mirror of
https://github.com/noplacenoaddress/RNMnetwork.git
synced 2024-12-24 06:39:33 -05:00
Add files via upload
This commit is contained in:
parent
febc30146e
commit
fba28c14a2
112
Chapter four - services.md
Normal file
112
Chapter four - services.md
Normal file
@ -0,0 +1,112 @@
|
||||
# The synthetic telepathy network services
|
||||
|
||||
|
||||
|
||||
### Gangstalking
|
||||
|
||||
## ![](luzdegas.jpg)
|
||||
|
||||
**To stalk**, a verb with root in Protoindo European [[1]](https://en.wikipedia.org/wiki/Indo-European_languages ) languages, ancient Greek [[2]](https://en.wikipedia.org/wiki/Ancient_Greek>) and old Armenian [[3]](https://en.wikipedia.org/wiki/Classical_Armenian). Four possible meanings of this verb:
|
||||
|
||||
1. To approach slowly and quietly in order not to be discovered when getting closer.
|
||||
2. To (try to) follow or contact someone constantly, often resulting in **harassment** [[4]](https://en.wikipedia.org/wiki/Harassment).
|
||||
3. To walk slowly and cautiously; to walk in a stealthy, noiseless manner.
|
||||
4. To walk behind something, such as a screen, for the purpose of approaching game; to proceed under cover.
|
||||
|
||||
From this verb we can extract the noun **stalking** [[5]](https://en.wikipedia.org/wiki/Stalking), three possibles meanings:
|
||||
|
||||
1. Hunting for game by moving silently and stealthily or by waiting in ambush.
|
||||
2. The crime of following or **harassing** another person, causing him or her to fear death or injury.
|
||||
3. The removal of stalks from bunches of grapes prior to wine making.
|
||||
|
||||
We can appreciate in bold two times words with root in the verb **to harass**, from old French:
|
||||
|
||||
1. To fatigue or to tire with repeated and exhausting efforts.
|
||||
2. To annoy endlessly or systematically; to molest.
|
||||
3. To put excessive burdens upon; to subject to anxieties.
|
||||
|
||||
We speak about **gangstalking** [[6]](https://www.urbandictionary.com/define.php?term=gang%20stalking) when we refer to the stalking of an individual by a large number of people who coordinate their stalking activities. Normally used by criminals organizations to claim a drogue debt, to induct to suicide an opposer, to annihilate a political figure, to limit a especially creative brain or to generate thousand millions euro.
|
||||
|
||||
Has you can see in the image on top of the paragraph I've used the Spanish name "**Luz de Gas**" [[7]](https://ca.wikipedia.org/wiki/Fer_llum_de_gas) that is the translation of **gaslighting** [[8]](https://en.wikipedia.org/wiki/Gaslighting) that is a form of psychological manipulation in which a person seeks to sow seeds of doubt in a **targeted individual** [[9]](https://www.urbandictionary.com/define.php?term=targeted%20individual) or in members of a targeted group, making them question their own memory, perception, and sanity. Using persistent denial, misdirection, contradiction, and lying, gaslighting involves attempts to destabilize the victim and to invalidate the victim's belief.
|
||||
|
||||
From the name of "Luz de Gas", a practice that without technology was executed also by the Franco's phalanx in the Catalan Republic, we can arrive to the word of a defunct masonry which name was "**illuminati**" [[10]](https://www.nationalgeographic.com/archaeology-and-history/magazine/2016/07-08/profile-adam-weishaupt-illuminati-secret-society/). In Italy and in all over the world nowadays is utilized by a pseudo digital dictatorship that is doing terrorism in Europe. Does illuminati really exist? For sure simply search the hashtag **#illuminati** [[11]](https://www.instagram.com/explore/tags/illuminati/) [[12]](https://twitter.com/search?q=%23illuminati&src=typd) in Twitter or in Instagram, in this one with infographics this masonry have got more than two millons of results. It's all about the audiovisual industry.
|
||||
|
||||
But what is a pseudo dictatorship? Is a form of a state under the declared state. *A B*-side of the democracy where black markets, stalkings, sexual harassments, illegal control is done. Normally is regulated by a **pyramid structure **[[13]](https://en.wikipedia.org/wiki/Organization#Pyramids_or_hierarchies) with **paramilitary** [[14]](https://en.wikipedia.org/wiki/Paramilitary) or **mercenary** [[15]](https://en.wikipedia.org/wiki/Mercenary) forces controlling the victims that fall in with a gangstalking or the workers, drug sellers or prostitute.
|
||||
|
||||
|
||||
|
||||
### The gangstalking "game"
|
||||
|
||||
|
||||
|
||||
![](trote.jpg)
|
||||
|
||||
Basically gangstalking and gaslighting are based upon the systematically destruction of your past and present. *Love, friendship, work, home, pets and your possessions are loose* in a short period of time. I've got a personal experience about a pattern used in these tortures. We can speak about "**target individuals**", and i use the plural because there are always two victim, **a men and his love**. It's simple, the man loose all his life like I've said before and the woman like one year after start to think that world have changed and that she'll meet with this man another time after a **sexual game**. *She thinks that this is a game, very similar to what we found in the internationals ready-made television formats*. The two targets are separated and inducted to suicide with a mental destroyer situation, normally a gangstalking for him and a **gang bang** [[16]](https://en.wikipedia.org/wiki/Gang_bang) for her. The two in different time range, him usually one or half year before, are victims also of what is known as **brainwashing** [[17]](https://en.wikipedia.org/wiki/Brainwashing). The twos in different time laps are victims of stalkers that are normally **mind hackers** [[18]](https://www.gitbook.com/) that try to change the basics of them life. The man usually have no money, no friends and no sex. Go in **major depressive disorder** [[19]](https://en.wikipedia.org/wiki/Major_depressive_disorder) and typically live of what he founds on the street, so the society classify them as indigent and sick with **Diogenes syndrome** [[20]](https://en.wikipedia.org/wiki/Diogenes_syndrome) and **compulsive hoarding** [[21]](https://en.wikipedia.org/wiki/Compulsive_hoarding). The woman is blocked in a vortex of sex and orgies thinking that she is partaking in a game, every game for the women i think that has got one year of time with the goal of four years in total. All of this is brainwashing. First of all when the two separates, that is the start of the loose of all his goods for the man, the woman is betrayed to go away from him with hoax. Next she's got a relation with a personal trainer or a figure like this to have got a perfect body in vision of the games that nothing more are than illegal pornography sold in video on demand bitcoin stores and be a victim of human trade.
|
||||
|
||||
What is the final objective of these machinated steps? It's simple, but when you're experiencing them if your not very clever and intelligent the twos will die committing **suicide**[[22]](https://en.wikipedia.org/wiki/Suicide). The final goal for the woman, if she doesn't kill herself, is to grew up like a sexual slave prostitute build *to satisfy extreme desire for high class society individuals*.
|
||||
|
||||
Normally the man, who has lost everything, commit suicide because see her in porn movies and images found on the web, deep web, and many others technological platform. The woman when the man loose his life understand that this was not a game and commit suicide also or terminate in heavy drug addiction like **heroine** [[23]](https://en.wikipedia.org/wiki/Heroin) or **crack** [[24]](https://en.wikipedia.org/wiki/Crack_cocaine) working like a low level prostitute.
|
||||
|
||||
This "game" is reality is a recurrent pattern where a love is forcedly broken and two people commit suicide. The pattern is shaped every time upon the victims using a series of variables, like in information technology are the parameters in the invocation of the program. With this crime, gangstalker can gain **billions euro**, alimenting **terrorism** [[25]](https://en.wikipedia.org/wiki/Terrorism) in a silent mode. How is possible to gain such amount of money with this **criminal pattern**? It's simple, they bet on all about the life of the two target individuals, and the woman in engaged in **sexual harassment** [[26]](https://en.wikipedia.org/wiki/Sexual_harassment) ,**human traffic** [[27] ](https://en.wikipedia.org/wiki/Human_Traffic)and **forced prostitution** [[28]](https://en.wikipedia.org/wiki/Forced_prostitution). They use her to do sexual favors to big drugs clients, rich casino players or so on. She doesn't gain. When she lost her naturally protection about sexual violence they sell her to ultra high class customers that simply enslave her or kill her in a ritual.
