Merge pull request #148 from redeltaglio/master

sada
This commit is contained in:
Riccardo Giuntoli 2020-04-21 09:34:01 +02:00 committed by GitHub
commit d1613e4702
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
15 changed files with 764 additions and 14 deletions

4
.gitignore vendored
View File

@ -1,7 +1,4 @@
Images/firma_mg.png
Part\ 8\ -\ Personal\ consideration/4\ -\ Natal\ chart.md
Part 8 - Personal consideration/2 - Noble houses.md
Images/ArxOri_Cas003.jpg
Images/FotLocCas.jpg
Introduction.md
@ -11,3 +8,4 @@ Part 6 - Organization chart/2 - Organization chart.md
Part 7 - Personal consideration/6 - The house of Bourbon.md
Images/andreu-joven.jpg
Part 6 - Organization chart/2 - The owl in deep.md
Part 7 - Personal consideration/2 - Noble houses.md

BIN
Images/20200323_185301.jpg Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 139 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 61 KiB

View File

@ -16,7 +16,7 @@ Last mile normally is soak into official infrastructure. It's not a secret all t
Who are target individuals? For example who are classified as terrorist, like **ETA** [[3]](https://eu.wikipedia.org/wiki/Euskadi_Ta_Askatasuna) in Spain, by governments was controlled by remote neural networks. But in the last ten years someone come to speculate over those networks forcing human clients to join this hell because of data selling to big tech companies, military facilities and audiovisual industry. Because of big masses manipulation.
There's also another big class of target individuals. People that come from illegal child traffic, assigned by the church, coming from big nobles families or dynasties, they are grown by families strictly connected with the Vatican. So Italy is a normal place where to find them because of the great power of the Vatican. In them life they are always utilized and next played like a game card. **I'm one of them.**
There's also another big class of target individuals. People that come from illegal child traffic, assigned by the church, coming from big nobles families or dynasties, they are grown by families strictly connected with the Vatican. So Italy is a normal place where to find them because of the great power of the Vatican. In them life they are always utilized and next played like a game card. **I am one of them**
I'm in active remote neural control from November 2017 and probably in passive from when I came to Spain. Ten years of passive and two of active with subliminal voice to skull service. I've lost all what I've done, but not my mental clearness.

View File

@ -8,7 +8,7 @@ The gang stalking scene, and as you can appreciate I write scene like the **hack
To gain access to state, military and Vatican structures false hacking crimes are done. Normally they are accords between some noble that administrate ancient analog state infrastructure and hacker crew. Those nobles are normally the pupils of fat families. Stupids that sell state semi secret services to gang stalkers. To mask this fraud those people use normally the name Anonymous, citizens think that they are a terrorist group but in reality this name is used to cover this type of network abuses.
They use the group Anonymous like an anonymizer [[4]](https://en.wikipedia.org/wiki/Anonymizer).
They use the group Anonymous like an **anonymizer** [[4]](https://en.wikipedia.org/wiki/Anonymizer).
The hacked services are what I've described before. The reflection to which I want to bring the reader is that in reality these services that belong to institutions, church and military is absolutely unthinkable that have been forced and that the technical assistance department of the same is not able to close the security problem . At this point where we have explained how it works, what are the profits and how victims are committed to suicide the most obvious reasoning is to give as true the fact that the legitimate owners, which are institutions, or well leave a security error by the way, since they profit from this hidden but not unknown criminal world, or the so-called nobles who deal with their management use Anonymous's mask and pass themselves off as hackers.

View File

@ -62,7 +62,7 @@ The human auditory system is composed by the **auditory system** [[38]](https://
![US5159703](../Images/voicetoskull.png)
The auditory system is totally bypassed by the voice to skull technology. Voice to skull from the early seventy until now was classified as mental sickness. Voice to skull technology was patented on 27 October 1992 by United States Patent under the official name of **silent subliminal presentation system** [[40]](https://patents.google.com/patent/US5159703A/en). The system generate a single **sideband** [[41]](https://en.wikipedia.org/wiki/Sideband), **suppressed carrier** [[42]](https://en.wikipedia.org/wiki/Double-sideband_suppressed-carrier_transmission), **amplitude modulated (AM)** [[43]](https://en.wikipedia.org/wiki/Amplitude_modulation) signal with a channel width of 14.5 KHz, the frequency is 462.25 KHz.
The auditory system is totally bypassed by the voice to skull technology. Voice to skull from the early seventy until now was classified as mental sickness. Voice to skull technology was patented on 27 October 1992 by United States Patent under the official name of **silent subliminal presentation system** [[40]](https://patents.google.com/patent/US5159703A/en). The system generate a single **sideband** [[41]](https://en.wikipedia.org/wiki/Sideband), **suppressed carrier** [[42]](https://en.wikipedia.org/wiki/Double-sideband_suppressed-carrier_transmission), **amplitude modulated** [[43]](https://en.wikipedia.org/wiki/Amplitude_modulation) signal with a channel width of 14.5 KHz, the frequency is 462.25 KHz.
In Catalunya, Spain, people that have worked in this patent have shifted the center frequency and found another that work exactly like these. 431.87

