance, with what? *In not so ancient time with supernatural, cult and church. Now with piloted mass media, television and Internet*.
But if they understand but no one say nothing, what is the cause. Always very simple:
**Money** [[26]](https://en.wikipedia.org/wiki/Money).
I **rotftl** [[27]](https://emojipedia.org/rolling-on-the-floor-laughing/), a nowadays technological acronym, a lot. For money and ignorance our sons and we are about to live another forty years of blackout like the start of the twentieth century more dangerous because of extreme evolution of technology.
*How are the real persons behind that? Our fathers, because they are old people, they've lived and they only think about personal problems. They don't like humans and unconsciously or not have destroyed the life of their grandchildren.*
### Piloted feminism and others mass feelings
![Girl power](../Images/feminismpuppetry-punchierpink-958x559.jpg)
**Feminism** [[28]](https://en.wikipedia.org/wiki/Feminism) is also another paint of this system, they have been very clever and got analyzed the weak points in our society. Attention theoretically feminism is a great movement is for freedom and equality in **human rights** [[29]](https://en.wikipedia.org/wiki/Human_rights) for women, in reply to **machismo** [[30]](https://en.wikipedia.org/wiki/Machismo) and **gender violence** [[31]](https://en.wikipedia.org/wiki/Gender_violence). So it's a democratic movement.
So who can utilize democratic movements to complain with a turn in totalitarianism in our Europe? Great service entrepreneurs departments followed by human hackers.
Why i speak about paint when i speak about feminist? It's not to illegitimate a true sentiment but it's to do a reflexion and i want that you, girls, do the same with my phrases that are not a manipulation but an object thinking. When we speak about sentiment that move a lot of persons, we can speak about masses. Masses are an incredible power tool for politicians and big entrepreneurs. Masses guided using a real sentiment with another final goal are very dangerous for democracy, masses vote almost the same when there's an **election** [[32]](https://en.wikipedia.org/wiki/Election) in the current **legislature** [[33]](https://en.wikipedia.org/wiki/Legislature).
![Carles Puigdemont in the Catalan parliament](../Images/1024px-Carles_Puigdemont_el_10_d'octubre_de_2017.jpg)
Very unfortunately always when we speak about masses common feeling if they are not managed by great minds alien to foreign influences and primarily not corrupted by money, like it happen with the advance of the "Illuminati" pseudo dictatorship, they can be addressed where the corrupter want.
*The common address nowadays is the devious, for now, totalitarian regime.*
Here it is others masses common feelings that is manipulated with this hell technology in my opinion:
- The Catalan Republican feeling.
- Associations against homophobia.
- Football club supports.
- Disgruntled citizens from the current political scene.
- Religious believers.
### Documentation and bank identity thief
![CaixaBank](../Images/60410.jpg)
There is others towers of our democracy government like the importance of keeping your identification and banking documents private. With this technology all of yours documents are read by the visual cortex remote reading by the neural control.
Also, and yes it's true, with radio frequency it's possible to simulate a **magnetic stripe reader** [[34]](https://en.wikipedia.org/wiki/Card_reader) device and chip reader. It's true and it's under our eyes every days. Do you know **contactless payment** [[35]](https://en.wikipedia.org/wiki/Contactless_payment)? Do you know **radio frequency identification** [[36]](https://en.wikipedia.org/wiki/Radio-frequency_identification)? Could you image that the same system is done from a satellite network? You probably don't understand that we've totally loose our democracy. E-democracy is totally hacked by satterrorism. And it's now, and no one speak about? Does mass media say nothing? No. Why? Because of democratic backsliding that have fallen into populism political real movement and that obviously will fall into fascism and millions of death. The history always is repeating because of human kind, we're always the same animal and with technology we're too dangerous. For our planet and for our fellow men. *What is happening in reality*?
![Capitalist pyramid](../Images/Pyramid_of_Capitalist_System.png)
Look another pyramid, another fraud, this have more than two thousand years. A strong one. Ok but now there's one layer upper that is **outer space** [[37]](https://en.wikipedia.org/wiki/Outer_space) and **cyberspace** [[38]](https://en.wikipedia.org/wiki/Cyberspace).
Old summit of the capitalist pyramid, that have been always the same aristocratic cast, have lost them supremacy. This is called **new world order** [[39]](https://en.wikipedia.org/wiki/New_World_Order_(conspiracy_theory)), but is a conspiracy theory (in wikipedia, a web portal...).
![New World Order](../Images/nwo.png)
Look at this false **esoterism** [[40]](https://en.wikipedia.org/wiki/Western_esotericism) **masonic** [[41]](https://en.wikipedia.org/wiki/Freemasonry) symbol, you can find it on the **dollar** [[42]](https://en.wikipedia.org/wiki/Dollar) . Remember *paper money is a fraud also*. A pyramid, a fraud, broken in his summit by an eye in space. *Satellite nothing else*.
But who are who have broken the capitalist summit? Big technological firm.
They call them the **unicorn club** [[43]](https://en.wikipedia.org/wiki/Unicorn_(finance)), another symbol. And the biggest are the **GAFAM** [[44]](https://en.wikipedia.org/wiki/Big_Four_tech_companies), next "**the big nine G-MAFIA BAT**" [[45]](https://www.wired.com/beyond-the-beyond/2019/03/big-nine-g-mafia-bat/). Those are the companies:
1. Google
2. Amazon
3. IBM
4. Facebook
5. Apple
6. Microsoft
7. **Baidu** [[46]](https://en.wikipedia.org/wiki/Alibaba_Group)
8. **Alibaba** [[47]](https://en.wikipedia.org/wiki/Alibaba_Group)
9. **Tencent** [[46]](https://en.wikipedia.org/wiki/Tencent)
Look at those last three tech giant, are Chinese.
The reality is one. **Barcelona was owned by BAT tech giants.** And also the B-side is under those group. Because big tech nowadays control also black markets. Yes, it's true and yes the new mafia. The digital one.
![BAT](../Images/Batman-Golden-Age-Featured-Image-Cropped.jpg)
### Oaths break
![Hippocratic Oath](../Images/HippocraticOath.jpg)
There's various professional figures in a democratic state that have to oath in front of the state about the professional secret of customers personal data and cases.
Those professionals are important to maintains people sovereign state:
- Doctors and odontologist, **Hippocratic Oath** [[47]](https://en.wikipedia.org/wiki/Hippocratic_Oath).
- Military and also military police like **Carabinieri** [[48]](https://en.wikipedia.org/wiki/Carabinieri) or **Guardia Civil** [[49]](https://en.wikipedia.org/wiki/Civil_Guard_(Spain)), **Oath of allegiance** [[50]](https://en.wikipedia.org/wiki/Oath_of_allegiance).
- **Oath of politicians office** [[51]](https://en.wikipedia.org/wiki/Oath_of_office).
- Oath of **lawyers** [[52]](https://en.wikipedia.org/wiki/Lawyer).
With this criminal networks it's impossible to maintain professional secrecy! All what we're saying to a lawyer or a police officers or our medicals records are registered and stolen. They have the knowledge of all about us.
I call it a pseudo dictatorship because it is a state under the state like it is the old Mafia. But it's important to understand that this kind of digital Mafia with this extreme invasive technology got all about every citizen and professional. It's absolutely the end of democracy, no privacy, without rights, every victim or target individual is totally naked in front of the perpetuators of this horrible criminal state. Something that start in Internet like a fraud, the *"Illuminati" now are a very dangerous Mafia which is taking ground in the civil status but also in the ancient mafias*.
# External links
1. https://en.wikipedia.org/wiki/Claustrophobia
2. https://en.wikipedia.org/wiki/Giza_pyramid_complex
3. https://en.wikipedia.org/wiki/Anxiety_disorder
4. https://en.wikipedia.org/wiki/E-democracy
5. https://en.wikipedia.org/wiki/Big_data
6. https://en.wikipedia.org/wiki/Privacy
7. https://en.wikipedia.org/wiki/Switzerland
8. https://en.wikipedia.org/wiki/Secret_ballot
9. https://en.wikipedia.org/wiki/United_States_of_Europe
10. https://en.wikipedia.org/wiki/Corruption
11. https://freewallet.org/
12. https://www.torproject.org/
13. https://en.wikipedia.org/wiki/Proxy_server
14. https://en.wikipedia.org/wiki/IP_address
15. https://en.wikipedia.org/wiki/Election_day
16. https://en.wikipedia.org/wiki/Democratic_backsliding
17. https://en.wikipedia.org/wiki/Cold_War
18. https://en.wikipedia.org/wiki/Climate_change
19. https://en.wikipedia.org/wiki/Anonymous_(group)
20. https://en.wikipedia.org/wiki/Populism
21. https://en.wikipedia.org/wiki/Fascism
22. https://en.wikipedia.org/wiki/New_World_Order_(conspiracy_theory)
23. https://en.wikipedia.org/wiki/Authoritarianism
24. https://en.wikipedia.org/wiki/World_War_II_casualties
25. https://en.wikipedia.org/wiki/Ignorance
26. https://en.wikipedia.org/wiki/Money
27. https://emojipedia.org/rolling-on-the-floor-laughing/
28. https://en.wikipedia.org/wiki/Feminism
29. https://en.wikipedia.org/wiki/Human_rights
30. https://en.wikipedia.org/wiki/Machismo
31. https://en.wikipedia.org/wiki/Gender_violence
32. https://en.wikipedia.org/wiki/Election
33. https://en.wikipedia.org/wiki/Legislature
34. https://en.wikipedia.org/wiki/Card_reader
35. https://en.wikipedia.org/wiki/Contactless_payment
36. https://en.wikipedia.org/wiki/Radio-frequency_identification
37. https://en.wikipedia.org/wiki/Outer_space
38. https://en.wikipedia.org/wiki/Cyberspace
39. https://en.wikipedia.org/wiki/New_World_Order_(conspiracy_theory)
40. https://en.wikipedia.org/wiki/Western_esotericism
41. https://en.wikipedia.org/wiki/Freemasonry
42. https://en.wikipedia.org/wiki/Dollar
43. https://en.wikipedia.org/wiki/Unicorn_(finance)
44. https://en.wikipedia.org/wiki/Big_Four_tech_companies
45. https://www.wired.com/beyond-the-beyond/2019/03/big-nine-g-mafia-bat/
46. https://en.wikipedia.org/wiki/Baidu
47. https://en.wikipedia.org/wiki/Hippocratic_Oath
48. https://en.wikipedia.org/wiki/Carabinieri
49. https://en.wikipedia.org/wiki/Civil_Guard_(Spain)
50. https://en.wikipedia.org/wiki/Oath_of_allegiance
51. https://en.wikipedia.org/wiki/Oath_of_office
52. https://en.wikipedia.org/wiki/Lawyer

View File

@ -0,0 +1,605 @@
# The network illegal services
The first question that we can do when we speak about a service is who is the type of client that search for all the services that are packaged in this network? Remember that all of those utilities are illegals; some of them are possible to be classified as terrorist in my opinion.
- Businessman
- Politicians
- Market analysts
- Criminal organizations
- High-class scammers
- High-class stalkers
- Subversive groups
- Audiovisual industry
- Military warfare industry
- Big tech firm B-Side
- High class society
- High level ecclesiastics
### Gangstalking
![](../Images/luzdegas.jpg)
> *Clients: Businessman, Politicians, Criminal organizations, Subversive groups, High-class stalkers.*
>
> *Type of service: probably 365 days duration with possibility of renew the contract.*
>
> *Price of service: unknown, but in radio frequency they speak about 3 millions Monero for year of service*.
