報告相談 Insights on Perpetrator Technology & Tactics P6 End

Next, I’d like to provide information, countermeasures, knowledge, and ideas for solving technology crimes.

▼Explain the risk of technology crime to local neighborhood associations, residents’ associations, residents, citizens, and citizen groups from the other party’s perspective and solicit proponents.

* I think that it is effective to just provide information to the website of such as residents’ association,etc, inquiry form, and e-mail address in the publicity activity.

For example, what is caused by technology crime

■ The private life of residents is monitored by artificial satellites, satellite communication networks, remote sensing, radar waves, and abuse of technology, and eavesdropping and voyeurism occur frequently.

■Neighborhood trouble

Because the perpetrator can abuse V2K and microwave auditory effect technology to make hear false accusation, provocation, and threatening behavior from various directions to the target.

Voices  from the mouth and direction of neighbors, residents next to or above the apartment, residents on the lower floors, people walking, drivers driving, passengers such as buses and trains,and car horn from various directions etc. Because it can be misunderstood as if the sound of is being generated.

(Actually, the perpetrator is abusing amateur satellites, microwave auditory effect technology, and V2K from inside a remote building.)

Because the target also misunderstands the perpetrator and decides, causing trouble.

In rare cases, the perpetrator abuses the microwave auditory effect technology against the target and actually amplifies the volume of human voices and car horns from the vicinity to mix V2K or actual voices and sounds. It seems that it may be confusing and difficult to judge and isolate.

■Technology crime occurre in which an electromagnetic wave, microwave, radiation, X-ray, or gamma-ray attack on a pregnant fetus causes the fetus to miscarriage, stillbirth, or cause cell or chromosomal abnormalities or congenital abnormalities.

■Technology crime causes wiretapping, voyeurism, peeping of elementary school girls, junior high school students, high school girls, and college girls, and remote sexual crimes against women living alone.

■It is said that victims, including many women, are forced to commit suicide or are killed by crimes that abuse technology every year.

■There is a high possibility that remote abuse of technology has caused fights and conflicts among small, middle, high school, and university students.

■Murders between brothers and sisters, murders between families, and murders of elderly people in the home have been caused.

■Remote mind control that abuses technology induces fights, quarrels, affairs, and divorces between men and women and couples who are dating.

(Example: Abuse radio waves of several tens of Hz to 100 Hz used in medical treatment and hundreds of Hz used in electrical stimulation therapy to excite sympathetic nerves, or send images / images via satellite uplink downlink. Reminiscent of various situations, creativity and image, stimulating emotions, voicing violence, sexually stimulating and inducing cheating, alcohol addiction, smoking, gambling Drowning, going to a sex shop, debt work such as purchasing high-priced products such as cars and houses, participating in crimes, etc.)

■Explain the risk of technology crime to local kindergartens, parents’ associations, elementary schools, children’s associations, junior high and high school PTAs and parents, university supporters’ associations, university circles, local SMEs, presidents, and office workers and recruiting supporters.

* I think that it is effective to provide information to each site such as school and company, inquiry form, and e-mail address in the publicity activity.

There are cases where parents of children are being monitored or victims of crime due to remote technology abuse.

■An accident has occurred in which an elementary school student who is going to and from school is involved in a runaway driving of a car that is a victim of a technology crime and dies.

There is a possibility that an accident has been caused in which a student going to and from school is attacked by a victim of a technology crime.

There is a possibility that an accident has occurred in which a student in the school is attacked by a victim of a technology crime.

There is a high possibility that the student’s appearance, personal life, and private life in the school are being monitored or eavesdropped.

There is a high possibility that teachers and principals are being monitored or eavesdropped on their work, personal life, and private life.

The stabbed murder of a female college student has been triggered

An accident has occurred in which a student on his way home is attacked by a victim of a technology crime while commuting to school.

There is a possibility that an accident has been caused in which a student in the university is attacked by a victim of a technology crime.

There is a high possibility that the student’s appearance, personal life, and private life in the university are being monitored or eavesdropped.

There is a high possibility that the professors and presidents are being monitored or eavesdropped on their work, personal life, and private life.

There is a high possibility that the office room of the university and the clerks are being monitored or eavesdropped.

There is a high possibility that the activities of the student circle and the behavior outside the university are monitored or eavesdropped.

For example, there is a risk that a company’s business partners, customer information, confidential information, intellectual property, trade secrets may be leaked, or employees or company misconduct may be roughly searched for due to remote technology abuse.

There is a high possibility that an accident has occurred that is causing scandals to company employees due to remote technology abuse.