View File

@ -0,0 +1,431 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<link href='Css/main.css' rel='stylesheet' type='text/css'>
<link href='Css/code.css' rel='stylesheet' type='text/css'>
<meta content='text/html; charset=UTF-8' http-equiv='Content-Type' />
<meta name="description" content="Neural control network in Europe derived from nobility strictly connected to child trafficking. Forced labor. Slavery. Gangstalking." />
<link rel="canonical" href="https://telecomlobby.com" />
<head>
<title>The worldwide neural control network, a network full of violence. Gangstalking.</title>
</head>
<body>
<h3 style='margin-left: 5px; margin-top: 20px;'>
<a href='/' id='myname'>Riccardo Giuntoli</a>
</h3>
<div id='article'>
<h1 id="The remote neural monitor wave Machine">The remote neural monitor wave Machine</h1>
<img alt="Bjork analogue televion" src="../Images/bjork-tv.png" />
<p>
In the last chapter we speak about the target machine, a virtual system under which many clients, conscious or not, are organized in a pyramid structure. But what is exactly the machine, or **M** [[1]](https://en.wikipedia.org/wiki/M_(James_Bond))
</p>
<p>
? First of all there is practically no public document speaking about, so it's like a secret or something similar, many people know about it, someone can technically explain it, but no one write about. Why? I really don't know the real reason and i strongly believe in the **open source model** [[2]](https://en.wikipedia.org/wiki/Open-source_model)
and i will try here to explain what I've understand about with some background knowledge about computer science, telecommunication, neuroscience and ham radio.
</p>
<p>
In 1988 the Iceland artist **Björk Guðmundsdóttir** [[3]](https://en.wikipedia.org/wiki/Bj%C3%B6rk)
speak about the **analog television** [[4]](https://en.wikipedia.org/wiki/Analog_television)
with a fascinated voice Here is part of her logic-defying monologue:
</p>
<p>
*This beautiful television has put me, like I said before, in all sorts of situations.*
</p>
<p>
*I remember being very scared because an Icelandic poet told me that not like in cinemas, where the thing that throws the picture from it just sends light on the screen, but this is different. This is millions and millions of little screens that send light, some sort of electric light, I'm not really sure.*
</p>
<p>
*But because there are so many of them, and in fact you are watching very many things when you are watching TV. Your head is very busy all the time to calculate and put it all together into one picture.*
</p>
<p>
*And then because you're so busy doing that, you don't watch very carefully what the program you are watching is really about. So you become hypnotized. So all that's on TV, it just goes directly into your brain and you stop judging it's right or not.*
</p>
<p>
*You just swallow and swallow. This is what an Icelandic poet told me.*
</p>
<p>
*And I became so scared to television that I always got headaches when I watched it. Then, later on, when I got my Danish book on television, I stopped being afraid because I read the truth, the scientifical truth and it was much better.*
</p>
<p>
*You shouldn't let poets lie to you.*
</p>
<p>
Image to have en front of yours eye a **cathode ray tube** [[5]](https://en.wikipedia.org/wiki/Cathode-ray_tube)
that projects all the reality in our line of sight more some object like in an augmented reality system or completely rewrite all the world before us with a totally computer graphic ambient, something like interactive architectural visualization made by **unreal engine** [[6]](https://en.wikipedia.org/wiki/Unreal_Engine)
**four** [[7]](https://www.unrealengine.com/en-US/);
this is what they call as **immersion in virtual reality** [[8]](https://en.wikipedia.org/wiki/Immersion_(virtual_reality))
</p>
<p>
but without any hardware device.
</p>
<p>
Image to have surrounding your ears a special headphone that reproduce all the audio around you but add a voice chat, could duplicate on the fly the exact voice of a human or any type of sound or audio, could rewrite on the fly the voice of a person speaking with you and so on. Something that could emulate what is nowadays call **3D audio effect** [[9]](https://en.wikipedia.org/wiki/3D_audio_effect).
</p>
<p>
Image also but not only to have all your **nervous system** [[10]](https://en.wikipedia.org/wiki/Nervous_system)
and **muscles** [[11]](https://en.wikipedia.org/wiki/Muscle)
connected by **acupuncture** [[12]](https://en.wikipedia.org/wiki/Acupuncture)
and **electrodes** [[13]](https://en.wikipedia.org/wiki/Electrode)
to a perfect human body reproduction external and internal. They can torture you without touching you but only reproducing the **pain** [[14]](https://en.wikipedia.org/wiki/Pain)
remotely stimulating your **nerves** [[15]](https://en.wikipedia.org/wiki/Nerve)
and your **brain** [[16]](https://en.wikipedia.org/wiki/Brain).
</p>
<p>
Our brain is also able to execute two complete tasks, yes two life, at the same moment dividing the twos in the left and right side of the brain. This is called **human multitasking** [[19]](https://en.wikipedia.org/wiki/Human_multitasking).
With the Machine connected clients, and not victims, thanks to the radio technology can work in parallel in two thinks. Normally physically in the A-side, legal work, and with the brain in an augmented reality like environment in the B-side, black market. What is the real result? Because of the people connected on this system are divided in classes like **Indian castes**, low cast persons are like slaves, work double time without great compensation normally in the A-side in restorations of what ever and in the B-side in illegal IT, or doing black market and payed in very variables value crypt concurrencies. Normally nor they don't understand the bitcoin market and loose a lot of money. This is like slavery and the soul death of a lot of people. A lot of friends of mine have changed totally in the last ten years.
</p>
<p>
This seems to be a science fiction film but it's true and it's up and running. It's what i can describe as the more powerful tool product by computer science applied to human being but if used with the only goal the archive more money than possible it's the nightmare of the democracy in our old but great **European Union** [[20]](https://en.wikipedia.org/wiki/European_Union);
*world have to know*.
</p>
<h1 id="The visual system MitM remote device">The visual system MitM remote device</h1>
<img alt="human visual system pathway" src="../Images/Comprehensive_List_of_Relevant_Pathways_for_the_Visual_System.png" />
<p>
The first part of the human visual system is composed by:
</p>
<ul>
<li>
**Cornea** [[21]](https://en.wikipedia.org/wiki/Cornea)
and **Lens** [[22]](https://en.wikipedia.org/wiki/Lens_(anatomy))
<p>
: reflect light into a small image and shine it on the **retina** [[23]](https://en.wikipedia.org/wiki/Retina).
</p>
</li>
<li>
**Retina**: translate the image received by cornea and lens into electrical neural impulse to the brain to create **visual perception** [[24]](https://en.wikipedia.org/wiki/Visual_perception).
</li>
<li>
**Optic nerve** [[25]](https://en.wikipedia.org/wiki/Optic_nerve):
a paired **cranial nerve** [[26]](https://en.wikipedia.org/wiki/Cranial_nerves)
that transmit visual information from the retina to the brain.
</li>
</ul>
<p>
How is possible to do a MitM on the human visual system? I think that the developers have done a big work because the complexity of this system but i can complain that they've done this two principle jobs:
</p>
<ul>
<li>
Reading in the optic nerve with radio waves obtaining something similar to the **fiber tapping** [[27]](https://en.wikipedia.org/wiki/Fiber_tapping)
passive attack. *A very hard work*, it does mean that they have great developers working for this criminal project.
</li>
<li>
