User Controls
Gang Stalking in Canada by CSIS and RCMP using undercover drug runners and crisis actors in Toronto
-
2019-01-30 at 2:47 PM UTC
-
2019-01-30 at 2:51 PM UTCWow! You're an analyst?
-
2019-01-30 at 2:53 PM UTCWhy yes lol
-
2019-01-30 at 8:46 PM UTC
Originally posted by SpaceCakes dude, in the 1970s they discovered they could hear what the mind thinks by placing a probe on one part of the brain.
since then they have been able to pick it up with digital technology because analog would increase and decrease making it hard to trunk the frequency and hold it at such a low frequency (that 11hrz you spoke of, which is 8-12hrz)
when digital technology came into existence (off the shelf parts) it made it easier to obtain technology by making it yourself. someone was able to see what the eye sees though it's very pixlated. they can often make out the object. they realized this part of the brain also transmits thought. they were able to tap into this and see what object a person even thinks about. it was then later that someone was able to map out every word into a translator into text which people can read on their cell phone and they can tell patterns you're thinking off visually. and they can listen to your breathing and heart rate and blood pressure and so on.
Yes, you mentioned Jeff Hunter worked with HDDs and motherboards. The digital displays emitting electromagnetic radiation in man different forms has been shown to be able to entrain brainwaves the same way that radio waves and ELF waves can. With the right code, certain websites and certain images, or certain computers, can become mind control technology. I'm guessing you knew this. They've now started amplifying neurons artificially, so the ELF waves from your brain, in order decode them and hijack your eyes, ears, ,and record your thoughts, can now be picked up more easily when necessary, using a radiotelescope similar to how Van Eck phreaking picks up and decodes RFI from monitors and cameras. US3951134A was useful in getting remote EEG information without electrodes. That sort of technology, but now it can be done less invasively by amplifying neurons and picking up the resulting RFI and decoding it.
The mossad doesn't want 5G, also, because, not so much that it's going to necessarily directly cause health problems, but because it makes spying on everyone passively so much easier. They're incredibly paranoid about being contacted on non secured communications systems. 5G of course makes remotely encoding brainwaves and even DNA (radiogenetics) faster and easier. So for mind control and covert surveillance it's great. Signals intelligence has their work cut out for them nowadays. -
2019-01-30 at 9:47 PM UTCWhen ELF came out, I always figured one of Lorne Michael's children (Will Ferrell) created the film with layered messages for the elite.
created to send subliminal messages through shlap-shtick humor (Frat/ pratfall humor) for kids while introducing figures like the Norwal (Wall wall wall wall wall norwal)
enslavement to the illuminate. -
2019-02-01 at 2:11 AM UTChttps://people.cs.uchicago.edu/~shuwang/pubs/MobiCom15-wirelessaudio.pdf
In this section, we brief the basic assumptions behind wireless
vibrometry, given its two targeted scenarios (Figure 1). In general,
both scenarios involve an eavesdropper (also referred to as attacker
or adversary) and a target (or victim) loudspeaker. The target is
assumed to be static. The eavesdropper controls radio transceivers
that can run at a specific frequency band, with a practical transmit power level. The eavesdropping radios can be compromised
devices within LOS of the target, or unfettered devices that are separated from the target by sound-proof obstacles (walls, windows,
etc.). In any case, the eavesdropper can transmit/capture radio signals, but has no direct control over the target. However, as long
as the eavesdropper’s radio signals can reach the target, wireless
vibrometry is feasible.
So, your phone doesn't need to be turned on in order to use its speaker/microphone setup. The reflecting RF is actually modified by the human voice vibrations in the speaker or microphone, and this is then decoded and turned into audible sound. Pretty cool technique. Found this one today. Another one of those semi passive techniques. No need to plant a cube reflector or diode. These speakers are everywhere nowadays.
https://www.youtube.com/watch?v=ufn8JXohEfI
Skip to 0:40
Just using the smartphone's speaker to modify the reflected 2.4 GHz signal. Cool.
EDIT:
If the goal were to simply track a human target inside a building of course, data may be easier to obtain. Actually inducing a heart attack with internet traffic may be possible. Synchronize the pulses/packet streams, so you obtain the heart-rate, and synchronize pulses with the heart beat. The Russians found with a strong enough signal, a heart attack can be induced this way. I wonder if the same thing can be done on a more gradual level with wifi and smartphone signals. That means you have the router or phone track the person, monitor their vitals while they're asleep, and then use pulses synchronized with the heart to stress it out over time, so that they never really get any useful sleep, and the stress eventually takes its toll. I think it's pretty crazy that regular internet traffic can be used to obtain audio information, not just from speakers, but anything that vibrates enough. Of course, the receiver has to be within proximity of the target so that the signal doesn't get distorted too much. That's why having malicious code on the router or phone makes it easier, as it's already in proximity.
