Contradictory Attacks Are Contradictory

signal-2017-12-05-225754-1209701956.jpg

Did yet another video explaining how pentesters, hackers and other assortments of jackasses who use common pentesting programs like aircrack-ng or metasploit expose themselves to greater levels of EMF radiation by using my EMF detector to point out that when they attack some with a DDOS or DOS attack that there also attacking themselves.

Guess this means that pentesters and hackers become professional victims too

What Is Tailgating and Piggybacking

Jungian Psychology

Related

How Hackers On The Outside Of Government and The Corporate World Play A Role In Covert Harassment Campaigns

No Such Thing

The research that I am doing on gaslighting and gangstalking which has nothing to do with the cops or intelligentsia even if it might look that way. But a system administration course has given a glimpse of how these people might work in there mysterious ways. Even though it’s not that mysterious, it’s actually just social engineering that’s what gangstalking and gaslighting really is. Most people cannot make the connection even if the evidence is present to the contrary but you can’t force people to take your side for everything, especially if they haven’t been effected by harassment campaign.

Social Engineering (Human Sciences)

Social Engineering (Social Sciences)

Political Engineering (Political Sciences)

Gangs, terror groups and radicals will try to social exploit anyone or any situation they can to gain on there opponents which can be anything really. Gaslighting and gangstalking is an action which relates to political and social engineering because if such a thing didn’t exist then there wouldn’t be any gangs, terrorists or radicals.

Cyber physical attacks are real and trust me on this hackers outside the control of government and corporations are usually responsible for these attacks on people or structures that contain people with in them. Most of the left still wants to blame a western government or two because they don’t have the brain capacity to work out other possibilities besides the conspiracy theories that fly out of the mouths of minorities. Who are mainly Islamist who swear there is conspiracy against them on everything even though they perpetuate most of the conspiracies themselves.

Competing Hierarchies (Social Sciences)

Social Hierarchies & Collective Autonomy Would Be The Illuminati To A Conspiracy Theorist (Social Sciences)

Networked Love and Hate (Social Engineering)

Every Neighborhood Is A Server Farm With Organic & Synthetic Relationships (Social Sciences)

Reverse Engineering Mindwar (Social Engineering)

How The Left, Unions and Deep State Copied Mindwar Patents (Political Sciences)

Another thing I tested out was my open third eye and the relationship between wireless radio frequencies and using wireless technologies and finally realized something out of it all. Between the GHz’s of both phones that I use self text myself and the wireless. Which hovers around 2.4 GHz that means my phones are resonating at about 1.8 GHz so it’s a pretty consistent electronic vibration which is super and then when I touch the smartphone with my physical body that vibration becomes natural.

For every single message I send it’s supernatural from one device to the next.

Then in another instance……

Between the GHz’s of both phones that I use self text myself and the wireless. Which hovers around 2.4 GHz that means my phones are resonating at about 1.8 GHz so it’s a pretty consistent electronic vibration which is extra and then when I touch the smartphone with my physical body that vibration becomes terrestrial.

For Every Single Message I Send It’s Extra|Terrestrial From One Device To The Next.

Related

 

Competing Hierarchies

No Such Thing

Competing Hierarchies Will Rely Heavily On Vengeance Attacks

Services such as these are illegal under the current framework of law in Canada this is just for educational purposes only. Showing people that it’s not just government that uses these practices but private individuals who sell psychologically humiliating services to anyone that needs them like political parties or NGO’s for example.

http://www.alibisnpaybacks.com

https://www.nefariousjobsmain.com

https://revengeforhire.com

Directed Energy Attack Map

directed energy attack map

The hypothetical directed energy attack map which could be deployed by local gangs with there own cyber capabilities on a localized level. You could probably say that these homemade purchased off the internet of things devices are being used to deliver wireless radiation payloads onto people who I would think have nothing to do with the gangs per say. But these gang members just use these things for personal entertainment purposes and silently murder individuals in homes, businesses and quite possibly other places like churches for example. The method of a localized directed energy attack carried out by local gangs is constantly dosing a wireless AP whether it’s placed in a concealed place among other wireless devices as mention before with the Arduino and raspberry pi boards that have a built in wireless or Bluetooth radio chip for networking with wireless AP’s. Means that if someone where to use a bash shell script to keep that AP pumping streams of wireless radiation or wireless energy from the constant deauthorization requests to whatever devices it’s sending it to specifically or to the AP by itself. Means that a homeowner being targeted by a gang with local cyber capabilities of there own will never really know if it’s the government that’s behind it or a local gang of cyber hoodlums. However when it comes to directed energy attacks most people on the internet still believe to this day that governments and there corporate contractors are behind this business. However given that most common wireless devices have wireless and Bluetooth radio built into hobby boards like Arduino and raspberry pi means that an entire house hold could be hackadayed by a local gang with there own localized cyber capabilities. Placing these small or nano sized devices in the walls, ceilings and even the floors of there victims homes.