**Reading mind** [[28]](https://www.nationalgeographic.com/science/phenomena/2011/10/13/reading-minds-with-fmri/)
by remote **fMRI** [[29]](https://www.nationalgeographic.com/science/phenomena/2011/10/13/reading-minds-with-fmri/)
or others **neuroimaging** [[30]](https://en.wikipedia.org/wiki/Neuroimaging)
sciences. The use of radio waves distinguish real programming state of art of the heads of this project. Probably one of the best programmers is payed by this terrorist system. Military related?
</li>
<li>
Writing using **dream** [[31]](https://en.wikipedia.org/wiki/Dream)
injections. Image to dream but when you are awake. How it possible? Using **theta waves**, but not only, generated by software defined radio and the correct modulation. Another time a great work but not so difficult to complain.
</li>
</ul>
<img alt="Cyber and Information Domain Service" src="../Images/InternesVerbandsabzeichenKdoCIR.png" />
<p>
This kind of ultra hard work it' seems to be obviously related to military forces research department. I live in Europe so the team is Europe related. I was studying computer science at the university of Genoa, Italy. Here I've known the only genius that I've known in my life, i will not write is name here because of possible complaints. What i know that he's working hard on this criminal network and he's working for German military forces (the **Bundeswehr** [[32]](https://en.wikipedia.org/wiki/Bundeswehr))
</p>
<p>
. The Deutschland military cyber forces is named **Cyber and Information Domain Service** [[33]](https://en.wikipedia.org/wiki/Cyber_and_Information_Domain_Service_(Germany))
</p>
<p>
.
</p>
<p>
Another obvious connection, because of one of the most important speaker in the voice to skull chat that i know from my primary school always in Genoa, is the **Italian Navy** [[34]](https://en.wikipedia.org/wiki/Italian_Navy),
i think that speaking about the **CEMM** [[35]](https://it.wikipedia.org/wiki/Corpo_degli_equipaggi_militari_marittimi)
the section is obviously the **SSC/TLC/GE** [[36]](http://www.marina.difesa.it/il-tuo-futuro-e-il-mare/carriere/per-grado/sottufficiali/Documents/categ_sottufficiali.pdf).
</p>
<h1 id="The auditory system MitM remote device">The auditory system MitM remote device</h1>
<p>
The human auditory system is composed by the **auditory system** [[38]](https://en.wikipedia.org/wiki/Auditory_system)
and the **primary auditory cortex** [[39]](https://en.wikipedia.org/wiki/Auditory_cortex).
</p>
<img alt="US5159703" src="../Images/voicetoskull.png" />
<p>
The auditory system is totally bypassed by the voice to skull technology. Voice to skull from the early seventy until now was classified as mental sickness. Voice to skull technology was patented on 27 October 1992 by United States Patent under the official name of **silent subliminal presentation system** [[40]](https://patents.google.com/patent/US5159703A/en).
The system generate a single **sideband** [[41]](https://en.wikipedia.org/wiki/Sideband),
**suppressed carrier** [[42]](https://en.wikipedia.org/wiki/Double-sideband_suppressed-carrier_transmission),
**amplitude modulated (AM)*
* [[43]](https://en.wikipedia.org/wiki/Amplitude_modulation)
signal with a channel width of 14.5 KHz, the frequency is 462.25 KHz.
</p>
<p>
In Catalunya, Spain, people that have worked in this patent have shifted the center frequency and found another that work exactly like these. 431.87
</p>
<img alt="Voice to skull in Catalunya" src="../Images/v2k.png" />
<p>
This is the *voice to skull service active in Catalunya*, Spain. As you can see the center frequency move in function of time. Nowadays it's certainly coded with a script in a SDR environment, but it's a technology from like thirty years ago. It is emitted from terrestrial radio equipment. This frequency is classified by **ITU** as **medium frequency** and normally use a **mast radiator** like antenna, with a single radio it can cover hundred of kilometers using **ground waves** and **ionosphere** reflection.
</p>
<p>
With this frequency all the B-side, probably all over the world, is administrated. What is the **B-side** [[44]](https://en.wikipedia.org/wiki/B-Sides)?
**The dark side of the moon** [[45]](https://en.wikipedia.org/wiki/The_Dark_Side_of_the_Moon)?
The two faces of the same medal? It's simple, it is all what is concerned to what ever is connected to the underground world, black market, illegal pornography, deep internet, crypt concurrency, unknown location club, human test, electronic weapons development, society illegal control, audiovisual and so on. All the people working on the shadow economy infrastructures and markets know it but no one speak about in a public network like Internet.
</p>
<img alt="B-side Barcelona" src="../Images/b-side.png" />
<p>
So this network is known by also the governments but *since i was tortured* by probably electronic weapons development and since i'm under continuous control by third parts i decide to speak about it, doing it in an open source way.
</p>
<p>
But what is the MitM remote equipment that could rewrite on fly audio from every sources on our **auditory field** [[46]](http://www.cochlea.org/en/hear/human-auditory-range)
? This is very complex. And is for sure done with a receiver in the same frequency of the **frequency range of human hearing** [[47]](https://hypertextbook.com/facts/2003/ChrisDAmbrose.shtml)
and a transmitter that use the same patent, the **US5159703A**.
</p>
<p>
This supposed system could have this abstracted scheme:
</p>
<p>
**Receiver** [20Hz to 20Khz] [[48]](https://en.wikipedia.org/wiki/Radio_receiver)
--> **Vocoder** [[49]](https://en.wikipedia.org/wiki/Vocoder)
(**speech** [[50]](https://en.wikipedia.org/wiki/Speech)
to bit)
--> **Operating system** [[51]](https://en.wikipedia.org/wiki/Operating_system)
--> Vocoder (bit to speech)
--> **Transmitter** [462.25 KHz] [[52]](https://en.wikipedia.org/wiki/Transmitter)
</p>
<p>
What can be archived with this system?
</p>
<ul>
<li>
Automatic voice recognition.
</li>
<li>
Automatic translation in what ever language; input and output.
</li>
<li>
On the fly voice or sound rewrite.
</li>
<li>
Sound effects and like augmented reality system.
</li>
</ul>
<h1 id="The nervous system and muscle control">The nervous system and muscle control</h1>
<p>
Do you know the project **OpenBCI** [[53]](https://en.wikipedia.org/wiki/OpenBCI)?
An **open hardware** [[54]](https://en.wikipedia.org/wiki/Open-source_hardware)
project to amplify, read and processing **EEG** [[55]](https://en.wikipedia.org/wiki/Electroencephalography),
**EMG** [[56]](https://en.wikipedia.org/wiki/Electromyography)
and **EKG** [[57]](https://en.wikipedia.org/wiki/Electrocardiography).
</p>
<img alt="OpenBCI" src="../Images/IMG_7586.jpg" />
<p>
Do you know that Facebook **has adquired** [[58]](https://www.theverge.com/2019/9/23/20881032/facebook-ctrl-labs-acquisition-neural-interface-armband-ar-vr-deal)
**CTRL-Labs** [[59]](https://www.ctrl-labs.com/)
that produce an **neural control interface NCI** [[60]](https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface),
a wristband to control machine with muscles on a arm?
</p>
<img alt="CTRL-labs Facebook wristband" src="../Images/CTRL-labs.jpeg" />
<p>
Imagine those devices acting in remote without any physical brain implant or device on the victim or the client of the synthetic telepathy network, this is exactly what is the "Machine". This is an extremely powerful device that used in a bad way could start what it can me named as a pseudo dictatorship. A digital mafia. Owning rapidly black market and clear economy and politics. This is what it is passing just now, nowadays, at this moment in our country, Europe. This is not a joke. This is what we're leaving now and no one speak about it. **Brexit** [[61]](https://en.wikipedia.org/wiki/Brexit)?
This is probably what it start it. It's possible that is acronym of "*brain exit*"?
</p>
<p>
