Measures in daily life

報告相談

I’m going to   continue  to report on the subject.
Tinnitus HQ. Using an application called Tinnitus HQ, playing the sounds of crickets and birds can significantly reduce the sound of V2K and microwave auditory effect technology.

You can use the band elimination function to adjust the frequency of the voice, frequency and application sound of the other party to reduce unpleasant sounds at about the same frequency.

Even if the other party changes the frequency, you can change the frequency again.

If the opponent still attacks by changing the frequency persistently, select another type of cricket, bird’s voice.

I think it’s best to use it in 0.1 octave.

You can download it from the iPhone App Store.
It will be charged, but it is the most reduced I have tried so far.

Next, at bedtime, I wear a knit hat from a manufacturer called Mamodenpa, but I can reduce it the most.
And in everyday life, I fold a knit hat in half and put it on the top of my head, then put several layers of aluminum foil on it, and put a hat on it to reduce it.

If it attacks your eyes, you can reduce it with blue light glasses.

In addition, an electromagnetic wave protection sheet is attached to the entire ceiling to reduce the problem.

Please refer to it.

How to collect evidence

報告相談 

I’m going to report on the subject.
I think that many things you already know are included, but please refer to them.

1. Detection of 40 μT (micro tesla) or more with the AR electromagnetic wave measurement application of smartphones
Application name: Magna-AR

An electromagnetic wave arrow is displayed and the screen shows how much electromagnetic wave is coming from which direction.
You can use it immediately by downloading it from the iPhone App store.

* AR is an abbreviation for “Augmented Reality” and is called “Augmented Reality” in Japanese.
AR is a technology that adds information to the real world by the appearance of digital content such as navigation, 3D data, and videos in the real world when viewed through a smartphone or AR glass.
Simply put, AR can supplement real-world “missing” or “desired” information.

2. The wideband receiver was able to confirm the V2K voice of the perpetrator, although it was mixed with noise (FM70MHz to 1600MHz).

* Wideband receivers (wideband receivers, scanners) are not only ordinary radio broadcasting channels, but also simple radios such as specified low power, amateur radios, illegal radios such as eavesdroppers, cordless microphones, aviation, railways, etc. It is a radio that can receive radio waves of a wide range of frequencies such as ship radio.
Made by Alinco and purchased from Amazon

3. Software defined radio (SDR) was able to confirm the voice of the perpetrator’s V2K, although it was mixed with noise (70MHz to 4000MHz).

* SDR: Software Defined Radio replaces most of the radio hardware with software.
Since many physical circuits required for radio are realized by software, it is possible to change the performance and specifications of the radio by changing the software.

A USB and antenna set called RTL-SDR can be purchased at Amazon for around 40USD.

RTL-SDR usage site: http://rtl-sdr.tukaikata.net/p/rtl-sdr.html

In addition, software called SDR Sharp and AIRSPY can be downloaded for free.

And if you use this USB and antenna set called RTL-SDR, SDR Sharp, and software called AIRSPY, you will be able to receive not only radio waves but also radio waves from satellites.

4. Confirm the reception of satellite radio waves using RTL-SDR, USB and antenna set, SDR Sharp, AIRSPY software in 3 above.
Confirmation of received sound at a frequency of 144MHz.432MHz in CW mode
Check the voice of the perpetrator at the same frequency (144MHz) even in other radio modes
* CW mode is the mode used for receiving satellite radio waves.
It seems that the frequency of 144MHz.432MHz is often abused by illegal amateur radio and illegal radio stations. (Ministry of Internal Affairs and Communications Radio Wave Homepage> Features of Illegal Radio Stations)

5. The ultrasonic detector (bad detector) confirmed the V2K sound of the perpetrator, although it was mixed with noise (30KHz-120KHz).
Purchased from Amazon

* The ultrasonic detector allows you to hear ultrasonic waves that cannot be heard by the human ear.
For example, ultrasonic waves such as bats can be converted so that humans can hear them.
You can also measure the frequency of ultrasonic waves.
In addition, it is also used to identify the location of a flat tire, and the location of gas leaks, air leaks, high-voltage discharge, etc. in the factory line.

