Dear Government Sponsored Stalking
Hello, I’m a person fighting technology crime and Electronic Torture in Japan.
I ‘d like to send you about the subject.
Please refer to it among the parties concerned.
By saying the following command and imagining it in your head, it is possible to actually execute the command on the perpetrator’s computer or screen side and interfere with the attack.
(Uplink and downlink in the frequency band for amateur satellites operated by perpetrators and amateur radio abused by computers (originally used for data transfer between satellites and ground stations)
Those who are under attack in the 144MHz band and 430MHz band, because they are in the same position as the ground station in amateur radio and are linked. * Ground station = victim / attacked person)
Example: Railgun 1 million watt
(By uttering a command and then imagining the gun and pulling the trigger, the perpetrator’s computer and in the screen will be fired by the electromagnetic cannon.
I think it’s best to shoot the muzzle in a direction that feels the effect, such as facing the front, facing up, facing from directly above to the bottom, or facing yourself.
If you fire it toward yourself, it will also be fired at the perpetrator’s screen.
Also, if you shoot the muzzle upward near the left and right ears, the perpetrator will also hear the firing sound and it will be effective for V2K.
Feel free to change the unit to 1 million watt or 100,000 watt.)
* The electromagnetic cannon is a state-of-the-art weapon that shoots ultra-high-speed cannonballs with electromagnetic force, and seems to have been introduced by the Ministry of Defense and the military.
Please try the following in the same way with reference to the above.
Railgun 1 million Watt
* Same as the railgun.
Coilgun 1 million Watt
* A coil gun is a device that accelerates and fires an object that becomes a bullet using the coil of an electromagnet.
Plasma gun 1 million Watt
* Plasma gun is a weapon for emitting plasma.
Glare Blaster, Red, Blue 1 Million Watt
(A fast blinking light used for self-defense and crime prevention)
Pulse flash 1 million Watt
(Bright light flashes at high speed)
100 flash bullets
(It has the effect of flirting mobs and criminals for a few seconds with a dazzling light and a deafening explosion sound with a momentarily intense bomb.)
100 stun grenade
(Same as flash bullet)
Gunpowder gun
100 direct lightning strikes
(The effect is doubled by speaking a voltage of 1 million V (volt) and a current of 1 million A (ampere) before executing a direct lightning strike as a command.)
Sonic shock wave maximum
(It is a shock wave that generates a wave of extremely high pressure around a wing that flies at supersonic speed.)
Sonic shock wave
(Explosion sound caused by the shock wave of a supersonic aircraft and felt on the ground)
Ultrasonic blaster maximum
Imagine a laser pointer and slash vertically, horizontally, and diagonally with respect to your own direction.
(Because by imagining it in your own direction, it will appear on the screen that the perpetrator is looking at in the same way.
I think it’s a good idea to try various orientations such as from the front or from the top to the bottom.
I think it’s a good idea to say 100,000 Watt of laser pointer red or green in advance. )
Aluminum, V2K, acoustic maximum
Aluminum,V2K,howling
Emergency bell maximum
Alarm siren for disaster prevention maximum
Motor siren maximum
Fire alarm maximum
Earthquake Early Warning maximum
Aluminum, V2K, 1-100Hz,maximum
(This is an application of the command that I shared before.
It seems that the 1 to 100Hz radio waves emitted by the perpetrator become noise and noise and return to the perpetrator. )
Maximum noise in telecommunications and wireless communication
(It seems that noise and noise are returned to the perpetrator side.)
Aluminum, V2K, noise (jamming) 100 decibels.
(Noise and noise will be returned to the perpetrator side.
Please try different units. )
Maximum power density
(Attack is reduced or mitigated when the perpetrator is attacking with increased power density)
Maximum electric field, maximum magnetic field, maximum microwave, maximum remote sensing
(It will be reduced or mitigated against electromagnetic wave attacks and microwave attacks from the perpetrators, and will return to the perpetrators as noise or noise.)
All Reflect
(Attack from the perpetrator is reduced and mitigated, and noise and noise are returned to the perpetrator.)