it the person **on this article** [[62]](https://www.guineapigzero.com/i-was-a-brain-slave.html)
a schizophrenic? Absolutely not, but he doesn't know why he is a slave. Why does he speaks about UFO and stupidity like this? Because when human kind cannot explain a phenomenon use divinity, like our ancestor do with polytheism and monotheism. The real problem is that our politics, administrations and police doesn't know exactly what it is passing or they are totally corrupted by the Machine. How it is possible? We will see in the next chapter.
</p>
<h1 id="The visible light radio wave monitor television">The visible light radio wave monitor television</h1>
<img alt="Visible light frequency" src="../Images/visible_light.jpg" />
<p>
This is the best feature of this network. People that have payed to enter or girls that have passed two years of slavery are in. When you're in you visualize, and only you, a virtual monitor above your head. Something similar to the effect of the physic **Google glass** [[63]](https://en.wikipedia.org/wiki/Google_Glass).
Augmented reality without a device, it's real and it's now. It's changing our democracy. Just now, under our eyes.
</p>
<p>
What you visualize is a big tablet Android equipped above your head. And also a augmented reality vision. How do you control it? With two virtual arms that you control with your brain. All of this it's visible only by the end user, others users in the network could not visualize it.
</p>
<h1 id="The reproductive system over excitement and control">The reproductive system over excitement and control</h1>
<img alt="Women masturbation brain response" src="../Images/nihms303557f2.jpg" />
<p>
**Human sexual activity** [[63]](https://en.wikipedia.org/wiki/Human_sexual_activity)
can be overloaded by the use of the radio and digital Machine from the synthetic telepathy network. This can create induced sex slaves, prostitutes and child violations. How it is possible?
</p>
<p>
In the **study before** [[64]](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3186818/)
we can appreciate in the fMRI images in composite the brain zone neuron activated by different parts self masturbation in a woman.
</p>
<p>
So like we've seen before with this technology and **electromagnetic waves** [[65]](https://en.wikipedia.org/wiki/Electromagnetic_radiation)
it's possible to remotely stimulate neurons like it's done in a physic MRI machine.
</p>
<p>
Doing a rapid technical analysis we can consider that radios are working in a magnetic resonance environment use **shortwave** [[66]](https://en.wikipedia.org/wiki/Shortwave_radio)
frequencies. Transmitters and receivers are called **radio frequency coils** [[67]](https://en.wikipedia.org/wiki/Radiofrequency_coil)
and use **loop antennas** [[68]](https://en.wikipedia.org/wiki/Loop_antenna)
or **ferrite loop antennas** [[69]](https://en.wikipedia.org/wiki/Comoros).
</p>
<h1 id="Remote EEG plotting ">Remote EEG plotting </h1>
<img alt="Spike Wavesz" src="../Images/Spike-waves.png" />
<p>
Whit this technology it's possible to obtain remote plotting of brain waves to obtain a complete clinical picture of the victim; but not only using this informations is possible to keep under control various state of mind induced by external agents, like provoked situations, or to study effect of drug abuse in a victim. Results can be different between targets.
</p>
<p>
Stalkers and human hackers with a large career, criminals, can use those remote informations to trace a possible degrade in the life of the victim using **psychological traumas** [[70]](https://en.wikipedia.org/wiki/Psychological_trauma)
and inducted drug abuse to obtain the suicide of the target. Those criminals always play pushing the psychological limit using provoked anxiety stress and schizophrenias on the victims to obtain extreme data to sell for example to military facilities or to obtain the suicide gaining money using a system of bets that i'll explain later.
</p>
<p>
Those criminals are the most dangerous ones in the earth. Using this network they can apply this method to a large part of the population changing life of entire families, groups and so on. Can obtain change in political elections. *This is terrorism*.
</p>
<p>
Another thing about remote EEG it's not only the possibility to read. But this i really don't know.
</p>
<p>
I think that is possible using this technology to induce to a victim an attack of **epilepsy** [[71]](https://en.wikipedia.org/wiki/Epilepsy).
</p>
<img alt="Epilepsy" src="../Images/shutterstock_590081462-1000x480.jpg" />
<p>
**Epileptic seizures** [[72]](https://en.wikipedia.org/wiki/Epileptic_seizure)
are the result of excessive and abnormal neuronal activity in the cortex of the brain. This abnormal neuronal activity can be induced at 3Hz at **extremely low frequency** [[73]](https://en.wikipedia.org/wiki/Extremely_low_frequency).
</p>
<img alt="Image from brain waves" src="../Images/Human-Thoughts-Reconstructed-From-Brain-Waves-777x559.jpg" />
<p>
Those image are obtained by the interpretation of brain wave. It's possible to obtain what wee see reading our remote EEG. In the remote neural monitoring data center we are considered like "*human cameras*". These technology is from **Moscow institute of physics and technology** [[74]](https://en.wikipedia.org/wiki/Moscow_Institute_of_Physics_and_Technology)
and was published on October 2019 in **bioRxiv** [[75]](https://www.biorxiv.org/)
in this document:
</p>
<ul>
<li>
**Natural image reconstruction from brain waves** [[76]](https://www.biorxiv.org/content/10.1101/787101v2.full.pdf)
</li>
</ul>
<h1 id="Involuntary vocalization">Involuntary vocalization</h1>
<img alt="Involuntary vocalization" src="../Images/OMP_Figure_1_jpg.jpg" />
<h1 id="Death method">Death method</h1>
<img alt="DEW" src="../Images/laser-weapons-illustration-1200.jpg" />
<p>
Yes, in this network it's possible to induce to death rapidly and slowly to a victim. Rapidly i can describe those methods:
</p>
<ul>
<li>
Prolonged attack of epilepsy.
</li>
<li>
**Intracranial aneurysm** [[74]](https://en.wikipedia.org/wiki/Intracranial_aneurysm)
inducted by amphetamine or cocaine more pressure in cranial **blood vessels** [[75]](https://en.wikipedia.org/wiki/Blood_vessel),
a **vasospasm** [[76]](https://en.wikipedia.org/wiki/Vasospasm).
</li>
<li>
**Myocardial infarction** [[77]](https://en.wikipedia.org/wiki/Myocardial_infarction).
<p>
</li>
</p>
</ul>
<p>
But there is also worst method to kill persons using this network. One is very slowly but so effective. Using radio waves pointed exactly always in the same interior organ, like a **lung** [[78]](https://en.wikipedia.org/wiki/Lung),
you can create a **pleurisy** [[79]](https://en.wikipedia.org/wiki/Pleurisy).
Because pleuritis is an **inflammation** [[80]](https://en.wikipedia.org/wiki/Inflammation)
if it is prolonged for years it can degenerate in a **lung cancer** [[81]](https://en.wikipedia.org/wiki/Lung_cancer).
If the victim is a smoker it can be used like an effective manner to kill.
</p>
<h1 id="Electronic harassment">Electronic harassment</h1>
<img alt="Electronic harassment" src="../Images/cyber-harassment.jpg" />
<p>
**Electromagnetic torture** [[82]](https://en.wikipedia.org/wiki/Electronic_harassment)
are normally classified for the governments as **hallucinations** [[83]](https://en.wikipedia.org/wiki/Hallucination)
thats because people cannot explain scientifically the real cause of the voice to skull and other sensations feelings that provoke them.
</p>
<p>
This book want to be exactly the necessary proof, the **evidences** [[84]](https://en.wikipedia.org/wiki/Evidence_(law))
</p>
<p>
, to denounce these criminals who are ruining the lives of millions of people.
</p>
<p>
**Electromagnetic pollution** [[85]](https://en.wikipedia.org/wiki/Electromagnetic_radiation_and_health)
exist. And mistakenly these issues are classified as such. Electro smog is also dangerous for our health.
</p>
