Add files via upload

This commit is contained in:
Riccardo Giuntoli 2019-11-19 19:47:23 +01:00 committed by GitHub
parent 10260f98e8
commit c99682c2be
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -1,12 +1,12 @@
# The worldwide neural control network # The worldwide neural control network
![network scheme](../Images/satcycle3-4_2_orig.png) ![Remote neural network](../Images/satcycle3-4_2_orig.png)
From the end of the second world war and mostly in the cold war remote neural control networks was develop. From the end of the second world war and mostly in the cold war remote neural control networks was develop.
Nowadays it is a multi layer radio frequency networks like Internet tier division. Last mile is mixed between satellite constellations and terrestrial waves towers. Nowadays it is a multi layer radio frequency networks like Internet tier division. Last mile is mixed between magnetic field are network to position and lock to the human and terrestrial waves towers.
It's soap of different radio service, very complex to analyze because of a smoke curtain covering this type of networks. Why? Because in the past they was utilized by secret services and nowadays are utilized my a digital mafia that hack human brains. Manipulate masses. Change political views. Destroy families. Bet on suicides. It's a soap of different radio service, very complex to analyze because of a smoke curtain covering this type of networks. Why? Because in the past they was utilized by secret services and nowadays are utilized my a digital mafia that hack human brains. Manipulate masses. Change political views. Destroy families. Bet on suicides.
*Something that is destroying the Europe Union and democracy* *Something that is destroying the Europe Union and democracy*
@ -22,7 +22,17 @@ The service, because yes it is a service from a provider, was contracted in Spai
> *I'm public writing all of this because of **justice**. It's difficult to demonstrate but a very important person in Spain is helping me in this network. So i'm doing it. Thank you great man and person. I've lost the woman that i'm love to and this book is dedicated to her and her baby. They forced her to go out from our house five years ago.* > *I'm public writing all of this because of **justice**. It's difficult to demonstrate but a very important person in Spain is helping me in this network. So i'm doing it. Thank you great man and person. I've lost the woman that i'm love to and this book is dedicated to her and her baby. They forced her to go out from our house five years ago.*
### Magnetic field area network, the radio steam machine
![Magnetic field](../Images/magneticsd.png)
The magnetic field are network or MFAN is a terrestrial magnetic radio where they can identify exactly the position of the victim. More than this it's possible to practically physically the client or do sexual violence to him.
They call this steam machine.
With this virtual device the environment near the victim is like a tac machine. And it is continuously, the real mean is that we this system is carcinogenic for our brain and body.
### The synthetic telepathy network computing center
![Synthetic Telepathy network](../Images/redtelepatia.jpg) ![Synthetic Telepathy network](../Images/redtelepatia.jpg)
@ -35,7 +45,7 @@ In Internet we can find a lot of references about the synthetic telepathy networ
Let's introduce every device of the network scheme above: Let's introduce every device of the network scheme above:
- **Target machine:** A virtual device locked to the target person(s) by radio frequency. What does it mean? Every machine has an identification, a human unique magnetic field identification, an id to witch in a **VPN** [[5]](https://en.wikipedia.org/wiki/Virtual_private_network) there's a correspondence with a remote virtual **Android** [[6]](https://en.wikipedia.org/wiki/Android_(operating_system)) device where we can find a lot of applications more or less powerful depending on what kind of access we've got in the network. A single Machine, later i will explain theory and technology about this death device, could be shared by many clients, usually humans but also animals, could determine a pyramid structure normally identified by a natural number, the mine in Barcelona for example is the number **9**. - **Target machine:** A virtual device locked to the target person(s) by radio frequency. What does it mean? Every machine has an identification, a human unique magnetic field identification, an id to witch in a **VPN** [[5]](https://en.wikipedia.org/wiki/Virtual_private_network) there's a correspondence with a remote virtual **Android** [[6]](https://en.wikipedia.org/wiki/Android_(operating_system)) device where we can find a lot of applications more or less powerful depending on what kind of access we've got in the network. A single Machine, later i will explain theory and technology about this death device, could be shared by many clients, usually humans but also animals, could determine a pyramid structure normally identified by a natural number, the mine in Barcelona for example is the number **9**.