Connecting them to the electrical grid of there victims homes (which is illegal because it is considered to be theft of electricity) and then using there own metadata siphoning wireless router. Connected to a spliced illegal wired fork of there victims internet connection that they use to carry out packet injection attacks or what is described as ddos attack with each and every hobby board in that house hold means that a local gang with there own localized cyber capabilities can launch an electronic cyber attack on IoT devices in a victims house and also a physical directed energy attack too at the exact same time. Local WiFi war drivers aka local gang members (not the cops or intelligentsia) could be using these illegal WiFi siphoning routers that there friends or they themselves setup to access them through a wireless connection. Say like a laptop running Kali Linux with a wireless adapter running with programs like Aircrack-Ng, Aireplay-Ng or Airmon-Ng to access those illegal WiFi siphoning routers grabbing metadata downloading it onto a cold storage device like a portable external hard drive, flash drive, SD or micro SD card for later and illegal analysis.

These illegally setup wireless routing devices could be placed in your attic, in a wall cut open with a drywall knife or in the back of a closet that you seldom access without you knowing it’s there.

It never occurred to me but the possibilities are endless when it comes my adversaries (not the cops or intelligentsia) putting devices in my house that could potentially allow them to hack into my wireless devices (not that I use wireless devices that much any more switched back to wired) using a common off the self wireless router, some stolen coaxial cable and electrical wiring. So they could splice an illegal connection to the internet so that they can access to device remotely but still siphon off large amounts of metadata using that routing device. I found an article from null byte dating back to 2013 when other readers could have been inspired to create wireless metadata siphoning points in there adversaries homes. By just simply breaking into the houses masquerading themselves fictitiously and illegally as government agents or corporate employees to get there victims login credentials for whatever online services they use, to stealing money from there bank accounts while they are using there smartphone or other wireless devices. Aside from that they could use that device to not only siphon metadata maliciously but use a means to setup there own wireless IP pinhole cameras purchased off the internet. To monitor there adversaries in there own homes, seeing what time they leave the house and what time they return, to the relationship they have other people determining there names and whereabouts etc.

The left and there criminal allies in common neighborhoods have a means to control the populace just as the government does with similar technologies that the government has used since at least the seventies to maintain the minds of the people using something called Mindwar. However the small minded people on the internet who are quite frankly activists and conspiracy theorists still hold the government responsible for Mindwar abuses. But with me that’s not how I think it works and that criminals are opportunists whenever something presents itself as means to expropriate an agenda for there own benefit. Call it at least the way the left might put it so that it doesn’t sound too controversial “a power to the people network” where physical directed energy gets pumped into everyone living in neighborhoods with large and significant number of leftist might attempt to do something like this on a covert level at least on there own. However it’s functions may actually be used to disrupt law enforcement and intelligence officers scouting the area either investigating or carrying out an operation against a group of adversaries like a gang or terror cell.

929642709748535296

Articles For My Research Originates From Null Byte

https://is.gd/9SHP6h

https://is.gd/h7EJoJ

https://is.gd/ItYU9Y

https://is.gd/cl8kML

****Please Don’t Use This Information Maliciously Against Another Individual and Please Be Mindful Of Federal, State, Provincial, Municipal, County and Local Laws Because You Could Be Held Criminally Liable If You Get Caught Doing This To Which I Take No Responsibility For Because You Chose To Act Maliciously Against Another Individual****

not intended for the criminally minded

 

 

How The Left, Unions and Deep State Might Have Copied The Military’s Mindwar Patents To Make There Own Mindware Networks.

not intended for the criminally minded

Which mindwar patents did the left, the unions and the deep state copy from the military to use against the citizenry that they don’t like including targeting government officials and politicians?

1. https://is.gd/1g6DqU

2. https://is.gd/OV6oWE

3. https://is.gd/ATJ6ZI

4. https://is.gd/Vj9SL0

5. https://is.gd/ujjpEa

6. https://is.gd/WyY8QD

7. https://is.gd/mqcEfn

8. https://is.gd/OzFi6E

9. https://is.gd/pdVtaO

10. https://is.gd/eB6F6o

11. https://is.gd/jA8hlF

12. https://is.gd/kffV16

13. https://is.gd/nNujpq

14. https://is.gd/UyL9dZ

15. https://is.gd/VBwBdu

16. https://is.gd/PiFgm6

17. https://is.gd/xlaKTx

18. https://is.gd/ziRge5

19. https://is.gd/blewxv

20. https://is.gd/EEfeJU

21. https://is.gd/84EqW6

22. https://is.gd/gZeG5m

How many actual and real members of the International Brotherhood of Electrical Workers and USW Telecommunications Local 1944 in Canada have been tinkering with this technology putting it in the homes, business and other tangible structures like places of worship etc.

And Please Folks Do Remember That…….

not intended for the criminally minded