>
> *Target: one or more human victims.*
>
> *Source of income: contract, sale of victims various type of data, plot for film and/or series productions, video on demand illegal amateur pornography, forced prostitution, human traffic.*
**To stalk**, a verb with root in Protoindo European [[1]](https://en.wikipedia.org/wiki/Indo-European_languages ) languages, ancient Greek [[2]](https://en.wikipedia.org/wiki/Ancient_Greek>) and old Armenian [[3]](https://en.wikipedia.org/wiki/Classical_Armenian). Four possible meanings of this verb:
1. To approach slowly and quietly in order not to be discovered when getting closer.
2. To (try to) follow or contact someone constantly, often resulting in **harassment** [[4]](https://en.wikipedia.org/wiki/Harassment).
3. To walk slowly and cautiously; to walk in a stealthy, noiseless manner.
4. To walk behind something, such as a screen, for the purpose of approaching game; to proceed under cover.
From this verb we can extract the noun **stalking** [[5]](https://en.wikipedia.org/wiki/Stalking), three possibles meanings:
1. Hunting for game by moving silently and stealthily or by waiting in ambush.
2. The crime of following or **harassing** another person, causing him or her to fear death or injury.
3. The removal of stalks from bunches of grapes prior to wine making.
We can appreciate in bold two times words with root in the verb **to harass**, from old French:
1. To fatigue or to tire with repeated and exhausting efforts.
2. To annoy endlessly or systematically; to molest.
3. To put excessive burdens upon; to subject to anxieties.
We speak about **gangstalking** [[6]](https://www.urbandictionary.com/define.php?term=gang%20stalking) when we refer to the stalking of an individual by a large number of people who coordinate their stalking activities. Normally used by criminals organizations to claim a drogue debt, to induct to suicide an opposer, to annihilate a political figure, to limit a especially creative brain or to generate thousand millions euro.
Has you can see in the image on top of the paragraph I've used the Spanish name "**Luz de Gas**" [[7]](https://ca.wikipedia.org/wiki/Fer_llum_de_gas) that is the translation of **gaslighting** [[8]](https://en.wikipedia.org/wiki/Gaslighting) that is a form of psychological manipulation in which a person seeks to sow seeds of doubt in a **targeted individual** [[9]](https://www.urbandictionary.com/define.php?term=targeted%20individual) or in members of a targeted group, making them question their own memory, perception, and sanity. Using persistent denial, misdirection, contradiction, and lying, gaslighting involves attempts to destabilize the victim and to invalidate the victim's belief.
From the name of "Luz de Gas", a practice that without technology was executed also by the Franco's phalanx in the Catalan Republic, we can arrive to the word of a defunct masonry which name was "**illuminati**" [[10]](https://www.nationalgeographic.com/archaeology-and-history/magazine/2016/07-08/profile-adam-weishaupt-illuminati-secret-society/). In Italy and in all over the world nowadays is utilized by a pseudo digital dictatorship that is doing terrorism in Europe. Does illuminati really exist? For sure simply search the hashtag **#illuminati** [[11]](https://www.instagram.com/explore/tags/illuminati/) [[12]](https://twitter.com/search?q=%23illuminati&src=typd) in Twitter or in Instagram, in this one with infographics this masonry have got more than two millions of results.
But what is a pseudo dictatorship? Is a form of a state under the declared state. *A B*-side of the democracy where black markets, stalkings, sexual harassments, illegal control is done. Normally is regulated by a **pyramid structure **[[13]](https://en.wikipedia.org/wiki/Organization#Pyramids_or_hierarchies) with **paramilitary** [[14]](https://en.wikipedia.org/wiki/Paramilitary) or **mercenary** [[15]](https://en.wikipedia.org/wiki/Mercenary) forces controlling the victims that fall in with a gangstalking or the workers, drug sellers or prostitute.
### The gangstalking "game"
![](../Images/trote.jpg)
Basically gangstalking and gaslighting are based upon the systematically destruction of your past and present. *Love, friendship, work, home, pets and your possessions are loose* in a short period of time. I've got a personal experience about a pattern used in these tortures. We can speak about "**target individuals**", and i use the plural because there are always two victim, **a men and his love**. It's simple, the man loose all his life like I've said before and the woman like one year after start to think that world have changed and that she'll meet with this man another time after a **sexual game**. *She thinks that this is a game, very similar to what we found in the internationals ready-made television formats*. The two targets are separated and inducted to suicide with a mental destroyer situation, normally a gangstalking for him and a **gang bang** [[16]](https://en.wikipedia.org/wiki/Gang_bang) for her. The two in different time range, him usually one or half year before, are victims also of what is known as **brainwashing** [[17]](https://en.wikipedia.org/wiki/Brainwashing). The twos in different time laps are victims of stalkers that are normally **mind hackers** [[18]](https://www.gitbook.com/) that try to change the basics of them life. The man usually have no money, no friends and no sex. Go in **major depressive disorder** [[19]](https://en.wikipedia.org/wiki/Major_depressive_disorder) and typically live of what he founds on the street, so the society classify them as indigent and sick with **Diogenes syndrome** [[20]](https://en.wikipedia.org/wiki/Diogenes_syndrome) and **compulsive hoarding** [[21]](https://en.wikipedia.org/wiki/Compulsive_hoarding). The woman is blocked in a vortex of sex and orgies thinking that she is partaking in a game, every game for the women i think that has got one year of time with the goal of four years in total. All of this is brainwashing. First of all when the two separates, that is the start of the loose of all his goods for the man, the woman is betrayed to go away from him with hoax. Next she's got a relation with a personal trainer or a figure like this to have got a perfect body in vision of the games that nothing more are than illegal pornography sold in video on demand bitcoin stores and be a victim of human trade.
What is the final objective of these machinated steps? It's simple, but when you're experiencing them if your not very clever and intelligent the twos will die committing **suicide**[[22]](https://en.wikipedia.org/wiki/Suicide). The final goal for the woman, if she doesn't kill herself, is to grew up like a sexual slave prostitute build *to satisfy extreme desire for high class society individuals*.
Normally the man, who has lost everything, commit suicide because see her in porn movies and images found on the web, deep web, and many others technological platform. The woman when the man loose his life understand that this was not a game and commit suicide also or terminate in heavy drug addiction like **heroine** [[23]](https://en.wikipedia.org/wiki/Heroin) or **crack** [[24]](https://en.wikipedia.org/wiki/Crack_cocaine) working like a low level prostitute.
This "game" is reality is a recurrent pattern where a love is forcedly broken and two people commit suicide. The pattern is shaped every time upon the victims using a series of variables, like in information technology are the parameters in the invocation of the program. With this crime, gangstalker can gain **billions euro**, alimenting **terrorism** [[25]](https://en.wikipedia.org/wiki/Terrorism) in a silent mode. How is possible to gain such amount of money with this **criminal pattern**? It's simple, they bet on all about the life of the two target individuals, and the woman in engaged in **sexual harassment** [[26]](https://en.wikipedia.org/wiki/Sexual_harassment) ,**human traffic** [[27] ](https://en.wikipedia.org/wiki/Human_Traffic)and **forced prostitution** [[28]](https://en.wikipedia.org/wiki/Forced_prostitution). They use her to do sexual favors to big drugs clients, rich casino players or so on. She doesn't gain. When she lost her naturally protection about sexual violence they sell her to ultra high class customers that simply enslave her or kill her in a ritual.
*I'll explain step by step how this game with the help of a lot of technology is the real plague of our democracy, and the cause of the right turning in the Europe of the XXI single.*
### Cyberstalking
![Cyberstalking](../Images/Cyberstalking.jpg)
In the last twenty years, gangstalking has evolved and it has evolved very rapidly using IT technology and telecommunications, touching what is known as **cyberstalking** [[29]](https://en.wikipedia.org/wiki/Cyberstalking) or **cyber gangstalking**. Normally in a gangstalking crew there's a lot of **hackers** [[30]](https://en.wikipedia.org/wiki/Hacker), **crackers** [[31]](http://www.catb.org/jargon/html/C/cracker.html) and **ham radio** [[32]](https://en.wikipedia.org/wiki/Amateur_radio) telecommunications experts, like **satellite** [33](https://en.wikipedia.org/wiki/Satellite), **ELF** [[34]](https://en.wikipedia.org/wiki/Extremely_low_frequency), **ULF** [[35]](https://en.wikipedia.org/wiki/Ultra_low_frequency), **WPT** [36](https://en.wikipedia.org/wiki/Wireless_power_transfer), **HF** [37], **VHF** [[38]](https://en.wikipedia.org/wiki/Very_high_frequency) and **UHF** [[39]](https://en.wikipedia.org/wiki/Ultra_high_frequency).
**Neuroscience** is another gangstalking IT branch. With the grow up of **BCI** [[40]](https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface), and the fall down of the price of them with **Arduino** [[41]](https://en.wikipedia.org/wiki/Arduino) and other **open hardware** [[42]](https://en.wikipedia.org/wiki/Open-source_hardware) solutions, **neuroscience** [[43]](https://en.wikipedia.org/wiki/Neuroscience) is now low cost.
What in the **cold war** [[44]](https://en.wikipedia.org/wiki/Cold_War) was patented by US researcher with various acronym like **V2K** known also as "voice to skull" [[45]](https://sites.google.com/site/targetedindividuals101/home/v2k) or "infrasound" [[46]](https://en.wikipedia.org/wiki/Infrasound), **MKULTRA** [[47]](https://en.wikipedia.org/wiki/Project_MKUltra), known also as CIA mind control program, **TMS** [[48]](https://en.wikipedia.org/wiki/Transcranial_random_noise_stimulation), transcranial magnetic stimulation also in remote, and **NLP** [[49]](https://en.wikipedia.org/wiki/Neuro-linguistic_programming), neuro-linguistic programming (see also methods [[50]](https://en.wikipedia.org/wiki/Methods_of_neuro-linguistic_programming)) synthetic hypnosis , could be found in my personal repository [[51]](https://drive.google.com/drive/folders/1p_ZjYQu33qaeZTE89Ae48biWiBG9EPcK) and it is actively used by gangstalker and hackers. Also in wikileaks we can found some information more about those technologies.
But is gangstalkers connected to the US secret services and governments? No, probably not. It's very common that they are using the public patents and leaks from **Julian Assange** [[52]](https://en.wikipedia.org/wiki/Julian_Assange) team to improve the synthetic telepathy network, nowadays an information technology evolution of a part of the radio television broadcast system.
### Telecommunications for inmates
![radio signals see through walls](../Images/4D41F26E00000578-5838529-image-a-2_1529053047445.jpg)
> *Clients: Businessman, Politicians, Criminal organizations, Subversive groups, Extra European spies.*
>
> *Type of service: probably for month service like a normal provider.*
>
> *Price of service: unknown.*
>
> *Target: in reality the same contractor because all the conversations are registered!*
>
> *Source of income: contract, sold of all the conversations to opposites, police and governments.*
Telecommunications for inmates is another service bind by the synthetic telepathy network. Radio wave at low frequency like is voice to skull obtained by the applications of the patent US5159703A (462.25 KHz) can bypass all kind of material utilized in construction. It's an analog but clientless semi secure telecommunication system.