- **Target in reality**: one or more persons that doesn't have access to the administration of his Machine, she/he loose totally her/his privacy and all the time passed without access is considered like a slave. Many times she/he is also considered only like an object, they use to do experiments with the person to archive data under extreme stress, violent sex situations and brain experiments. The target individual is a **human guinea pig** in an unauthorised **human subject research** [[7]](https://en.wikipedia.org/wiki/Human_subject_research). - **Target in reality**: one or more persons that doesn't have access to the administration of his Machine, she/he loose totally her/his privacy and all the time passed without access is considered like a slave. Many times she/he is also considered only like an object, they use to do experiments with the person to archive data under extreme stress, violent sex situations and brain experiments. The target individual is a **human guinea pig** in an unauthorized **human subject research** [[7]](https://en.wikipedia.org/wiki/Human_subject_research).
- **Machine in metaphor**: A mobile telephone, protected by a simple **PIN** [[8]](https://en.wikipedia.org/wiki/Personal_identification_number) of four numbers. It's security it's so basic because allow gangstalker to steal money of the target machine or another client that doesn't know about basic security. Money are always in **crypt concurrency** [[9]](https://en.wikipedia.org/wiki/Cryptocurrency). - **Machine in metaphor**: A mobile telephone, protected by a simple **PIN** [[8]](https://en.wikipedia.org/wiki/Personal_identification_number) of four numbers. It's security it's so basic because allow gangstalker to steal money of the target machine or another client that doesn't know about basic security. Money are always in **crypt concurrency** [[9]](https://en.wikipedia.org/wiki/Cryptocurrency).
- **Target in metaphor**: Is a dog, gangstalkers consider a target individual with the same rights of an animal. They give her/him orders, deny to her/him every types of rights, electronically punish her/him and hit her/him. So do practically all the persons connected to this system because if they doesn't torture the victim they loose privilege in the network and return to the victim state that is the initial state when you was forced to join this hell network with brain zapping, that is a technique used to find the unique magnetic identification of a human. It is archive using a physical Android device, normally a telephone. A victim is captured identifying is unique magnetic field id by proximity with another network client used like predator. Normally is a woman or a very attractive man that have sex with the victim, the predator has got her or his mobile infected by an application remotely controlled by the network owners. In Barcelona Spain i think that there are more than two hundred thousand clients connected. - **Target in metaphor**: Is a dog, gangstalkers consider a target individual with the same rights of an animal. They give her/him orders, deny to her/him every types of rights, electronically punish her/him and hit her/him. So do practically all the persons connected to this system because if they doesn't torture the victim they loose privilege in the network and return to the victim state that is the initial state when you was forced to join this hell network with brain zapping, that is a technique used to find the unique magnetic identification of a human. It is archive using a physical Android device, normally a telephone. A victim is captured identifying is unique magnetic field id by proximity with another network client used like predator. Normally is a woman or a very attractive man that have sex with the victim, the predator has got her or his mobile infected by an application remotely controlled by the network owners. In Barcelona Spain i think that there are more than two hundred thousand clients connected.
- **Bidirectional connection to target machine**: Using a unique identification of the target person, or probably an array of, ground station speak directly with the victim or the client using **RNM**, remote neural monitoring. The remote neural monitoring act like a **BCI** [[10]](https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface), a **TMS** [[11]](https://en.wikipedia.org/wiki/Transcranial_magnetic_stimulation) device, a **MRI** [[12]](https://en.wikipedia.org/wiki/Magnetic_resonance_imaging) device; all of them are remote and virtual. All is done by radio frequency. All is remote brain waves. There is no need of any sort of device acting like a client in the human target. There is no need of **brain implant** [[13]](https://en.wikipedia.org/wiki/Brain_implant). - **Bidirectional connection to target machine**: Using a unique identification of the target person, or probably an array of, ground station speak directly with the victim or the client using **RNM**, remote neural monitoring. The remote neural monitoring act like a **BCI** [[10]](https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface), a **TMS** [[11]](https://en.wikipedia.org/wiki/Transcranial_magnetic_stimulation) device, a **MRI** [[12]](https://en.wikipedia.org/wiki/Magnetic_resonance_imaging) device; all of them are remote and virtual. All is done by radio frequency. All is remote brain waves. There is no need of any sort of device acting like a client in the human target. There is no need of **brain implant** [[13]](https://en.wikipedia.org/wiki/Brain_implant).