6.5G satellite EMF electromagnetic wave detector confirms EMF electromagnetic wave from satellite (satellite name: STARLINK: -95db (W / ㎡))
* A unit called decibel [dB] is used to express the strength of radio waves and the gain of the antenna.
W / ㎡ (irradiance) is a physical quantity that represents the radiant energy per area that is applied to an object per hour.

It is displayed when you search for 5G electromagnetic wave detector in iPhone App store etc.

Since the satellite is displayed on the screen in AR, I think that it will be more credible when explaining.

7. Using an astronomical telescope, check the celestial body of the satellite orbiting in the satellite orbit (estimated at an altitude of 1,000 km) over your home.

You can purchase it from Amazon for 30USD~.

You can see the satellites and celestial bodies that are shining white and orbiting.

8. Check the radio wave of 30-40dbm at 40MHz-50MHz.140-145MHz using a handy type spectrum analyzer.
* A spectrum analyzer is an electrical measuring instrument that displays a two-dimensional graph with frequency on the horizontal axis and power or voltage on the vertical axis.

You can purchase it on Amazon for 130~180USD.

9. Using a software-type spectrum analyzer and receiving antenna, confirmed radio waves of about 40dbm at many frequencies.
* In the decibel [dB] display, the power is represented by DBM [dBm].

As the confirmed frequency (part),
Radio waves were received and confirmed in the frequency bands of 1Ghz, 2GHz, 3GHz, 4GHz, 5Ghz, 6Ghz, and 7Ghz.
In addition, 1Hz ~ 7000MHz, 20MHz ~ 40MHz.26.1MHz ~ 28MHz.50MHz.80MHz.100MHz.120MHz
144MHz-146MHz.430MHz-440MHz.460MHz.462.5-463MHz
received and confirmed radio waves at a frequency of 467.5 to 468MHz.480MHz.880MHz.889MHz to 911MHz.900MHz.920MHz.1800MHz.
As confirmed by the materials released by the Communications Bureau of the Ministry of Internal Affairs and Communications, it was found that the frequency band is often used in illegal radio stations.

I used a device called Hack RF One and a set of antennas purchased from Amazon, and software called SDR Console.

Usage site: https://engineer-climb.com/hackrf-one-1/

Site about the software to use: https://engineer-climb.com/hackrf-one-2/

This software type spectrum analyzer can be purchased for about 180USD, and you will be able to check reception of radio waves at frequencies of 1Hz to 7GHz.

In addition, 1Ghz to 10Ghz for satellite remote sensing, 2Ghz to 10Ghz for wall transmission radar, and 2Ghz to 8Ghz for human body search radar.

2400-2500MHz with microwave auditory effect technology (V2K), 2Ghz-8Ghz with radar used in brain-machine interface

It seems that radio waves of 1Hz to 100Hz are used for radio waves that make people irritated, uncomfortable, and excite parasympathetic nerves.

Thank you

United Nations Human Rights Council ・ Report on human rights violations and appeal procedures

報告相談 

I’m going to report on the subject.

From individuals to non-governmental organizations, there seems to be formal written reporting, appeal procedures, and remedies.
It seems that it is possible to send and submit in writing by using Google Translate.
Also, the format is not specified.

If accepted, it will be reviewed by the Working Group together with the Secretariat and the government’s view on alleged human rights violations will be sought.
It seems that the report will be subsequently deliberated and recommendations will be made to the parties concerned.

United Nations Information Center
https://www.ohchr.org/EN/HRBodies/HRC/ComplaintProcedure/Pages/HRCComplaintProcedureIndex.aspx

Communications intended for handling under the Human Rights Council  complaint procedure may be addressed to:

Complaint Procedure Unit
Human Rights Council Branch
Office of the United Nations High Commissioner for Human Rights
United Nations Office at Geneva
CH-1211 Geneva 10, Switzerland
Fax: (41 22) 917 90 11
E-mail: CP@ohchr.org

The petition can also be sent to the Office of the United Nations High Commissioner for Human Rights in each country or region.

About publicity activities and reports of technology and high-tech crimes 5

報告相談

I’m going to continue to report effective methods and ideas for publicizing and reporting technology and high-tech crimes.

Information and report destination

Agriculture, fishery, forestry workers

There is a possibility that the inside of your home or office may be peeped, monitored, eavesdropped, or voyeurized.

