Who Was Really Behind OWS

No Such Thing

There is a reason why Andrew Breitbart was killed off by the deep state, he knew the real founders of the cockupy ball street movement. Which branches off into the crack lives matters movement.

At least he was able start up breitbart, his idealistic journalist website to fight the liberal media and take back the truth from a media that likes to divide and conquer. Trump calls liberal media outlets like CNN or NBC fake news.

Related

And It’s Gone………

arpscan

It appears that the unions with there friends on the left and center left have constructed there own internet based psychological warfare network made with computer hobby boards. This isn’t connected to the government of Canada or any other western government from looks of it. Because the router is outdated for starters and the firmware isn’t up to date based on the scan I did and analyzing this network in my own house with some very basic open source software like arp-scan and airmon-ng. A week later Cisco SPVTG disappears from the arp scan I even checked with a netstat and IP route scan it didn’t show up. The router devices I use are dlink which has a default routing address of 10.0.0.1 and the Cisco device has default routing address of 192.168.0.1

Directed Energy Attack Map

directed energy attack map

The hypothetical directed energy attack map which could be deployed by local gangs with there own cyber capabilities on a localized level. You could probably say that these homemade purchased off the internet of things devices are being used to deliver wireless radiation payloads onto people who I would think have nothing to do with the gangs per say. But these gang members just use these things for personal entertainment purposes and silently murder individuals in homes, businesses and quite possibly other places like churches for example. The method of a localized directed energy attack carried out by local gangs is constantly dosing a wireless AP whether it’s placed in a concealed place among other wireless devices as mention before with the Arduino and raspberry pi boards that have a built in wireless or Bluetooth radio chip for networking with wireless AP’s. Means that if someone where to use a bash shell script to keep that AP pumping streams of wireless radiation or wireless energy from the constant deauthorization requests to whatever devices it’s sending it to specifically or to the AP by itself. Means that a homeowner being targeted by a gang with local cyber capabilities of there own will never really know if it’s the government that’s behind it or a local gang of cyber hoodlums. However when it comes to directed energy attacks most people on the internet still believe to this day that governments and there corporate contractors are behind this business. However given that most common wireless devices have wireless and Bluetooth radio built into hobby boards like Arduino and raspberry pi means that an entire house hold could be hackadayed by a local gang with there own localized cyber capabilities. Placing these small or nano sized devices in the walls, ceilings and even the floors of there victims homes.

Connecting them to the electrical grid of there victims homes (which is illegal because it is considered to be theft of electricity) and then using there own metadata siphoning wireless router. Connected to a spliced illegal wired fork of there victims internet connection that they use to carry out packet injection attacks or what is described as ddos attack with each and every hobby board in that house hold means that a local gang with there own localized cyber capabilities can launch an electronic cyber attack on IoT devices in a victims house and also a physical directed energy attack too at the exact same time. Local WiFi war drivers aka local gang members (not the cops or intelligentsia) could be using these illegal WiFi siphoning routers that there friends or they themselves setup to access them through a wireless connection. Say like a laptop running Kali Linux with a wireless adapter running with programs like Aircrack-Ng, Aireplay-Ng or Airmon-Ng to access those illegal WiFi siphoning routers grabbing metadata downloading it onto a cold storage device like a portable external hard drive, flash drive, SD or micro SD card for later and illegal analysis.

These illegally setup wireless routing devices could be placed in your attic, in a wall cut open with a drywall knife or in the back of a closet that you seldom access without you knowing it’s there.

It never occurred to me but the possibilities are endless when it comes my adversaries (not the cops or intelligentsia) putting devices in my house that could potentially allow them to hack into my wireless devices (not that I use wireless devices that much any more switched back to wired) using a common off the self wireless router, some stolen coaxial cable and electrical wiring. So they could splice an illegal connection to the internet so that they can access to device remotely but still siphon off large amounts of metadata using that routing device. I found an article from null byte dating back to 2013 when other readers could have been inspired to create wireless metadata siphoning points in there adversaries homes. By just simply breaking into the houses masquerading themselves fictitiously and illegally as government agents or corporate employees to get there victims login credentials for whatever online services they use, to stealing money from there bank accounts while they are using there smartphone or other wireless devices. Aside from that they could use that device to not only siphon metadata maliciously but use a means to setup there own wireless IP pinhole cameras purchased off the internet. To monitor there adversaries in there own homes, seeing what time they leave the house and what time they return, to the relationship they have other people determining there names and whereabouts etc.

