報告相談 Insights on Perpetrator Technology & Tactics P4

I’d like to continue to send.I’d like to to report the discovery of international treaties and legislation that may be related to or in conflict with technology crimes, high-tech crimes, and high-tech attacks that abuse satellites.

In particular, the principle of peaceful use under the Outer Space Treaty, the permission system for satellite management under the Space Activity Law, the Land Remote Sensing Policy Law, which is a law related to remote sensing, the permission system for the use of satellite remote sensing devices, measures to prevent unauthorized use, etc,

Measures to prevent the use of unauthorized persons, satellite remote sensing record holders as an obligation of satellite remote sensing record holders are high except for those who have been certified by this law and when they are carried out by an appropriate method to a specific handling organization. The rule that the satellite remote sensing recording of resolution should not be provided,

regarding satellite remote sensing records, the provider is limited to certified persons or specific handling organizations,

In addition, remote sensing technology on satellites, monitoring and peeping of people outside and inside buildings that abuse radar waves, and illegal acquisition of thinking, sight, hearing, and biometric information that abuses BMI and BCI also violate laws and regulations. It seems that it is.

▼Outer Space Treaty
Freedom to explore and use outer space

It is stipulated in Article 1. The exploration and utilization of outer space, including celestial bodies, is freely carried out by all humankind “for the benefit of all nations” and “according to international law.”

Prohibition of territory

Provided in Article 2. No nation can claim sovereignty over outer space, including celestial bodies.

Principle of peaceful use

Provided in Article 4. Objects carrying weapons of mass destruction such as nuclear weapons (missile satellites, etc.) must not be placed in orbit around the earth or deployed in outer space.

Also, the moon and other celestial bodies are used exclusively for peaceful purposes, and military use is prohibited at all.

Principle of concentration of responsibility on the nation

Provided in Articles 6 and 7. Regardless of whether the space activity is carried out by a government agency or a non-governmental organization, the state bears international responsibility for the activities carried out by its own country.

If a launched space object causes damage to another country, the launching country will be liable for infinite liability.

https://en.wikipedia.org/wiki/Outer_Space_Treaty

※I think the governments of each country are leading the treaties and statutes.

Screen captures and recorded videos, photos, recordings, testimonies, etc. of personal computers, computers, software for satellite operation management systems, BMI, BCI, software for biometric information analysis, etc. that will be used for crimes by providing information in the future If the evidence is gathered and reported, I think it will be dealt with.

▼Space Activity Law
Relationship with the Outer Space Treaty

Article 6 of the Outer Space Treaty stipulates that “the activities of non-governmental organizations in outer space, including the Moon and other celestial bodies, require the permission and continuous supervision of the parties concerned with the Treaty.”

Space activities by private organizations are permitted and require continuous supervision by the state. The Space Activities Act was created to meet the demands of the Outer Space Treaty.

Launch permission system

Permission system for satellite management

Even if the artificial satellite is successfully launched, it does not mean that anyone can manage it, and permission is required to manage the artificial satellite.

Also, when re-entry a satellite that has finished its role, it must be safe and consistent with the treaty.

Third party damages

It is easy to imagine that if a rocket falls into an urban area, it will cause terrible damage.

Under the Space Activities Act, the responsibility for accidents caused by launches is concentrated on the launchers, and they are liable for negligence (even if they are careful).

This is to help those who are not blamed for the damage caused by the accident.

However, when such heavy responsibility is involved, it may undermine the spirit of challenge of business operators and may adversely affect space development.

Therefore, the responsibility of the business operator is covered by insurance, and the government covers a part of the part that cannot be covered by insurance.

■Other penalties, etc.

Penal provisions are stipulated in Article 60 for those who commit acts that violate this law.

For example, if a launch or artificial satellite management is performed without obtaining the above-mentioned various permits, “imprisonment of up to 3 years, a fine of up to 3 million yen, or both”

Will be done.

▼Laws related to remote sensing

Example: Land Remote Sensing Policy Law

* Remote sensing is a technology that “examines without touching objects”.

There are various types of remote sensing, but satellite remote sensing is the process of mounting a dedicated measuring instrument (sensor) on an artificial satellite and examining (observing) the earth.

Sensors mounted (mounted) on satellites observe electromagnetic waves that are reflected from the oceans, forests, cities, clouds, etc. on the earth and that they emit. The following can be seen from the observation results.

Measuring plants Deforestation, desertification, crops (paddy fields)

Heat island phenomenon that measures the temperature of the earth’s surface

Kuroshio meandering to measure sea surface temperature, El Nino phenomenon, fishing ground prediction

Creating a map to measure the height of the earth’s surface

Weather forecast to measure cloud condition, rain intensity, internal condition of typhoon

Measure the water situation The amount of water stored in the dam and the damage situation of the flood

■Overview
It is a law regarding the handling of data obtained by devices mounted on artificial satellites.