There is a possibility that work, personal life, and private life are being monitored or eavesdropped.

There is a high possibility that personal information has been leaked due to the damage of surveillance, eavesdropping, and voyeurism by business partners due to technology and high-tech crimes.

Manufacturing, construction, electric power companies, gas supply companies, waterworks, companies, oil companies, energy-related, chemical-related companies

There is a possibility that the inside of the company, the site, etc. may be peeped, monitored, eavesdropped, or voyeurized.

There is a possibility that the president or employees’ work, personal life, or private life may be monitored or eavesdropped.

There is a high possibility that confidential or confidential information has been leaked due to damage from surveillance, eavesdropping, and voyeurism caused by technology and high-tech crimes.

Electrical equipment manufacturers, information and communication companies, Information technology companies, systems, software development companies, mobile phone distributors

Banks, credit unions, credit unions, credit card companies, consumer finance, securities companies, investment companies, life insurance, non-life insurance companies, human resources service companies, security companies, audit corporations, lawyer corporations, lawyer offices, tax accountant offices, Accountant office, food maker, food maker, beverage maker, liquor maker, liquor maker, pharmaceutical company, pharmaceutical company, cosmetics, office supplies,

Theme park, fitness gym, travel agency, hotel, casino, real estate company, condominium management company, building management company

Construction machinery manufacturers, shipbuilding land transportation, transportation companies, warehousing companies, logistics companies, shipping companies, air transportation, airlines, convenience stores and operating companies, consumer electronics mass retailers, supermarkets, department stores,

Shopping center, home improvement store, furniture interior, drug store, apparel maker, general trading company, specialized trading company, recycling, purchase shop

Restaurant chains, family restaurants, taverns, restaurants, eyeglasses, jewelry, learning schools, weddings, wedding halls, nursing homes, medical device manufacturers

Hospitals, medical institutions, consulting companies, professional sports owners, operating companies, professional athletes

There is a possibility that the state of the company / company, office, branch office, store, store, site, etc. may be peeped, monitored, eavesdropped, or voyeurized.

There is a possibility that the president or employees’ work, personal life, or private life may be monitored or eavesdropped.

There is a high possibility that confidential information, confidential information, and personal information have been leaked due to damage from surveillance, eavesdropping, and voyeurism caused by technology and high-tech crimes.

There is a possibility that the inside of the hotel or guest room may be peeped, monitored, eavesdropped, or voyeurized.

There is a possibility that the inside of hospital facilities, buildings, and condominiums may be peeped, monitored, eavesdropped, or voyeurized.

There is a possibility that the personal life and private life of the athlete may be monitored or eavesdropped.

About publicity activities and reports of technology and high-tech crimes 4

報告相談

I’m going to continue to report effective methods and ideas for publicizing and reporting technology and high-tech crimes.

Information and report destination

Media
There is a possibility that the situation inside the TV station, news station, production company, production site may be peeped, monitored, eavesdropped, or voyeurized.

News caster, reporters, employees may be monitored or eavesdropped on their work, personal life, or private life.

Web and internet media
There is a possibility that the inside of the company or production site may be peeped, monitored, eavesdropped, or voyeurized.

Reporters and employees may be monitored or eavesdropped on their work, personal life, or private life.

Youtuber
There is a possibility that the inside of the production company or production site may be peeped, monitored, eavesdropped, or voyeurized.

Youtuber, employees’ work, personal life, and private life may be monitored or eavesdropped.

Church

There is a possibility that the inside or inside of the facility may be peeped, monitored, eavesdropped, or voyeurized.

There is a possibility that the private life and private life of the priests and staff are being monitored or eavesdropped.

Thank you

About publicity activities and reports of technology and high-tech crimes 3

報告相談

I’ll continue to report effective methods and ideas for publicizing and reporting technology and high-tech crimes.
I think it is good to provide information from the standpoint and perspective of the other party.

Information and report destination

Police

There is a possibility that the police box may be peeped, monitored, eavesdropped, or voyeurized.

There is a possibility that police officers are being monitored or eavesdropped on their work, personal life, or private life.

There is a possibility that the inside of the police station may be peeped, monitored, eavesdropped, or voyeurized.