@ -49,7 +59,7 @@ Let's introduce every device of the network scheme above:
- **Gamma wave** [[24]](https://en.wikipedia.org/wiki/Gamma_wave) from 32 to 100 Hz. - **Gamma wave** [[24]](https://en.wikipedia.org/wiki/Gamma_wave) from 32 to 100 Hz.
- **Silent subliminal presentation system**: a method from United States patent that serve to bypass first human auditory system, using the frequency of 462.25 KHz with a channel width of 14.5 KHz. - **Silent subliminal presentation system**: a method from United States patent that serve to bypass first human auditory system, using the frequency of 462.25 KHz with a channel width of 14.5 KHz.
- **Geosynchronous satellite**: Used to obtain remote imaging of the target. Nowadays with the advent of the open hardware, middle size criminal organization could have a satellite in low orbit. This could be classified as *satellite terrorism*. **Open hardware satellite** [[25]](https://www.google.com/search?q=open+hardware+satellite&ie=utf-8&oe=utf-8&client=firefox-b-1-e) could be launch in orbit by companies that bind this service at relative low cost. - **Geosynchronous satellite**: Used to obtain remote imaging of the target. Nowadays with the advent of the open hardware, middle size criminal organization could have a satellite in low orbit. This could be classified as *satellite terrorism*. **Open hardware satellite** [[25]](https://www.google.com/search?q=open+hardware+satellite&ie=utf-8&oe=utf-8&client=firefox-b-1-e) could be launch in orbit by companies that bind this service at relative low cost.
- **Ground station**: Is an access point to BRAINnet. To archive the full coverage of a territory like Catalunya there is no need of too many points because of **wavelengths** [[26]](https://en.wikipedia.org/wiki/Wavelength) from 100000 to 1000 kilometres and because at this frequencies there is no need of **line of sight** [[27]](https://en.wikipedia.org/wiki/Line-of-sight_propagation), waves can pass through many types of materials. Every ground station perhaps have got eight different physical radios and antennas, one for every type of brain wave, and an interface, fibre optic or another radio technology, for the **backbone** [[28]](https://en.wikipedia.org/wiki/Backbone_network). The backbone doesn't have the need to transport a lot of data so it can be build using low size technology and **NLOS** [[29]](https://en.wikipedia.org/wiki/Non-line-of-sight_propagation) radio and frequency. - **Ground station**: Is an access point to BRAINnet. To archive the full coverage of a territory like Catalunya there is no need of too many points because of **wavelengths** [[26]](https://en.wikipedia.org/wiki/Wavelength) from 100000 to 1000 kilometers and because at this frequencies there is no need of **line of sight** [[27]](https://en.wikipedia.org/wiki/Line-of-sight_propagation), waves can pass through many types of materials. Every ground station perhaps have got eight different physical radios and antennas, one for every type of brain wave, and an interface, fibre optic or another radio technology, for the **backbone** [[28]](https://en.wikipedia.org/wiki/Backbone_network). The backbone doesn't have the need to transport a lot of data so it can be build using low size technology and **NLOS** [[29]](https://en.wikipedia.org/wiki/Non-line-of-sight_propagation) radio and frequency.