While satellite data is expected to be used in a wide range of fields such as agriculture, disaster prevention, and social infrastructure development, it has been necessary to develop a mechanism to prevent misuse.

Therefore, in order to ensure proper handling, the following three points are largely disciplined.

1. Permit system for using satellite remote sensing equipment

2. Obligation of satellite remote sensing record holder

3. Certification of a person who handles satellite remote sensing records

I’d like to introduce the outline of the three disciplines at once.

(1) Permit system for using satellite remote sensing equipment

The use of high-resolution satellite remote sensing equipment is permitted.

1. Unauthorized use prevention measures
2. Prohibition of use other than application receiving equipment
3. Stop outside the application track
4. Imposing obligations such as measures at the end of use

Under the Remote Sensing-related Law and the Land Remote Sensing Policy Law, anyone who intends to use a satellite remote sensing device using operating radio equipment must obtain permission for each satellite remote sensing device. It is stipulated that.

In other words, the users of satellite remote sensing equipment (mainly satellite manufacturers) are limited to those permitted by the country.

And the authorized person, the use prevention measures of the unauthorized person, the function stop when the device goes out of the assumed trajectory, the prohibition of use other than the receiving equipment related to the permission, the book recording of the usage status, the device termination measures, etc. Obligations are imposed.

However, the “satellite remote sensing device” here refers to a high-resolution satellite remote sensing device.

The object discrimination system is a high-performance system that is sufficient to grasp the movement of vehicles, ships, aircraft and other mobile facilities, and the national government has set the standard.

For example, in the case of standard data recorded by an optical sensor, the object discrimination accuracy is less than 25 centimeters.

And if it does not meet this standard, it will not be applied.

2. Obligation of satellite remote sensing record holder

The satellite remote sensing record holder shall not provide high-resolution satellite remote sensing records except to those who have been certified by this law or to a specific handling organization by an appropriate method.

The satellite remote sensing record is one of the records acquired by using the satellite remote sensing device, which may hinder the peace assurance of the international community by considering the object discrimination system, processing level, elapsed time from the recording, etc. Refers to those that meet the standards set by the government.

And, regarding the above-mentioned satellite remote sensing records, the provider is limited to the certified person or the specific handling organization.

When providing it, it is obligatory to confirm the certificate and take preventive measures against the acquisition and use of persons other than the other party by encryption.

In addition, there is an obligation to take necessary and appropriate measures against the leakage of records.

However, the satellite data here is intended for raw data or temporary processed data such as geometry processing, and is not applicable to high value-added data such as being able to be superimposed on a map. Yes, no permission is required for use.

Unlike raw data and temporary processing data, high value-added data is data that has been processed to some extent, so it is thought that the risk of misuse is eliminated.

Therefore, permission is not required for data that is sold or published.

However, depending on how it is used, it may conflict with privacy, copyright, etc., so it should be noted that this time, the Information Law and Intellectual Property Law will become a problem instead of the satellite Limosen Law.

3.Certification of a person who handles satellite remote sensing records

Those who handle satellite remote sensing records can be certified that they can properly handle satellite remote sensing records according to the classification of the records.

Those who handle satellite remote sensing records can be certified by the country as being recognized as being able to handle satellite remote sensing records properly.

And you need to submit an application to be certified.

Those who have been certified will be obliged to record the books regarding the handling status of satellite remote sensing records.

■ Other penalties, etc.

Penalties are also stipulated in this law. For example, if the satellite remote sensing record is provided to an uncertified person without the permission of the government, it is said that “the imprisonment for up to 3 years, the fine of up to 1 million yen, or both” will be imposed.

In addition to the above, human rights violations of the national constitution,Prefectural and municipal nuisance prevention regulations,

Stoker regulation law,Criminal law murder preliminary crime, suicide involvement attempted crime, suicide incitement attempted crime, suicide aiding attempted crime,

forcible obstruction of business,Intimidation, injury charges, unfair competition prevention law violations,

(Illegal collection of company confidential information, business partners, customer information, intellectual property, etc. by remotely misusing technologies such as BMI and BCI)

Illegal acts of the Civil Code (when physically or mentally damaged, liability for damages arises or accompanies)

Default of the Civil Code (when there is some kind of contractual relationship between the perpetrator and the victim, for example, employment contract, sale, lease, etc.)

Violation of the Radio Law

Opening a radio station A person who intends to open a radio station must obtain a license from the regulatory agency.

Operation of radio equipment of amateur radio stations

The operation of radio equipment of amateur radio stations must be performed only by radio operators, as provided for in the next article.

A person who falls under any of the following items shall be punished by imprisonment with work for not more than 1 year or a fine of not more than 1 million yen.(in Japan’s case)

A person who has established a radio station without a license (omitted) under the Radio Law.