FBI
There is a possibility that the inside of the FBI headquarters or branch office may be peeped, monitored, eavesdropped, or voyeurized.

There is a possibility that FBI staff and investigators may be monitored or eavesdropped on their work, personal life, or private life.

Court
There is a possibility that the inside of the court has been peeped, monitored, eavesdropped, or voyeurized.

There is a possibility that the judges’ work, personal life, and private life may be monitored or eavesdropped.

Prison
There is a possibility that the inside of the prison may be peeped, monitored, eavesdropped, or voyeurized.

There is a possibility that police officers are being monitored or eavesdropped on their work, personal life, or private life.

Political party
There is a possibility that the inside of the party headquarters or local branch may be peeped, monitored, eavesdropped, or voyeurized.

There is a possibility that staff and party members are being monitored or eavesdropped on their work, personal life, or private life.

The inside of the offices of members of the House of Representatives, members of the Diet, states, groups, cities, and towns may be peeped, monitored, eavesdropped, or voyeurized.

There is a possibility that members of the Diet may be monitored or eavesdropped on their duties, personal life, or private life.

Government, municipality
There is a possibility that the inside of the state, group, city hall, town hall, etc. may be peeped, monitored, eavesdropped, or voyeurized.

There is a possibility that the staff members’ work, personal life, and private life may be monitored or eavesdropped.

Each ministry
Ministry of State, Ministry of Finance, Department of Defense, Justice, Ministry of Interior, Ministry of Agriculture, Ministry of Commerce, Ministry of Labor, Ministry of Health and Welfare, Ministry of Housing and Urban Development, Ministry of Transport, Ministry of Energy,

The Ministry of Education, the Department of Veterans Affairs, the Department of Homeland Security, and local bureaus may have been peeped, monitored, eavesdropped, or voyeurized.

There is a possibility that the staff members’ work, personal life, and private life may be monitored or eavesdropped.

Thank you.

About publicity activities and reports of technology and high-tech crimes 2

報告相談

Dear Government Sponsored Stalking

I’ll continue to report effective methods and ideas for publicizing and reporting technology and high-tech crimes.
I think it would be good if information was provided by e-mail from inquiries on the website.

Information and report destination

Kindergarten PTA, Parents Association
There are cases where parents of children are being monitored or victims of crime.

Elementary, junior high and high school, Parent-Teacher Association, children’s association

Case: It is said that accidents such as children and students going to and from school dying or becoming seriously injured due to a car rush accident have also been caused.
(It is said that the driver who caused the accident was originally the victim of the above crime)

There is a possibility that an accident has been caused in which students who are going to and from school are attacked.

There is a possibility that an accident has been caused in which the students in the school are attacked.

There is a high possibility that the student’s situation in the school, personal life, and private life are being monitored or eavesdropped.

There is a high possibility that teachers, teachers, and principals are being monitored or eavesdropped on their work, personal life, and private life.

Universities, supporters’ associations, circles, clubs, club activities, etc.

An accident has occurred in which a student on his way home is attacked while commuting to school.

There is a possibility that an accident has been caused in which a student in the university is attacked.

There is a high possibility that the student’s appearance in the university, personal life, and private life are being monitored or eavesdropped.

There is a high possibility that the professors and presidents are being monitored or eavesdropped on their work, personal life, and private life.

There is a high possibility that the office room of the university and the office workers are being monitored or eavesdropped.

There is a high possibility that activities such as clubs,club activities, and activities outside the university are monitored or eavesdropped.

Thank you

About publicity activities and reports of technology and high-tech crimes

報告相談

Dear Government Sponsored Stalking

I’ll report effective methods and ideas for publicizing and reporting technology and high-tech crimes.
I think that it contains a lot of content that you already know, but please refer to it.

Report destination

Neighborhood associations,local communities

If there are sites for each state federation, group, city, or town, you should report and provide information from inquiries.

You Should report when, where, who, what, how, and why, including the evidence collected, according to the other party’s perspective.
(I think it is also good to report to the police through the residents’ association, neighborhood association, and local community.)

In addition, crimes may have caused troubles in the neighborhood and residents, and may have caused family murder.