- **Telemetry** - **Telemetry**
- **Listening station** : part of every ground station but not in the outside. Every target individual got his **telemetry** [[30]](https://en.wikipedia.org/wiki/Telemetry) saved in the network computing center, like all steps taken, all the trips and so on. There's no privacy in this network. - **Listening station** : part of every ground station but not in the outside. Every target individual got his **telemetry** [[30]](https://en.wikipedia.org/wiki/Telemetry) saved in the network computing center, like all steps taken, all the trips and so on. There's no privacy in this network.
- **Input/Output processing** - **Input/Output processing**
@ -59,7 +69,7 @@ Let's introduce every device of the network scheme above:
- **Feedback monitoring** - **Feedback monitoring**
- **External events**: because of our visual cortex is under control, like in a **MitM** [[41]](https://en.wikipedia.org/wiki/Man-in-the-middle_attack) environment, when we're victim of the synthetic telepathy network we are like a remote video camera. All what we do and we see is transmitted to the . What it can mean? Simple, our privacy and the privacy of whatever is under our line of sight is compromised. All what we write be pen or in a computer or in a cash dispenser is stolen. When we've sex all is transmitted, and so on. We're like a tool for hackers. What does it mean? Image a beautiful woman victim of the network. All the people that have sex with her are connected to the network. Woman can be like a **Trojan horse** [[42]](https://en.wikipedia.org/wiki/Trojan_Horse). - **External events**: because of our visual cortex is under control, like in a **MitM** [[41]](https://en.wikipedia.org/wiki/Man-in-the-middle_attack) environment, when we're victim of the synthetic telepathy network we are like a remote video camera. All what we do and we see is transmitted to the . What it can mean? Simple, our privacy and the privacy of whatever is under our line of sight is compromised. All what we write be pen or in a computer or in a cash dispenser is stolen. When we've sex all is transmitted, and so on. We're like a tool for hackers. What does it mean? Image a beautiful woman victim of the network. All the people that have sex with her are connected to the network. Woman can be like a **Trojan horse** [[42]](https://en.wikipedia.org/wiki/Trojan_Horse).
- **Health monitoring**: With this machine owners of the synthetic telepathy network got physical health values of the targets individuals, like **blood pressure** [[43]](https://en.wikipedia.org/wiki/Blood_pressure), **heart rate** [[44]](https://en.wikipedia.org/wiki/Heart_rate), **human body temperature** [[45]](https://en.wikipedia.org/wiki/Human_body_temperature) and so on. They have the complete medical view of every human client connected to the network. - **Health monitoring**: With this machine owners of the synthetic telepathy network got physical health values of the targets individuals, like **blood pressure** [[43]](https://en.wikipedia.org/wiki/Blood_pressure), **heart rate** [[44]](https://en.wikipedia.org/wiki/Heart_rate), **human body temperature** [[45]](https://en.wikipedia.org/wiki/Human_body_temperature) and so on. They have the complete medical view of every human client connected to the network.
- **Lie detection**: owners of the network got also in their hands a full remote equipment of **lie detection** [[46]](https://en.wikipedia.org/wiki/Lie_detection). They know if the target lie or not about an argue. All is registered in the network core centre. - **Lie detection**: owners of the network got also in their hands a full remote equipment of **lie detection** [[46]](https://en.wikipedia.org/wiki/Lie_detection). They know if the target lie or not about an argue. All is registered in the network core center.
- **Core process** - **Core process**
- **Strategic Natural Language Processing**: client who has got access to the services in BRAINnet could understand and speak a lot of different humans languages with them vocalization. This is possible by an advanced system of **natural language processing** [[47]](https://en.wikipedia.org/wiki/Natural_language_processing) , a part of computer science concerned with the interactions between computers and human (natural) languages. - **Strategic Natural Language Processing**: client who has got access to the services in BRAINnet could understand and speak a lot of different humans languages with them vocalization. This is possible by an advanced system of **natural language processing** [[47]](https://en.wikipedia.org/wiki/Natural_language_processing) , a part of computer science concerned with the interactions between computers and human (natural) languages.
- **Mental Impressions**: i don't know what it can be. - **Mental Impressions**: i don't know what it can be.