With radio waves as you can see in the image above it's possible to obtain also remote imaging. It's from a **MIT** [[53]](http://www.mit.edu/) research and it's called **RF Pose** [[54]](http://rfpose.csail.mit.edu/). But it's also possible to obtain 3D **skeletons** [[55]](https://en.wikipedia.org/wiki/Skeleton) models always through walls with something called **RF-Pose3D** [[56]](http://rfpose3d.csail.mit.edu/). But it's also possible to remote reading learning **sleep stages** [[57]](https://es.wikipedia.org/wiki/Arquitectura_del_sue%C3%B1o) from radio signals with something called **RF-Sleep** [[58]](http://sleep.csail.mit.edu/) and at least but not last we've got **EQ-Radio** [[59]](http://eqradio.csail.mit.edu/) that is a remote emotion recognition.
Why i explain this in this section? It's obvious. Who contract this clientless service in reality he's also a victim. Because of all the technologies that i've explained above. With this awesome technology the owners of the network can know passions of the victims and seeing this in a criminal way it is possible to obtain ways to coerce victims. Reflect.
### Semi physic remote desktop environment
![Islamic Terrorism](../Images/p8-ponnuru-a-20151125.jpg)
> *Clients: Businessman, Politicians, Criminal organizations, Subversive groups, Audiovisual industry, Big tech firm B-Side.*
>
> *Type of service: probably for month service like a normal provider.*
>
> *Price of service: unknown.*
>
> *Target: in reality the same contractor because all the environment is registered!*
>
> *Source of income: contract, sold of all the conversations to opposites, police and governments.*
With the use of brain waves joint together with voice to skull service, clients of this criminal network can work in physic remote site only with their brain. This is a very interesting technology because a person can work physically like a waiter for example and, using what we have refer in another chapter like human multi tasking, do a parallel job. This is a very productive feature but as usual if it's used by bad guys it could determine the grow up of undetectable terrorism. Why i use this important word? It's simple. Think about an hacker crew like the phenomenon that we see in **Al Qaeda** [[60]](https://en.wikipedia.org/wiki/Al-Qaeda) or other mercenary crew working for **Islamic Terrorism** [[61]](https://en.wikipedia.org/wiki/Islamic_terrorism). With this feature they can work using information technology without that any secret service or military police can detect it.
This is absolutely lawbreaker if sold to the wrong customer. Who is controlling this network? Is police able to stop the grow up of the "Illuminati" pseudo dictatorship? I cannot find information about the synthetic telepathy network and i'm a victim of. *I was electronically tortured for two years* and i decide to write about all what i've understood in those hell years. *Someone have to stop this. Just now.* I think that is responsible of the birth of the new **populist movements** [[62]](https://en.wikipedia.org/wiki/Populism) in Europe, extreme right movements, grow up of **Neo-Nazism** [[63]](https://en.wikipedia.org/wiki/Neo-Nazism) and so on. *This is not a joke.*
### Sexual holograms sale
![Coachella Valley Music](../Images/ca-times.brightspotcdn.com.jpeg)
> *Clients: Businessman, Politicians, Criminal organizations, High class society, High class ecclesiastics.*
>
> *Type of service: Different types, for hour like a prostitute or for month like a service.*
>
> *Price of service: unknown.*
>
> *Target: The person that is connected with the machine to the hologram.*
>
> *Source of income: service, contract, and informations about sexual customs of the client.*
This is the cutting edge in prostitution. This is what consume high class society. With this, they can fuck, kill, eat whatever they want. And the shape is the shape of a real person.
**Holography** [[64]](https://en.wikipedia.org/wiki/Holography). But remember is holography without a projector. Who it is possible? Satellite. The city of Barcelona is totally covered. Genova and Milano without any doubt. In radio frequency the speak about Roma, Copenhague but is very likely that all Europe is under this kind of illegal services.
But some times it's used also by municipal administration in the A-side. Doing what? Urban projection using what is called **projection mapping** [[65]](https://en.wikipedia.org/wiki/Projection_mapping).
![Street Projection Casa Batllo](../Images/CasaBatllo-mapping-800x472.jpg)
But who is behind all of this goodness? So simple the audio visual industry. But what is the real shit about all of this goodness? **Food for pedophiles**.
In radio frequency people speak about secret about this awesome technology. But it's not. It's only a patchwork of cutting edge universities discoveries. And someone build upon those works a *digital criminal organization*. Who is? *A/B B/A*. Remember human multitasking? Ok now you've got the reply:
- Big tech companies
- Audiovisual industry
- **Hollywood** [[66]](https://en.wikipedia.org/wiki/Hollywood), **Bollywood** [[67]](https://en.wikipedia.org/wiki/Bollywood) **Cinecittà** [[68]](https://en.wikipedia.org/wiki/Cinecitt%C3%A0) and so on.
- etcetera etcetera
So they sell you a package, an hologram with the shape of a girl. You buy it in a virtual catalog that could be consulted in deep Internet, **Tor** [[69]](https://en.wikipedia.org/wiki/Tor_(anonymity_network)) **i2p** [[70]](https://en.wikipedia.org/wiki/I2P) and so on. Payment is obviously in crypt concurrency, **Litecoin** [[71]](https://en.wikipedia.org/wiki/Litecoin) for example. So the client is secured buy a theoretically untraceable transference. Image that every Sunday there's a **forward auction** [[72]](https://en.wikipedia.org/wiki/Reverse_auction) in a virtual reality ambient like a living room where's people dressed with what so over shape, image something like "the presidents" in the **Point Break** [[73]](https://en.wikipedia.org/wiki/Point_Break) film. Girls are presented like sexual slaves and people offerer a quantity for a type of service. Who pay the more amount of money got a immediate delivery in a geographic exact point in **latitude, longitude and elevation** [[74]](https://en.wikipedia.org/wiki/Geographic_coordinate_system) in a physical site of the city, like in a luxury boat dock in the port or what so ever. The girl, that is treated like a videogame or a object, in reality is at her house but all her nervous system and her brain is totally connected to the hologram by the network. People that buy those services normally do extreme sexual violence, and she pass hell pains and above all in here memory the experience is true. This is **human memory imprinting** [[75]](https://scholar.google.com/scholar?q=human+memory+imprinting&hl=es&as_sdt=0&as_vis=1&oi=scholart).
![Barcelona port](../Images/car-parking-near-maremagnum-centre-barcelona.gif)
Barcelona is famous in this new era market. Barcelona actually is one of the capital of this extreme sex luxury tourist destination. From about five years, it's blowing this hell wind of changes in my favorite city. It's possible to correlate this with the advancement of the **Lion club of Barcelona** [[76]](https://www.e-clubhouse.org/sites/barcelona_gaudi/)? But this is only my little opinion. *A man that has walked 4000 km by foot in the last three years to investigate what is passing here.*
![Lions Barcelona](../Images/lions.png)
But is this a secret? No! Here is some international press articles and porn movies:
- https://www.mirror.co.uk/tech/holographic-porn-bring-3d-naked-9525844
- https://www.pornhub.com/view_video.php?viewkey=2114250286
- https://www.pornhub.com/view_video.php?viewkey=ph5ccdfd32e138a
- https://fortune.com/2019/01/11/ces-holograms/
Doing a rapid search on Google i've found a name of a Greek billionaire connected to holograms related business, **Alki David** [[77]](https://en.wikipedia.org/wiki/Alki_David).
### Goods transport route control
![Indian Satellite](../Images/indiansatelite_resize_md.jpg)
> *Clients: Criminal organizations, Subversive groups.*
>
> *Type of service: Price for kilometers.*
>
> *Price of service: Unknown.*
>
> *Target: Some transports are obviously sold to the police or opposite organizations.*
>
> *Source of income: service, contract, and informations about quantities.*
Another fantastic service from this totally criminal network. But don't be shame, it's not with video camera. It's with radio frequency. This is what i call satellite terrorism. All our streets and highways are under control with an array of radio in a satellite network. What network? It's difficult because of open hardware satellite.
![Gpredict](../Images/sat.png)
This is a screenshot of the open source application **Gpredict** [[78]](http://gpredict.oz9aec.net/). Look at the orbits in the sky of every satellites. Yes they are moving but with the transit of one after other you can track in real time every street of Europe. If a camion with goods is traveling in the **International E-road network** [[79]](https://en.wikipedia.org/wiki/International_E-road_network) is under constant control. But what is the goodness? Simple. If there's some roadblock in his path with this technology and the voice to skull service working on the driver the game is done. A change in his trip and there's no lost of goods. Remember that goods could be also humans.
# Remote controlled lightning strike
![Lighting](../Images/actractlighting.png)
> *Clients: Businessman, Politicians, Criminal organizations, Subversive groups.*
>
> *Type of service: Price for strike.*
>
> *Price of service: Unknown.*
>
> *Target: Opposites, politician, criminals, industry.*
>
> *Source of income: service, and the information about who contract it.*
Perhaps this seems to be a craziness. But no, it isn't. Ok with radio frequency it's possible to **electric charge** [[80]](https://en.wikipedia.org/wiki/Electric_charge) a site, like a mono familiar house a car or a airplane, with **protons** [[81]](https://en.wikipedia.org/wiki/Proton). Because that a thunder born in the **Troposphere** [[82]](https://en.wikipedia.org/wiki/Troposphere) minus charged, **electrons** [[83]](https://en.wikipedia.org/wiki/Electron) are attracted by protons and can be tele guided.
Let's start with a reflexion about this. What can be done playing with this natural phenomenon?
- Explosions, like in a chemical or war industry.
- Fires, like in a farmland or in a forest.
- Accidents, in transport, civil or military.
- Death by a lightning strike like you can see in the graph below
![US Lighting Deaths](../Images/800px-US_Lightning_Deaths.png)
### Women sexual overexcitation
![south america BDSM digital](../Images/bdsmeradigital.png)
**This flier is not about an illegal service.**
> *Clients: Businessman, Politicians, Criminal organizations, High-class stalkers, Audiovisual industry, High class society, High level ecclesiastics.*
>
> *Type of service: Price for monthly service for person.*
>
> *Price of service: Unknown.*
>
> *Target: Mainly young womens.*
>
> *Source of income: service, and the information about who contract it.*
*First of all i want to transmit to all my readers that i'm absolutely not in opposite to immigration and human circulation all over the world. I'm not racist because i love freedom and i'm a democratic left side man. I love cultures from all over the world but i think that we've always to respect local traditions without fomenting political or territorial divisions and we've to search a good balance between all the cultures in a cosmopolitan city, like the city that i'm in love to, Barcelona.*
What is this flier announcing **BDSM** [[84]](https://en.wikipedia.org/wiki/BDSM) from south America using digitals techniques? I will write about what is happening just now under the eyes of all the police forces and government of Barcelona.
Like i've said on chapter two, with the Machine it's possible to overload the genital system of a women, or a man, with electro magnetism over some part of our brain. And also to get feeling of physical touch in the reproducing apparatus. Now this is all ok if the "target" is consenting. Those feelings that with this technology can be like real (reaD they call in voice to skull chat) it's important to understand that can be activated by two persons with them brains at the same level of importance, in a master / slave configuration like in the real BDSM world, and also with sexual **bot** [[85]](https://en.wikipedia.org/wiki/Internet_bot) or applications.
