JuiceSSH With BackBox Linux

signal-attachment-2019-05-25-041440

Using JuiceSSH abroad isn’t as easy as looks so I am going to opt on using VPN. Because I am convinced that my adversaries use VPN’s while being connected to there hacking rigs or raspberry pi hacking networks all over town.

Related

What Is Tailgating and Piggybacking

Jungian Psychology

Related

There’s No Such Thing As A New World Order

No Such Thing

Absolutely not there is however a liberal world order, conservative world order, libertarian world order, communist world order, socialist world order, marxist world order and list goes on even an islamic world order too. But you couldn’t tell them apart because they all have the same basic foundation a world and order beneath there great ideas which creates three levels of progression for those involved in each order. It’s representative by different political parties in a democracy which seen in most western countries and some outside the west.  

do not tread on me

How Hackers On The Outside Of Government and The Corporate World Play A Role In Covert Harassment Campaigns

No Such Thing

The research that I am doing on gaslighting and gangstalking which has nothing to do with the cops or intelligentsia even if it might look that way. But a system administration course has given a glimpse of how these people might work in there mysterious ways. Even though it’s not that mysterious, it’s actually just social engineering that’s what gangstalking and gaslighting really is. Most people cannot make the connection even if the evidence is present to the contrary but you can’t force people to take your side for everything, especially if they haven’t been effected by harassment campaign.

Social Engineering (Human Sciences)

Social Engineering (Social Sciences)

Political Engineering (Political Sciences)

Gangs, terror groups and radicals will try to social exploit anyone or any situation they can to gain on there opponents which can be anything really. Gaslighting and gangstalking is an action which relates to political and social engineering because if such a thing didn’t exist then there wouldn’t be any gangs, terrorists or radicals.

Cyber physical attacks are real and trust me on this hackers outside the control of government and corporations are usually responsible for these attacks on people or structures that contain people with in them. Most of the left still wants to blame a western government or two because they don’t have the brain capacity to work out other possibilities besides the conspiracy theories that fly out of the mouths of minorities. Who are mainly Islamist who swear there is conspiracy against them on everything even though they perpetuate most of the conspiracies themselves.

Competing Hierarchies (Social Sciences)

Social Hierarchies & Collective Autonomy Would Be The Illuminati To A Conspiracy Theorist (Social Sciences)

Networked Love and Hate (Social Engineering)

Every Neighborhood Is A Server Farm With Organic & Synthetic Relationships (Social Sciences)

Reverse Engineering Mindwar (Social Engineering)

How The Left, Unions and Deep State Copied Mindwar Patents (Political Sciences)

Another thing I tested out was my open third eye and the relationship between wireless radio frequencies and using wireless technologies and finally realized something out of it all. Between the GHz’s of both phones that I use self text myself and the wireless. Which hovers around 2.4 GHz that means my phones are resonating at about 1.8 GHz so it’s a pretty consistent electronic vibration which is super and then when I touch the smartphone with my physical body that vibration becomes natural.

For every single message I send it’s supernatural from one device to the next.

Then in another instance……

Between the GHz’s of both phones that I use self text myself and the wireless. Which hovers around 2.4 GHz that means my phones are resonating at about 1.8 GHz so it’s a pretty consistent electronic vibration which is extra and then when I touch the smartphone with my physical body that vibration becomes terrestrial.

For Every Single Message I Send It’s Extra|Terrestrial From One Device To The Next.

Related

 

POE Useful In Psychological Warfare

proxy.duckduckgo.com

Whatever my adversaries are doing with there own psychological warfare suite I can do way better because they thought it was a good idea to splice cat 5 cable into a splice box and connect it to the wiring in my house. However my plan doesn’t involve using such an old dated technique instead I would use what I already have and add to it. Using at least eight raspberry pi three boards running Oracle Linux for ARM then operating a separate computer running Oracle Linux for servers connected to the Raspberry Pi’s. As for this splicing and wiring things to my electrical system business that wouldn’t be the case seeing as Power Over Ethernet would take over on that front, the electricity is already available via the Ethernet switch and the router.

This would be part of a broader plan of building a smart house with this system in place for mainly behavioral control not modding which is based on well researched science.

1. Raspberry Pi 3 (x8)

2. Cisco DPC 3010 (DOCSIS 3.0)

3. Cisco SG350 10 Port Gigabit Managed Switch

4. Pi PoE Switch HAT (x8)

5. Cat 7 Ethernet Cable 30 FT (x8)

6. Cat 7 Ethernet Cable 1.5 FT (x8)

7. Zareason Desktop Computer

Then it would be a matter of initially targeting the Oracle server unit connected to the Raspberry Pi’s to be hit with a series of DDOS attacks from a specific location using a pentest program to essentially transfer consciousness, resonation and vibration from people who are relatively neutral in personality but no friends or foes.