Hamas Is The Testnet and The Muslim Brotherhood Is Bitcoin

Remote Management

Worked out quite an interesting theory about the Muslim brotherhood and Hamas by using Bitcoin which could represent the Muslim brotherhood and Hamas is the Testnet which is an alternative bitcoin block chain used for testing and development. This means that Hamas is used as a testing and development model for terrorism worldwide and the Muslim brotherhood is the final product that gets distributed to the entire world like open source code. But that’s what Bitcoin is it’s like the Muslim brotherhood, but anyone can take there open source code and fork it to social engineer more terrorism. Just like when cryptocurrency developers fork Bitcoin to social engineer an alternative cryptocurrency to give consumers more options to make and spend money in the digital and global economy.

What Is Tailgating and Piggybacking

Jungian Psychology


How Hackers On The Outside Of Government and The Corporate World Play A Role In Covert Harassment Campaigns

No Such Thing

The research that I am doing on gaslighting and gangstalking which has nothing to do with the cops or intelligentsia even if it might look that way. But a system administration course has given a glimpse of how these people might work in there mysterious ways. Even though it’s not that mysterious, it’s actually just social engineering that’s what gangstalking and gaslighting really is. Most people cannot make the connection even if the evidence is present to the contrary but you can’t force people to take your side for everything, especially if they haven’t been effected by harassment campaign.

Social Engineering (Human Sciences)

Social Engineering (Social Sciences)

Political Engineering (Political Sciences)

Gangs, terror groups and radicals will try to social exploit anyone or any situation they can to gain on there opponents which can be anything really. Gaslighting and gangstalking is an action which relates to political and social engineering because if such a thing didn’t exist then there wouldn’t be any gangs, terrorists or radicals.

Cyber physical attacks are real and trust me on this hackers outside the control of government and corporations are usually responsible for these attacks on people or structures that contain people with in them. Most of the left still wants to blame a western government or two because they don’t have the brain capacity to work out other possibilities besides the conspiracy theories that fly out of the mouths of minorities. Who are mainly Islamist who swear there is conspiracy against them on everything even though they perpetuate most of the conspiracies themselves.

Competing Hierarchies (Social Sciences)

Social Hierarchies & Collective Autonomy Would Be The Illuminati To A Conspiracy Theorist (Social Sciences)

Networked Love and Hate (Social Engineering)

Every Neighborhood Is A Server Farm With Organic & Synthetic Relationships (Social Sciences)

Reverse Engineering Mindwar (Social Engineering)

How The Left, Unions and Deep State Copied Mindwar Patents (Political Sciences)

Another thing I tested out was my open third eye and the relationship between wireless radio frequencies and using wireless technologies and finally realized something out of it all. Between the GHz’s of both phones that I use self text myself and the wireless. Which hovers around 2.4 GHz that means my phones are resonating at about 1.8 GHz so it’s a pretty consistent electronic vibration which is super and then when I touch the smartphone with my physical body that vibration becomes natural.

For every single message I send it’s supernatural from one device to the next.

Then in another instance……

Between the GHz’s of both phones that I use self text myself and the wireless. Which hovers around 2.4 GHz that means my phones are resonating at about 1.8 GHz so it’s a pretty consistent electronic vibration which is extra and then when I touch the smartphone with my physical body that vibration becomes terrestrial.

For Every Single Message I Send It’s Extra|Terrestrial From One Device To The Next.



Competing Hierarchies

No Such Thing

Competing Hierarchies Will Rely Heavily On Vengeance Attacks

Services such as these are illegal under the current framework of law in Canada this is just for educational purposes only. Showing people that it’s not just government that uses these practices but private individuals who sell psychologically humiliating services to anyone that needs them like political parties or NGO’s for example.




How The Left, Unions and Deep State Might Have Copied The Military’s Mindwar Patents To Make There Own Mindware Networks.

not intended for the criminally minded

Which mindwar patents did the left, the unions and the deep state copy from the military to use against the citizenry that they don’t like including targeting government officials and politicians?

1. https://is.gd/1g6DqU

2. https://is.gd/OV6oWE

3. https://is.gd/ATJ6ZI

4. https://is.gd/Vj9SL0

5. https://is.gd/ujjpEa

6. https://is.gd/WyY8QD

7. https://is.gd/mqcEfn

8. https://is.gd/OzFi6E

9. https://is.gd/pdVtaO

10. https://is.gd/eB6F6o

11. https://is.gd/jA8hlF

12. https://is.gd/kffV16

13. https://is.gd/nNujpq

14. https://is.gd/UyL9dZ

15. https://is.gd/VBwBdu

16. https://is.gd/PiFgm6

17. https://is.gd/xlaKTx

18. https://is.gd/ziRge5

19. https://is.gd/blewxv

20. https://is.gd/EEfeJU

21. https://is.gd/84EqW6

22. https://is.gd/gZeG5m

How many actual and real members of the International Brotherhood of Electrical Workers and USW Telecommunications Local 1944 in Canada have been tinkering with this technology putting it in the homes, business and other tangible structures like places of worship etc.

And Please Folks Do Remember That…….

not intended for the criminally minded

Mindware (Dis)organizational Structure

Mindware Structure

Memes are ideas, behaviors, or styles that spreads from person to person within a culture often with the aim of conveying a particular phenomenon, theme, or meaning represented by the meme. A meme acts as a unit for carrying cultural ideas, symbols, or practices, that can be transmitted from one mind to another through writing, speech, gestures, rituals, or other imitable phenomena with a mimicked theme. Supporters of the concept regard memes as cultural analogues to genes in that they self-replicate, mutate, and respond to selective pressures.

Proponents theorize that memes are a viral phenomenon that may evolve by natural selection in a manner analogous to that of biological evolution. Memes do this through the processes of variation, mutation, competition, and inheritance, each of which influences a meme’s reproductive success. Memes spread through the behavior that they generate in their hosts. Memes that propagate less prolifically may become extinct, while others may survive, spread, and (for better or for worse) mutate. Memes that replicate most effectively enjoy more success, and some may replicate effectively even when they prove to be detrimental to the welfare of their hosts.

A field of study called memetics arose in the 1990s to explore the concepts and transmission of memes in terms of an evolutionary model. Criticism from a variety of fronts has challenged the notion that academic study can examine memes empirically. However, developments in neuroimaging may make empirical study possible. Some commentators in the social sciences question the idea that one can meaningfully categorize culture in terms of discrete units, and are especially critical of the biological nature of the theory’s underpinnings. Others have argued that this use of the term is the result of a misunderstanding of the original proposal.