A person who falls under any of the following items shall be punished by a fine of not more than 300,000 yen.(in Japan’s case)

Persons who violated the rules for operating radio equipment of amateur radio stations.

It seems that the above applies or conflicts.

Please share it with the people concerned and make use of it.

報告相談 Insights on Perpetrator Technology & Tactics P3

I ‘d like to continue to send
Amateur radios, handy machines, mobile machines (on-board units), fixed machines (stationary machines) that help control, reduce, and mitigate the attacks of technology crimes and high-tech crimes.

It will be an example and introduction of.

Please refer to it.

▼I use a handy radio for amateur radio made by Icom, Alinco, and Baofeng to receive the radio waves (144MHz band and 430MHz band) of the uplink downlink, which is the frequency for amateurs abused by the perpetrator, and noise. Although it is mixed, the voice of the perpetrator has been confirmed.

Also, although it is a car driver who is orbiting the vicinity, it seems that the frequency of amateur radio is used for communication with the perpetrator. (144MHz band and especially 430MHz band (430-440MHz)

And it seems that V2K and microwave auditory technology are also used for communication among perpetrators, drivers, and collaborators walking nearby.

Actually, in my case, I think that the number of cooperators has decreased because I can hear conversations and exchanges with the circling driver by always scanning with a handy radio (especially 430 to 440MHz).

As a scanning method, it is difficult to always turn the dial of the radio to search for the frequency, so it is better to specify the lower and upper limits of the frequency such as program scan (430 to 440MHz).

Also, when sleeping, it is better to turn down the volume so that you can hear it a little.

In my case, Icom’s handy machine, ID-52, can scan the 144MHz band and 430MHz band at high speed with a simple operation, so it is effective for scanning conversations and exchanges between the perpetrator and the driver. It has come out.

It is also effective when there is a ground station of an amateur satellite in a group of perpetrators near the person being attacked.

▼By using a handy radio, a mobile machine made by Alinco (on-board unit), and a fixed machine made by Yaesu Radio (stationary machine for placing at home), by receiving radio waves of the frequency used by the perpetrator. I feel the attack from the other party, but I have reduced it by about 70% and have been able to decline. (Electromagnetic waves, V2K, microwaves, voice transmission, image transmission, acquisition of thinking information, etc.)

In addition, I think it is good to utilize scan functions such as program scan that specifies the lower limit and upper limit range and memory scan that registers the frequencies frequently used by the perpetrator.

In addition, the squelch function that can adjust the reception sensitivity is used to reduce the attack by increasing the reception sensitivity, and the RF gain function is used to adjust the reception gain of the radio wave (maximize the gain, etc.) to reduce the attack. I think it is possible.

You can also suppress or reduce the attack from the other party by pressing the button (PTT button) that emits and transmits radio waves according to the frequency used by the other party or by transmitting and outputting the radio waves.

In my case, when transmitting radio waves, the main body becomes hot in a few minutes in the case of a handy machine, and in a mobile machine, the main body becomes hot in about 10 minutes depending on the output, even if it is a fixed device. I was able to continue sending for more than 8 hours without getting too hot.

In principle, an amateur radio license is required to emit radio waves (depending on the output, amateur radio technician 4th grade or higher)

I usually focus on receiving and reduce the attack, and when the attack becomes stronger, I send it to suppress and reduce it.

Also, as evidence when consulting with the police, it is good to use the reception of radio waves on the radio and the confirmation of the perpetrator’s voice as evidence.

In my case, if it is a handy machine made by Baofeng, it can be purchased at Amazon for about 8000 yen as a set of two, so it is useful for receiving fixed frequencies often used by perpetrators.

The price is reasonable with the radio name UV5RE, but the included radio alone cannot perform memory scans and program scans, and the instruction manual states that it can be done using writing software.

Besides, if it is a handy machine (DJ-S57LA) made by Alinco, it is not high speed, but the reception sensitivity is good and the reception of the 430MHz band (430 to 440MHz) used by the perpetrator and the uplink downlink radio wave can be confirmed well. increase.

I use Yaesu Radio’s FT-991A as a fixture, and it can transmit radio waves for a long time.

DR-735D / H manufactured by Alinco as a mobile device, and I feel that it is effective in reducing or suppressing attacks by receiving radio waves from the perpetrator.

For the antenna, I purchased a TWAY RDIO 144 / 430MHz band transmission / reception Yagi antenna from Amazon, and I use a stainless steel T-shaped hanger rack for indoor use and for mounting the antenna.

(If the antenna is installed outdoors, the perpetrator may harass you if it violates the Radio Law, and you may be notified to the communication station for the purpose of obstruction.)

