Directed Energy Attack Map

directed energy attack map

The hypothetical directed energy attack map which could be deployed by local gangs with there own cyber capabilities on a localized level. You could probably say that these homemade purchased off the internet of things devices are being used to deliver wireless radiation payloads onto people who I would think have nothing to do with the gangs per say. But these gang members just use these things for personal entertainment purposes and silently murder individuals in homes, businesses and quite possibly other places like churches for example. The method of a localized directed energy attack carried out by local gangs is constantly dosing a wireless AP whether it’s placed in a concealed place among other wireless devices as mention before with the Arduino and raspberry pi boards that have a built in wireless or Bluetooth radio chip for networking with wireless AP’s. Means that if someone where to use a bash shell script to keep that AP pumping streams of wireless radiation or wireless energy from the constant deauthorization requests to whatever devices it’s sending it to specifically or to the AP by itself. Means that a homeowner being targeted by a gang with local cyber capabilities of there own will never really know if it’s the government that’s behind it or a local gang of cyber hoodlums. However when it comes to directed energy attacks most people on the internet still believe to this day that governments and there corporate contractors are behind this business. However given that most common wireless devices have wireless and Bluetooth radio built into hobby boards like Arduino and raspberry pi means that an entire house hold could be hackadayed by a local gang with there own localized cyber capabilities. Placing these small or nano sized devices in the walls, ceilings and even the floors of there victims homes.

Connecting them to the electrical grid of there victims homes (which is illegal because it is considered to be theft of electricity) and then using there own metadata siphoning wireless router. Connected to a spliced illegal wired fork of there victims internet connection that they use to carry out packet injection attacks or what is described as ddos attack with each and every hobby board in that house hold means that a local gang with there own localized cyber capabilities can launch an electronic cyber attack on IoT devices in a victims house and also a physical directed energy attack too at the exact same time. Local WiFi war drivers aka local gang members (not the cops or intelligentsia) could be using these illegal WiFi siphoning routers that there friends or they themselves setup to access them through a wireless connection. Say like a laptop running Kali Linux with a wireless adapter running with programs like Aircrack-Ng, Aireplay-Ng or Airmon-Ng to access those illegal WiFi siphoning routers grabbing metadata downloading it onto a cold storage device like a portable external hard drive, flash drive, SD or micro SD card for later and illegal analysis.

These illegally setup wireless routing devices could be placed in your attic, in a wall cut open with a drywall knife or in the back of a closet that you seldom access without you knowing it’s there.

It never occurred to me but the possibilities are endless when it comes my adversaries (not the cops or intelligentsia) putting devices in my house that could potentially allow them to hack into my wireless devices (not that I use wireless devices that much any more switched back to wired) using a common off the self wireless router, some stolen coaxial cable and electrical wiring. So they could splice an illegal connection to the internet so that they can access to device remotely but still siphon off large amounts of metadata using that routing device. I found an article from null byte dating back to 2013 when other readers could have been inspired to create wireless metadata siphoning points in there adversaries homes. By just simply breaking into the houses masquerading themselves fictitiously and illegally as government agents or corporate employees to get there victims login credentials for whatever online services they use, to stealing money from there bank accounts while they are using there smartphone or other wireless devices. Aside from that they could use that device to not only siphon metadata maliciously but use a means to setup there own wireless IP pinhole cameras purchased off the internet. To monitor there adversaries in there own homes, seeing what time they leave the house and what time they return, to the relationship they have other people determining there names and whereabouts etc.

The left and there criminal allies in common neighborhoods have a means to control the populace just as the government does with similar technologies that the government has used since at least the seventies to maintain the minds of the people using something called Mindwar. However the small minded people on the internet who are quite frankly activists and conspiracy theorists still hold the government responsible for Mindwar abuses. But with me that’s not how I think it works and that criminals are opportunists whenever something presents itself as means to expropriate an agenda for there own benefit. Call it at least the way the left might put it so that it doesn’t sound too controversial “a power to the people network” where physical directed energy gets pumped into everyone living in neighborhoods with large and significant number of leftist might attempt to do something like this on a covert level at least on there own. However it’s functions may actually be used to disrupt law enforcement and intelligence officers scouting the area either investigating or carrying out an operation against a group of adversaries like a gang or terror cell.


Articles For My Research Originates From Null Byte

****Please Don’t Use This Information Maliciously Against Another Individual and Please Be Mindful Of Federal, State, Provincial, Municipal, County and Local Laws Because You Could Be Held Criminally Liable If You Get Caught Doing This To Which I Take No Responsibility For Because You Chose To Act Maliciously Against Another Individual****

not intended for the criminally minded



Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s