There is a possibility that the private life of the inhabitants may be monitored by satellite communication networks, artificial satellites, remote sensing, radar, etc., or eavesdropped and voyeurized.

Explain the cases of actual accidents and familiar examples of technology used in crime in an easy-to-understand manner without using technical terms as much as possible according to the interests of the other party.

For example, regarding electromagnetic waves and microwave irradiation, the radio wave electromagnetic waves originally used for earth observation by satellite (meteorological satellites, etc.) and remote sensing technology are diverted to attacks.

The brain-machine interface is originally used for medical purposes such as brain diseases and cerebral palsy.

In addition, the biometric information analysis software originally used in medical treatment is abused to read thought information, visual, auditory, cardiopulmonary function, and biometric information from brain waves and electrical signals.

Microwave auditory effect technology is also used in agriculture and forestry as a countermeasure against wildlife and vermin.

Also, in December 2021, it seems that a device that does not require headphones or earphones that applies the microwave auditory effect will be released by an Israeli tech company.

It is also believed that the transmission sensor and wall transmission radar (technology for seeing through the inside of a building from the reflection of radio waves in the event of a disaster or for life exploration) electromagnetic wave life exploration equipment mounted on artificial satellites are also being abused.

(Electromagnetic wave human life exploration equipment is an application device of radar. It is a fusion of two technological areas of biometric measurement using microwaves and underground radar. It is a kind of Doppler radar and electromagnetic waves (mainly microwaves) from the transmitter. ) And the reflected wave is received by the receiver
It is a device that searches for survivors in buildings and under rubble by detecting the periodic phase transition (frequency modulation) of the reflected wave due to breathing and pulsation. A monitoring sensor for elderly people in beds and bathrooms that applies this technology is being developed.)

Microwaves are also familiar to us in microwave ovens (microwave heating), satellite television broadcasting, multiplex wireless communication, radar, microwave spectroscopy, microwave chemistry, microwave transmission, microwave imaging, etc.

Furthermore, radio waves and ultrasonic waves used for medical, examination, and therapeutic purposes are abused and continue to irradiate the head, respiratory tract, and trachea, resulting in dyspnea.

And by continuing to irradiate the head with radio waves of 1Hz to 100Hz, it acts on the parasympathetic nerves, causing frustration, discomfort, and excitement.

Furthermore, it seems that it is possible to make some intentional remarks, hits, kicks, throws, etc. by misusing electric signals that are thought to be used in medical treatment and medical treatment.

Microwave auditory effect technology (V2K), bone conduction voice communication technology, and voice changer function are abused to spoof various people from all directions to the target and continue to make detrimental remarks.

It is possible to hear the sound of closing the door, the horn of the car, the sound of closing the car door, and the sound of coughing by amplifying the volume to the target from various directions in the neighborhood.

In addition, various sound effects managed on the perpetrator’s computer can be disguised as if they were actually heard from various directions, and the judgment can be improved by actually listening to or mixing various sounds. Being guided to a blunted hospital.

Persecutory delusions have been triggered because it is possible to disguise and misunderstand as if the voice is coming out from the mouths of neighbors, car drivers, train and bus passengers. case.
(Example: You can hear a voice next to an apartment or apartment building or from the upper floor)

In addition, it is said that victims including many women are forced to commit suicide or are killed by crimes that abuse the above technology every year.
(There is a high possibility that a pregnant foetation may have a miscarriage, stillbirth, chromosomal abnormality, or congenital abnormality due to the attack of electromagnetic waves or microwaves.)

It is said that accidents such as the death of a child who is going to and from school due to a car rush accident or becoming seriously ill have also been caused.
(It is said that the driver who caused the accident was originally the victim of the above crime)

Thank you

About solutions and ideas for technology and tech crimes

報告相談

Dear Government Sponsored Stalking

I’ll report on the subject.
I hope you can refer to it.

Use bulletin boards, Twitter, Youtube, SNS, Websites, leaflets and word-of-mouth to call for information on perpetrators.

Widely gather and solicit evidence that leads to arrest, such as voice recording data, computer screens used for crimes, video captures, etc., including anonymous information provision from the general public, other perpetrators, and related parties.