<img alt="EMF" src="../Images/EMF-3.png" />
<p>
This detections was done in my house on march 2019. Like you can appreciate the normal values are shown on the left , this is the correct on people that are not target individuals. The right side is a person, like me, subjected to electromagnetic assault. Those are called **EMF measurement** [[86]](https://en.wikipedia.org/wiki/EMF_measurement)
can be obtained with physical meters or with applications in mobile that've got a **MEMS magnetic field sensor** [[87]](https://en.wikipedia.org/wiki/MEMS_magnetic_field_sensor).
Almost all medium size smart mobile got one nowadays. Here you are some application to size it:
</p>
<ul>
<li>
https://play.google.com/store/apps/details?id=smf.detector
</li>
<li>
https://play.google.com/store/apps/details?id=com.mreprogramming.ultimateemfdetector
</li>
</ul>
<p>
Those hardware size EMF using the **Tesla unit** [[88]](https://en.wikipedia.org/wiki/Tesla_(unit))
</p>
<p>
.
</p>
<h1 id="Unreal engine full immersion">Unreal engine full immersion. </h1>
<img alt="Virtual Reality full immersion" src="../Images/virtual-reality-augmented-reality-3.jpg" />
<p>
Look above. This man is experiencing what we can define as virtual and augmented reality full immersion. Ok, but this mas has go to this site and want to test it. Correct. Imagine if someone put you in this world without authorization and whenever he wants. You could die if your driving for example. This feature is the most terrible one of this network. Thousand of woman are suffering violence with this terrible system. But also minors. In this network there is a lot of pederast that buy services from the owners.
</p>
<img alt="Unreal Engine 4" src="../Images/bSwKV9Xom4cuyCGW.jpg" />
<p>
**Unreal Engine 4** [[90]](https://en.wikipedia.org/wiki/Unreal_Engine)
permit the construction of virtual world that absolutely seems to be real like you can see in the image above. It runs without any problems in a **Playstation 4** [[91]](https://en.wikipedia.org/wiki/PlayStation_4)
hardware, something that cost for below of 300 **Dollar** [[92]](https://en.wikipedia.org/wiki/Dollar).
</p>
<p>
Imagine this graphic engine streamed on your visual cortex and your nervous system binded to the virtual world. Imagine to be chained to a chair and a lot of people, humans or not, is doing sexual violence to you. Imagine that they kill you and the sensations, the pain, is the almost the same. Image it, but it's true and it's now and it's changing the life of many womans and mans in Europe.
</p>
<p>
Imagine a person that couldn't explain this using science. Do you remember what happen when humankind cannot explain processes with science? *It's the start of a new sept or religion*. Do you try to image a person that want to denounce it and try to explain to police that she seen her in a BDSM torture chamber every night? What happened to the girl? The police send her immediately to the **mental asylum** [[93]](https://en.wikipedia.org/wiki/Psychiatric_hospital).
</p>
<p>
Can you image that your child start "dreaming" and in reality a porn is streamed in their visual cortex a pedophile start abuse them? This is what is pass in this hell network.
</p>
<p>
Girls start to think about **UFO** [[94]](https://en.wikipedia.org/wiki/Unidentified_flying_object).
Could you image if this continuous sexual violence that don't keep signs of violence in the body of the woman is accompanied by stalker brain washing job and the use of psychotic drug like amphetamine?
</p>
<p>
What does it pass to the woman? Nothing good.
</p>
<p>
I want to share in public this document because Europe has changed. This is real. And my ex girlfriend is a victim. Please help, *spread the world*!
</p>
<p>
But what is the real purposes of stream violence sex ambients in the visual cortex of a victim? Always the same. Change her life. She cannot work because if she is serving in a restaurant for example, and they start to do data injection with something similar and she doesn't visualize the real world, because they can do a complete rewrite, she will fall to the ground. And if they masturbate her with the reproductive system over excitement and control she will got an orgasm while she is working. She will lost the job and probably she will be raped also by her employer or by some client. And if those stalkers that has got access to the network will send at her workplace some payed actor, she will be raped yes or yes. This is what is passing. When she lost the job she will search for another, if she cannot explain with science what is passing to her she will lost the other. And so? She will fall in prostitution. This is what they've done to my ex girlfriend.
</p>
<p>
What can pass also to a woman if they put her brain into full immersion?
</p>
<p>
If she is with those stalkers, that are also **rapist** [[95]](https://en.wikipedia.org/wiki/Rape),
they can tie her. And then they can violate her. As many as they want. This is why i'm searching to explain to the outside world what is this network.
</p>
<h1 id="Body full copy and body instances ">Body full copy and body instances </h1>
<img alt="3D scan" src="../Images/vsdvsdvsdvsd.jpeg" />
<p>
With **3D scanning** [[96]](https://en.wikipedia.org/wiki/3D_scanning)
methods it's possible to achieve the full body scan of a human in ten minutes. The data obtained by the scan are usable in augmented reality worlds.
</p>
<p>
With the radio waves Machine is possible to use those bodies connected to a real human with system nervous interaction. With this I can say that body of a victim could be utilized by another person. Also a body of a child. To aliment pederast. And this is what is passing with the administration of the "Francese".
</p>
<p>
The body of my ex girlfriend was scanned and used in all the network of remote neural monitoring.
</p>
<p>
Bodies are like **instances** [[97]](https://en.wikipedia.org/wiki/Instance_(computer_science))
</p>
<p>
of a class of an **object oriented programming** [[98]](https://en.wikipedia.org/wiki/Object-oriented_programming)
language. By the way the shape, the figure, is the same of the victim. What does it mean? That is sex violence.
</p>
<p>
In the data center of the synthetic telepathy network many times the body isn't government by the interaction with a real human. Many times, in routine movements like suck a dick for example, the body is moved by a program. And in many conversation in the subliminal message system the body is connected to a chat bot governed by artificial intelligence.
</p>
<p>
Those chat bot has got also the same voice and speech of the person that is cloned. Using this method targets individuals think to have sex with her lost woman, normally also victim of sexual harassment, or to speak with friends of them. Usually doing menaces. But they are not. Those are chat bot with advanced artificial intelligence. And why physically also those person don't contact with target individuals? Because of corruption, that is not because civilian that receive payments in crypt currencies are doing a crime. But the real crime is *participation in the contest of murdered*. Those chat bot can also mix different tone of people obtain a specie of matryosha. This is another hoax of the "Illuminati" pseudo dictatorship. In the Machine clients that are able to operate got an analog filter like the ones that use techno music producers to obtain effects and sound shifting in amplitude and modulation. Another behavior of those bots is that they wake up with special words that you say, automatically and in round robin rotation choosing different speech vocoders.
</p>
<blockquote>
*By the way, her body is raped millions of times. By the way the body is the most important secret of a woman. And the woman that I love has lost her body in this hell. And we need justice.*
</blockquote>
<p class='timestamp'>
Last updated on November 29, 2019
</p>
</body>
</html>