|
||||
|
||||
*I'll explain step by step how this game with the help of a lot of technology is the real plague of our democracy, and the cause of the right turning in the Europe of the XXI single.*
|
||||
|
||||
|
||||
|
||||
### Cyberstalking
|
||||
|
||||
|
||||
|
||||
![Cyberstalking](/home/taglio/Work/gangstalking/Cyberstalking.jpg)
|
||||
|
||||
|
||||
|
||||
In the last twenty years, gangstalking has evolved and it has evolved very rapidly using IT technology and telecommunications, touching what is known as **cyberstalking** [[1]](https://en.wikipedia.org/wiki/Cyberstalking) or **cyber gangstalking**. Normally in a gangstalking crew there's a lot of **hackers** [[2]](https://en.wikipedia.org/wiki/Hacker), **crackers** [[3]](http://www.catb.org/jargon/html/C/cracker.html) and **ham radio** [[4]](https://en.wikipedia.org/wiki/Amateur_radio) telecommunications experts, like **satellite** [[5]](https://en.wikipedia.org/wiki/Satellite), **ELF** [[6]](https://en.wikipedia.org/wiki/Extremely_low_frequency), **ULF** [[7]](https://en.wikipedia.org/wiki/Ultra_low_frequency), **WPT** [[8]](https://en.wikipedia.org/wiki/Wireless_power_transfer), **HF** [[9]](https://en.wikipedia.org/wiki/High_frequency), **VHF** [[10]](https://en.wikipedia.org/wiki/Very_high_frequency) and **UHF** [[11]](https://en.wikipedia.org/wiki/Ultra_high_frequency).
|
||||
|
||||
Gangstalking is the *B-side of the audiovisual industry*.
|
||||
|
||||
**Neuroscience** is another gangstalking IT branch. With the grow up of **BCI** [[12]](https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface), and the fall down of the price of them with **Arduino** [[13]](https://en.wikipedia.org/wiki/Arduino) and other **open hardware** [[14]](https://en.wikipedia.org/wiki/Open-source_hardware) solutions, **neuroscience** [[15]](https://en.wikipedia.org/wiki/Neuroscience) is now low cost.
|
||||
|
||||
What in the **cold war** [[16]](https://en.wikipedia.org/wiki/Cold_War) was patented by US researcher with various acronym like **V2K** known also as "voice to skull" [[17]](https://sites.google.com/site/targetedindividuals101/home/v2k) or "infrasound" [[18]](https://en.wikipedia.org/wiki/Infrasound), **MKULTRA** [[19]](https://en.wikipedia.org/wiki/Project_MKUltra), known also as CIA mind control program, **TMS** [[20]](https://en.wikipedia.org/wiki/Transcranial_random_noise_stimulation), transcranial magnetic stimulation also in remote, and **NLP** [[21]](https://en.wikipedia.org/wiki/Neuro-linguistic_programming), neuro-linguistic programming (see also methods [[22]](https://en.wikipedia.org/wiki/Methods_of_neuro-linguistic_programming)) synthetic hypnosis , could be found in my personal repository [[23]](https://drive.google.com/drive/folders/1p_ZjYQu33qaeZTE89Ae48biWiBG9EPcK) and it is actively used by gangstalker and hackers. Also in wikileaks we can found some information more about those technologies.
|
||||
|
||||
But is gangstalkers connected to the US secret services and governments? No, probably not. It's very common that they are using the public patents and leaks from **Julian Assange** [[24]](https://en.wikipedia.org/wiki/Julian_Assange) team to improve the synthetic telepathy network, nowadays an information technology evolution of a part of the radio television broadcast system.
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
### External links
|
||||
|
||||
![networking](1-intro_113_0.jpg)
|
||||
|
||||
|
||||
|
||||
1. https://en.wikipedia.org/wiki/Indo-European_languages
|
||||
2. https://en.wikipedia.org/wiki/Ancient_Greek
|
||||
3. https://en.wikipedia.org/wiki/Classical_Armenian
|
||||
4. <https://en.wikipedia.org/wiki/Harassment>
|
||||
5. <https://en.wikipedia.org/wiki/Stalking>
|
||||
6. https://www.urbandictionary.com/define.php?term=gang%20stalking
|
||||
7. <https://ca.wikipedia.org/wiki/Fer_llum_de_gas>
|
||||
8. <https://en.wikipedia.org/wiki/Gaslighting>
|
||||
9. <https://www.urbandictionary.com/define.php?term=targeted%20individual>
|
||||
10. <https://www.nationalgeographic.com/archaeology-and-history/magazine/2016/07-08/profile-adam-weishaupt-illuminati-secret-society/>
|
||||
11. https://www.instagram.com/explore/tags/illuminati/
|
||||
12. <https://twitter.com/search?q=%23illuminati&src=typd>
|
||||
13. <https://en.wikipedia.org/wiki/Organization#Pyramids_or_hierarchies>
|
||||
14. <https://en.wikipedia.org/wiki/Paramilitary>
|
||||
15. <https://en.wikipedia.org/wiki/Mercenary>
|
||||
16. <https://en.wikipedia.org/wiki/Gang_bang>
|
||||
17. https://en.wikipedia.org/wiki/Brainwashing
|
||||
18. <https://www.mindhacki.ng/content/>
|
||||
19. <https://en.wikipedia.org/wiki/Major_depressive_disorder>
|
||||
20. https://en.wikipedia.org/wiki/Diogenes_syndrome
|
||||
21. https://en.wikipedia.org/wiki/Compulsive_hoarding
|
||||
22. https://en.wikipedia.org/wiki/Suicide
|
||||
23. https://en.wikipedia.org/wiki/Heroin
|
||||
24. https://en.wikipedia.org/wiki/Crack_cocaine
|
||||
25. https://en.wikipedia.org/wiki/Terrorism
|
||||
26. <https://en.wikipedia.org/wiki/Sexual_harassment>
|
||||
27. <https://en.wikipedia.org/wiki/Human_Traffic>
|
||||
28. https://en.wikipedia.org/wiki/Forced_prostitution
|
||||
29.
|
145
Chapter one - the synthetic telepathy network.md
Normal file
145
Chapter one - the synthetic telepathy network.md
Normal file
@ -0,0 +1,145 @@
|
||||
# The synthetic telepathy network
|
||||
|
||||
|
||||
|
||||
![Synthetic Telepathy](redtelepatia.jpg)
|
||||
|
||||
|
||||
|
||||
Let's analyse device by device what is the synthetic telepathy network, a telecommunication facility that is changing in my opinion all Europe and is determining a right turning in our governments. It's very dangerous and probably it's the start of what i think it could be a **neo nazism** [[25]](https://en.wikipedia.org/wiki/Neo-Nazism) digital dictatorship and a start of a alpha stage of what we found in Internet named as **cyberwarfare** [[26]](https://en.wikipedia.org/wiki/Cyberwarfare).
|
||||
|
||||
In Internet we can find a lot of references about the synthetic telepathy network by **metaphors** [[27],](https://en.wikipedia.org/wiki/Metaphor) or what is called nowadays as **Internet meme** [[28]](https://en.wikipedia.org/wiki/Metaphor).
|
||||
|
||||
Let's introduce every device of the network scheme above:
|
||||
|
||||
- **Target machine:** A virtual device locked to the target person(s) by radio frequency. What does it mean? Every machine has an identification, a human unique magnetic field identification, an id to witch in a **VPN** [[29]](https://en.wikipedia.org/wiki/Virtual_private_network) there's a correspondence with a remote virtual **Android** [[30]](https://en.wikipedia.org/wiki/Android_(operating_system)) device where we can find a lot of applications more or less powerful depending on what kind of access we've got in the network. A single Machine, later i will explain theory and technology about this death device, could be shared by many clients, usually humans but also animals, could determine a pyramid structure normally identified by a natural number, the mine in Barcelona for example is the number **9**.