![Baron Mood Instagram](../Images/analfist.png)
What could be obtained? Extreme sexual appetite, induced prostitution, brain washing, loose of principles, climb of the threshold of sexual violence. *Is this a crime*? For sure, it's **sexual violence** [[86]](https://en.wikipedia.org/wiki/Sexual_violence) and **psychological abuse** [[87]](https://en.wikipedia.org/wiki/Psychological_abuse).
Why the customers who pay for this service is searching for example the climb of the threshold of sexual violence? As usual is very easy to explain using only some logic, the base of the human thinking. Obviously it's to sold those victims that normally are sexy beautiful womens or athletic mans in sex parties with rich mans that consider them like objects of sexual abuse. Orgies without a decent limit. They are slaved and in this system they obtain a very little financial compensation in crypt concurrency, in totally contrast with the real gain of entrepreneurs that normally round at four digits. It's luxury extreme prostitutions that could be payed like one thousand euro for person and obviously is **exploitation of prostitution** [[88]](http://www.europarl.europa.eu/RegData/etudes/etudes/join/2014/493040/IPOL-FEMM_ET(2014)493040_EN.pdf).
Now look at sexual ads in Barcelona in a web page called NuevoLoquo, this is an ads for pay not affiliated portal.
https://www.nuevoloquo.com/anuncios-eroticos/barcelona/putas/catalan/
There is a lot of Catalans young girls. It's so estrange because this territory got a high **PIB** [[89]](https://en.wikipedia.org/wiki/Gross_domestic_product), 33661$ as 2017. Are those victims of digital **forced prostitution** [[90]](https://en.wikipedia.org/wiki/Forced_prostitution)? Yes, in my opinion.
Prostitution in the synthetic telepathy network is, like all the structures, a pyramid.
![pyramid structures](../Images/scop.jpeg)
Barcelona has changed in the last ten years. A lot. Yes the city have been reformed and restored. Its face is clean and beautiful. But is this true? No. Someone, who is washing and cleaning B-side money from this system, yes absolutely, is doing a great job to maintain a good facade. But the old city, the heart of the Catalan capital, was and is totally sold to extra communitarian, but not only, contractors. You can't feel now the real soul and smell of the streets.
Normally we can underline this chain of sales of small businesses nowadays:
*small Catalan entrepreneur -> sale in cash to Chinese people who deal with the purchase of businesses -> resale to Europeans, mainly Italians.*
This is obviously the new criminal organization, the Illuminati, a fraud.
Look at the numbers of the china community in Catalunya, this study from **UAB** [[91]](https://en.wikipedia.org/wiki/Autonomous_University_of_Barcelona) is impressive:
http://www.fti.uab.es/interasia/documents/Beltran-La%20Inmigraci%F3n%20China%20en%20Catalu%F1a.pdf
### Hacking applied to humans
![Gold river search](../Images/xssa.jpg)
If a person resist to the fascist crime of gangstalking, namely don't fall in heroin drug abuse, don't fall in psychiatric disorders, don't fall in extreme sex disorders, etcetera etcetera could be next victim of another difficult to detect subliminal crime, but always a very big crime, that could be named as **human hacking** [[92]](https://thecyberwire.com/podcasts/hacking-humans-episode-list.html) and exaggeration of **social engineering** [[93]](https://en.wikipedia.org/wiki/Social_engineering_(security)), a branch of cyber security.
> *Remember that human hacking is accomplished by very difficult to capture criminals. Serial criminals. Persons who taste sexual pleasure seeing how they can manipulate big masses of humans doing whatever they want. Almost are extremely intelligent individuals, and probably classified by the government as mentally ill. Persons that use others like hacking tools, to hack the victim that they call case of study to expand their recurrent method, used to obtain sexual pleasure.* *This is my two cents, awl (the nickname of one of them)*.
First of all the synthetic telepathy network is abused by those kind of criminals, remember that i say abuse because though it is an illegal network it is also hacked by these figure. A strange and complex man. Yes because it is only one. But i'll not speak directly about him because he's the most special human that i find in my life. **I'm studying him**. He is using the owner of this facility like a virus, a worm, a girl born in Genova, Italy.
Secondly, and i say this because of the possibility to try to catch this individual, i want to remember to him that human hacking is a crime respect to **human right declaration** [[94]](https://en.wikipedia.org/wiki/Universal_Declaration_of_Human_Rights). A crime against humanity, not a game.
![Human Rights](../Images/asdadsd33.jpg)
But what is the final goal of human hacking and in what consist these complex and very long in time attack?
The final goal is obviously the destruction of a singular, a singularity better saying. What is the total destruction? The suicide. But what happen in this wide way? Scorched earth (\#882D17 or **Sienna** [[95]](https://en.wikipedia.org/wiki/Sienna)). When two singularity meet, it's like two stars collide. Results is only death. Death of whatever is in them orbit. All. Next is life. Or one of the most dangerous unknown object will born, a black hole; or if they are like black holes the results in a **binary black hole system** [[96]](https://en.wikipedia.org/wiki/Binary_black_hole). But death is a natural process, the result in falling down a black hole is totally unknown. Some participle are ejected at furious velocities and others go in something that mankind don't know. Some speak about **wormhole** [[97]](https://en.wikipedia.org/wiki/Wormhole). A game of **spacetime** [[98]](https://en.wikipedia.org/wiki/Spacetime) and speed. **Multiverse** [[99]](https://en.wikipedia.org/wiki/Multiverse).
But remember always, reader, those connections between different science branch collide into what nations call mental illness. Don't try to fuck your mind alone.
*Are them actors or are them directors of an invented tragedy? I don't know, i've never try it.*
### Parimutuel crypt betting
![Nast Boss](../Images/Nast-Boss-Tweed-1871.jpg)
*"Gambling in which persons participate by the use of remote communication"*
I live in Catalunya from about twelve years. A great country, great traditions and hermetic people live here. People that have fight a lot in the last century with the fascist dictatorship guided by **Francisco Franco** [[100]](https://en.wikipedia.org/wiki/Francisco_Franco). People that have died in the **Spanish civil war** [[101]](https://en.wikipedia.org/wiki/Spanish_Civil_War). **Republicans** [[102]](https://en.wikipedia.org/wiki/Republican_faction_(Spanish_Civil_War)). And after the civil war people that have been persecuted by Franco using what we've called as *gaslighting*. The persecution against one; something that I'm living from about four years. Franco use voice to skull radio technology in MF and mast radiators like we've described in chapter two. Franco use the national provider **RNE** [[103]](https://en.wikipedia.org/wiki/Radio_Nacional_de_Espa%C3%B1a) to mask this criminal emissions. Look at this mast radiator in **Palau-solita i Plegamans** [[104]](https://ca.wikipedia.org/wiki/Palau-solit%C3%A0_i_Plegamans) in Catalunya.
![MF in Palau de Plegamans](../Images/mast-riadiator.png)
Almost every old person that live in Catalunya can listen to voice to skull emission. They have been tortured by the dictator. The "Illuminati" pseudo dictatorship use the same technology but done with **SDR** [[105]](https://en.wikipedia.org/wiki/Software-defined_radio) radio devices. Open source and open hardware, very dangerous because of low cost. "Illuminati" also have expanded this with what i call remote **BRAINnet** [[106]](https://www.nature.com/articles/s41598-019-41895-7?fbclid=IwAR2dpWDv9RZk41Xt8xcQPLbCXBTfJo_qpaXVAiu--AoIgOyKjhjJqmFCCEI) to create slaves like we've just explained.
But what is the connection between "Illuminati", that are been created ten years ago in **Genoa** [[107]](https://en.wikipedia.org/wiki/Genoa) Italy, and Catalunya fascist voice to skull technology?
This is not so simple to explain but i can argue that five years ago in Catalunya there was a radical change. Now all the B-side of Barcelona is guided by the "Illuminati" **hierarchical** [[108]](https://en.wikipedia.org/wiki/Hierarchy) pyramid tree. Why? In Catalunya there's a silent way to gain millions of Euro, an underground economy to which only wealthy Catalans have access, something handed down according to blood lineage. Something that I'm victim of:
*Bets on everything related to a person's personal life. Suicide bets.*
Something that generate billions, something that is administrated by the Catalan **tax haven** [[109]](https://en.wikipedia.org/wiki/Tax_haven), **Andorra** [[110]](https://en.wikipedia.org/wiki/Andorra). Something that until the advent of the "Illuminati" was managed by hand, but with BRAINnet it is totally automatic. It's an expansion of the tax heaven in the European state, Spain. A fraud. A fiscal fraud. And obviously something that is done also in Genoa using the other fiscal haven, the **Principality of Monaco** [[111]](https://en.wikipedia.org/wiki/Monaco).
Who fall in this bet vortex? Someone, like me, that have something special, a singularity. Someone that pass a complex check list to be classified as a *special case*. Or someone that is a potential political opponent of both the state and the church, also like me. Or someone that was a good entrepreneur, also like me.
**Joseph Oller** [[112]](https://en.wikipedia.org/wiki/Joseph_Oller), a Catalan born in 1839, was the inventor of the **parimutuel betting** [[113]](https://en.wikipedia.org/wiki/Parimutuel_betting) system. And in this network the service of parimutuel betting is done in remote. And *this is the real cause of all the others services*. A billions black market, now bitcoin based, but not only. The worst thing is that if your quota pass a certain gain level in this *game* play noble families and **dynasty** [[114]](https://en.wikipedia.org/wiki/Dynasty). But there's also another big crime, all the people that are forced to join the synthetic telepathy network are subdued to bets. The important thing is not to exceed the quota, which I did however since I did not accept working as a drug dealer for this pyramid of organized digital crime.
Where does people could bet on this human black market? In the normal **sports betting** [[115]](https://en.wikipedia.org/wiki/Sports_betting) there is a double key of lecture. But also there's the crypt betting market:
- https://www.cloudbet.com/en/
- https://1xbit.com/en/
- https://fortunejack.com/
- https://sportsbet.io/
- https://22bet.co.uk/sport
In those circuit and also off line this occult world those type of bets and all the life of the target individuals are *played* in low class games. Like the ones that we find in **app stores** [[116]](https://en.wikipedia.org/wiki/App_store).
So here you are the explanation on why there's this fascist persecution of all the society against a single, betting, money.
Parimutuel betting are a dangerous form of betting when we speak about large amount of money. Because people have to pay before of the deadline, in this case probably in a crypt concurrency bank account. So if you pass the infamous quota dangerous people have already payed and no one can withdraw the bet, it is the cat that bites its tail. If we speak about bet about humans you can understand that this method is the most dangerous one for the life of the victim, like I'm. The bank account it's obvious property of the **bookmaker** [[117]](https://en.wikipedia.org/wiki/Bookmaker), in this case they are the owners of the network.
Why i said that all the peoples that enter in the "Illuminati" hierarchy tree are subject to parimutuel betting? Because every years there is gambling on who do more invoice selling goods, black market, legal market and so on. Like in a **greyhound racing** [[119]](https://en.wikipedia.org/wiki/Greyhound_racing). But here you will die if you arrive further down the place number thirteen. And obviously there is also, probably with another method, a bet in your life using normal concurrency.