View File

@ -0,0 +1,165 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<link href='Css/main.css' rel='stylesheet' type='text/css'>
<link href='Css/code.css' rel='stylesheet' type='text/css'>
<meta content='text/html; charset=UTF-8' http-equiv='Content-Type' />
<meta name="description" content="Neural control network in Europe derived from nobility strictly connected to child trafficking. Forced labor. Slavery. Gangstalking." />
<link rel="canonical" href="https://telecomlobby.com" />
<head>
<title>The worldwide neural control network, a network full of violence. Gangstalking.</title>
</head>
<body>
<h3 style='margin-left: 5px; margin-top: 20px;'>
<a href='/' id='myname'>Riccardo Giuntoli</a>
</h3>
<div id='article'>
<h1 id="Blockchain technology">Blockchain technology</h1>
<p>
First of all i wanna do with you, reader, a consideration. We've got analyzed the synthetic telepathy network and the radio waves Machine. Those two IT systems are to control, break our privacy laws, abuse persons, destroy souls, change our life.
</p>
<p>
Now i want to introduce to you technologies that are exactly on the opposite site. Those technologies are actively developed to do the exact in front work. Those peer to peer derived protocols are born to guarantee privacy and security to the end users.
</p>
<p>
But they are used by the synthetic telepathy network owners to do crimes. Horrible crimes like foment pedophilia or illegal pornography. But those are not the real crimes, though they are the most horrible of mankind. The ultimate end is despise the work of those programmers that work for freedom. <em>Freedom is the most important background of our democracy</em>.
</p>
<p>
Who are the new dictators, who is building this pseudo dictatorship, who is destroying our dreams of the late sixties? Always the same persons. The elite. Now the elite have semi owned the Internet, the most important invention in the last century and with the tech giants they are building the eye that all see. Something similar to the Egyptian gods, mysticism upon ignorance; in Internet and radio frequency but now also in the <em>decimal society</em> they call "Illuminati", an Internet <span class="important">fraud</span>. The new mafia is the <span class="important">digital mafia</span> and is international.
</p>
<p>
But why they are doing crimes like those? It's simple. To get profound and go ahead with technology. All of this is for always the same think. Like in the cold war. Is for the arms race. The nowadays cold war have a name but no one speak about, <span class="important">cyber warfare</span>.
</p>
<p>
*Those are my two cents.*
</p>
<h1 id="The Monero crypt concurrency">The Monero crypt concurrency</h1>
<img alt="The Monero circuit" src="../Images/monero.png" />
<p>
<a href="https://www.getmonero.org/">Monero</a>
is decentralized crypt currency, meaning it is secure digital cash operated by a network of users. Transactions are confirmed by distributed consensus and then immutably recorded on the <a href="https://en.wikipedia.org/wiki/Blockchain">blockchain</a>.
Third-parties do not need to be trusted to keep your <a href="https://en.wikipedia.org/wiki/Monero_(cryptocurrency)">Monero</a>
</p>
<p>
safe. Monero is <em>totally</em> untraceable.
</p>
<p>
Let's do some considerations before start with a deep dive into this network. First of all <span class="important">M</span> is its logotype, simple is the concurrency of the Machine, what we start to explain in the last chapter. But does it can be converted into classical money? Yes for sure here it is the exchange graphic:
</p>
<img alt="monero exchange value" src="../Images/monero-euro-value.png" />
<p>
<pre><code>
</code></pre>
</p>
<p>
But it's possible to simply go to a cash dispenser and get euro? Yes it is.
</p>
<img alt="Bitchain ATM cash dispenser" src="../Images/btcpoint_bitcoin_atm_c828d19c75.jpg" />
<p>
Remember that to get cash from this bitcoin <a href="https://en.wikipedia.org/wiki/Automated_teller_machine">ATM</a>
normally you have to change <a href="https://www.coinbase.com/price/monero?locale=en">XMR</a>
to <a href="https://www.coinbase.com/price/litecoin?locale=en">LTC</a>,
then go to a local ATM as you can find in <a href="https://coinatmradar.com/">coin ATM radar</a>.
In Barcelona for example there's the network called <a href="https://bitbase.es/">BitBase</a>
where you can sell also directly Monero.
</p>
<p>
Another method is to buy a debit bitcoin card that you can recharge on line from your wallet and then simply go to every type of classic currency ATM and got cash. Like <a href="https://cryptopay.me/bitcoin-debit-card/#uk">CryptoPay</a>.
Criminals use false identities and SIM card without identification to buy online those goods. And this is a fraud.
</p>
<p>
Another method to move XMR coins is buy directly in shops that accepts this crypt concurrency. The A-side services or goods that can be payed directly are various some of them are detailed on <a href="https://cryptwerk.com/pay-with/xmr/">cryptwerk</a>.
What does it mean in reality? That a person that has got a lot of this type of currency could open an A-side physic and Internet shop and sell goods in classical money. Simple but functional. Who's do it in a better way use various company chains to elude fiscal controls and remove the use of XMR from their fiscal invoices. Another time, very simple, it's a game.
</p>
<p>
What those criminals can do in the same Monero circuit? I don't know but using a little bit of logic and remembering that we're speaking about B-side it's very simple:
</p>
<ul>
<li>
Drug market buy and sell.
</li>
<li>
Black market buy and sell.
</li>
<li>
Human traffic.
</li>
<li>
Forced prostitution.
</li>
<li>
All kind of illegal good buy and sell.
</li>
<li>
Illegal apartment rent.
</li>
<li>
Credit card fraud.
</li>
<li>
Cracker services rent.
</li>
<li>
Corruption.
</li>
</ul>
<p>
This is only a little window over this terrorist and criminal network. We'll go deeper in the next chapters.
</p>
<h1 id="The crypt concurrency market ">The crypt concurrency market </h1>
<img alt="Bitcoin" src="../Images/AT8rEjx8lVL6PQ1GCU.jpeg" />
<p>
The Bitcoin market it's similar to the normal concurrency market, with a quotation changing it's value every day depending on different factors. There's more solid concurrency that don't fluctuate too much but others, new or opened ad hoc for an operation, change them value constantly. People that work with this kind of values know it and play a lot with newbies or ignorance paying in a type and dais after this type loose likely more than 10% of value.
</p>
<p>
A good player got always in mind this factor and use good web pages to keep the global market under control.
</p>
<p>
https://coinmarketcap.com/
</p>
<p>
This is a very good portal to know about it. <em>But why I speak about this feature</em>?
</p>
<p>
Many Bitcoin or <a href="https://en.wikipedia.org/wiki/Ethereum">Ethereum</a>
based crypt concurrency are connected to the "Illuminati" pseudo dictatorship. Many of them are connected to the black, drug and prostitution market. Many also with corruption. I've done a public web page where you can consult about those coin that I've learned in radio frequency (voice to skull)
about.
</p>
<p>
There are safe crypt currency bank and others that respect totally the privacy of the owners. Some want that you send your passport and a photography of you keeping it opened in front of a webcam, nothing very secure, and others are totally anonymous:
</p>
<ul>
<li>
https://www.coinbase.com/ is the one more secure.
</li>
</ul>
<ul>
<li>
https://freewallet.org/ the other more privacy related.
</li>
</ul>
<p>
But there is also games bitcoin based that are based onto Caribbean tax heavens like <a href="https://en.wikipedia.org/wiki/Cura%C3%A7ao">Curaçao</a>.
Here you can open free and totally anonymous crypt concurrency directions where to clean money in a series of washing machines. To obtain totally anonymity in a bitcoin transaction. One of those games is:
</p>
<p>
https://duckdice.io/?modal=greeting
</p>
<p>
That is probably related to the privacy based search engine <a href="https://en.wikipedia.org/wiki/DuckDuckGo">Duck, duck, goose</a>.
</p>
<h1 id="The SAFE network blockchain ">The SAFE network blockchain </h1>
<img alt="SAFE network blockchain" src="../Images/1200px-Safe_Water_Network_logo.svg.png" />
<p>
A blockchain model applied to networking <a href="https://en.wikipedia.org/wiki/OSI_model">ISO/OSI</a>
stack. It replace the last fourth pile of the Internet model. Packets are replaced with data chunks mixed in various different locations without a fixed one, a central server. It's like the old style <a href="https://en.wikipedia.org/wiki/Peer-to-peer">p2p</a>
but with new encryptions models that guarantee <a href="https://en.wikipedia.org/wiki/Privacy">privacy</a>,
<a href="https://en.wikipedia.org/wiki/Cryptography">cryptography</a>,
confidentiality, integrity, and availability.
</p>
<p class='timestamp'>
Last updated on November 29, 2019
</p>
</body>
</html>