So, maybe I'm crazy but it seems the internet can be deadly. Not to mention, synchronizing with the heart is one thing, but entraining brainwaves, you could possibly raise cortisol levels further with entrainment combined with the heart synchronizing, making sure the person will die of a heart attack or stroke within a few months or weeks depending on the person. Possibly a good way to assassinate someone, cause even if they turn their router off, the neighbors may suffice, or the nearest cell tower. -
2019-02-05 at 8:44 PM UTC
In the following experiments, the target is a smartphone (Moto
X XT1053) with internal loudspeaker playing audio. Meanwhile,
it sends packets through its WiFi interface to a nearby commercial access point Belkin N150. We do not modify any hardware
or software on either the smartphone or the access point. Thus,
their communication completely follows the IEEE 802.11g protocol. The adversary SDR works on the sniffer mode, which only
captures raw signal samples overheard from the smartphone. We
decode the WiFi packets on a PC using our software 802.11g decoder and then reconstruct the audio signals. Since the adversary
has no control of the target smartphone, we evaluate the eavesdropping performance when the smartphone generates different traffic
patterns. Note that due to 802.11’s CSMA contention mechanism,
the transmission time of packets is non-uniform, and we handle this
problem using the re-interpolation designed in Sec. 5.
First, the smartphone initiates a TCP file transfer at 10 Mbps
traffic rate, but with different packet lengths. Meanwhile, it plays
a 400 Hz audio. Figure 23 shows that the decoded audio PSNR
is logarithmically proportional to packet length. This is consistent
with our asymptotic analysis in Sec. 5, which showed that the RSS
amplification algorithm can effectively improve PSNR by accumulating energy across each packet duration.
We have a similar observation for the impact of packet rate (Figure 24): the PSNR improves by about 8dB as the packet rate increases from 1100 pkt/s to 1900 pkt/s.
The experiments clearly reveal alarming threats in today’s wireless communications systems that strive for speed. Modern wireless
standards like 802.11n/ac widely adopt packet aggregation to improve transmission efficiency (e.g., 802.11ac allows for up to 5.5ms
of packet duration). Meanwhile, packet rate is escalating owing
to high PHY-layer bit-rate (e.g., 802.11ad enables up to hundredMega per second of packet rate). Riding on these trends, an adversary with wireless vibrometry can easily launch eavesdropping with
ultra-high PSNR.
8.2.2 Overall Threat Analysis
Threats from through-wall emissive eavesdropping: To evaluate the practical threat, we use a similar blind-test setup as in the
reflective vibrometry, except that the target is a smartphone playing
the number sounds while running a file uploading application (with
a mean packet duration of 0.25 ms and 1900 pkt/s). Figure 25 plots
the blind-test results. We can see that emissive ART achieves almost 100% accuracy when eavesdropper is less than than 3 m away
from the target with drywall or sound-proof window in between.
In contrast, a microphone can barely recognize anything at all distances. Interestingly, the eavesdropping has good performance in
spite of the low volume. The is attributed to the more “pure” vibration in the emissive case, where the radio signals come exclusively
from the smartphone, whereas the irrelevant reflections in the reflective case contaminate radio signals.
To sum up, emissive vibrometry constitutes a higher level of threat
due to strong signals directly emitted by the target. Considering the
wide penetration of mobile devices that co-locate loudspeaker with
radios, emissive ART can easily impinge on private communications over such devices.
Threats under real traffic patterns: Above we have tested emissive ART when the target is running file-uploading applications
through WiFi. We have also tested other upload-traffic-dominated
applications including FTP and Skype video call. We found FTP
results in similar eavesdropping audio quality as above. Yet Skype
call has a packet rate below 200 pkts/second, which is insufficient
to provide usable audio sampling rate (Sec. 5). However, as camera resolution on smartphone increases along with WiFi bit-rate, we
expect the packet rate of such applications will eventually reach the
threat level. Besides, we also tested the emissive ART under environment dynamics, with similar observations as the reflective ART.
We thus omit the details for the sake of space.
Very nice.
EDIT: if the target's phone or other device isn't compromised or currently initiating such a packet stream, a device belonging to the attacker can simply initiate it's own stream on the other side of the wall or adjacent building, and collect the raw analog data reflected from the speaker. That way, it doesn't seem like some strange microwave signal that can't be explained easily, just looks like normal internet traffic rather than an eavesdropping attempt. How many people would notice someone is downloading a song or something and then try to find out who it is? Not many. You'd just assume if you even noticed, that it's a neighbor. -
2019-02-05 at 9:53 PM UTCnot sure if this applies or not but there is a website that will analyze you song and show you the author of it. maybe even the persons covering it.
I think you can even hum the tune and it will find a matching song or songs that sound similar. I forget the websites name but you could probably find it through google (so you can leave a trail back to you for looking :D ) -
2019-02-06 at 3:10 PM UTCYou people are crazy
-
2019-02-06 at 6:45 PM UTC
Originally posted by SpaceCakes not sure if this applies or not but there is a website that will analyze you song and show you the author of it. maybe even the persons covering it.
I think you can even hum the tune and it will find a matching song or songs that sound similar. I forget the websites name but you could probably find it through google (so you can leave a trail back to you for looking :D )
Can't I just tell you where I am and cut out the middleman? -
2019-02-07 at 12 AM UTC
Originally posted by cupocheer Can't I just tell you where I am and cut out the middleman?