Aluminum V2K, current, voltage maximum
(Attack from the perpetrator is reduced and mitigated, and noise and noise are returned to the perpetrator.)
Maximum gamma ray
(The perpetrator’s attack using gamma rays is reduced and mitigated, and noise and noise are returned to the other party.)
BMI and BCI are all maximum
(It will be noisy or noisy to the perpetrator side)
All signals, all maximum, all 100 decibels
(It will be noisy or noisy to the perpetrator side)
Aluminum V2K, all RF signals, all 100 decibels
(It will be noisy or noisy to the perpetrator side)
All open, all secured, all ground, all discharged
(Attack from the perpetrator will be reduced or mitigated)
Aluminum V2K, Reflect all signals
(It will be noisy or noisy to the perpetrator side)
Repeat forever, Programm forever, Repeat forever
(After uttering and executing various shared commands, if you add and utter, the command will be repeated)
Fire a gunpowder gun after saying “Aluminum V2K, eardrum, all explode”
(It seems that the computer on the perpetrator’s side makes a fairly loud noise.
It is especially effective when the V2K attack echoes your eardrum and is terrible.)
Fire a gunpowder gun after saying “Aluminum V2K, airway, all explode”
(It seems that the computer on the perpetrator’s side makes a fairly loud noise.
It is especially effective when the perpetrator attacks your airway and it is difficult to breathe.)
Fire a gunpowder gun after saying “Aluminum V2K, skull, left ear, eardrum, all explode”
(It seems that the computer on the perpetrator’s side makes a fairly loud noise.
It is especially effective when the V2K attack affects your skull, ears, and eardrums.)
Try to say the names of each part of the human body and the whole body
(Example: “whole head” when there is an attack on the head “whole brain” when there is an attack on the brain “central nerve” “cranial nerve” “sympathetic nerve” etc.)
In addition, attacks from the other party are alleviated or diminished in the “airways, lungs, stomach, large intestine, small intestine”, etc.
Aluminum V2K central nervous system (Advanced version)
Human body, whole body barrier
Barriers to all spaces, barriers to ceilings, barriers to the sky, barriers to outer space
Send and output all
(It seems that the signal is sent from itself to the computer on the perpetrator’s side)
Reply all
(It seems that the signal is returned from the perpetrator’s computer to the computer)
Send and transmission, output 100W
(Try changing the output at the time of transmission)
Microwave transmission
(It seems that the computer on the perpetrator’s side makes noise and noise)
As an application example,
First, the speaker (image a speaker ) = (equal) The motor siren is sounded on the other computer just by associating it with the motor siren and imagining the speaker.
Things are also possible.
(Since it is difficult to say a command every time the opponent attacks, it is also possible to apply it to imagine the steering wheel of a car and associate the horn.)
Maximum squelch (or actual setting value such as 20)
(This setting is often used for amateur radio equipment. By maximizing the squelch, the reception sensitivity can be lowered and the attack and signal from the other party can be reduced.)
Those who are under attack of technology crime seem to be in the same position as the ground station in amateur radio. Therefore, it is effective to say this command. )
Minimum RF gain (or minimum value such as 0, 1)
(This setting is used for amateur radio equipment. By minimizing the RF gain, it is possible to reduce the attack and signal from the other party.)
Those who are under attack of technology crime seem to be in the same position as the ground station in amateur radio. Therefore, it is effective to say this command. )
* You can actually execute the command on the perpetrator’s computer to prevent the attack by saying (or imagining) the following command or the shortcut used on the computer.
Imagine pressing and holding the power button → Forced termination
All forced termination
Ctrl + Alt + Delete → Sign out
Alt + F4 Exit application → Repeat multiple times After closing all applications → Windows shutdown screen → OK
Cmd + Q Application termination (for MacOS)
Cmd + W Close window (for MacOS)
Ctrl + W Delete tab (Google Chrome function)
Shift + Ctrl + W Close the current window (Google Chrome function)
Commands that I shared so far, it will be effective even if it is applied in various combinations.
If you get used to it, you will be able to execute commands according to the attack method from the perpetrator.
how did u getr the list of target individuals where did it come from? Full detail.