View File

@ -0,0 +1,11 @@
#!perl
# slurp the entire file
local $/ = undef;
open INFILE, $ARGV[0] or die "Could not open file. $!";
$string = <INFILE>;
close INFILE;
while ($string =~ s/\*\*(.*)\*\* \[\[\d+\]\]\((.*)\)/<a href="$2">$1<\/a>/) {}
print "$string";

View File

@ -0,0 +1,6 @@
#!/bin/bash
input="$1"
while IFS= read -r line
do
fold -w 1 `echo "$line"`
done < "$input"

View File

@ -0,0 +1,143 @@
# About me
![taglio](../Images/41442503_10217626665321011_2490918823650131968_n.jpg)
*A broken clock is always right twice a day*
### Short biography.
Born in Genoa on March 31, 1981 at 19:13. My mother made me Catholic but as a teenager I have chosen to be an atheist and a political passion with a clear left matrix. I love people, technology, nature and telecommunications.
From good family culture, they have taken care to teach me curiosity for this reason I consider myself able to sit at any discussion table. Deep hatred of violence in all its forms, both physical and psychological.
Sufficient notions of both science and letters; I have cultivated computer science as both systems and information as a passion.
*I am very lucky to work on my passion, few people have it.*
Of a career path always distinguished for being independent both in Genoa and in Catalonia. Very tortuous course lately interrupted by interests outside my person of which nature was unaware. In strong comeback, determined to rebuild what was lost and fully convinced to meet again with the love of my life. Saray.
### Riccardo runs BSD and do Unix porn.
My first PC was a **Pentium II** [[1]](https://en.wikipedia.org/wiki/Pentium_II) and my father bought it because I always use to open his office laptop connected with an embedded **56k modem** [[2]](https://en.wikipedia.org/wiki/Modem) to the Internet. I was a curious adolescent with radioham background, **CB** [[3]](https://en.wikipedia.org/wiki/Citizens_band_radio) and **SSB** [[4]](https://en.wikipedia.org/wiki/Single-sideband_modulation). Cycling to the top of a mountain with a motorbike battery, a discone like antenna and a **President Jackson** [[5]](https://president-electronics.com/RadioCB/AM-FM-BLU/JACKSON-II-ASC-Classic). Connecting to Russia and China and using an invented ID. 1 **Alfa Tango** [[6]](https://www.alfatango.org/) 13 01. 1AT1301.
A friend of mine, Mauro, which father is an hardware hacker, in his house starts to let me see his oscilloscope and working table with various **Pentium processors** [[7]](https://en.wikipedia.org/wiki/List_of_Intel_Pentium_microprocessors) and various **ISA** [[8]](https://en.wikipedia.org/wiki/Industry_Standard_Architecture) boards. I just started dreaming about information technology science. Mauro was a wannabe hacker. And I dont know nothing about because of my ignorance and he was jealous about his secret. So my father accept to buy me a desktop system from **Intel** [[9]](https://en.wikipedia.org/wiki/Intel), he was very restrictive with his son buy me something was not at the order of the day. I remember the **USRobotics** [[10]](https://en.wikipedia.org/wiki/USRobotics). And his **registered jack** [[11]](https://en.wikipedia.org/wiki/Registered_jack). I remember the sound of this device connecting to the network of networks, a slow Internet full of incredible content for a curious mind. The mine.
*A beautiful mind*.
The operating system was a **Windows 98** [[12]](https://en.wikipedia.org/wiki/Windows_98) full of bugs. Mauro hack my desktop in a couple of weeks with a **MS-DOS** [[13]](https://en.wikipedia.org/wiki/MS-DOS) trick in the classic **AUTOEXEC.BAT** [[14]](https://en.wikipedia.org/wiki/AUTOEXEC.BAT) script. So I start to hack. At that time, more then twenty years ago, I use to play. I start gaming, **IRCNet** [[15]](https://en.wikipedia.org/wiki/IRCnet), **takeover** [[16]](https://en.wikipedia.org/wiki/IRC_takeover), **Stacheldraht** [[17]](https://en.wikipedia.org/wiki/Stacheldraht), **Eggdrop** [[18]](https://en.wikipedia.org/wiki/Eggdrop), **BNC** [[19]](https://en.wikipedia.org/wiki/BNC_(software)), **Shell** [[20]](https://en.wikipedia.org/wiki/Shell_(computing)), **TESO team** [[21]](https://en.wikipedia.org/wiki/TESO_(Austrian_hacker_group)), **Smurf** [[22]](https://en.wikipedia.org/wiki/Smurf_attack) and so on. This is how I start to play with Unix, only illegal hacking in the ninety.
*I was just a curious boy and not a professional senior network engineer.*
**Unset HISTFILE** [[23]](https://www.gnu.org/software/bash/manual/html_node/Bash-History-Facilities.html) was my preferred command. We found a crew in IRCNet. We started a shell provider and started to sell bouncer to the IRC network. We were testers of IPv6 and **3FFE class** [[24]](https://en.wikipedia.org/wiki/6bone). We started learning **apache** [[25]](https://en.wikipedia.org/wiki/Apache_HTTP_Server), **FreeBSD** [[26]](https://en.wikipedia.org/wiki/FreeBSD), **POLLING** [[27]](https://www.freebsd.org/cgi/man.cgi?query=polling&sektion=4&n=1), **kernel hacking** [[28]](https://www.freebsd.org/doc/en/books/arch-handbook/), networking, user administration, IPsec, **BIND** [[29]](https://en.wikipedia.org/wiki/BIND), and so on. Slowly I joined Unix and networking community.
*BSD was my fun, Linux my desktop. BSD was my server, Linux my workstation.*