I use Daiichi Denpa Kogyo Diamond MX2000N Triplexer (HF ~ 50/144 / 430MHz) to share one other antenna with two radios and transmit / receive at the same time.

An M-type coaxial cable for amateur radio is used to connect the radio and antenna, and an M-male-M-male connector and conversion adapter are used to connect the coaxial cable to the triplexer.

A N female-M male connector and conversion adapter are used to connect the triplexer and Alinco’s mobile machine, DR-735D / H.

I think it is better to use the connector and conversion adapter properly according to the device to be connected.

It is also possible to connect a handy machine to a triplexer or Yagi antenna by using connectors such as N female-SMA male, N female-SMA female, M female-SMA male, M female-SMA female, and conversion adapter.

▼Generally, household outlets are AC (alternating current) of 100 to 220V, so if you purchase a DC stabilized power supply that converts to 13.8V DC, you will be able to use mobile machines and fixed machines at home.

Although it is a regulated DC power supply, it is okay if it has a capacity of 10 to 15A for mobile machines and 20A or more for fixed machines.

In my case, I purchased Alinco’s DM-330MV, 32A, and connected a total of two fixed machines and mobile machines, and I can use them without any problems.

Depending on the budget, use a handy machine (about 8,000 to 20,000 JPY), a mobile machine (about 35,000 to 80,000 JPY), and a fixed machine (stationary machine) (about 120,000 to 200,000 JPY). I think it’s good.

It is possible to reduce or suppress the attack by receiving only with a handy machine, but connect the Yagi antenna to a mobile machine or a fixed machine and make it horizontal on the ceiling in the house, the balcony outside the room, the roof, etc. from your own head. I think that if you install it as high as possible, you can mitigate, reduce, and suppress the attack.

At that time, there is an application called MagnaAR that was shared by e-mail last time that can display the direction of the electromagnetic wave coming in with AR, and use this application to check the direction of the radio wave electromagnetic wave and change the direction of the Yagi antenna. I think you should adjust it.

The part where the director is located should be directed in the direction of the radio wave, and the reflector should be on the opposite side.

As an example of utilization, in the case of Baofeng’s handy machine UV5RE, since it is possible to receive two bands at the same time, it is used for simultaneous reception of 144MHz and 430MHz bands and simultaneous reception of 430Mhz and 431MHz. Also, for a set of 2 units, it costs about 8,000 yen(JPY), so I purchased 10 units and use it for reception when the perpetrator frequently uses the frequency or when the frequency is frequently switched to attack.

I use Alinco’s handheld device (DJ-S57LA) for program scanning that scans the frequency range from 430MHz to 440MHz.

And Icom’s handheld device, ID-52, can also receive two bands at the same time, so I use it to scan conversations and interactions between the perpetrator and the driver.

Alinco’s mobile machine, DR-735D / H, can also receive two bands at the same time, and the price is about 40,000 yen(JPY), so I think it is good to connect it to the Yagi antenna as a fixed machine at home.

Yaesu Radio’s fixed device, FT-991A, has a maximum output of 50W and I use for radio wave transmission output for attacks from perpetrators, reduction when radio waves are strong for a long time, and suppression.

Mobile devices can also transmit strong radio waves with a maximum output of 50 W, but since the main body gets hot in about 10 minutes, I think that fixed machines are suitable for transmission output to suppress attacks for a long time and to reduce.

報告相談 Insights on Perpetrator Technology & Tactics P2

Dear  Government Sponsored Stalking

I ‘d like to continue to send the subject

Here is a summary of the knowledge that will definitely help you solve technology crime.

Please use it as a reference.

▼In technology crimes, the frequency bands for amateur satellites and amateur radio (Example.144MHz band, 430MHz band) are often abused, so I think that the basic knowledge of amateur radio will lead to a solution.

(Actually, the perpetrator said that. Also, it seems that the frequency for amateur radio is being abused not only in Japan but also overseas.)

Amateur radio・Wikipedia

https://en.wikipedia.org/wiki/Amateur_radio

Amateur radio satellite・Wikipedia

https://en.wikipedia.org/wiki/Amateur_radio_satellite

This is a wikipedia link that introduces amateur satellites.

I think it will be especially helpful for communication methods and uplink / downlink.

(Because the uplink downlink (144MHz band / 430MHz band) is being abused for the attack, and the attacked person is also linked to the uplink downlink)

Telecommunications link・Wikipedia

https://en.wikipedia.org/wiki/Telecommunications_link#Uplink

Telecommunications link・Wikipedia

https://en.wikipedia.org/wiki/Telecommunications_link#Downlink

And 2GHz to 10GHz to connect radar to radar waves and human body search radars (originally for human life search and emergency), BMI and BCI (originally thought to be for medical care and treatment). It seems that radio waves have been abused.