■Inform members of the local and prefectural governments, members of the House of Representatives, and members of the Diet that they can support them together with their supporters and voters (helping in voting and election campaigns, volunteers, etc.).

And they will have activities and policies to eliminate high-tech technology crime.

Also explain the risk of technology crime from the perspective of the other party.

Example: The perpetrator is likely to use satellites to remotely abuse technology to eavesdrop and voyeur in the office of a member of the Diet, monitor private life, peep, collect confidential information, scandals, etc.

■ Tell the diplomatic friendly countries and countries’ diplomatic departments, trade departments, intelligence agencies, leaders, supporting political parties and supporters that you can cooperate in diplomatic and trade policies.

Example: Being able to propose cooperative diplomatic and trade policy proposals together with supporters and voters to domestic parliamentarians and governments.

And you would like to ask for cooperation and support to eliminate technology crimes occurring in Japan and around the world.

And explain the risk of technology crime from the other person’s perspective.

Example: Perpetrators are likely to use satellites to remotely abuse technology to eavesdrop and voyeur in provinces, buildings, offices, monitor private life, peep, collect confidential information, scandals, etc. case.

■When disseminating information about technology crimes to the world, make plain clothes and suits clean and modern as much as possible so that they can be accepted by a wide range of generations and the world, from children to the elderly.

(Example: newscaster,announcer, politician, etc.)

Also, by doing so, you will make people want to participate in and cooperate .

■If possible, cooperate with men and women in their twenties and thirties who are in the modern fashion to think about group names and websites, naming and keywords, words, sentences, expressions, expression techniques, etc.

Or, consider the position of the other party and ask a specialized PR company that can cooperate while keeping it secret.

(When the company requesting cooperation seems to want to refrain from cooperating openly, etc.)

Also, by doing so, you will make people want to participate in and cooperate with the activities to raise awareness of technology crime.

■Go to church

(For example, in memory of the deceased, to unite with victims, groups, related parties, and supporters nationwide, to further strengthen publicity activities and spread them to the world)

Tell the current situation to the priest.

to donate.

Go to church and mourn the dead victims.

You mourn the victims, bereaved families, groups, officials, and supporters from all over the country who went to church and died.

■Visit shrines and temples.

For example, chanting sutras to those who have died and Purify against the world’s technology crimes.

Because to unite with victims, groups, related parties, and supporters nationwide to further strengthen publicity activities and spread them to the world.

Inform the priest and priest of the current state of technology crime.

Make donations and donations.

Purify yourself against being attacked and against public technology crimes.

Go to the temple and chant the sutras to the deceased victims.

Visit shrines and temples all over the country with victims, groups, people concerned, and supporters all over the country to Purify for technology crimes of themselves and the world.

You will chant to the victims who have died in the attacks and damages of technology crimes so far.

Providing information to alumni associations such as the university where the judge came from and the Faculty of Law.

I think it makes sense just to provide information to the email address listed on the alumni association site.

■Provide information to police, prosecutors, politicians, local governments, ministries, corporate staff and employees’ home universities and high school alumni associations in the prefectures, cities, wards, towns and villages where the victims live.

I think it makes sense just to provide information to the email address listed on the alumni association site.

■Report to the perpetrator’s siblings, parents, children, neighborhood, countryside, relatives, etc.

Example: If you know the perpetrator’s information, ask a detective company, a detective agency, a research company, etc. to investigate the address of the perpetrator’s brother, parents, children, countryside, relatives, etc.

■Develop negative campaigns against perpetrators and technology crimes

■Suspect that the perpetrator is mentally ill, psychopathic, or mentally and physically abnormal

For example, using V2K all the time, day and night, talking and talking.

Abnormal aggression, relentlessness, and desire for control.

Being an antisocial personality that robs the public interest and social welfare.

Outrageous, sneaky, cowardly, well-prepared, malicious and planned crime

If the perpetrator of the technology crime, who is the person who is causing the accident, is arrested in the future,

Together with residents, citizens, politicians, police and prosecutors, you will promote the perpetrators to undergo a psychological examination to determine whether the perpetrators themselves are responsible.

■The law allows private arrest only for the arrest of the current offender. It is said that the current criminal can be arrested not only by judicial police officers but also by any number of people (general people or anyone) without an arrest warrant (Criminal Procedure Code).

This is because the current criminal is actually committing or has just finished committing the crime, so it is highly necessary to arrest him and secure himself, and there is no risk of false arrest.

https://en.wikipedia.org/wiki/Citizen%27s_arrest

For example, pay a large amount of reward to an internal collaborator, have a technology criminal arrested for the current offense, and report it to the police.