|
||||
- **Target in reality**: one or more persons that doesn't have access to the administration of his Machine, she/he loose totally her/his privacy and all the time passed without access is considered like a slave. Many times she/he is also considered only like an object, they use to do experiments with the person to archive data under extreme stress, violent sex situations and brain experiments. The target individual is a **human guinea pig** in an unauthorised **human subject research** [[31]](https://en.wikipedia.org/wiki/Human_subject_research).
|
||||
- **Machine in metaphor**: A mobile telephone, protected by a simple **PIN** [[32]](https://en.wikipedia.org/wiki/Personal_identification_number) of four numbers. It's security it's so basic because allow gangstalker to steal money of the target machine or another client that doesn't know about basic security. Money are always in **crypt concurrency** [[33]](https://en.wikipedia.org/wiki/Cryptocurrency).
|
||||
- **Target in metaphor**: Is a dog, gangstalkers consider a target individual with the same rights of an animal. They give her/him orders, deny to her/him every types of rights, electronically punish her/him and hit her/him. So do practically all the persons connected to this system because if they doesn't torture the victim they loose privilege in the network and return to the victim state that is the initial state when you was forced to join this hell network with brain zapping, that is a technique used to find the unique magnetic identification of a human. It is archive using a physical Android device, normally a telephone. A victim is captured identifying is unique magnetic field id by proximity with another network client used like predator. Normally is a woman or a very attractive man that have sex with the victim, the predator has got her or his mobile infected by an application remotely controlled by the network owners. In Barcelona Spain i think that there are more than two hundred thousand clients connected.
|
||||
- **Bidirectional connection to target machine**: Using a unique identification of the target person, or probably an array of, ground station speak directly with the victim or the client using **RNM**, remote neural monitoring. The remote neural monitoring act like a **BCI** [[34]](https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface), a **TMS** [[35]](https://en.wikipedia.org/wiki/Transcranial_magnetic_stimulation) device, a **MRI** [[36]](https://en.wikipedia.org/wiki/Magnetic_resonance_imaging) device; all of them are remote and virtual. All is done by radio frequency. All is remote brain waves. There is no need of any sort of device acting like a client in the human target. There is no need of **brain implant** [[37]](https://en.wikipedia.org/wiki/Brain_implant).
|
||||
- **Remote brainwaves**: This one of the **last mile** [[38]](https://en.wikipedia.org/wiki/Last_mile) technology used by the synthetic telepathy network. They are used to build what is known as **BRAINnet** [[39]](http://www.BRAINnet.net/), a sort of network of interconnected brains. In the synthetic telepathy network **brainwaves** [[40]](https://en.wikipedia.org/wiki/Neural_oscillation) was hacked to archive the modulation of the eight neural oscillations that are present in our brain. The frequencies used by BRAINnet are from 0.5 to 100 Hz and are transmitted by analogue **SDR** [[41]](https://en.wikipedia.org/wiki/Software-defined_radio). Every type of brain wave is related to a part of our brain and to a specific function like the auditory cortex or the visual cortex. Those name are:
|
||||
- **Delta wave** [[42]](https://en.wikipedia.org/wiki/Delta_wave) from 0.1 to 3 Hz.
|
||||
- **Theta wave** [[43]](https://en.wikipedia.org/wiki/Theta_wave) from 4 to 7 Hz.
|
||||
- **Mu wave** [[44]](https://en.wikipedia.org/wiki/Mu_wave) from 7.5 12.5 Hz.
|
||||
- **SMR wave** [[45]](https://en.wikipedia.org/wiki/Sensorimotor_rhythm) from 12.5 15.5 Hz.
|
||||
- **Alpha wave** [[46]](https://en.wikipedia.org/wiki/Alpha_wave) from 7 to 12 Hz.
|
||||
- **Beta wave** [[47]](https://en.wikipedia.org/wiki/Beta_wave) from 12 to 30 Hz.
|
||||
- **Gamma wave** [[48]](https://en.wikipedia.org/wiki/Gamma_wave) from 32 to 100 Hz.
|
||||
- **Silent subliminal presentation system**: a method from United States patent that serve to bypass first human auditory system, using the frequency of 462.25 KHz with a channel width of 14.5 KHz.
|
||||
- **Geosynchronous satellite**: Used to obtain remote imaging of the target. Nowadays with the advent of the open hardware, middle size criminal organisation could have a satellite in low orbit. This could be classified as *satellite terrorism*. **Open hardware satellite** [[49]](https://www.google.com/search?q=open+hardware+satellite&ie=utf-8&oe=utf-8&client=firefox-b-1-e) could be launch in orbit by companies that bind this service at relative low cost.
|
||||
- **Ground station**: Is an access point to BRAINnet. To archive the full coverage of a territory like Catalunya there is no need of too many points because of **wavelengths** [[50]](https://en.wikipedia.org/wiki/Wavelength) from 100000 to 1000 kilometres and because at this frequencies there is no need of **line of sight** [[51]](https://en.wikipedia.org/wiki/Line-of-sight_propagation), waves can pass through many types of materials. Every ground station perhaps have got eight different physical radios and antennas, one for every type of brain wave, and an interface, fibre optic or another radio technology, for the **backbone** [[52]](https://en.wikipedia.org/wiki/Backbone_network). The backbone doesn't have the need to transport a lot of data so it can be build using low size technology and **NLOS** [[53]](https://en.wikipedia.org/wiki/Non-line-of-sight_propagation) radio and frequency.
|
||||
- **Telemetry**
|
||||
- **Listening station** : part of every ground station but not in the outside. Every target individual got his **telemetry** [[54]](https://en.wikipedia.org/wiki/Telemetry) saved in the network computing centre, like all steps taken, all the trips and so on. There's no privacy in this network.
|
||||
- **Input/Output processing**
|
||||
- **Vocalisations**: in the synthetic telepathy network with technology the owners can exact copy the voice of a target. Not only the timbre of the voice but also the vocalisation **speech** [[55]](https://en.wikipedia.org/wiki/Speech). Targets individuals can be tricked to think to speak with another individual that is not. This is part of the mental confusion in which he may fall the victim in the gangstalking mind game. He may fall in mental disorder confusion. Vocalisations is modulated in gamma wave using a **vocoder** [[56]](https://en.wikipedia.org/wiki/Vocoder) and it results on **voice to skull** transmission, that is a hearing direct to the **auditory cortex** [[57]](https://en.wikipedia.org/wiki/Auditory_cortex).
|
||||
- **Mental Imagery**: in this network it's possible to do data injection direct to the **visual cortex** [[58]](https://en.wikipedia.org/wiki/Visual_cortex). It's something very powerful they can archive **augmented** [[59]](https://en.wikipedia.org/wiki/Augmented_reality) and **mixed reality** [[60]](https://en.wikipedia.org/wiki/Mixed_reality) direct in our brain without using the **human eye** [[61]](https://en.wikipedia.org/wiki/Human_eye), that are organs of the **visual system** [[62]](https://en.wikipedia.org/wiki/Visual_system). It's also possible to archive dream injections. They can obtain to stream a video in our brain when we are sleeping using the correct brainwave . Our dreams can also be read, they have archive to stole our dreams one of the most private and personal think of our personal sphere.
|
||||
- **Sensory**: Like the auditory and visual cortex also the **sensory cortex** [[63]](https://en.wikipedia.org/wiki/Primary_somatosensory_cortex) can be tricked, injected and manipulated by remote brain waves. They can archive that our brain can reproduce unreal feelings in our body, like sexual excitement. In the synthetic telepathy network it's possible to force a woman or a man to have sex with a stalker, to be all the day exited and then s/he can be tricked in a machined situation to have a disproportionate orgies that can be remote filmed always by the network and then to be sold in VOD crypt concurrences systems. The worst think is that they can do this also to minors creating **sexual slavery** [[64]](https://en.wikipedia.org/wiki/Sexual_slavery).