### External links
![networking](../Images/1-intro_113_0.jpg)
1. https://en.wikipedia.org/wiki/Indo-European_languages
2. https://en.wikipedia.org/wiki/Ancient_Greek
3. https://en.wikipedia.org/wiki/Classical_Armenian
4. <https://en.wikipedia.org/wiki/Harassment>
5. <https://en.wikipedia.org/wiki/Stalking>
6. https://www.urbandictionary.com/define.php?term=gang%20stalking
7. <https://ca.wikipedia.org/wiki/Fer_llum_de_gas>
8. <https://en.wikipedia.org/wiki/Gaslighting>
9. <https://www.urbandictionary.com/define.php?term=targeted%20individual>
10. <https://www.nationalgeographic.com/archaeology-and-history/magazine/2016/07-08/profile-adam-weishaupt-illuminati-secret-society/>
11. https://www.instagram.com/explore/tags/illuminati/
12. <https://twitter.com/search?q=%23illuminati&src=typd>
13. <https://en.wikipedia.org/wiki/Organization#Pyramids_or_hierarchies>
14. <https://en.wikipedia.org/wiki/Paramilitary>
15. <https://en.wikipedia.org/wiki/Mercenary>
16. <https://en.wikipedia.org/wiki/Gang_bang>
17. https://en.wikipedia.org/wiki/Brainwashing
18. <https://www.mindhacki.ng/content/>
19. <https://en.wikipedia.org/wiki/Major_depressive_disorder>
20. https://en.wikipedia.org/wiki/Diogenes_syndrome
21. https://en.wikipedia.org/wiki/Compulsive_hoarding
22. https://en.wikipedia.org/wiki/Suicide
23. https://en.wikipedia.org/wiki/Heroin
24. https://en.wikipedia.org/wiki/Crack_cocaine
25. https://en.wikipedia.org/wiki/Terrorism
26. <https://en.wikipedia.org/wiki/Sexual_harassment>
27. <https://en.wikipedia.org/wiki/Human_Traffic>
28. https://en.wikipedia.org/wiki/Forced_prostitution
29. https://en.wikipedia.org/wiki/Cyberstalking
30. https://en.wikipedia.org/wiki/Hacker
31. http://www.catb.org/jargon/html/C/cracker.html
32. https://en.wikipedia.org/wiki/Amateur_radio
33. https://en.wikipedia.org/wiki/Satellite
34. https://en.wikipedia.org/wiki/Extremely_low_frequency
35. https://en.wikipedia.org/wiki/Ultra_low_frequency
36. https://en.wikipedia.org/wiki/Wireless_power_transfer
37. https://en.wikipedia.org/wiki/High_frequency
38. https://en.wikipedia.org/wiki/Very_high_frequency
39. https://en.wikipedia.org/wiki/Ultra_high_frequency
40. https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface
41. https://en.wikipedia.org/wiki/Arduino
42. https://en.wikipedia.org/wiki/Open-source_hardware
43. https://en.wikipedia.org/wiki/Neuroscience
44. https://en.wikipedia.org/wiki/Cold_War
45. https://sites.google.com/site/targetedindividuals101/home/v2k
46. https://en.wikipedia.org/wiki/Infrasound
47. https://en.wikipedia.org/wiki/Project_MKUltra
48. https://en.wikipedia.org/wiki/Transcranial_random_noise_stimulation
49. https://en.wikipedia.org/wiki/Neuro-linguistic_programming
50. https://en.wikipedia.org/wiki/Methods_of_neuro-linguistic_programming
51. https://drive.google.com/drive/folders/1p_ZjYQu33qaeZTE89Ae48biWiBG9EPcK
52. https://en.wikipedia.org/wiki/Julian_Assange
53. http://www.mit.edu/
54. http://rfpose.csail.mit.edu/
55. https://en.wikipedia.org/wiki/Skeleton
56. http://rfpose3d.csail.mit.edu/
57. https://es.wikipedia.org/wiki/Arquitectura_del_sue%C3%B1o
58. http://sleep.csail.mit.edu/
59. http://eqradio.csail.mit.edu/
60. https://en.wikipedia.org/wiki/Al-Qaeda
61. https://en.wikipedia.org/wiki/Islamic_terrorism
62. https://en.wikipedia.org/wiki/Populism
63. https://en.wikipedia.org/wiki/Neo-Nazism
64. https://en.wikipedia.org/wiki/Holography
65. https://en.wikipedia.org/wiki/Projection_mapping
66. https://en.wikipedia.org/wiki/Hollywood
67. https://en.wikipedia.org/wiki/Bollywood
68. https://en.wikipedia.org/wiki/Cinecitt%C3%A0
69. https://en.wikipedia.org/wiki/Tor_(anonymity_network)
70. https://en.wikipedia.org/wiki/I2P
71. https://en.wikipedia.org/wiki/Litecoin
72. https://en.wikipedia.org/wiki/Forward_auction
73. https://en.wikipedia.org/wiki/Point_Break
74. https://en.wikipedia.org/wiki/Geographic_coordinate_system
75. https://scholar.google.com/scholar?q=human+memory+imprinting&hl=es&as_sdt=0&as_vis=1&oi=scholart
76. https://www.e-clubhouse.org/sites/barcelona_gaudi/
77. https://en.wikipedia.org/wiki/Alki_David
78. http://gpredict.oz9aec.net/
79. https://en.wikipedia.org/wiki/International_E-road_network
80. https://en.wikipedia.org/wiki/Electric_charge
81. https://en.wikipedia.org/wiki/Proton
82. https://en.wikipedia.org/wiki/Troposphere
83. https://en.wikipedia.org/wiki/Electron
84. https://en.wikipedia.org/wiki/BDSM
85. https://en.wikipedia.org/wiki/Internet_bot
86. https://en.wikipedia.org/wiki/Sexual_violence
87. https://en.wikipedia.org/wiki/Psychological_abuse
88. http://www.europarl.europa.eu/RegData/etudes/etudes/join/2014/493040/IPOL-FEMM_ET(2014)493040_EN.pdf
89. https://en.wikipedia.org/wiki/Gross_domestic_product
90. https://en.wikipedia.org/wiki/Forced_prostitution
91. https://en.wikipedia.org/wiki/Autonomous_University_of_Barcelona
92. https://thecyberwire.com/podcasts/hacking-humans-episode-list.html
93. https://en.wikipedia.org/wiki/Social_engineering_(security)
94. https://en.wikipedia.org/wiki/Universal_Declaration_of_Human_Rights
95. https://en.wikipedia.org/wiki/Sienna
96. https://en.wikipedia.org/wiki/Binary_black_hole
97. https://en.wikipedia.org/wiki/Wormhole
98. https://en.wikipedia.org/wiki/Spacetime
99. https://en.wikipedia.org/wiki/Multiverse
100. https://en.wikipedia.org/wiki/Francisco_Franco
101. https://en.wikipedia.org/wiki/Spanish_Civil_War
102. https://en.wikipedia.org/wiki/Republican_faction_(Spanish_Civil_War)
103. https://en.wikipedia.org/wiki/Radio_Nacional_de_Espa%C3%B1a
104. https://ca.wikipedia.org/wiki/Palau-solit%C3%A0_i_Plegamans
105. https://en.wikipedia.org/wiki/Software-defined_radio
106. https://www.nature.com/articles/s41598-019-41895-7?fbclid=IwAR2dpWDv9RZk41Xt8xcQPLbCXBTfJo_qpaXVAiu--AoIgOyKjhjJqmFCCEI
107. https://en.wikipedia.org/wiki/Genoa
108. https://en.wikipedia.org/wiki/Hierarchy
109. https://en.wikipedia.org/wiki/Tax_haven
110. https://en.wikipedia.org/wiki/Andorra
111. https://en.wikipedia.org/wiki/Monaco
112. https://en.wikipedia.org/wiki/Joseph_Oller
113. https://en.wikipedia.org/wiki/Parimutuel_betting
114. https://en.wikipedia.org/wiki/Dynasty
115. https://en.wikipedia.org/wiki/Sports_betting
116. https://en.wikipedia.org/wiki/App_store
117. https://en.wikipedia.org/wiki/Bookmaker
118. https://en.wikipedia.org/wiki/Olympic_Games
119. https://en.wikipedia.org/wiki/Greyhound_racing
120. https://en.wikipedia.org/wiki/Horoscope
121. https://en.wikipedia.org/wiki/Knights_of_the_Round_Table

View File

@ -0,0 +1,116 @@
# The legal services, ideas.
![The Untouchables](../Images/maxresdefault.jpg)
I speak a lot about the Catalan territory because i live in this lovely autonomous community of Spain. It's obvious in practice a very high part of the revenue of this criminal network is in the submerged economy, so payments are in bitcoin and there's no legal enterprise that pays his duties to the state doing a big crime to it. So one manner to put in jail the owners, the Illuminati (Italians and fascists), is do what United States have done with **Al Capone** [[1]](https://en.wikipedia.org/wiki/Al_Capone) a fiscal investigation like we've see with **The Untouchables** [[2]](https://en.wikipedia.org/wiki/The_Untouchables_(film)), a film by **Brian de Palma** [[3]](https://en.wikipedia.org/wiki/Brian_De_Palma).
So another good investigation practice to put in jail those criminals, the Illuminati (this is the name of this shit), is search for legal companies of investments. I my long way by foot in Catalunya to investigate what happen in this fantastic country from five years from now, i've found relation with:
- Real estate holdings, do you remember the ten years crisis in Spain called **burbuja inmobiliaria** [[4]](https://es.wikipedia.org/wiki/Burbuja_inmobiliaria_en_Espa%C3%B1a)?
- **Techno** [[5]](https://en.wikipedia.org/wiki/Techno) music industry.
- The IT tech **district 22@** [[6]](https://en.wikipedia.org/wiki/22@) of Barcelona.
- The contemporary Catalan theater.
- The audiovisual Catalan industry.
- The telecommunication industry
But there's also a lot of new type of markets that could use this awesome technology, because, yes it is, it is awesome but used in a wrong way. Doing a little bit of **brainstorming** [[7]](https://en.wikipedia.org/wiki/Brainstorming) applications of this Machine are enormous, from small business to city administration, and more.
- Interconnected brains to do war game strategies in **Q-zar** [[8]](https://en.wikipedia.org/wiki/Q-Zar) like ambients.
- **Virtual tour** [[9]](https://en.wikipedia.org/wiki/Virtual_tour) with muscle brain and nerves connected in the real ambient, something like an extreme **three-dimensional virtual tourism** [[10]](https://en.wikipedia.org/wiki/Three-dimensional_virtual_tourism).
- People movement control and counter near large surfaces to know what product attracts more customers.
- Legal digital **coworking** [[11]](https://en.wikipedia.org/wiki/Coworking) ambient.
- Citizen plague control and on fly patch.
- Port container census by maritime police.
- Support for conventional traffic control.
- etcetera etcetera.
This is only a ten minutes thinking. *Applications are near infinity*.
# Real estate holding in Catalunya
![Burbuja inmobiliaria](../Images/bolle-4.jpg)
Barcelona, the city of my love. Fantastic bohemian Mediterranean port. A city that start a new age from **1992 Summer Olympics** [[12]](https://en.wikipedia.org/wiki/1992_Summer_Olympics).
Barcelona has changed a lot, i start to live here from new year day of 2007. The city has reborn with new skyscrapers, new concept transport and technologies, how it's cleaned every day for it tourist facade, what languages you can listen on his old town concurred streets, the dominants colors in your line of sight were pastels and now are led and neon. Like many European capitals, technology is dominant.