In addition, about 2000-3000MHz ~ for V2K and microwave hearing effect technology (also used to prevent birds and beasts in agricultural and forestry),moreover,it seems that radio waves of several Hz to 100 Hz are being abused at frequencies that affect the human body.

(For example, 27-38Hz … insomnia 48-55Hz … asthma 50Hz … menstrual pain 52Hz … epilepsy 60Hz … convulsions 88Hz … migraine)

Originally, it seems to be radio waves and frequencies used for medical and therapeutic purposes.

List of human body interference frequencies of electromagnetic waves

※Because it is Japanese, please translate it into English etc by Google Chrome and use it.

https://sites.google.com/site/gangstalkinghksssyk/technology_crime/electromagnetic_wave_damage_and_countermeasures/human_body_intervention_frequency_list_of_radio_waves

In addition, it seems that radio waves of tens to hundreds of Hz are being abused to drive victims to attack (for example, hitting, kicking, stabbing, and ranting).

Originally, it seems to be radio waves and frequencies used for medical purposes, especially for paralysis and rehabilitation of various parts of the human body such as arms, legs, and vocal cords.

And the perpetrator seems to be committing a crime in the same area and city as the victim (including uplink downlink data transfer).

▼Amateur radio frequency band・Wikipedia

https://en.wikipedia.org/wiki/Amateur_radio_frequency_allocations

Classification by radio frequency・Wikipedia

https://en.wikipedia.org/wiki/Radio_spectrum

Radio engineering

https://ja.wikipedia.org/wiki/%E7%84%A1%E7%B7%9A%E5%B7%A5%E5%AD%A6

※Because it is Japanese, please translate it into English etc by Google Chrome and use it.

Communication engineering

https://en.wikipedia.org/wiki/Telecommunications_engineering

報告相談 Insights on Perpetrator Technology & Tactics P1

Dear Government Sponsored Stalking

Hello, I’m a person fighting technology crime and Electronic Torture in Japan.

I ‘d like to send you about the subject.
Please refer to it among the parties concerned.

By saying the following command and imagining it in your head, it is possible to actually execute the command on the perpetrator’s computer or screen side and interfere with the attack.

(Uplink and downlink in the frequency band for amateur satellites operated by perpetrators and amateur radio abused by computers (originally used for data transfer between satellites and ground stations)

Those who are under attack in the 144MHz band and 430MHz band, because they are in the same position as the ground station in amateur radio and are linked. * Ground station = victim / attacked person)

Example: Railgun 1 million watt

(By uttering a command and then imagining the gun and pulling the trigger, the perpetrator’s computer and in the screen will be fired by the electromagnetic cannon.

I think it’s best to shoot the muzzle in a direction that feels the effect, such as facing the front, facing up, facing from directly above to the bottom, or facing yourself.

If you fire it toward yourself, it will also be fired at the perpetrator’s screen.

Also, if you shoot the muzzle upward near the left and right ears, the perpetrator will also hear the firing sound and it will be effective for V2K.

Feel free to change the unit to 1 million watt or 100,000 watt.)

* The electromagnetic cannon is a state-of-the-art weapon that shoots ultra-high-speed cannonballs with electromagnetic force, and seems to have been introduced by the Ministry of Defense and the military.

Please try the following in the same way with reference to the above.

Railgun 1 million Watt
* Same as the railgun.

Coilgun 1 million Watt
* A coil gun is a device that accelerates and fires an object that becomes a bullet using the coil of an electromagnet.

Plasma gun 1 million Watt
* Plasma gun is a weapon for emitting plasma.

Glare Blaster, Red, Blue 1 Million Watt
(A fast blinking light used for self-defense and crime prevention)

Pulse flash 1 million Watt
(Bright light flashes at high speed)

100 flash bullets
(It has the effect of flirting mobs and criminals for a few seconds with a dazzling light and a deafening explosion sound with a momentarily intense bomb.)

100 stun grenade
(Same as flash bullet)

Gunpowder gun

100 direct lightning strikes
(The effect is doubled by speaking a voltage of 1 million V (volt) and a current of 1 million A (ampere) before executing a direct lightning strike as a command.)

Sonic shock wave maximum
(It is a shock wave that generates a wave of extremely high pressure around a wing that flies at supersonic speed.)

Sonic shock wave
(Explosion sound caused by the shock wave of a supersonic aircraft and felt on the ground)

Ultrasonic blaster maximum

Imagine a laser pointer and slash vertically, horizontally, and diagonally with respect to your own direction.

(Because by imagining it in your own direction, it will appear on the screen that the perpetrator is looking at in the same way.

I think it’s a good idea to try various orientations such as from the front or from the top to the bottom.