|
||||
- **Feedback monitoring**
|
||||
- **External events**: because of our visual cortex is under control, like in a **MitM** [[65]](https://en.wikipedia.org/wiki/Man-in-the-middle_attack) environment, when we're victim of the synthetic telepathy network we are like a remote video camera. All what we do and we see is transmitted to the . What it can mean? Simple, our privacy and the privacy of whatever is under our line of sight is compromised. All what we write be pen or in a computer or in a cash dispenser is stolen. When we've sex all is transmitted, and so on. We're like a tool for hackers. What does it mean? Image a beautiful woman victim of the network. All the people that have sex with her are connected to the network. Woman can be like a **Trojan horse** [[66]](https://en.wikipedia.org/wiki/Trojan_Horse).
|
||||
- **Health monitoring**: With this machine owners of the synthetic telepathy network got physical health values of the targets individuals, like **blood pressure** [[67]](https://en.wikipedia.org/wiki/Blood_pressure), **heart rate** [[68]](https://en.wikipedia.org/wiki/Heart_rate), **human body temperature** [[69]](https://en.wikipedia.org/wiki/Human_body_temperature) and so on. They have the complete medical view of every human client connected to the network.
|
||||
- **Lie detection**: owners of the network got also in their hands a full remote equipment of **lie detection** [[70]](https://en.wikipedia.org/wiki/Lie_detection). They know if the target lie or not about an argue. All is registered in the network core centre.
|
||||
- **Core process**
|
||||
- **Strategic Natural Language Processing**: client who has got access to the services in BRAINnet could understand and speak a lot of different humans languages with them vocalisation. This is possible by an advanced system of **natural language processing** [[71]](https://en.wikipedia.org/wiki/Natural_language_processing) , a part of computer science concerned with the interactions between computers and human (natural) languages.
|
||||
- **Mental Impressions**: i don't know what it can be.
|
||||
- **Keyword analysis**: like a **search engine** [[72]](https://en.wikipedia.org/wiki/Search_engine_(computing)). In the core process of the synthetic telepathy network there is a **keyword analysis** [[73]](https://en.wikipedia.org/wiki/Search_engine_optimization) system that could react to certain word or phrases with **artificial intelligence** [[74]](https://en.wikipedia.org/wiki/Artificial_intelligence) bot that use known speech and vocalisation of the victim. He can trust to speak with a real person but in reality is a **chatbot** [[75]](https://en.wikipedia.org/wiki/Chatbot). This function also aliment the **schizophrenia** [[76]](https://en.wikipedia.org/wiki/Schizophrenia) and **paranoia** [[77]](https://en.wikipedia.org/wiki/Paranoia) of the target individual that is slowly condemned to go crazy.
|
||||
- **Emotive response**: related to the different possible responses of the target individual among the artificial intelligence, chatbot, owners and machined situations proposed to him. All of this data are certainly used to improve the different algorithms inside the network but also probably sold to military and paramilitary forces that use human data to build robot and electronic cyberwarfare equipment. This is terrorism because target individuals are not volunteers but are unconscious victims. This is in opposition to **the universal declaration of human rights** [[78]](https://www.un.org/en/universal-declaration-human-rights/).
|
||||
- **Data mining**: always focused to the sold of data related to the target individual. **Data mining** [[79]](https://en.wikipedia.org/wiki/Data_mining) is the computer science and statistics part related to the extract of **data set** [[80]](https://en.wikipedia.org/wiki/Data_set) in a large amount of data. What could be the meaning in a criminal point of view because of the target individual condition? It could be referred to the fact that all what the victim do is registered. Imagine when a person go to a big shopping centre; what are the windows that mostly reclaim his attention? What products does he buy mostly when he go to a market? What are the colours that they attract him? And so on. All of those data are potentially sold to big firm companies, and are an important part of a commercial campaign if they are in big amount of individuals. They are also very important in a political point of view. Remember that target individuals aren't volunteers but they are obligated victims so we can always speak about terrorism. With BRAINnet in my opinion it's possible also to have a target individual that doesn't know to be because he doesn't listen to voice to skull telecommunication so only the visual cortex could be under control and only in read mode. What does it mean? It means that probably this network got thousand of victims and it probably mean that is the cause of the change in Europe these days.
|
||||
- **Reporting**: **Data reporting** [[81]](https://en.wikipedia.org/wiki/Data_reporting) is the fact to exactly report all the data set extracted from **big data** [[82]](https://en.wikipedia.org/wiki/Big_data)
|
||||
- **Error control**: referring to the control of percent of errors in the data reporting process.
|
||||
- **Sensory control**: machines dedicated to the automatic control and regulation on all what append in the *feedback monitoring* facility. Certainly dominated by machine intelligence, **machine learning** [[83]](https://en.wikipedia.org/wiki/Machine_learning) and **neural network** [[84]](https://en.wikipedia.org/wiki/Neural_network).
|
||||
- **Artificial Intelligence**: all in the synthetic telepathy network, or BRAINnet, is absolutely dominated by machine intelligence. I think that there isn't a big crew of administrators but there is a lot of excellent programmers. I've found connections with the **Neuralink** [[85]](https://en.wikipedia.org/wiki/Neuralink) project by **Elon Musk** [[86]](https://en.wikipedia.org/wiki/Neuralink) and what have said **Mark Zuckerberg** [[87]](https://en.wikipedia.org/wiki/Mark_Zuckerberg) at **F8 conference in 2017** [[88]](https://newsroom.fb.com/news/2017/04/f8-2017-day-1/).