![Gaudi art at Barcelona](../Images/barcelona-rutas-turisticas-alternativas-1030x633.jpg)
In the last ten years here is the list of Barcelona's neighborhoods and small cities in the province that have got big real estate holdings:
- **Gorg** [[13]](https://en.wikipedia.org/wiki/Gorg,_Badalona), **Badalona** [[14]](https://ca.wikipedia.org/wiki/Badalona).
- http://territori.scot.cat/cat/notices/transformaciO_urbana_del_barri_del_gorg_badalona_1111.php
- http://www.marinabadalona-sa.es/
- Port Forum, **Sant Adrià de Besòs** [[15]](https://en.wikipedia.org/wiki/Sant_Adri%C3%A0_de_Bes%C3%B2s).
- https://en.wikipedia.org/wiki/2004_Universal_Forum_of_Cultures
- http://portforum.barcelona/
- **Poblenou** [[16]](https://ca.wikipedia.org/wiki/Poblenou), Barcelona.
- https://www.elperiodico.com/es/juegos-barcelona92/20170720/casi-billon-pesetas-para-barcelona-92-6175711
- https://web.archive.org/web/20130613173355/http://www.arxiuhistoricpoblenou.es/
- **Sitges** [[17]](https://en.wikipedia.org/wiki/Sitges), Barcelona:
- https://www.durancarasso.com/
- https://www.laplanadesitges.com/casas/
- http://www.vertix.es/
Ok. Now to go ahead it's not so difficult. A little bit of **OSINT** [[18]](https://en.wikipedia.org/wiki/Open-source_intelligence) technique and Internet to understand underground connections between those companies. Our principle tool is named **Maltego** [[19]](https://en.wikipedia.org/wiki/Maltego).
![Glorias C31](../Images/1475666443_559218_1475666930_noticia_normal.jpg)
# Techno music in the world
![Nina Kraviz techno music](../Images/techno.jpg)
In techno music concert the Machine of this network is used. But no one say nothing, look at the concerts dates of **Nina Kraviz** [[20]](https://en.wikipedia.org/wiki/Nina_Kraviz), one of the most famous **disk jockey** [[21]](https://en.wikipedia.org/wiki/Disc_jockey) nowadays. Those below are the official dates on **Resident Advisor** [[22]](https://en.wikipedia.org/wiki/Resident_Advisor), but remember that we don't know about unofficial parties.
https://www.residentadvisor.net/dj/ninakraviz/dates?yr=2018
Look at more than two concerts dates on same day like those on 2 of June 2018:
1. https://www.residentadvisor.net/events/1049111 in United Kingdom.
2. https://www.residentadvisor.net/events/1040928 in France.
3. https://www.residentadvisor.net/events/1104721 in Germany.
Or those on 15 of September 2018:
1. https://www.residentadvisor.net/events/1135225 in Japan.
2. https://www.residentadvisor.net/events/1051295 in Netherlands.
3. https://www.residentadvisor.net/events/1149115 in Japan.
That are like missions impossible calculating airplane travel, airport times, trip to the concert, join the main stage and so on. If you analyze you'll find that for **time zone** [[23]](https://en.wikipedia.org/wiki/Time_zone) they're possible but counting all the steps that i've rapidly listed almost not. *So that the doubt is legitimate*.
# Tech, but not only, industry.
![Secret services US chain](../Images/intelligence-liaison-partners.png)
Remember when i speak about human hackers? There's another mode to focus them. As high level private investigator or **secret services** [[24]](https://en.wikipedia.org/wiki/List_of_intelligence_agencies) agents and so on.
# External Links
1. https://en.wikipedia.org/wiki/Al_Capone
2. https://en.wikipedia.org/wiki/The_Untouchables_(film)
3. https://en.wikipedia.org/wiki/Brian_De_Palma
4. https://es.wikipedia.org/wiki/Burbuja_inmobiliaria_en_Espa%C3%B1a
5. https://en.wikipedia.org/wiki/Techno
6. https://en.wikipedia.org/wiki/22@
7. https://en.wikipedia.org/wiki/Brainstorming
8. https://en.wikipedia.org/wiki/Q-Zar
9. https://en.wikipedia.org/wiki/Virtual_tour
10. https://en.wikipedia.org/wiki/Three-dimensional_virtual_tourism
11. https://en.wikipedia.org/wiki/Coworking
12. https://en.wikipedia.org/wiki/1992_Summer_Olympics
13. https://en.wikipedia.org/wiki/Gorg,_Badalona
14. https://ca.wikipedia.org/wiki/Badalona
15. https://en.wikipedia.org/wiki/Sant_Adri%C3%A0_de_Bes%C3%B2s
16. https://ca.wikipedia.org/wiki/Poblenou
17. https://en.wikipedia.org/wiki/Sitges
18. https://en.wikipedia.org/wiki/Open-source_intelligence
19. https://en.wikipedia.org/wiki/Maltego
20. https://en.wikipedia.org/wiki/Nina_Kraviz
21. https://en.wikipedia.org/wiki/Disc_jockey
22. https://en.wikipedia.org/wiki/Resident_Advisor
23. https://en.wikipedia.org/wiki/Time_zone
24. https://en.wikipedia.org/wiki/List_of_intelligence_agencies

View File

@ -0,0 +1,145 @@
# Products from the assembly line: goods
![Car's assembly line](../Images/1923-automobile-fabbrica-di-automobili-sulla-linea-di-assemblaggio-finale-di-new-york-cmt08n.jpg)
The synthetic telepathy network is like an industry of human brains. It models masses of brains according to predetermined patrons to create figures of work and exploitation in order to foster the greatest gain due to imposed digital slavery.
Those slaves first of all enter for a couple of years in the lowest part of this structured multi layer pyramid, a big fraud of frauds. Those are the works after a period of time, after gangstalking, that are offered for the new citizens of this state under the state:
- Low class drug sellers
- Induced prostitutes
People that normally doesn't accept this condition ends suicides or heroin addicted or in jail, this last phase underline the big corruption present in our society, and no one say nothing but it is under the eyes of everyone first of all the workers of hospitals, psychiatric structures, courts and jails.
Remember also a thing, if a person accept under torture, yes because who enter in this system is tortured to obtain **genuflection** [[1]](https://en.wikipedia.org/wiki/Genuflection), it's seems to be like a religion, selling drugs or obtain return from prostitution he's doing a crime so the owners of the network could press him to do whatever they want, like torture others friends that end in this vortex.
They do this also with the ghost of **pederasty** [[2]](https://en.wikipedia.org/wiki/Pederasty) against children of the victims, but remember those people are only ghost. You all, victims, have to just start to explain your personal experience and all together we can start a legal **complaint** [[3]](https://en.wikipedia.org/wiki/Complaint) because **the law is the same for everyone** [[4]](https://en.wikipedia.org/wiki/Equality_before_the_law) in a democracy and yet we are in a democracy even if totally corrupt. Just bring enough proof.
> *There is another my two cents, i'm totally crazy or this digital and radio world perhaps in guided by some sect, or what so ever?*
>
> *Something like this? **Communion and Liberation** [[5]](https://en.wikipedia.org/wiki/Communion_and_Liberation).*
So in fact this pseudo dictatorship is founded in drug sell and prostitution. But where does it reverses its revenues? Basically in technology to fortify the digital explosion ship of people. Who're behind this monster? Aristocrats, Vatican, great entrepreneurs and so on. The **elite** [[6]](https://en.wikipedia.org/wiki/Elite). And now the so-called elitist have decided to destroy our democracy probably to reinvigorate the arms market, especially the electronic weapons market in view of a new cyber cold war that currently has already targeted our United Europe to favor the two great giants, the United States and Russia. **Mediterranean Sea** [[7]](https://en.wikipedia.org/wiki/Mediterranean_Sea) always was board of silent cold wars for is geographical center position between the two empires.
![Mediterranean Sea](../Images/Mediterranee_02_EN.jpg)
### Theft of ideas and unfair competition
Remember that all people in this network, victims or not, are under remote neural monitoring. Them minds are read. In a vast amount of people there's always some singularity, some especial person, some inventor. This system have got a branch of rapid idea development. The problem is that who has got the idea don't know this feature and his idea is theft and rapidly pass in production. Those people has got all the tools and stuff, not only digital, to produce whatever good, also physic. They produce millions of euro stealing good ideas. Why they do more moneys than a single? Simply, in this network there's a lot of great entrepreneurs all of them participate with non-legal **shares** [[8]](https://en.wikipedia.org/wiki/Share_(finance)) of the company, that make a percentage completely out of the market so that they attract a lot of **shareholders** [[9]](https://en.wikipedia.org/wiki/Shareholder). So all participate in the purchase and marketisation of the product. Very simple, dude.
**Idea theft** [[10]](https://lawtl.com/idea-theft) is a crime! *And i'm victim of*.
![idea theft](../Images/brojid.com_.-Idea-Theft-1.jpg)
With remote neural monitoring what happen to business mans:
- **Unfair competition** [[11]](https://en.wikipedia.org/wiki/Unfair_competition)
- **Misappropriation** [[12]](https://en.wikipedia.org/wiki/Misappropriation)
- Break of **competition law** [[13]](https://en.wikipedia.org/wiki/Competition_law)
So another kind of victim of the network are young inexpert businessman, like i was, that are inserted violently in this system. They theft all his possession and fall in the gang stalking game, normally for a couple of years or more depending on his capacities.
### People with similar physiognomy
![Collages of Faces](../Images/Collage.jpg)
**Physiognomy** [[14]](https://en.wikipedia.org/wiki/Physiognomy). **Clone** [[15]](https://en.wikipedia.org/wiki/Clone_(computing)) in computing. What does those words got in common?
In the "Illuminati" pseudo dictatorship all about technology it is applied to human being and society. So we speak about human hacking and not simply hacking. It's fascinating but somewhat disturbing the bizarre but effective result of the creators of this network.
Think about pyramid structures with a summit and next top-down levels from minus to more members. One of the feature of this system is to find with the network or in Internet in social web sites persons with similar physiognomy of the summit of the pyramid? Why? To protect to real identity of the head of. Or other applications.
Who can they do it?
It's so basic today with open source technology you can do it at your home. With **OpenCV** [[16]](https://en.wikipedia.org/wiki/OpenCV) some **face detection** [[17]](https://en.wikipedia.org/wiki/Face_detection) **algorithm** [[18]](https://en.wikipedia.org/wiki/Algorithm) and a good programmers department the game is done. Nothing of the other world.
Remember also that visual cortex of all the human clients of the network is read. What does it mean? That in the core of the network image from thousands or millions of human video camera walking in the street is automatic elaborated to find clones for example. Probably they are sold to pyramids summit to comply with crimes.
### Hunters of new victims and the develop of a Mantis tool
![Girls hunters](../Images/ROWIE_Coda-Mini-Hunter_Savannah_Pre-Spring-19__198-900x1350.jpg)
To hunt, to pursue, to chase, to *stalk*. Or in computer science, a **trojan horse** [[19]](https://en.wikipedia.org/wiki/Trojan_horse_(computing)); something in a good shape that hide something terrible and dangerous. *Prostitutes*? Something more complex, they aren't directly sold in web pages. They go out in the **Saturday Night Fever** [[20]](https://en.wikipedia.org/wiki/Saturday_Night_Fever) trying to catch, and yes all the days they go out they catch, the correct prey. Someone that isn't connected to the network, someone that has got a good bank account, or someone that is a possible competitor for others clients of the network. In this way **twenty four girls dressed like my ex girlfriend** in the network monitor tv ended up being a slave to the neural control network for a year and raped several times before becoming a millionaire huntress berthed in the tourist port of Barcelona.