I think it’s good to spend a bounty to collect information. (Give only influential information)

If definitive evidence is gathered and criminal charges, accusations, and civil suits are possible and settlements and compensation can be reimbursed, a part of them will be given as a reward.

Also, I think it is good to call for information on the premise that some rewards will be given.

Information provided by perpetrators and former perpetrators anonymously, actual methods, sources and operations of communication satellites used for perpetrators, operation methods, satellite names and manufacturer names, geostationary orbits , Altitude, longitude, latitude, region, frequency used, etc. are collected and linked to a solution.

Use domestic and overseas crowdfunding and fund-raising sites to raise funds for activities.

Establish a fund that uses the compensation that can be reimbursed in the proceedings as an investment profit. (If reimbursement is possible, it will be distributed according to the investment ratio)

Use recruitment websites and bulletin boards to gather volunteers, collaborators, and staff.

Use a reliable paid VPN for activities on the site to prevent IP address leakage.

As much as possible, anonymity, secrecy, decentralization, and wide-area network formation to prevent or minimize the risk of interference.

If there is a rough search or obstruction from the perpetrator, another rough search or information gathering and accusation.

Be aware that the company that received the request in the comment section of the bulletin board, Twitter, or Youtube may have written a large amount of negative information.

Be careful that the perpetrators are not inside or approaching.

If possible, young in twenties and thirties, ask modern men and women to design sites, Youtube, SNS, Twitter, leaflets and expression techniques for sentences to gather public reaction and response, and to be widely recognized and permeated.  

Then gather young male and female volunteers, collaborators and staff.

When funds are raised, ask celebrities, freelance announcers, etc. to introduce you to the crime.

Rent an artificial satellite and use it to collect evidence.

It seems that there are actually artificial satellite subscriptions and hourly rental services.
$ 250 a week
A company called Spire Global, Inc. Spire Global in San Francisco
https://spire.com/

In addition, an hourly rental of artificial satellites was introduced on a Chinese news site.

http://news.sina.com.cn/o/2017-03-30/doc-ifycwunr8163325.shtml

The service is provided by Tianyi Research Institute, a cloud computing service provider.

The sharing economy has been introduced in the satellite services sector, and the initial estimate of the rental price is 2 to 3000 yuan per hour.
(320USD~480USD)

Changsha Tenichi Institute and UCloud, one of the top three cloud services in China, have announced strategic cooperation to jointly develop China’s first time-sharing astronomical satellite, UCloud Yunhan.

As one of the few private aerospace companies in China, we provide short-term, low-cost, one-stop space science experiment and technology verification services to domestic and foreign scientists, research institutes, and private companies through microsatellite. ..

The test preparation period can be reduced from the initial years to months, reducing test costs by almost an order of magnitude compared to traditional methods.

Individuals can also rent, and the sharing economy has been introduced in the satellite service field.

After the launch of the “UCloud Yoonhan” satellite, renting an “experimental station” will allow individuals to easily perform experimental operations and significantly reduce test costs.

In addition, announce the use of satellites on an hourly basis to the people involved in companies that operate satellites and try to negotiate.

If there is a contact from the people who operate the artificial satellite for publicity activities and information provision, and if a relationship is established, ask to investigate and collect evidence in a short time, hourly.

A method that worked for the perpetrator

1. Point the laser pointer (red) at the ceiling and irradiate.
2. Irradiate the tactical light used for self-defense toward the ceiling.
3. Discharge the stun gun overhead, in the direction of the electromagnetic wave, laser, and radar.

Thank you.

Detoxing from Man-made Technologies

This is a video from Richard Delgado talking about suppliments that you can purchase to address the symptoms your perpetrators are giving you. Some of these suppliments can be supplement by some of the natural foods that can be purchased at a supermarket or vegetable store.

Video: https://www.holistichealthonline.info/remove-graphene-oxide-vaccine/

Other sources:

https://www.webmd.com/vitamins-and-supplements/quercetin-uses-and-risks

https://www.holistichealthonline.info/remove-graphene-oxide-vaccine/

https://www.webmd.com/vitamins-and-supplements/astaxanthin

https://www.webmd.com/vitamins-and-supplements/glutathione-uses-risks

https://www.webmd.com/vitamins/ai/ingredientmono-1018/n-acetyl-cysteine-nac

Merry Christmas.