RNMnetwork/Part 1 - The worldwide neural control network/3 - human networking stack.md
Riccardo Giuntoli 3de0650da9 10/1 6:7
2020-01-10 06:07:55 +01:00

3.9 KiB

Human networking stack

Like in the OSI model in the remote neural monitoring network there's a pile of different protocols that which deals with human address that are constantly tracked in the network and are considered like machines in a IP network.

Human stack

Physical layer

Human body

Human body [1] is the physical layer of connectivity of this network. This is an awesome technology but used to destroy, command and conquer.

Unique ID magnetic field

We're locked to those networks by satellite and by the steam machine between an unique human magnetic field value transmitted naturally if radio wave stimulated. The frequency that is used to stimulate these field is 3Ghz it can be transmitted by satellite or by WiMax [2] radio technology. Magnetoelectric [3] nanoparticles [4] MEN are responsible of this emission.

Until ten years ago those networks exist but the services use in hide mode, there was no interaction with the client, the victim. Then someone have created a tool that scan for this magnetic field unique id and a lot of people become target individuals. Human guinea pig. Subjects that are under a continuous bet vortex in crypt concurrency. People that normally commit suicide. Go in mental disorder vortex by a corrupted health care system. Something that is destroying our society. Welcome to the false electronic democracy. Welcome to the probably third world war.

Network Layer

Heartmath

Another method to give an address in this radio network to clients, humans but not only also animal and machines, is the magnetic field produced by heart [5].

Transport Layer

Human resonance frequencies

The transport layer to address the different organs of the client services, in this case are our organs, are the resonance frequencies of every part of our body. The worst part is that every human has got a particular range of resonance of internal organs. So every target individual has to be scanned like in a nmap [6] session.

How they can do it?

Using others victims and their particular smart phones infected by hackers working with these facility.

A smart phone nowadays has got a lot of hardware that can be used to do this body scanner:

  • MEMS magnetic field sensor [7]
  • Accelerometer [8]
  • LTE quad band modem [9]
  • Wi-Fi and Bluetooth modules [10]
  • GNSS modules [11]
  1. https://en.wikipedia.org/wiki/Human_body
  2. https://en.wikipedia.org/wiki/WiMAX
  3. https://www.nature.com/articles/s41598-017-01647-x
  4. https://en.wikipedia.org/wiki/Nanoparticle
  5. https://en.wikipedia.org/wiki/Heart
  6. https://en.wikipedia.org/wiki/Nmap
  7. https://en.wikipedia.org/wiki/MEMS_magnetic_field_sensor
  8. https://en.wikipedia.org/wiki/Accelerometer
  9. https://www.sierrawireless.com/products-and-solutions/embedded-solutions/iot-modules/
  10. https://www.sierrawireless.com/products-and-solutions/embedded-solutions/wifi-bluetooth-modules/
  11. https://www.sierrawireless.com/products-and-solutions/embedded-solutions/gnss-positioning-modules/