What is the forced process to become a slayer? What steps must a huntress follow to avoid being tortured daily by the owners of this criminal network? How many victims hunt my ex girlfriend and twenty other four girls in Barcelona? What kind of drugs are they administered to make them lose the limit of violence? How many men and women forced to be slaves of this hell in their turn? How much money did you generate for the owners? How is it possible that the police do not stop this continuous crime? How many orgies did you have to deal with international dealers and characters of dubious origin? How many times has your life been endangered?
This is a two years process, started with brainwash and ended with continuous praise and helpful additives to boost self esteem. Provoked situations orchestrated by a strong mind, like a master. Something similar but not equal to a sept. The adepts are beautiful women with a great desire to overcome and to be noticed in a complicated world. With a great desire to reach economic goals glimpsed in the upper floors of the direction of this deadly weapon, the network of synthetic telepathy. Situations in which these beautiful girls after being treated as slaves for mid-level stalkers are lured with false promises and made safe by theoretically random facts. For example, being invited to high-class parties, such as parties in football players' private villas and being able to have sex, even multiple ones, with so-called famous people. Other tools of the owners of the network.
So that their self-esteem rises exponentially in a short period of time. Since you don't even have money to eat quickly you are invited to luxurious parties. Then a work is proposed to her, based on the seduction ballet. On the hunt, on sex on the capacity for conviction.
*Why do they make money?*
Easy, actually people who have nights of madness with these beautiful women, including my ex-girlfriend, are victims of a subtle crime of invasion of privacy. Girls are human cameras. The owners of the network observe the sexual clothes of the victims in case they are high-level people, obviously they are not included in the invasive form, but only in a hidden way.
*Let us remember that a naked man is a more vulnerable man.*
So let's consider the image on the header. Like I explain it is a production line of a factory. And it is all information technology related. So we can speak about **scheduling** [[21]](https://en.wikipedia.org/wiki/Scheduling_(computing)), and about **processes** [[22]](https://en.wikipedia.org/wiki/Process_(computing)).
> *The transformation of a person from a girl who enjoy doing love with her boyfriend to a person that hunt for prey in discotheque is something large and laborious.*
![Mantis](../Images/04-praying-mantis-nationalgeographic_2301352.jpg)
Let's analyze this radical transformation that can occur in a mind because the work of an expert human hacker. This is in reality what we've described as this peculiar profession. I think that a transformation like this need at least ten years of work. The result is a perfect **Mantis** [[23]](https://en.wikipedia.org/wiki/Mantis). A tool in human hacking.
1. Find the correct prey using the tools present in the synthetic telepathy network. The hacker, or better say the stalker, use this network to search for a woman that enjoy sex, beautiful, aggressive, with some type of childhood trauma that cause her to fall in drug abuse, cocaine normal or sexual violence, and like luxury ambients. The stalker usually have to apply a vast check list of different comportments and physical values. He will utilize programmed situation in real life using a tool, but like we're speaking about reality those tool are obviously human relations with some other that are already infected by the visual cortex system read. Others victim that accept to work in this world. Using the machine of the other the human hacker read value of the victim, the girl. Like how many times she got orgasm when she is having sex or if cocaine or others drug affect her nervous system and if with heavy abuse when her mind and her body collapse. Another think that the stalker search is if with alcohol and cocaine the sexual defenses of the victim go down.
2. After a little bit of survey the stalker usually go in the same neighborhood next to the victim and catch her normally in a market where he starts to work or in a discotheque smelling her like a wolf. This is not an history this is the reality. Yes it is not simple find one, but if you find him take care. Go away! He will try to have a sporadic sex relation with the victim to investigate more her mind and body. Why? Remember that he is an hacker. To **exploit** [[24]](https://en.wikipedia.org/wiki/Exploit_(computer_security)) her fantasies but in reality to exploit her weakness. But remember that like nobody explain this old art, probably Japanese, and there's no public repository of exploit. Like **exploit database** [[25]](https://www.exploit-db.com/) for systems.
3. The stalker got access to the "Machine" of the network. With this radio waves machine he can masturbate continuously the victim. Using the reproductive system over excitement described on chapter one. Also using dream injection the stalker can provoke that the victim fall in love with him, creating a psychological dependency with one's executioner, the **Stockholm syndrome** [[26]](https://en.wikipedia.org/wiki/Stockholm_syndrome). Day by day the stalker became the master of the victim something similar to what we find in BDSM ambients.
4. Women got many times the same weak point, that is not a weak point but if you're stalked yes it is, child. The insanity that is present in this network is enormous. I've listen to the owner to menace a lot of women, mi ex girlfriend also, to violate them child, and she has done it! With this threat women became very vulnerable. They start to oblige them to have bigger and bigger orgies, so they lose the limit of sexual violence. And this is another very important step in the forge of a human mantis tool. The other point where is possible to force the mind of a person is the job. If the girl live alone and cannot ask help to her family, the stalker could menace people that work with her to create an hostile work ambient or worst could create what is called as **workplace harassment** [[27]](https://en.wikipedia.org/wiki/Workplace_harassment).
# External links
1. https://en.wikipedia.org/wiki/Genuflection
2. https://en.wikipedia.org/wiki/Pederasty
3. https://en.wikipedia.org/wiki/Complaint
4. https://en.wikipedia.org/wiki/Equality_before_the_law
5. https://en.wikipedia.org/wiki/Communion_and_Liberation
6. https://en.wikipedia.org/wiki/Elite
7. https://en.wikipedia.org/wiki/Mediterranean_Sea
8. https://en.wikipedia.org/wiki/Share_(finance)
9. https://en.wikipedia.org/wiki/Shareholder
10. https://lawtl.com/idea-theft
11. https://en.wikipedia.org/wiki/Unfair_competition
12. https://en.wikipedia.org/wiki/Misappropriation
13. https://en.wikipedia.org/wiki/Competition_law
14. https://en.wikipedia.org/wiki/Physiognomy
15. https://en.wikipedia.org/wiki/Clone_(computing)
16. https://en.wikipedia.org/wiki/OpenCV
17. https://en.wikipedia.org/wiki/Face_detection
18. https://en.wikipedia.org/wiki/Algorithm
19. https://en.wikipedia.org/wiki/Trojan_horse_(computing)
20. https://en.wikipedia.org/wiki/Saturday_Night_Fever
21. https://en.wikipedia.org/wiki/Scheduling_(computing)
22. https://en.wikipedia.org/wiki/Process_(computing)
23. https://en.wikipedia.org/wiki/Mantis
24. https://en.wikipedia.org/wiki/Exploit_(computer_security)
25. https://www.exploit-db.com/
26. https://en.wikipedia.org/wiki/Stockholm_syndrome
27. https://en.wikipedia.org/wiki/Workplace_harassment

View File

@ -0,0 +1,173 @@
# Porn Internet industry food
![pornography stats](../Images/statistics-on-internet-porn-still-a-major-industry--infographics_50290fccd8f2b_w1500.jpg)
How to produce porn industry food? And I speak about food not because i don't like women involved in porn facilities but because "Illuminati" consider them just food. *Food to buy in a Pakistan's market*. They forge adolescent girls with a large brain washing procedure, it start with the complete demolition of democratic and classic knowledge basis of those girl. Normally victims aren't very educated and come from a normally low social class. It start with something like classes about supposed unknown histories about human kind and flow into sexual abuse based also in the destructions of the normal sexual education, orgies, slavery and so on. It uses the reproductive system over excitement and control described on chapter two.
Let's start the little scene about the destruction of the basis of girl's normal comportment. This, always because basically it's a fraud but at world scale even though after the sexual violence and human traffic sometimes it's real, technically is called scam or **Internet fraud** [[1]](https://en.wikipedia.org/wiki/Internet_fraud). Those below are documents about this brain washing procedure, they've got destroyed life of many girls that fall down into heroin addiction, **anorexia** [[2]](https://en.wikipedia.org/wiki/Anorexia_nervosa) or worst death.
1. [ETAPA DESDE EL INICIO HASTA LOS ATLANTES]()
2. [ETAPA LOS ATLANTES](https://drive.google.com/open?id=1R5WFD7UWGtmKFbGdaTSzbbfRPQIDftD9)
3. [ETAPA LA LLEGADA DE LOS NEFILIN DEL 445.000 AL 200.000](https://drive.google.com/open?id=1W_RK_5hy7gr4HNP9ZSl1LdN0oWuBgeT_)
4. [ETAPA CREACIÓN DE EVA 200.000 a. C](https://drive.google.com/open?id=1VNkpmJ2r_2Ttybd-xReQLNb07QOHBYYP)
5. [ETAPA EL PRE-DILUVIO DEL 200.000 AL Y 10.178 A. C](https://drive.google.com/open?id=1F5a41JvjqVaQKiNvEZhIoT86hRN2BN53)
6. [ETAPA LOS FOCOS DE CIVILIZACIÓN 14.000 AL 1600 a.C.](https://drive.google.com/drive/folders/1TUB2yeWs3qM0aw6uubXY4VAqPAnD3GrZ?fbclid=IwAR3B0gOmy4c-yJujWgFDi--WoaikwXJta1tt4YRQgDSEs9ucIPyz-EHmvbo)
7. [ETAPA LAS RELIGIONES ANTIGUO TESTAMENTO 1600 A 1 D.C](https://drive.google.com/drive/folders/1TUB2yeWs3qM0aw6uubXY4VAqPAnD3GrZ?fbclid=IwAR3B0gOmy4c-yJujWgFDi--WoaikwXJta1tt4YRQgDSEs9ucIPyz-EHmvbo)
8. [ETAPA RELIGIONES MONOTEISTAS del 1 al S V](https://drive.google.com/drive/folders/1TUB2yeWs3qM0aw6uubXY4VAqPAnD3GrZ?fbclid=IwAR3B0gOmy4c-yJujWgFDi--WoaikwXJta1tt4YRQgDSEs9ucIPyz-EHmvbo)
9. [ETAPA EDAD MEDIA RENACIMIENTO... DESDE S. V AL S. XVIII](https://drive.google.com/open?id=1r0jAPI40ozHH8d9vkN4gKoEW9oZXns6T)
10. [ETAPA S. XIX HASTA PRINCIPIOS DEL S. XX](https://drive.google.com/open?id=1pd6zDrcep4TKgK2WIJSWks9EW1Lsucuq)
11. [ETAPA NAZIS, ALIADOS, BILDERBERG DE 1939 A 1960](https://drive.google.com/open?id=1HUIZPLxxwn_Yvr7sSwGGYlwKcHZeKL6I)
12. [ETAPA DE 1960 A 1999 EL PRINCIPIO DE LA GLOBALIZACIÓN](https://drive.google.com/open?id=1BxSUGCTLNy1sf1zjbFv_SRr9LxDX8pA4)
13. [ETAPA DEL CONTROL DEL 2000 HASTA 2010]()
14. [ETAPA DESDE 2010 HASTA LA EXTINCIÓN](https://drive.google.com/open?id=1d09wG-Oxp0LXhrRveA8MzQgV4On6QZwr)
As you can see this is totally absurd. But in all of this shit there's is some trace of true. *Religion, church, Nazi and technology*. But i'm an average man caught. What happened to a young girl without culture and inducted to drugs utilized to cut drugs to sniff like cocaine or **ketamine** [[3]](https://en.wikipedia.org/wiki/Ketamine)? The most dangerous cut it's called **dopamine** [[4]](https://en.wikipedia.org/wiki/Dopamine). Dopamine augment libido, what is called **reward system** [[5]](https://en.wikipedia.org/wiki/Reward_system) is boosted. In simple words the girl with the use of cocaine and dopamine more the electronic reproductive system over excitement conduct the victim to extreme sexual behaviors.