I think it’s a good idea to say 100,000 Watt of laser pointer red or green in advance. )

Aluminum, V2K, acoustic maximum

Aluminum,V2K,howling

Emergency bell maximum

Alarm siren for disaster prevention maximum

Motor siren maximum

Fire alarm  maximum

Earthquake Early Warning maximum

Aluminum, V2K, 1-100Hz,maximum

(This is an application of the command that I shared before.

It seems that the 1 to 100Hz radio waves emitted by the perpetrator become noise and noise and return to the perpetrator. )

Maximum noise in telecommunications and wireless communication

(It seems that noise and noise are returned to the perpetrator side.)

Aluminum, V2K, noise (jamming) 100 decibels.

(Noise and noise will be returned to the perpetrator side.

Please try different units. )

Maximum power density

(Attack is reduced or mitigated when the perpetrator is attacking with increased power density)

Maximum electric field, maximum magnetic field, maximum microwave, maximum remote sensing

(It will be reduced or mitigated against electromagnetic wave attacks and microwave attacks from the perpetrators, and will return to the perpetrators as noise or noise.)

All Reflect
(Attack from the perpetrator is reduced and mitigated, and noise and noise are returned to the perpetrator.)

Aluminum V2K, current, voltage maximum

(Attack from the perpetrator is reduced and mitigated, and noise and noise are returned to the perpetrator.)

Maximum gamma ray

(The perpetrator’s attack using gamma rays is reduced and mitigated, and noise and noise are returned to the other party.)

BMI and BCI are all maximum
(It will be noisy or noisy to the perpetrator side)

All signals, all maximum, all 100 decibels
(It will be noisy or noisy to the perpetrator side)

Aluminum V2K, all RF signals, all 100 decibels
(It will be noisy or noisy to the perpetrator side)

All open, all secured, all ground, all discharged
(Attack from the perpetrator will be reduced or mitigated)

Aluminum V2K, Reflect all signals
(It will be noisy or noisy to the perpetrator side)

Repeat forever, Programm forever, Repeat forever

(After uttering and executing various shared commands, if you add and utter, the command will be repeated)

Fire a gunpowder gun after saying “Aluminum V2K, eardrum, all explode”

(It seems that the computer on the perpetrator’s side makes a fairly loud noise.

It is especially effective when the V2K attack echoes your eardrum and is terrible.)

Fire a gunpowder gun after saying “Aluminum V2K, airway, all explode”

(It seems that the computer on the perpetrator’s side makes a fairly loud noise.

It is especially effective when the perpetrator attacks your airway and it is difficult to breathe.)

Fire a gunpowder gun after saying “Aluminum V2K, skull, left ear, eardrum, all explode”

(It seems that the computer on the perpetrator’s side makes a fairly loud noise.

It is especially effective when the V2K attack affects your skull, ears, and eardrums.)

Try to say the names of each part of the human body and the whole body

(Example: “whole head” when there is an attack on the head “whole brain” when there is an attack on the brain “central nerve” “cranial nerve” “sympathetic nerve” etc.)

In addition, attacks from the other party are alleviated or diminished in the “airways, lungs, stomach, large intestine, small intestine”, etc.

Aluminum V2K central nervous system (Advanced version)

Human body, whole body barrier

Barriers to all spaces, barriers to ceilings, barriers to the sky, barriers to outer space

Send and output all
(It seems that the signal is sent from itself to the computer on the perpetrator’s side)

Reply all
(It seems that the signal is returned from the perpetrator’s computer to the computer)

Send and transmission, output 100W
(Try changing the output at the time of transmission)

Microwave transmission
(It seems that the computer on the perpetrator’s side makes noise and noise)

As an application example,

First, the speaker (image a speaker ) = (equal) The motor siren is sounded on the other computer just by associating it with the motor siren and imagining the speaker.

Things are also possible.

(Since it is difficult to say a command every time the opponent attacks, it is also possible to apply it to imagine the steering wheel of a car and associate the horn.)

Maximum squelch (or actual setting value such as 20)

(This setting is often used for amateur radio equipment. By maximizing the squelch, the reception sensitivity can be lowered and the attack and signal from the other party can be reduced.)

Those who are under attack of technology crime seem to be in the same position as the ground station in amateur radio. Therefore, it is effective to say this command. )

Minimum RF gain (or minimum value such as 0, 1)

(This setting is used for amateur radio equipment. By minimizing the RF gain, it is possible to reduce the attack and signal from the other party.)

Those who are under attack of technology crime seem to be in the same position as the ground station in amateur radio. Therefore, it is effective to say this command. )

* You can actually execute the command on the perpetrator’s computer to prevent the attack by saying (or imagining) the following command or the shortcut used on the computer.

Imagine pressing and holding the power button → Forced termination

All forced termination

Ctrl + Alt + Delete → Sign out

Alt + F4 Exit application → Repeat multiple times After closing all applications → Windows shutdown screen → OK

Cmd + Q Application termination (for MacOS)

Cmd + W Close window (for MacOS)

Ctrl + W Delete tab (Google Chrome function)

Shift + Ctrl + W Close the current window (Google Chrome function)

Commands that I shared so far,  it will be effective even if it is applied in various combinations.