The left and there criminal allies in common neighborhoods have a means to control the populace just as the government does with similar technologies that the government has used since at least the seventies to maintain the minds of the people using something called Mindwar. However the small minded people on the internet who are quite frankly activists and conspiracy theorists still hold the government responsible for Mindwar abuses. But with me that’s not how I think it works and that criminals are opportunists whenever something presents itself as means to expropriate an agenda for there own benefit. Call it at least the way the left might put it so that it doesn’t sound too controversial “a power to the people network” where physical directed energy gets pumped into everyone living in neighborhoods with large and significant number of leftist might attempt to do something like this on a covert level at least on there own. However it’s functions may actually be used to disrupt law enforcement and intelligence officers scouting the area either investigating or carrying out an operation against a group of adversaries like a gang or terror cell.

929642709748535296

Articles For My Research Originates From Null Byte

https://is.gd/9SHP6h

https://is.gd/h7EJoJ

https://is.gd/ItYU9Y

https://is.gd/cl8kML

****Please Don’t Use This Information Maliciously Against Another Individual and Please Be Mindful Of Federal, State, Provincial, Municipal, County and Local Laws Because You Could Be Held Criminally Liable If You Get Caught Doing This To Which I Take No Responsibility For Because You Chose To Act Maliciously Against Another Individual****

not intended for the criminally minded

 

 

How The Left, Unions and Deep State Might Have Copied The Military’s Mindwar Patents To Make There Own Mindware Networks.

not intended for the criminally minded

Which mindwar patents did the left, the unions and the deep state copy from the military to use against the citizenry that they don’t like including targeting government officials and politicians?

1. https://is.gd/1g6DqU

2. https://is.gd/OV6oWE

3. https://is.gd/ATJ6ZI

4. https://is.gd/Vj9SL0

5. https://is.gd/ujjpEa

6. https://is.gd/WyY8QD

7. https://is.gd/mqcEfn

8. https://is.gd/OzFi6E

9. https://is.gd/pdVtaO

10. https://is.gd/eB6F6o

11. https://is.gd/jA8hlF

12. https://is.gd/kffV16

13. https://is.gd/nNujpq

14. https://is.gd/UyL9dZ

15. https://is.gd/VBwBdu

16. https://is.gd/PiFgm6

17. https://is.gd/xlaKTx

18. https://is.gd/ziRge5

19. https://is.gd/blewxv

20. https://is.gd/EEfeJU

21. https://is.gd/84EqW6

22. https://is.gd/gZeG5m

How many actual and real members of the International Brotherhood of Electrical Workers and USW Telecommunications Local 1944 in Canada have been tinkering with this technology putting it in the homes, business and other tangible structures like places of worship etc.

And Please Folks Do Remember That…….

not intended for the criminally minded

Mindware (Dis)organizational Structure

Mindware Structure

Memes are ideas, behaviors, or styles that spreads from person to person within a culture often with the aim of conveying a particular phenomenon, theme, or meaning represented by the meme. A meme acts as a unit for carrying cultural ideas, symbols, or practices, that can be transmitted from one mind to another through writing, speech, gestures, rituals, or other imitable phenomena with a mimicked theme. Supporters of the concept regard memes as cultural analogues to genes in that they self-replicate, mutate, and respond to selective pressures.

Proponents theorize that memes are a viral phenomenon that may evolve by natural selection in a manner analogous to that of biological evolution. Memes do this through the processes of variation, mutation, competition, and inheritance, each of which influences a meme’s reproductive success. Memes spread through the behavior that they generate in their hosts. Memes that propagate less prolifically may become extinct, while others may survive, spread, and (for better or for worse) mutate. Memes that replicate most effectively enjoy more success, and some may replicate effectively even when they prove to be detrimental to the welfare of their hosts.

A field of study called memetics arose in the 1990s to explore the concepts and transmission of memes in terms of an evolutionary model. Criticism from a variety of fronts has challenged the notion that academic study can examine memes empirically. However, developments in neuroimaging may make empirical study possible. Some commentators in the social sciences question the idea that one can meaningfully categorize culture in terms of discrete units, and are especially critical of the biological nature of the theory’s underpinnings. Others have argued that this use of the term is the result of a misunderstanding of the original proposal.

 

 

 

 

My House Has Become A Hackaday.io Project Made By Blackhat Punks

My House Is A Hackday.io Project

Common members of the community in common neighborhoods. Acting like government agents running an operation that’s supposed to give the victim the impression they have a mental illness. But actually don’t have an sort of mental illness to speak of however in combination with involuntary doses of psychedelics and psychotronic energy. Emanating from commonly used wireless devices it can drive a normal nominal person insane under the wrong circumstances.