|
||||
|
||||
![Mark Zuckerberg at F8 conference in 2017](/home/taglio/Work/gangstalking/f8_mz_d.jpg)
|
||||
|
||||
|
||||
|
||||
### External Links
|
||||
|
||||
1. https://en.wikipedia.org/wiki/Cyberstalking
|
||||
2. <https://en.wikipedia.org/wiki/Hacker>
|
||||
3. <http://www.catb.org/jargon/html/C/cracker.html>
|
||||
4. https://en.wikipedia.org/wiki/Amateur_radio
|
||||
5. <https://en.wikipedia.org/wiki/Satellite>
|
||||
6. <https://en.wikipedia.org/wiki/Extremely_low_frequency>
|
||||
7. <https://en.wikipedia.org/wiki/Ultra_low_frequency>
|
||||
8. https://en.wikipedia.org/wiki/Wireless_power_transfer
|
||||
9. https://en.wikipedia.org/wiki/High_frequency
|
||||
10. https://en.wikipedia.org/wiki/Very_high_frequency
|
||||
11. https://en.wikipedia.org/wiki/Ultra_high_frequency
|
||||
12. <https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface>
|
||||
13. <https://en.wikipedia.org/wiki/Arduino>
|
||||
14. <https://en.wikipedia.org/wiki/Open-source_hardware>
|
||||
15. <https://en.wikipedia.org/wiki/Neuroscience>
|
||||
16. <https://en.wikipedia.org/wiki/Cold_War>
|
||||
17. <https://sites.google.com/site/targetedindividuals101/home/v2k>
|
||||
18. <https://en.wikipedia.org/wiki/Infrasound>
|
||||
19. <https://en.wikipedia.org/wiki/Project_MKUltra>
|
||||
20. <https://en.wikipedia.org/wiki/Transcranial_magnetic_stimulation>
|
||||
21. <https://en.wikipedia.org/wiki/Neuro-linguistic_programming>
|
||||
22. <https://en.wikipedia.org/wiki/Methods_of_neuro-linguistic_programming>
|
||||
23. <https://drive.google.com/drive/folders/1p_ZjYQu33qaeZTE89Ae48biWiBG9EPcK>
|
||||
24. https://en.wikipedia.org/wiki/Julian_Assange
|
||||
25. <https://en.wikipedia.org/wiki/Neo-Nazism>
|
||||
26. <https://en.wikipedia.org/wiki/Cyberwarfare>
|
||||
27. <https://en.wikipedia.org/wiki/Metaphor>
|
||||
28. <https://en.wikipedia.org/wiki/Internet_meme>
|
||||
29. <https://en.wikipedia.org/wiki/Virtual_private_network>
|
||||
30. https://en.wikipedia.org/wiki/Android_(operating_system)
|
||||
31. https://en.wikipedia.org/wiki/Human_subject_research
|
||||
32. https://en.wikipedia.org/wiki/Personal_identification_number
|
||||
33. <https://en.wikipedia.org/wiki/Cryptocurrency>
|
||||
34. https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface
|
||||
35. https://en.wikipedia.org/wiki/Transcranial_magnetic_stimulation
|
||||
36. https://en.wikipedia.org/wiki/Magnetic_resonance_imaging
|
||||
37. https://en.wikipedia.org/wiki/Brain_implant
|
||||
38. https://en.wikipedia.org/wiki/Last_mile
|
||||
39. http://www.BRAINnet.net/
|
||||
40. https://en.wikipedia.org/wiki/Neural_oscillation
|
||||
41. https://en.wikipedia.org/wiki/Software-defined_radio
|
||||
42. https://en.wikipedia.org/wiki/Delta_wave
|
||||
43. https://en.wikipedia.org/wiki/Theta_wave
|
||||
44. https://en.wikipedia.org/wiki/Mu_wave
|
||||
45. https://en.wikipedia.org/wiki/Sensorimotor_rhythm
|
||||
46. https://en.wikipedia.org/wiki/Alpha_wave
|
||||
47. https://en.wikipedia.org/wiki/Beta_wave
|
||||
48. https://en.wikipedia.org/wiki/Gamma_wave
|
||||
49. https://www.google.com/search?q=open+hardware+satellite
|
||||
50. https://en.wikipedia.org/wiki/Wavelength
|
||||
51. https://en.wikipedia.org/wiki/Line-of-sight_propagation
|
||||
52. https://en.wikipedia.org/wiki/Backbone_network
|
||||
53. https://en.wikipedia.org/wiki/Non-line-of-sight_propagation
|
||||
54. https://en.wikipedia.org/wiki/Telemetry
|
||||
55. https://en.wikipedia.org/wiki/Speech
|
||||
56. https://en.wikipedia.org/wiki/Vocoder
|
||||
57. https://en.wikipedia.org/wiki/Auditory_cortex
|
||||
58. https://en.wikipedia.org/wiki/Visual_cortex
|
||||
59. https://en.wikipedia.org/wiki/Augmented_reality
|
||||
60. https://en.wikipedia.org/wiki/Mixed_reality
|
||||
61. https://en.wikipedia.org/wiki/Human_eye
|
||||
62. https://en.wikipedia.org/wiki/Visual_system
|
||||
63. https://en.wikipedia.org/wiki/Primary_somatosensory_cortex
|
||||
64. https://en.wikipedia.org/wiki/Sexual_slavery
|
||||
65. https://en.wikipedia.org/wiki/Man-in-the-middle_attack
|
||||
66. https://en.wikipedia.org/wiki/Trojan_Horse
|
||||
67. https://en.wikipedia.org/wiki/Blood_pressure
|
||||
68. https://en.wikipedia.org/wiki/Heart_rate
|
||||
69. https://en.wikipedia.org/wiki/Human_body_temperature
|
||||
70. https://en.wikipedia.org/wiki/Lie_detection
|
||||
71. https://en.wikipedia.org/wiki/Natural_language_processing
|
||||
72. https://en.wikipedia.org/wiki/Search_engine_(computing)
|
||||
73. https://en.wikipedia.org/wiki/Search_engine_optimization
|
||||
74. https://en.wikipedia.org/wiki/Artificial_intelligence
|
||||
75. https://en.wikipedia.org/wiki/Chatbot
|
||||
76. https://en.wikipedia.org/wiki/Schizophrenia
|
||||
77. https://en.wikipedia.org/wiki/Paranoia
|
||||
78. https://www.un.org/en/universal-declaration-human-rights/
|
||||
79. https://en.wikipedia.org/wiki/Data_mining
|
||||
80. https://en.wikipedia.org/wiki/Data_set
|
||||
81. https://en.wikipedia.org/wiki/Data_reporting
|
||||
82. https://en.wikipedia.org/wiki/Big_data
|
||||
83. https://en.wikipedia.org/wiki/Machine_learning
|
||||
84. https://en.wikipedia.org/wiki/Neural_network
|
||||
85. https://en.wikipedia.org/wiki/Neuralink
|
||||
86. https://en.wikipedia.org/wiki/Elon_Musk
|
||||
87. https://en.wikipedia.org/wiki/Mark_Zuckerberg
|
||||
88. https://newsroom.fb.com/news/2017/04/f8-2017-day-1/x
|
73
Chapter three - blockchain.md
Normal file
73
Chapter three - blockchain.md
Normal file
@ -0,0 +1,73 @@
|
||||
# Just my 2 cents
|
||||
|
||||
First of all i wanna do with you, reader, a consideration. We've got analyzed the synthetic telepathy network and the radio waves Machine. Those two IT systems are to control, break our privacy laws, abuse persons, destroy souls, change our life.
|
||||
|
||||
Now i want to introduce to you technologies that are exactly on the opposite site. Those technologies are actively developed to do the exact in front work. Those peer to peer derived protocols are born to guarantee privacy and security to the end users.
|
||||
|
||||
But they are used by the synthetic telepathy network owners to do crimes. Horrible crimes like foment pedophilia or illegal pornography. But those are not the real crimes, though they are the most horrible of mankind. The ultimate end is despise the work of those programmers that work for freedom. *Freedom is the most important background of our democracy*.
|
||||
|
||||
Who are the new dictators, who is building this pseudo dictatorship, who is destroying our dreams of the late sixties? Always the same persons. The elite. Now the elite have semi owned the Internet, the most important invention in the last century and with the tech giants they are building the eye that all see. Something similar to the Egyptian gods, mysticism upon ignorance; in Internet and radio frequency but now also in the *decimal society* they call "Illuminati", an Internet **fraud**. The new mafia is the **digital mafia** and is international.
|
||||
|
||||
But why they are doing crimes like those? It's simple. To get profound and go ahead with technology. All of this is for always the same think. Like in the cold war. Is for the arms race. The nowadays cold war have a name but no one speak about, **cyber warfare**.
|
||||
|
||||
*Those are my two cents.*
|
||||
|
||||
# The Monero crypt concurrency
|
||||
|
||||
![The Monero circuit](monero.png)
|
||||
|
||||
**Monero** [[1]](https://www.getmonero.org/) is decentralized crypt currency, meaning it is secure digital cash operated by a network of users. Transactions are confirmed by distributed consensus and then immutably recorded on the **blockchain** [[2]](https://en.wikipedia.org/wiki/Blockchain). Third-parties do not need to be trusted to keep your **Monero** [[3]](https://en.wikipedia.org/wiki/Monero_(cryptocurrency)) safe. Monero is *totally* untraceable.
|
||||
|
||||
Let's do some considerations before start with a deep dive into this network. First of all **M** is its logotype, simple is the concurrency of the Machine, what we start to explain in the last chapter. But does it can be converted into classical money? Yes for sure here it is the exchange graphic:
|
||||
|
||||
![monero exchange value](monero-euro-value.png)
|
||||
|
||||
|
||||
|
||||
But it's possible to simply go to a cash dispenser and get euro? Yes it is.