If you get used to it, you will be able to execute commands according to the attack method from the perpetrator.

Nano Pathogens and Food Consumption

Lower the targeting involves how much you eat and what you eat. And if you daily or every other day.

Meanwhile, the level of targeting is based on how much nano pathogens are in your body at one time. And how these pathogens can be compile to form more targeting links.

So limit what you put in your body at one time and make sure it also contain foods that move pathogens through the body quickly.

There are all types of plant based foods that can aide in this situation. But natural foods work differently for different people, so I can not recommend what would work best for you.

I do often grate my veggies and fruits. So the mix of these compounds produce different results, just be careful what you grate or blend together. Certain individuals developed different reactions, so take precautions.

And. Absolutely no sugar in your diet! That includes already made and package goods. All these products contain high levels of nano pathogens in them.

Also limit meats and carbohydrates. They tend to stay in the body longer, which allows the nano pathegens to be manipulated by outside forces.

Good luck

Reflecting on the TI community & what could have been

I have been in this program for nearly 15 years now: October 15, 2007. I’m aware of what’s going on at least since 2010. I started a conference call talking about solutions. I ended all conference calls when I found that my efforts were being ignored.

It is a mind game. They want us to dedicate out entire life to them. So we must break that program and focus on ourselves.

I suggested that we purchase land across the country. This would’ve give us the opportunity to move around as it limit their capacity to target us.

I also know countermeasures to reducing and eliminating the tàrgeting. These are all easy to do.

There weakness is us coming together. It is much more difficult for them to target us together because they have to break down the frequencies that each one of us is on.

I talked about creating evidence in the form of Affidavits and sworn statements. This is the basis of this website.

But I was in the process of forming a new organization to address proactive means of addressing the tàrgeting.

However, you have to weed out infiltrators by requiring sworn statements that had been notarized. This is the basis of developing a relationship with each other.

Anyway, the only reason why we are targeted is because Targeted Individuals refused to follow simple solutions. They are programmed to complain, make excuses of why they can’t follow these examples and focus on the problem without no solution in sight.

And each passing year, their situation gets worse and more new TIs come on board to replace them.

About 15 years ago, there was a lawyer who was working on a case. There were an organization who was heavily funded.

Today, all of that is gone.

There is not even a central location for TIs to call home!

Just Facebook, weekly conference call and yearly rallies.

Very pitiful!

So my focus has been to focus on myself.

With any amount of money, the first thing is to purchase 5/10 acres. We need space from this targeting. Than counter-measures. SIMPLE!

Mass Shooting & Targeting

We had the worse mass shooting in the United States and the government response was, “we did not know the motive.” But on his profile, he claimed to have been harassed by what he claims to be government agents..

We TIs know much what these “government” agents are. We are very aware that the government has a role in this criminal operation. But the vast majority are agents of the state, which I refer as opportunists.

They take these jobs solely for financial rewards. Nothing more, nothing less. That’s why there so many “people” are participating.

But they don’t know their bio frequency is also being calibrated in the system as well. And once the government unleash this system to the general population, that’s when everyone becomes a targeted individual.

Anyway, just like anyone being targeted, they plea for help, but are ignored. But when a mass shooting happens everybody somehow becomes confused. But they weren’t so confused when they allow themselves to participate in something for financial gain. So there is always a price to pay at the end when you do something wrong. It’s called KARMA!

So what he killed 58 people and injured dozens more. So what! When his life was altered because the majority of people decided to look the other way or gladly participated in something they have no clue what the end game was..

And we supposed to just willow in sorrow just because a target decided to not accept their situation lying down? That everyone else should be allowed to live their lives while Targets are allow to suffer because of the public’s participation or unknowledgement of our situation?

Lack of Rain, nano technology in food & drink and intense heat of the sun

This is always the worse part of the year. As someone who is constantly outdoors and as a Targeted Individual.

It is a constant challenge to balance how much water to drink and how much food to consume, because of the lack of rain and the amount of nano technology in the food that I consume.

The nano technology is the software that is used to cause pain in our bodies, manipulate our thoughts and behaviors and prevent us from living ordinary lives.

This is compounded with our environment being saturated with this technology and you wonder why mass shootings have become such a regular phenomenon like getting up in the morning..

The U.S. government know this, because in 2008, right after Obama was sworn into office, I drop nearly two hundred Affidavits between the Capital and House of Representatives. So after 14 years later, it continues to happen as if no one knows what’s going on.

They know, but they don’t care until it directly affects them. But it is affecting everyone! Not by knowing, by how society is being impacted.