I was a collector of old fashioned hardware buying it in Ebay, chilling with an old style view version of the site. **SPARCstation 20** [[30]](https://en.wikipedia.org/wiki/SPARCstation_20) was my joy and obviously **NetBSD** [[31]](http://netbsd.org/) that “*of course it runs*”.
Joined the University but havent graduated and started to work as a an independent professional with Unix and web applications. The **Y2K glitch** [[32]](https://en.wikipedia.org/wiki/Year_2000_problem) passed from six years and in the next ten years I went to live to Spain where I started to work and play with IP over wireless. **MikroTik** [[33]](https://en.wikipedia.org/wiki/MikroTik), **Ubiquiti** [[34]](https://en.wikipedia.org/wiki/Ubiquiti_Networks), **OpenWrt** [[35]](https://en.wikipedia.org/wiki/OpenWrt) was my daily work and passion. I started to work as the head of the technical department of a ES wireless equipment manufacturer.
My name is famous nowadays in South America and Spain as a professional wireless and **WiMAX** [[36]](https://en.wikipedia.org/wiki/WiMAX) technician.
*Famous in Cuba with government and in Nicaragua with army. Bringing Internet where others could not.*
**Cisco** [[37]](https://en.wikipedia.org/wiki/Cisco_Systems) is also another passion of mine. **Multilayer switching** [[38]](https://en.wikipedia.org/wiki/Multilayer_switch), **dynamic routing** [[39]](https://en.wikipedia.org/wiki/Dynamic_routing) protocols **interior** [[40]](https://en.wikipedia.org/wiki/Interior_gateway_protocol) and **exterior** [[41]](https://en.wikipedia.org/wiki/Exterior_Gateway_Protocol), **Multi protocol label switching** [[42]](https://en.wikipedia.org/wiki/Multiprotocol_Label_Switching) and so on. Firewalling and **deep packet inspection** [[43]](https://en.wikipedia.org/wiki/Deep_packet_inspection) are also my daily bread.
Later Ive found a wireless internet service provider leading the Catalan market in four years with more that four thousands customers and three hundreds big accounts. Then studied for two years magnetic wireless networks. Ive amplified my knowledge about software defined radio, ELF and hand manufacturer antennas. My two news projects are Telecom Lobby where I want to public full disclosure technology about neural control and redama.es my new ISP.
All **OpenBSD** [[44]](http://openbsd.org/) based.
# External links
1. https://en.wikipedia.org/wiki/Pentium_II
2. https://en.wikipedia.org/wiki/Modem
3. https://en.wikipedia.org/wiki/Citizens_band_radio
4. https://en.wikipedia.org/wiki/Single-sideband_modulation
5. https://president-electronics.com/RadioCB/AM-FM-BLU/JACKSON-II-ASC-Classic
6. https://www.alfatango.org/
7. https://en.wikipedia.org/wiki/List_of_Intel_Pentium_microprocessors
8. https://en.wikipedia.org/wiki/Industry_Standard_Architecture
9. https://en.wikipedia.org/wiki/Intel
10. https://en.wikipedia.org/wiki/USRobotics
11. https://en.wikipedia.org/wiki/Registered_jack
12. https://en.wikipedia.org/wiki/Windows_98
13. https://en.wikipedia.org/wiki/MS-DOS
14. https://en.wikipedia.org/wiki/AUTOEXEC.BAT
15. https://en.wikipedia.org/wiki/IRCnet
16. https://en.wikipedia.org/wiki/IRC_takeover
17. https://en.wikipedia.org/wiki/Stacheldraht
18. https://en.wikipedia.org/wiki/Eggdrop
19. https://en.wikipedia.org/wiki/BNC_(software)
20. https://en.wikipedia.org/wiki/Shell_(computing)
21. https://en.wikipedia.org/wiki/TESO_(Austrian_hacker_group)
22. https://en.wikipedia.org/wiki/Smurf_attack
23. https://www.gnu.org/software/bash/manual/html_node/Bash-History-Facilities.html
24. https://en.wikipedia.org/wiki/6bone
25. https://en.wikipedia.org/wiki/Apache_HTTP_Server
26. https://en.wikipedia.org/wiki/FreeBSD
27. https://www.freebsd.org/cgi/man.cgi?query=polling&sektion=4&n=1
28. https://www.freebsd.org/doc/en/books/arch-handbook/
29. https://en.wikipedia.org/wiki/BIND
30. https://en.wikipedia.org/wiki/SPARCstation_20.
31. http://netbsd.org/
32. https://en.wikipedia.org/wiki/Year_2000_problem
33. https://en.wikipedia.org/wiki/MikroTik
34. https://en.wikipedia.org/wiki/Ubiquiti_Networks
35. https://en.wikipedia.org/wiki/OpenWrt
36. https://en.wikipedia.org/wiki/WiMAX
37. https://en.wikipedia.org/wiki/Cisco_Systems
38. https://en.wikipedia.org/wiki/Multilayer_switch
39. https://en.wikipedia.org/wiki/Dynamic_routing
40. https://en.wikipedia.org/wiki/Interior_gateway_protocol
41. https://en.wikipedia.org/wiki/Exterior_Gateway_Protocol
42. https://en.wikipedia.org/wiki/Multiprotocol_Label_Switching
43. https://en.wikipedia.org/wiki/Deep_packet_inspection
44. http://openbsd.org/

View File

@ -124,6 +124,8 @@ So this is a rapid analysis of the black and with market present in Catalunya a
Speaking about Mafia, my dear Mafia fellows, do you remember how was enjailed mr Al Capone? For **tax evasion** [[16]](https://en.wikipedia.org/wiki/Tax_evasion).
### External links
1. https://en.wikipedia.org/wiki/Monopoly_(game)

View File

@ -89,4 +89,4 @@ You can appreciate what happened from 2010 to 2017. The climb in number is incre
18. https://en.wikipedia.org/wiki/Tachycardia

View File

@ -205,7 +205,7 @@ And this could be the reason why I'm under torture. And why all the people that
![Slavery](../Images/640px-Maler_der_Grabkammer_des_Rechmirê_002.jpg)
Slavery is a crime persecuted by international laws. Slavery

View File

@ -1,6 +0,0 @@
# Masonry and Mafia
![Antimafia](../Images/mmm.jpg)
### External links