|
||||
|
||||
## ![Bitchain ATM cash dispenser](btcpoint_bitcoin_atm_c828d19c75.jpg)
|
||||
|
||||
Remember that to get cash from this bitcoin **ATM** [[4]](https://en.wikipedia.org/wiki/Automated_teller_machine) normally you have to change **XMR** [[5]](https://www.coinbase.com/price/monero?locale=en) to **LTC** [[6]](https://www.coinbase.com/price/litecoin?locale=en), then go to a local ATM as you can find in **coin ATM radar** [[7]](https://coinatmradar.com/). In Barcelona for example there's the network called **BitBase** [[8]](https://bitbase.es/) where you can sell also directly Monero.
|
||||
|
||||
Another method is to buy a debit bitcoin card that you can recharge on line from your wallet and then simply go to every type of classic currency ATM and got cash. Like **CryptoPay** [[9]](https://cryptopay.me/bitcoin-debit-card/#uk). Criminals use false identities and SIM card without identification to buy online those goods. And this is a fraud.
|
||||
|
||||
Another method to move XMR coins is buy directly in shops that accepts this crypt concurrency. The A-side services or goods that can be payed directly are various some of them are detailed on **cryptwerk** [[10]](https://cryptwerk.com/pay-with/xmr/). What does it mean in reality? That a person that has got a lot of this type of currency could open an A-side physic and Internet shop and sell goods in classical money. Simple but functional. Who's do it in a better way use various company chains to elude fiscal controls and remove the use of XMR from their fiscal invoices. Another time, very simple, it's a game.
|
||||
|
||||
What those criminals can do in the same Monero circuit? I don't know but using a little bit of logic and remembering that we're speaking about B-side it's very simple:
|
||||
|
||||
- Drug market buy and sell.
|
||||
- Black market buy and sell.
|
||||
- Human traffic.
|
||||
- Forced prostitution.
|
||||
- All kind of illegal good buy and sell.
|
||||
- Illegal apartment rent.
|
||||
- Credit card fraud.
|
||||
- Cracker services rent.
|
||||
- Corruption.
|
||||
|
||||
This is only a little window over this terrorist and criminal network. We'll go deeper in the next chapters.
|
||||
|
||||
# The SAFE network blockchain
|
||||
|
||||
![SAFE network blockchain](1200px-Safe_Water_Network_logo.svg.png)
|
||||
|
||||
A blockchain model applied to networking **ISO/OSI** [[11]](https://en.wikipedia.org/wiki/OSI_model) stack. It replace the last fourth pile of the Internet model. Packets are replaced with data chunks mixed in various different locations without a fixed one, a central server. It's like the old style **p2p** [[12]](https://en.wikipedia.org/wiki/Peer-to-peer) but with new encryptions models that guarantee **privacy** [[13]](https://en.wikipedia.org/wiki/Privacy), **cryptography** [[14]](https://en.wikipedia.org/wiki/Cryptography), confidentiality, integrity, and availability.
|
||||
|
||||
### External Links
|
||||
|
||||
1. https://www.getmonero.org/
|
||||
2. https://en.wikipedia.org/wiki/Blockchain
|
||||
3. https://en.wikipedia.org/wiki/Monero_(cryptocurrency)
|
||||
4. https://en.wikipedia.org/wiki/Automated_teller_machine
|
||||
5. https://www.coinbase.com/price/monero?locale=en
|
||||
6. https://www.coinbase.com/price/litecoin?locale=en
|
||||
7. https://coinatmradar.com/
|
||||
8. https://bitbase.es/
|
||||
9. https://cryptopay.me/bitcoin-debit-card/#uk
|
||||
10. https://cryptwerk.com/pay-with/xmr/
|
||||
11. https://en.wikipedia.org/wiki/OSI_model
|
||||
12. https://en.wikipedia.org/wiki/Peer-to-peer
|
||||
13. https://en.wikipedia.org/wiki/Privacy
|
||||
14. https://en.wikipedia.org/wiki/Cryptography
|
||||
|
170
Chapter two - machine.md
Normal file
170
Chapter two - machine.md
Normal file
@ -0,0 +1,170 @@
|
||||
# The Machine
|
||||
|
||||
![Bjork analogue televion](bjork-tv.png)
|
||||
|
||||
|
||||
|
||||
In the last chapter we speak about the target machine, a virtual system under which many clients, conscious or not, are organized in a pyramid structure. But what is exactly the machine, or **M** [[1]](https://en.wikipedia.org/wiki/M_(James_Bond))? First of all there is practically no public document speaking about, so it's like a secret or something similar, many people know about it, someone can technically explain it, but no one write about. Why? I really don't know the real reason and i strongly believe in the **open source model** [[2]](https://en.wikipedia.org/wiki/Open-source_model) and i will try here to explain what I've understand about with some background and knowledge about computer science, telecommunication, neuroscience and ham radio.
|
||||
|
||||
In 1988 the Iceland artist **Björk Guðmundsdóttir** [[3]](https://en.wikipedia.org/wiki/Bj%C3%B6rk) speak about the **analog television** [[4]](https://en.wikipedia.org/wiki/Analog_television) with a fascinated voice Here is part of her logic-defying monologue:
|
||||
|
||||
*This beautiful television has put me, like I said before, in all sorts of situations.*
|
||||
|
||||
*I remember being very scared because an Icelandic poet told me that not like in cinemas, where the thing that throws the picture from it just sends light on the screen, but this is different. This is millions and millions of little screens that send light, some sort of electric light, I'm not really sure.*
|
||||
|
||||
*But because there are so many of them, and in fact you are watching very many things when you are watching TV. Your head is very busy all the time to calculate and put it all together into one picture.*
|
||||
|
||||
*And then because you're so busy doing that, you don't watch very carefully what the program you are watching is really about. So you become hypnotized. So all that's on TV, it just goes directly into your brain and you stop judging it's right or not.*
|
||||
|
||||
*You just swallow and swallow. This is what an Icelandic poet told me.*
|
||||
|
||||
*And I became so scared to television that I always got headaches when I watched it. Then, later on, when I got my Danish book on television, I stopped being afraid because I read the truth, the scientifical truth and it was much better.*
|
||||
|
||||
*You shouldn't let poets lie to you.*
|
||||
|
||||
Image to have en front of yours eye a **cathode ray tube** [[5]](https://en.wikipedia.org/wiki/Cathode-ray_tube) that projects all the reality in our line of sight more some object like in an augmented reality system or completely rewrite all the world before us with a totally computer graphic ambient, something like interactive architectural visualization made by **unreal engine** [[6]](https://en.wikipedia.org/wiki/Unreal_Engine) **four** [[7]](https://www.unrealengine.com/en-US/); this is what they call as **immersion in virtual reality** [[8]](https://en.wikipedia.org/wiki/Immersion_(virtual_reality)) but without any hardware device.
|
||||
|
||||
Image to have surrounding your ears a special headphone that reproduce all the audio around you but add a voice chat, could duplicate on the fly the exact voice of a human or any type of sound or audio, could rewrite on the fly the voice of a person speaking with you and so on. Something that could emulate what is nowadays call **3D audio effect** [[9]](https://en.wikipedia.org/wiki/3D_audio_effect).
|
||||
|
||||
Image also but not only to have all your **nervous system** [[10]](https://en.wikipedia.org/wiki/Nervous_system) and **muscles** [[11]](https://en.wikipedia.org/wiki/Muscle) connected by **acupuncture** [[12]](https://en.wikipedia.org/wiki/Acupuncture) and **electrodes** [[13]](https://en.wikipedia.org/wiki/Electrode) to a perfect human body reproduction external and internal. They can torture you without touching you but only reproducing the **pain** [[14]](https://en.wikipedia.org/wiki/Pain) remotely stimulating your **nerves** [[15]](https://en.wikipedia.org/wiki/Nerve) and your **brain** [[16]](https://en.wikipedia.org/wiki/Brain).