■Recruit internal collaborators to whistle-blower technology criminals or arrest technology criminals privately.

And you will set a precedent for the arrest and prosecution of technology criminals, civil proceedings, and payment of compensation, and make it known to the world and change it into a world where the technology crimes are cracked down.

And give a reward to the collaborators.

■Create a base or center to consolidate information provision.

Aggregate perpetrator information and victim information at the center.

If you can identify the criminal by collating the perpetrator and the victim information, you will accuse the criminal to the police and the prosecution.

When collecting information on the perpetrator, the background, period, location, perpetrator information, method, (from the information provided by the perpetrator, the satellite aircraft name, supplier and manufacturer, operation, operation method, etc. Altitude, longitude, latitude, radio frequency used, etc.) Collect evidence of images, sound recordings, video recordings, screen captures, etc.

In addition, you will ask how much the victim can give a reward to the informant and the collaborator, and present the amount on the net and video site to solicit the perpetrator information.

■If the criminal is not arrested and prosecuted and is not legally or socially liable despite collecting evidence and prosecuting, rent a satellite from an artificial satellite leasing company as in the previous email. Use radar waves and human body search radar to identify the criminal in the building for the criminal who was found and stop the technology crime using V2K and microwave auditory effect technology for the criminal.

If the perpetrator does not respond to the stop, you will send 144MHz band / 430MHz band radio waves to the Yagi antenna or parabolic antenna attached to the building that the perpetrator seems to be using and suppress communication.

Also, if you can hear information about the person who is instructing the attack from the perpetrator of the technology crime with V2K etc., or if you can not talk about the person who is instructing the attack, use BMI, BCI from here. Repeat the question and collect the information of the person who is instructing the attack from the thought information of the criminal.

You make an electromagnetic wave attack on the perpetrator of a technology crime or the person who is directing the attack and ask you to stop the technology attack.

■Or try asking for cooperation from a company that has already rented a satellite or an individual who operates it.

It seems that there are companies that actually provide artificial satellite leasing and lending services for about 200,000 to 300,000 yen per month. (Interview with the perpetrator)

When consulting with affiliated companies and companies of machinery and communication equipment whether it is possible to lease or rent artificial satellites with the same functions and performance as the artificial satellites used by the perpetrators, about 1 or 2 out of 100 cases are negotiated. There seems to be a company that responds to.

Although it launched an artificial satellite, it is said that there is an artificial satellite that is not used much.

■Regarding the operating costs of artificial satellites, you will operate with annual membership fees, donations, donations, support funds, etc. from those who are under attack, cooperators, and supporters.

Actually, in my case, the satellite operated by the perpetrator is a satellite owned by an organization or association (some Buddhist organizations) to which the perpetrator is a member (perpetrator talk).

■As a last resort, you will recruit people who can operate artificial satellites on domestic and overseas SNS, bulletin boards, etc., and ask for countermeasures and cooperation against technology crimes, including negotiation of the amount.

And you ask the perpetrator to stop the technology attack, if the perpetrator does not stop the attack, you make an electromagnetic attack on the perpetrator and ask the perpetrator to stop the attack.

■Suggest to post a video about the technology crime to a popular YouTuber

The proposing side will be the content that leads to the public interest, and the uploading side will be the content that will lead to the profit.

Suggest uploading in various genres (example. suspense, horror, thriller, action, science fiction, drama, documentary ,, comedy, gag, etc.)

Utilize subtitles in various languages around the world.

■Do not believe that all information about specific religious corporations, organizations, races, etc. as perpetrators of technology crimes written on the Internet is true

Even if it is a fact, it may be a part of it, it may have been expanded, and it may have tail fins and feather fins.

On the contrary, I think that the solution will be accelerated by promoting constructive response with the perpetrator’s group and forming a cooperative relationship.

On the contrary, I think it is one of the things to think that the solution will be accelerated by promoting constructive response with the perpetrator’s group and forming a cooperative relationship.

If the perpetrator, the organization to which he belongs, or the organization is known, the perpetrator or the person who is instructing the organization or organization to which he belongs, etc., along with evidence and testimony, etc. Consider converting the negligence rate to seek trial,judgment or justice and treatment within the organization.

Also, try to build a cooperative relationship with the organization to which the perpetrator belongs as much as possible.

Please share the information with the people concerned.

Leave a Reply

Your email address will not be published. Required fields are marked *