If you can’t go outside your house out of fear of being killed by a mass shooting, then the problem is you for not getting clear answers.

But it doesn’t matter anymore! It’s about what’s in it for you?

However, their is a big price to pay for allowing this criminal organization to exist all around these communities.

Just the other day I hear 4 pulsing devices going off in 4 different areas surrounding me. If you didn’t know, you would have thought it was a display of fireworks.

These devices have been placed in these different communities. These devices allow anyone with a cell phone in these communities to program the device to send signals to the targeted area. The targeted area is the area that I’m in.

There is one community south west of me, an homeless encampment south of me, government facilities direct east and northeast of me and communities north east of me. All are participating in a 24/7 cycle.

Any pain that occurs on my body is a reflection of all who participate. And each year that occurs, the sounds get louder.

i even experience these sounds after leaving this area for sometime. So these pulsing devices are mobile and can even be carried on person.. So if you see someone with a backpack, than they most usually would have the pulsing device.

Anyway, gmo food, nano technology in our environment and the abundance of wireless device communications is the result of mass shootings that we have been experiencing for sometime.

The people who are running our government are the enemy of the people. And public through their opportunistic aspirations for their own financial means are they own enemy.

Buffalo, Texas Mass Shooter & Government Sponsored Cult Groups

At first glance I was surprised about what has been happening..But the more I delve into my.owm situation, I’m not surprised at all.

Almost 15 years as a targeted individual, I have witness a lot of things that “people” do around me.. The whole body language and the way that “people” conduct themselves awkwardly around me.

So i came to several conclusions that the either the average person is being possessed by something are completely embedded into criminal manipulation that they lost all senses of their true purpose on planet earth.

This is the majority of “people” I’m confronted with. Whether they are full human beings who lost their way, the criminally insane, or so connected to the electronic grid that the people pulling the strings are showing me no matter who confronts me, they are under their command.

And sense we talking about being under someone’s command, doesn’t it seem likely that these individuals were use to do these acts for a particular purpose and a particular outcome?

But most people wouldn’t know this unless they are targeted individuals or someone who is pulling the strings.

I don’t want to spend too much time with this. But it does appears that these individuals were lead to engage in these acts for a particular type of outcome. Maybe the outcome is to distract us from what our enemies true motive.

i do know from what I have seen, is that society is running on borrow time. “We” too many of these cult groups infiltrate our communities without questioning them. “We” stayed silent while they cast spell on individuals and the areas that they reside without batting an eye! “We” allowed individuals to setup pulsing and microwave weapons in our communities without questioning what they would be used for, as long as their was a financial payoff at the other end. “We” allowed “ourselves” to participate in these criminal groups without really understanding the full thrust of mission.

It’s not like this is a secret! Criminal Organization have been happening as long as this country has existed. And continue to operate way after every piece of mankind has been destroyed.

And now things are really coming to a head and supposedly, everybody is surprised now.

My targeting has gone through the roof

After consuming ground pork that I purchased from Harris Teeter, my targeting has gone up exponentially! But it is a series of events that lead up to this situation.

When this level of targeting does occur, you loose all your mobility, because the pain that the perpetrators are causing you is the kind of pain that only injured people experienced.

Anyway, I have not done anything unusual. For instance, my diet consist of green vegetables, garlic, ginger, hot peppers, fruits and grains such as brown rice or wheat. I have completely removed sugars from.my diet. And I limit meats whenever i.could.

I even did a major flush of my body. And I did a fasting two days after that.

So I was thinking what could have cause them to manipulate every muscle in my body as if I was lying on an operation table?.

The only thing I can think of is for the first time I rode an ebike. The ebike was made so I could expand my transportation options. But as I was riding the bike, I noticed myself feeling increasingly tired and low energy.

Could it be that I missed two days of eating? I stopped eating because my targeting was increasing and everything I purchase from this criminal enterprise, because they own all the businesses has nano and other technologies and chemicals that aide them in this criminal program.

So if the ebike is doing all of this, what could be causing it? By the way, the ebike consist of three key components: the motor, the controller and the battery.

Im suspecting the controller has been modified for this targeting activity, so what should I look for to see what modifications have been made?

i want to make sure I know what I’m doing. This is a $2500 bike, so I need to know how to disabled the modification.

By the way, the ebike supposed to replace the shopping cart for longer trips. I have already purchased a box that had been modified to fit on the bike rack.

Getting access to better stores outside my immediate area is necessary for quality products. So I made a sacrifice to get this ebike so I could limit trips made with Uber or Lyft.

Also I was surprised that the bike, which is a fat tire 26 x 4.0 reached a top speed of 51 mph when it was advertised as only reaching 28.

The lowest PAS level gives me 15 miles per hour, 2 23mph, 3 34 mph 4 42 and 5 51 Pas 6/7 are for advance users.