|
||||
|
||||
Our brain is also able to execute two complete tasks, yes two life, at the same moment dividing the twos in the left and right side of the brain. This is called **human multitasking** [[19]](https://en.wikipedia.org/wiki/Human_multitasking). With the Machine connected clients, and not victims, thanks to the radio technology can work in parallel in two thinks. Normally physically in the A-side, legal work, and with the brain in an augmented reality like environment in the B-side, black market. What is the real result? Because of the people connected on this system are divided in classes like **Indian castes**, low cast persons are like slaves, work double time without great compensation normally in the A-side in restorations of what ever and in the B-side in illegal IT, or doing black market and payed in very variables value crypt concurrencies. Normally nor they don't understand the bitcoin market and loose a lot of money. This is like slavery and the soul death of a lot of people. A lot of friends of mine have changed totally in the last ten years.
|
||||
|
||||
This seems to be a science fiction film but it's true and it's up and running. It's what i can describe as the more powerful tool product by computer science applied to human being but if used with the only goal the archive more money than possible it's the nightmare of the democracy in our old but great **European Union** [[20]](https://en.wikipedia.org/wiki/European_Union); *world have to know*.
|
||||
|
||||
### The visual system read and MitM remote device
|
||||
|
||||
![human visual system pathway](Comprehensive_List_of_Relevant_Pathways_for_the_Visual_System.png)
|
||||
|
||||
|
||||
|
||||
The first part of the human visual system is composed by:
|
||||
|
||||
- **Cornea** [[21]](https://en.wikipedia.org/wiki/Cornea) and **Lens** [[22]](https://en.wikipedia.org/wiki/Lens_(anatomy)): reflect light into a small image and shine it on the **retina** [[23]](https://en.wikipedia.org/wiki/Retina).
|
||||
- **Retina**: translate the image received by cornea and lens into electrical neural impulse to the brain to create **visual perception** [[24]](https://en.wikipedia.org/wiki/Visual_perception).
|
||||
- **Optic nerve** [[25]](https://en.wikipedia.org/wiki/Optic_nerve): a paired **cranial nerve** [[26]](https://en.wikipedia.org/wiki/Cranial_nerves) that transmit visual information from the retina to the brain.
|
||||
|
||||
How is possible to do a MitM on the human visual system? I think that the developers have done a big work because the complexity of this system but i can complain that they've done this two principle jobs:
|
||||
|
||||
1. Reading in the optic nerve with radio waves obtaining something similar to the **fiber tapping** [[27]](https://en.wikipedia.org/wiki/Fiber_tapping) passive attack. *A very hard work*, it does mean that they have great developers working for this criminal project.
|
||||
2. **Reading mind** [[28]](https://www.nationalgeographic.com/science/phenomena/2011/10/13/reading-minds-with-fmri/) by remote **fMRI** [[29]](https://www.nationalgeographic.com/science/phenomena/2011/10/13/reading-minds-with-fmri/) or others **neuroimaging** [[30]](https://en.wikipedia.org/wiki/Neuroimaging) sciences. The use of radio waves distinguish real programming state of art of the heads of this project. Probably one of the best programmers is payed by this terrorist system. Military related?
|
||||
3. Writing using **dream** [[31]](https://en.wikipedia.org/wiki/Dream) injections. Image to dream but when you are awake. How it possible? Using **theta waves**, but not only, generated by software defined radio and the correct modulation. Another time a great work but not so difficult to complain.
|
||||
|
||||
![Cyber and Information Domain Service](InternesVerbandsabzeichenKdoCIR.png)
|
||||
|
||||
This kind of ultra hard work it' seems to be obviously related to military forces research department. I live in Europe so the team is Europe related. I was studying computer science at the university of Genoa, Italy. Here i've known the only genius that i've known in my life, i will not write is name here because of possible complaints. What i know that he's working hard on this criminal network and he's working for German military forces (the **Bundeswehr** [[32]](https://en.wikipedia.org/wiki/Bundeswehr)). The Deutschland military cyber forces is named **Cyber and Information Domain Service** [[33]](https://en.wikipedia.org/wiki/Cyber_and_Information_Domain_Service_(Germany)).
|
||||
|
||||
![Luigi Durand de la Penne](Durand_de_la_Penne3.jpg)
|
||||
|
||||
Another obvious connection, because of one of the most important speaker in the voice to skull chat that i know from my primary school always in Genoa, is the **Italian Navy** [[34]](https://en.wikipedia.org/wiki/Italian_Navy), i think that speaking about the **CEMM** [[35]](https://it.wikipedia.org/wiki/Corpo_degli_equipaggi_militari_marittimi) the section is obviously the **SSC/TLC/GE** [[36]](http://www.marina.difesa.it/il-tuo-futuro-e-il-mare/carriere/per-grado/sottufficiali/Documents/categ_sottufficiali.pdf). She is the grandson of one of the second world war hero, **Luigi Durand de la Penne** [[37]](https://en.wikipedia.org/wiki/Luigi_Durand_de_la_Penne).
|
||||
|
||||
### The auditory system read and MitM remote device
|
||||
|
||||
The human auditory system is composed by the **auditory system** [[38]](https://en.wikipedia.org/wiki/Auditory_system) and the **primary auditory cortex** [[39]](https://en.wikipedia.org/wiki/Auditory_cortex).
|
||||
|
||||
![US5159703](voicetoskull.png)
|
||||
|
||||
The auditory system is totally bypassed by the voice to skull technology. Voice to skull from the early seventy until now was classified as mental sickness. Voice to skull technology was patented on 27 October 1992 by United States Patent under the official name of **silent subliminal presentation system** [[40]](https://patents.google.com/patent/US5159703A/en). The system generate a single **sideband** [[41]](https://en.wikipedia.org/wiki/Sideband), **suppressed carrier** [[42]](https://en.wikipedia.org/wiki/Double-sideband_suppressed-carrier_transmission), **amplitude modulated (AM)** [[43]](https://en.wikipedia.org/wiki/Amplitude_modulation) signal with a channel width of 14.5 KHz, the frequency is 462.25 KHz.
|
||||
|
||||
![Voice to skull in Catalunya](v2k.png)
|
||||
|
||||
This is the *voice to skull service active in Catalunya*, Spain. As you can see the center frequency move in function of time. Nowadays it's certainly coded with a script in a SDR environment, but it's a technology from like thirty years ago. It is emitted from terrestrial radio equipment. This frequency is classified by **ITU** as **medium frequency** and normally use a **mast radiator** like antenna, with a single radio it can cover hundred of kilometers using **ground waves** and **ionosphere** reflection.
|
||||
|
||||
With this frequency all the B-side, probably all over the world, is administrated. What is the **B-side** [[44]](https://en.wikipedia.org/wiki/B-Sides)? **The dark side of the moon** [[45]](https://en.wikipedia.org/wiki/The_Dark_Side_of_the_Moon)? The two faces of the same medal? It's simple, it is all what is concerned to what ever is connected to the underground world, black market, illegal pornography, deep internet, crypt concurrency, unknown location club, human test, electronic weapons development, society illegal control, audiovisual and so on. All the people working on the shadow economy infrastructures and markets know it but no one speak about in a public network like Internet.
|
||||
|
||||
![B-side Barcelona](b-side.png)
|
||||
|
||||
So this network is known by also the governments but *since i was tortured* by probably electronic weapons development and since i'm under continuous control by third parts i decide to speak about it, doing it in an open source way.
|
||||
|
||||
But what is the MitM remote equipment that could rewrite on fly audio from every sources on our **auditory field** [[46]](http://www.cochlea.org/en/hear/human-auditory-range) ? This is very complex. And is for sure done with a receiver in the same frequency of the **frequency range of human hearing** [[47]](https://hypertextbook.com/facts/2003/ChrisDAmbrose.shtml) and a transmitter that use the same patent, the **US5159703A**.
|
||||
|
||||
This supposed system could have this abstracted scheme:
|
||||
|
||||
**Receiver** [20Hz to 20Khz] [[48]](https://en.wikipedia.org/wiki/Radio_receiver) --> **Vocoder** [[49]](https://en.wikipedia.org/wiki/Vocoder) (**speech** [[50]](https://en.wikipedia.org/wiki/Speech) to bit) --> **Operating system** [[51]](https://en.wikipedia.org/wiki/Operating_system) --> Vocoder (bit to speech) --> **Transmitter** [462.25 KHz] [[52]](https://en.wikipedia.org/wiki/Transmitter)
|
||||
|
||||
What can be archived with this system?