You're located in North Carolina
https://www.cia.gov/offices-of-cia
that's where all my medical files are stored. -
2019-02-07 at 7:52 PM UTC
Despite the risks to civil liberties and racial justice, Amazon has chosen to ignore questions from members of Congress and calls from consumers, civil rights groups, and its own employees and shareholders to take responsibility for the consequences of its technology on communities where it is deployed.
This patent application also suggests that Amazon has no plans to stop at identifying people based on their faces. The company anticipates targeting an arsenal of other biometrics, including fingerprints, skin-texture analysis, DNA, palm-vein analysis, hand geometry, iris recognition, odor/scent recognition, and even behavioral characteristics, like typing rhythm, gait, and voice recognition.
https://www.aclu.org/blog/privacy-technology/surveillance-technologies/amazons-disturbing-plan-add-face-surveillance-yo-0
https://www.dw.com/en/the-stasi-had-a-giant-smell-register-of-dissidents/a-2555053The Stasi – East German secret police – kept an enormous museum of "smell samples" of German citizens, kept in case they ever needed to give hunting dogs the scent of a fugitive criminal.
The thing about the Stasi is that they illustrate just how daffy any totalitarian authority structure necessarily becomes. Tyrants all have their Rasputins, mystic goonybirds whose theories about human biology, governance, magic, and life end up steering the state into ever-tighter circles of rabid tail-biting.The Stasi smell jars suggest an interesting question: Is there a museum dedicated to the sense of smell anywhere in the world, an institution whose mission is the accumulation of aromas for public appreciation? The Bible Museum in Amsterdam has a collection of about a dozen bilbical odors, such as frankincense and myrrh, for visitors to sample, but surely there must be some grand cabinet of smells somewhere – and not just behind the closed doors of a perfume manufacturer, or in the back of an organic chemistry lab. Where?
Don’t expect Amazon to limit tracking technologies to doorbells or homes. The patent application makes clear that any audio/visual device — such as Amazon’s popular line of Echo products — can be outfitted with the appropriate biometric surveillance features. It confirms that Amazon wants to enable the tracking of everyone, everywhere, all the time. And it’s apparently happy to deliver that data to the government.
Jeff Bezos’ father and the special Hispanic connection
https://newstaco.com/2013/08/12/jeff-bezos-father-and-the-special-hispanic-connection/
By Emilio C. Sanchez, Voxxi
Man of the week, Jeff Bezos, is considered one of the top visionaries of the century and has a strong link to the Hispanic community that you may not know about.
His stepfather, Miguel Angel Bezos Perez, is Cuban.
Miguel was born in Cuba and, as a refugee, arrived in Camp Matecumbe in Miami at age 16 on July 21, 1962, with the Operation Peter Pan. Shortly after, he was relocated to the Operation Peter Pan Jesuit group home Casa de Sales in Wilmington (Delaware).
Like many other Cuban refugees, he worked hard and eventually graduated from the University of of New Mexico in Albuquerque, where he met Jeff’s mother, Jacklyn.
Julianne McKinney, US Army Intelligence officer said gang stalking was a form of psyops and that the goal was something similar to the Phoenix Program in Vietnam. It seems to me the goal is to kill all white males that would be considered "beta" or altruistic and eventually have the rest end up with non-white females, and for white females to end up with non-white males. Hispanics seem to be more prone to brown-nosing and the hive-mind, machiavellian disposition, hence most of the real gang stalking victims being non hispanic white males and many of the perps are hispanic and black. It's rare that any of the victims are hispanic, suspiciously. Latin American countries often adopt a communist/stasi type structure for their intelligence community and government so it makes sense. That's why the democrats, CIA and FBI want to bring in more third worlders from latin american countries, increase their birth rates, get the democrats more free votes.
White non-hispanic males are what they consider to be the main threat and I think black males second to that. But they have a special plan for everyone that is in that 1/3 of the population as in Stanley Milgram's electric shock experiments.
https://www.zerohedge.com/news/2019-02-07/yes-democrats-did-start-ku-klux-klan-and-its-still-party-racism
They create more racism, but they control it. Racism itself is a concept which in reality doesn't exist. Racial tension is what I mean. They create more race based hatred and tension, but in a controlled manner. They use that, along with the drug trade and sex trade, to fund black operations and feel superior to "normal" people.
EDIT: https://www.cbc.ca/news/canada/canadian-government-gag-order-mk-ultra-1.4448933 -
2021-03-26 at 4:35 AM UTCvideos clearly removed by the government
-
2021-03-26 at 5 AM UTC
-
2021-03-26 at 5:06 AM UTC
-
2021-03-26 at 5:20 AM UTCoh good this again
-
2021-03-26 at 5:25 AM UTC
-
2021-03-26 at 5:26 AM UTCRCMP is what was meant
Crybaby bitch boi -
2021-03-26 at 5:27 AM UTC
-
2021-03-27 at 6:29 AM UTC