Avoid using free public WiFi spots because nine times out of ten there’s criminal hackers lurking and looking for ways to exploit the apps on your phone if it’s an Android device and can’t say for sure if this works on IPhone’s.
The telecommunications grid does carry human consciousness, subconsciousness and unconsciousness just like it does with the electrical grid but the only difference is the telecommunications grid goes wireless and with that human consciousness can be channeled from your telecommunications devices like your smartphone or WiFi router.
- How Psychic/Mystics Are Involved In The World Of Gangstalking
- What Is Social Engineering
- DDOS Attack Maps
- Scanning For EMF Radiation (Part 1)
- Scanning For EMF Radiation (Part 2)
- What Is Hate and What Is Love
- How Hackers On The Outside Of Government and The Corporate World Play A Role In Covert Harassment Campaigns
- POE Useful In Psychological Warfare
- Cellular Towers Are Troll Towers
- Who Uses A DOCSIS 2.0 Router In 2019
- Networked Love and Hate
- Every Neighborhood Is A Server Farm With Organic & Synthetic Relationships
- Reverse Engineering Mindwar For A Particular Political, Social and Religious Agenda Mainly Coordinated By The Left and Unions In Canada and The USA
- Directed Energy Attack Map
- How The Left, Unions and Deep State Might Have Copied The Military’s Mindwar Patents To Make There Own Mindware Networks
- Mindware vs Mindwar Technology
- DB Psychotronics & RF Microwave Effect
- Stray Radio Signals Are A Lot Like Stray Dogs They Bite
This happened to me four years ago when I was renting a room at my cousin’s place. One night I heard people in his backyard as we all began to fall asleep for the night. Fortunely I was still partially awake when it happened. I could hear a noise I was familiar with, a large cylinder tank hitting the concrete pad just outside my window, exactly where the fresh air intake vent is on the outside of the house. The reason why I was so familiar with such noise like that is because I used to work in steel fabrication in shops and out on construction sites. Then as I began to fall asleep I heard this hissing noise and felt a strange feeling in my body slightly afterwards. There wasn’t much I could do about what was happening, so I just let it happened to see what kind of outcome would arise.
Turns out the gas that was used against me and my family was argon a common gas used in steel fabrication and welding. Which means some of my adversaries are clearly construction workers and tradesman, but they weren’t cops, spies or informants.
The Dangers Of Argon
The health hazards associated with overexposure to argon are minimal. But it is a simple asphyxiant, so in ceratin cases a release of a large volume of argon can pose a hazard of asphyxiation. Argon is neither flammable nor reactive. If a tank of argon is heated or punctured, the tank may rupture and cause physical injury. Argon is an element that exists as a gas in its natural form. Argon is a colorless, odorless gas.
Inhalation of a small amount of argon is not expected to cause adverse health effects. But, should there be an oxygen-deficient environment caused by release of a large quantity of argon, especially in a confined space, a person may experience symptoms such as headache, ringing in the ears, dizziness, drowsiness, unconsciousness, nausea, vomiting and depression of all the senses. Being confined to an oxygen-deficient environment for a prolonged period of time can even prove fatal.
The air we breathe normally contains about 21 percent oxygen. At 12 to 16 percent oxygen, a person’s breathing and pulse rate increases and muscular coordination is slightly disturbed. People experience emotional upset, abnormal fatigue and disturbed respiration at 10 to 14 percent oxygen; and nausea, vomiting, collapse and loss of consciousness at 6 to 10 percent oxygen. Below 6 percent oxygen, people can develop convulsive movements and respiratory collapse; they can die.
- How To Make A Schizophrenic For Amusement Purposes
- The Dangers Of Islamism In The West
- What Is Tailgating and Piggybacking
- How Outsiders Coordinated Attacks On Citizens
- Who Uses A DOCSIS 2.0 Router In 2019
- Competing Hierarchies
- Social Hierarchies and Collective Autonomy
- Networked Love and Hate
- It’s Abused By Cheerleaders On The Left
- Reverse Engineered Mindwar
- The Left and Unions Might Have Copied The Military’s Mindwar Patents
Firstly I live in a world where paranoia is healthy and not the latter. Sure the cops are everywhere but not all the time and for those who are convinced of a conspiracy sure there are conspiracies but for crying out loud not every cop is out to get you. There are hackers out there can play the role of police officer but don’t have the authority of one.
Please do not attempt to hack IP cameras or CCTV it is illegal these videos I have clearly presented on my blog are just examples of gusty people. Trying to show you another world that doesn’t live on your conspiracy forums, blogs, twitter feeds or facebook.
Why it might be a good idea to use strong passphrases to secure internet routing devices. Because if you set it to the default password then what will happen is foreign and domestic adversaries will take advantage of your good will and fuck your shit up literally with a few keystrokes.
In late April, the top federal cybersecurity agency, US-CERT, announced that Russian hackers had attacked internet-connected devices throughout the U.S., including network routers in private homes. Most people set them up – or had their internet service provider set them up – and haven’t thought much about them since. But it’s the gateway to the internet for every device on your home network, including Wi-Fi connected ones. That makes it a potential target for anyone who wants to attack you, or, more likely, use your internet connection to attack someone else.
As graduate students and faculty doing research in cybersecurity, we know that hackers can take control of many routers, because manufacturers haven’t set them up securely. Router administrative passwords often are preset at the factory to default values that are widely known, like “admin” or “password.” By scanning the internet for older routers and guessing their passwords with specialized software, hackers can take control of routers and other devices. Then they can install malicious programs or modify the existing software running the device.
How To Know Whether Your Being Hacked By An Adversary
This is one method for knowing whether your being hacked by an adversary is when you hear radio static human feedback from your wireless routing device. Because as I have come to realize it myself is that anything that operates at 2.4 GHz (UHF) and 5 GHz (SHF) from a wireless routing device can be intercepted using a software defined radio.
Before we get into the latest scary-virtual private network (VPN) news, let’s do as Naked Security’s Paul Ducklin advises and repeat after him:
A VPN doesn’t magically improve security. All it really does is to make your VPN provider into your new ISP – your “first hop” on the internet. That first hop is the one place where a single provider gets to see all your traffic, whether it’s encrypted or not. You need to trust your VPN provider. A lot.
Many people do trust their VPN provider. A lot. Unfortunately, some of them shouldn’t, going by what a Department of Homeland Security (DHS) higher-up recently said.
In a letter sent to Senators Ron Wyden and Marco Rubio on 22 May 2019, Chris Krebs, director of DHS’s Cybersecurity and Infrastructure Security Agency (CISA), wrote that foreign adversaries are interested in exploiting VPN services. From the letter:
Open-source reporting indicates nation-state actors have demonstrated intent and capability to leverage VPN services and vulnerable users for malicious purposes.
Krebs was writing in response to a 7 February 2019 letter sent to him by the senators, who are concerned about threats posed by apps created in countries of national security concern to the US.
The senators noted that mobile browsers such as Yandex, Dolphin and Opera use their own servers as an intermediary for user traffic, compressing the pages before delivering them to users in order to save data. Similarly, VPN providers route traffic through their own servers in order to mitigate privacy concerns – nominally, at least, the senators said.