|
||||
|
||||
1. Automatic voice recognition.
|
||||
2. Automatic translation in what ever language; input and output.
|
||||
3. On the fly voice or sound rewrite.
|
||||
4. Sound effects and like augmented reality system.
|
||||
|
||||
### The nervous system and muscle remote control
|
||||
|
||||
Do you know the project **OpenBCI** [[53]](https://en.wikipedia.org/wiki/OpenBCI)? An **open hardware** [[54]](https://en.wikipedia.org/wiki/Open-source_hardware) project to amplify, read and processing **EEG** [[55]](https://en.wikipedia.org/wiki/Electroencephalography), **EMG** [[56]](https://en.wikipedia.org/wiki/Electromyography) and **EKG** [[57]](https://en.wikipedia.org/wiki/Electrocardiography).
|
||||
|
||||
![OpenBCI](IMG_7586.jpg)
|
||||
|
||||
Do you know that Facebook **has adquired** [[58]](https://www.theverge.com/2019/9/23/20881032/facebook-ctrl-labs-acquisition-neural-interface-armband-ar-vr-deal) **CTRL-Labs** [[59]](https://www.ctrl-labs.com/) that produce an **neural control interface NCI** [[60]](https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface), a wristband to control machine with muscles on a arm?
|
||||
|
||||
![CTRL-labs Facebook wristband](CTRL-labs.jpeg)
|
||||
|
||||
Imagine those devices acting in remote without any physical brain implant or device on the victim or the client of the synthetic telepathy network, this is exactly what is the "Machine". This is an extremely powerful device that used in a bad way could start what it can me named as a pseudo dictatorship. A digital mafia. Owning rapidly black market and clear economy and politics. This is what it is passing just now, nowadays, at this moment in our country, Europe. This is not a joke. This is what we're leaving now and no one speak about it. **Brexit** [[61]](https://en.wikipedia.org/wiki/Brexit)? This is probably what it start it. It's possible that is acronym of "*brain exit*"?
|
||||
|
||||
it the person **on this article** [[62]](https://www.guineapigzero.com/i-was-a-brain-slave.html) a schizophrenic? Absolutely not, but he doesn't know why he is a slave. Why does he speaks about UFO and stupidity like this? Because when human kind cannot explain a phenomenon use divinity, like our ancestor do with polytheism and monotheism. The real problem is that our politics, administrations and police doesn't know exactly what it is passing or they are totally corrupted by the Machine. How it is possible? We will see in the next chapter.
|
||||
|
||||
### External links
|
||||
|
||||
1. https://en.wikipedia.org/wiki/M_(James_Bond)
|
||||
2. https://en.wikipedia.org/wiki/Open-source_model
|
||||
3. [https://en.wikipedia.org/wiki/Bj%C3%B6rk](https://en.wikipedia.org/wiki/Björk)
|
||||
4. https://en.wikipedia.org/wiki/Analog_television
|
||||
5. https://en.wikipedia.org/wiki/Cathode-ray_tube
|
||||
6. https://en.wikipedia.org/wiki/Unreal_Engine
|
||||
7. https://www.unrealengine.com/en-US/
|
||||
8. https://en.wikipedia.org/wiki/Immersion_(virtual_reality)
|
||||
9. https://en.wikipedia.org/wiki/3D_audio_effect
|
||||
10. https://en.wikipedia.org/wiki/Nervous_system
|
||||
11. https://en.wikipedia.org/wiki/Muscle
|
||||
12. https://en.wikipedia.org/wiki/Acupuncture
|
||||
13. https://en.wikipedia.org/wiki/Electrode
|
||||
14. https://en.wikipedia.org/wiki/Pain
|
||||
15. https://en.wikipedia.org/wiki/Nerve
|
||||
16. https://en.wikipedia.org/wiki/Brain
|
||||
17. https://en.wikipedia.org/wiki/Dyson_sphere
|
||||
18. https://en.wikipedia.org/wiki/Tty_(unix)
|
||||
19. https://en.wikipedia.org/wiki/Human_multitasking
|
||||
20. https://en.wikipedia.org/wiki/European_Union
|
||||
21. https://en.wikipedia.org/wiki/Cornea
|
||||
22. https://en.wikipedia.org/wiki/Lens_(anatomy)
|
||||
23. https://en.wikipedia.org/wiki/Retina
|
||||
24. https://en.wikipedia.org/wiki/Visual_perception
|
||||
25. https://en.wikipedia.org/wiki/Optic_nerve
|
||||
26. https://en.wikipedia.org/wiki/Cranial_nerves
|
||||
27. https://en.wikipedia.org/wiki/Fiber_tapping
|
||||
28. https://www.nationalgeographic.com/science/phenomena/2011/10/13/reading-minds-with-fmri/
|
||||
29. https://en.wikipedia.org/wiki/Functional_magnetic_resonance_imaging
|
||||
30. https://en.wikipedia.org/wiki/Neuroimaging
|
||||
31. https://en.wikipedia.org/wiki/Dream
|
||||
32. https://en.wikipedia.org/wiki/Bundeswehr
|
||||
33. https://en.wikipedia.org/wiki/Cyber_and_Information_Domain_Service_(Germany)
|
||||
34. https://en.wikipedia.org/wiki/Italian_Navy
|
||||
35. https://it.wikipedia.org/wiki/Corpo_degli_equipaggi_militari_marittimi
|
||||
36. http://www.marina.difesa.it/il-tuo-futuro-e-il-mare/carriere/per-grado/sottufficiali/Documents/categ_sottufficiali.pdf
|
||||
37. https://en.wikipedia.org/wiki/Luigi_Durand_de_la_Penne
|
||||
38. https://en.wikipedia.org/wiki/Auditory_system
|
||||
39. https://en.wikipedia.org/wiki/Auditory_cortex
|
||||
40. https://patents.google.com/patent/US5159703A/en
|
||||
41. https://en.wikipedia.org/wiki/Sideband
|
||||
42. https://en.wikipedia.org/wiki/Double-sideband_suppressed-carrier_transmission
|
||||
43. https://en.wikipedia.org/wiki/Amplitude_modulation
|
||||
44. https://en.wikipedia.org/wiki/B-Side
|
||||
45. https://en.wikipedia.org/wiki/The_Dark_Side_of_the_Moon
|
||||
46. http://www.cochlea.org/en/hear/human-auditory-range
|
||||
47. https://hypertextbook.com/facts/2003/ChrisDAmbrose.shtml
|
||||
48. https://en.wikipedia.org/wiki/Radio_receiver
|
||||
49. https://en.wikipedia.org/wiki/Vocoder
|
||||
50. https://en.wikipedia.org/wiki/Speech
|
||||
51. https://en.wikipedia.org/wiki/Operating_system
|
||||
52. https://en.wikipedia.org/wiki/Transmitter
|
||||
53. https://en.wikipedia.org/wiki/OpenBCI
|
||||
54. https://en.wikipedia.org/wiki/Open-source_hardware
|
||||
55. https://en.wikipedia.org/wiki/Electroencephalography
|
||||
56. https://en.wikipedia.org/wiki/Electromyography
|
||||
57. https://en.wikipedia.org/wiki/Electrocardiography
|
||||
58. https://www.theverge.com/2019/9/23/20881032/facebook-ctrl-labs-acquisition-neural-interface-armband-ar-vr-deal
|
||||
59. https://www.ctrl-labs.com/
|
||||
60. https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface
|
||||
61. https://en.wikipedia.org/wiki/Brexit
|
||||
62. https://www.guineapigzero.com/i-was-a-brain-slave.html
|
||||
|
Loading…
Reference in New Issue
Block a user