After these systematic destruction of the basis of society, democracy and sexual behavior in the mind and memory of the victim, she is theoretically approached by chance by individuals that takes advantage of his confusion and over-excitement to get her up and put her in extreme sex environments and BDSM parties. What is the final goal of this process? As usual it's simple. Money. The girl think that she has a lucky time to know new friends obviously of good economic status and participate in what this stalkers call "new world order", basically based on rituals and sex orgies for young women of good aspect. In reality she's sold to aristocratic or entrepreneurs to have sexual encounters and be treated like a sex slave.
Where does she will fall? Normally after a period of time where she is victim of human traffic and sexual harassment she'll die by a car accident, overdose or put in jail. Remember what i've say about gangastalking.
Who are the clients of this horrible crime?
- Ecclesiastical.
- Aristocrat.
- Business man.
- High class drug trafficker.
- etcetera etcetera
Will the girl gain money? No absolutely not. *She is fated to a bad destiny*.
# Barcelona swingers and BDSM ambient.
![Club rosas cinco](../Images/bdsm-rosas-cinco-barcelona.png)
**Swinging** [[6]](https://en.wikipedia.org/wiki/Swinging_(sexual_practice)), intercambio de parejas in Spanish, intercanvi de parelles in Catalan. A phenomenon that has seen Barcelona, the Catalunya most important city, like one of the most important sexual tourism destination about this sexual practice.
**BDSM** [[7]](https://en.wikipedia.org/wiki/Swinging_(sexual_practice)) another extreme sexual practice based on **dominance and submission** [[8]](https://en.wikipedia.org/wiki/Dominance_and_submission). Slavery. Perhaps we are speaking about the old **Atlantic slave trade** [[9]](https://en.wikipedia.org/wiki/Atlantic_slave_trade)? Or another mental illness? Or a tool? All the four, sex, commerce command and conquer, health, **handicraft** [[10]](https://en.wikipedia.org/wiki/Handicraft).
Speaking about induced sexual slave with the Machine of the "Illuminati" network and focusing over this kind of installations we've to reflect about the real meaning of all of this. Why owners of this network use humans after a brain wash procedure in those rituals? Remembers that *animals don't do orgies*, don't use pain to cause pleasure. This seems to be something like **the Decameron** [[11]](https://en.wikipedia.org/wiki/The_Decameron), **One Thousand and One Nights** [[12]](https://en.wikipedia.org/wiki/One_Thousand_and_One_Nights). But also something like **middle ages** [[13]](https://en.wikipedia.org/wiki/Middle_Ages) **torture** [[14]](https://en.wikipedia.org/wiki/Torture).
Here is my point of view.
In this focus we've got the girl molded has sexual slave but not only, someone could have the mask of slave but in reality is a master. Next we've got normally an husband and his wife that search for extra matrimonial pleasure because of them low sexual activity due to time and almost probably because in reality they got married without be in real love, because, yes, *real love exist* it's only difficult to find. "Illuminati" play this game of destruction over families to divide families to gain money doing **gambling** [[15]](https://en.wikipedia.org/wiki/Gambling) over on the lives of destroyed people, children are also victims they can be sold in human traffic crimes or even be victims of **organ trade** [[16]](https://en.wikipedia.org/wiki/Organ_trade). *And this real and true in the Europe of 2019, incredible*.
If this is done at large scale this could destabilize society and also democracy. So the final goal is always the same. Terrorism. The sale of Europe.
Don't be afraid to speak about, i'm Riccardo Giuntoli and i say to you that there is not any problem. In democracy, and yes we live in this system of **government** [[17]](https://en.wikipedia.org/wiki/Government), there is the **freedom of speech** [[18]](https://en.wikipedia.org/wiki/Freedom_of_speech) that is another important defense's tower.
# World wide web porn portals
First of all a consideration. Machine of the synthetic telepathy network in porn is present. No one say nothing but it's a reality. Cam site permit to connect people under this system with the models acting in the other site. **Cam4** [[19]](https://en.wikipedia.org/wiki/CAM4) and **Chaturbate** [[20]](https://en.wikipedia.org/wiki/Chaturbate) for sure. So there is an accord between the owners of those web pages and the owners of the network. Who they are?
![Chaturbate web cam](../Images/chatturbate.png)
Another consideration. A girl that is victim of this criminal system could be connected to many actress doing live sex on those portals as the owners want. What does it mean? The victim when close her eyes every time will see a porn scene so she cannot sleep and she is always over stimulated always searching to create a sexual slave. *This is a torture that destroy the life of the victim.* Be careful *they can do this also with a children*. Connecting a child to those womens acting in front of the cam will change the behavior of the child, preparing to a possible sold to a pederast. They use this threat, *i think almost always its only a threat* but i cannot swear it, to obtain also sexual slavery from the mom.
There is others networks that are called **imageboard** [[21]](https://en.wikipedia.org/wiki/Imageboard), on wikipedia some are declared as property of the Anonymous group but *i've got my doubts*. They are on clear and deep Internet . They've got many amateur pornography post but they are a little bit strange because of violence in many cases, we can find on Internet those addresses:
1. https://www.4chan.org/
2. https://www.4channel.org/
3. https://420chan.org/
4. https://www.2chan.net/
5. http://7chan.org/
6. http://oxwugzccvk3dk6tj.onion
7. https://bbw-chan.nl/
First reflexion almost all the girls on those portals are victim of this criminal network. Almost all are ex girlfriend of mans that are victims of gang stalking searching for hers and fall into a suicide vortex.
Who are behind those image boards?
1. **Christopher Poole** [[22]](https://en.wikipedia.org/wiki/Christopher_Poole)
2. **Hiroyuki Nishimura** [[23]](https://en.wikipedia.org/wiki/Hiroyuki_Nishimura).
3. **Fredrick Brennan** [[24]](https://en.wikipedia.org/wiki/Fredrick_Brennan).
Here i've personally found **263 images and porn video** of my ex girlfriend. Because yes, i'm a victim of this system. I'm a target individual. *But i'm a senior network engineer, a white hat hacker and a OSINT investigator*. I want to shut down this evil network. And Saray, this is her name, is a victim from about ten years. I love her. And all of this is only for her and her baby.
![Saray](../Images/sarayporn.png)
But the most important think is that i know personally like almost the **organization chart** [[25]](https://en.wikipedia.org/wiki/Organizational_chart). They have to be put in jail from International Police like **Interpol** [[26]](https://en.wikipedia.org/wiki/Interpol).
*Saray need help, i wish you where here little baby. Kisses.*
Others pages are not for live interaction but there i've found some porn video about my ex girlfriend, so, if you're too a victim, you could search for your woman. Remember a think, in this gang stalking game they will act in the way that you will think about your woman like as one of the perpetrators, but no, *she is a victim like you, and she need your help*.
- https://www.xvideos.com/
- https://xhamster.com/
But nowadays there's a lot of streaming porn video site. This industry is one of the most important branch of the digital revolution. I don't know the exact magnitude of the machine's utilization but i think that a good part in percent of the market.
But there's a lot of others resources on Internet about porn, a good list in:
https://www.mrporngeek.com/
Last but not least is the platform **Reddit** [[27]](https://en.wikipedia.org/wiki/Reddit):
- https://www.reddit.com/r/gonewild/
- https://www.reddit.com/r/nsfw/
- https://www.reddit.com/r/nsfw_gif
- https://www.reddit.com/r/realgirls
- https://www.reddit.com/r/holdthemoan/
# External Links
1. https://en.wikipedia.org/wiki/Internet_fraud
2. https://en.wikipedia.org/wiki/Anorexia_nervosa
3. https://en.wikipedia.org/wiki/Ketamine
4. https://en.wikipedia.org/wiki/Dopamine
5. https://en.wikipedia.org/wiki/Reward_system
6. https://en.wikipedia.org/wiki/Swinging_(sexual_practice)
7. https://en.wikipedia.org/wiki/BDSM
8. https://en.wikipedia.org/wiki/Dominance_and_submission
9. https://en.wikipedia.org/wiki/Atlantic_slave_trade
10. https://en.wikipedia.org/wiki/Handicraft
11. https://en.wikipedia.org/wiki/The_Decameron
12. https://en.wikipedia.org/wiki/One_Thousand_and_One_Nights
13. https://en.wikipedia.org/wiki/Middle_Ages
14. https://en.wikipedia.org/wiki/Torture
15. https://en.wikipedia.org/wiki/Gambling
16. https://en.wikipedia.org/wiki/Organ_trade
17. https://en.wikipedia.org/wiki/Government
18. https://en.wikipedia.org/wiki/Freedom_of_speech
19. https://en.wikipedia.org/wiki/CAM4
20. https://en.wikipedia.org/wiki/Chaturbate
21. https://en.wikipedia.org/wiki/Imageboard
22. https://en.wikipedia.org/wiki/Christopher_Poole
23. https://en.wikipedia.org/wiki/Hiroyuki_Nishimura
24. https://en.wikipedia.org/wiki/Fredrick_Brennan
25. https://en.wikipedia.org/wiki/Organizational_chart
26. https://en.wikipedia.org/wiki/Interpol
27. https://en.wikipedia.org/wiki/Reddit

View File

@ -0,0 +1,18 @@
# Laws violated by this system
![La legge è uguale per tutti](../Images/-piero-calamandrei--la-legge--20190913-160438-legge-uguale-tutti.jpg)
### Crimes and internationals laws about gangstalking and gaslighting
Is gangstalking and gaslighting only related to drug debt or another kind of debt? Absolutely not. And this is another reality that no one speak about. In fact who fall down in the gaslight vortex has very few opportunities to survive without commit suicide to himself. Who fall down in that word of shit will be threated like a dog, like an animal, like an **human guinea pig**. A person that is connected to the network in the infographic upon will lost eleven articles of the **Universal Declaration of Humans Rights**:
- article 1: all human beings are born free and equal in dignity and rights. [...]
- when a victim is inserted in the synthetic telepathy network, aka gangstalking and gaslighting network, lost is freedom because of the lost of privacy. Stalkers first of all can read his mind, see what he see via his brain in a sort of man-in-the-middle attack between the auditory and visual cortex. Can also change what the victim receive about the external world with a sort of data injection attack; voice onfly rewrite, voice carbon copy, augmented reality objects injected and so on. Speaking about dignity and rights when the victim suffer street teather and gaslighting is public humillated and induct to suicide.
- article 2: everyone is entitled to all the rights and freedoms set forth in this Declaration, without distinction of any kind, [...]. Furthermore, no distinction shall be made on the basis of the political, jurisdictional or international status of the country or territory wich a person belongs, [...].
- why victim loose the second article is the same motivation of the first
- article 3: everyone has the right to life, liberty and the security of person.
- also this article is destroyed when it speaks about liberty and like the second is for the reasons explained in the first.
- article 4: no one shall be held in slavery or servitude: slavery and the slave trade shall be prohibited in all their forms.
-
1.