Cybersecurity 210: Introduction to Neurosecurity
So, you're in cybersecurity, have entire network secured, IDS/IPS, some AI guardian shield system on the perimeter 2FA, inside, air gapped trade secret system, then you get neurohacked? What's that?
This article is a brief introduction to neurosecurity for cybersecurity professionals completely oblivious to it. These days even deep tech and hard tech startups are targets by neurohackers, this includes a proxy attack through contamination of an employee or trusted person, without their knowledge.
There are some basic vocabulary terms to be aware of before you read this publication:
non-invasive brain-machine-interface niBMIs exist today and are in people within your facility, with or without your current awareness or knowledge
the people with niBMIs can get hacked by neurohackers now, due to self-replicating synthetic biology, comprised of mesogens, graphenes and self-replicating nanotechnology.
The people that get neurohacked, typically arent’ even aware they’re hacked and are going about their daily routines, while a neurohacker linked mesogen, graphene and nanotech system is growing in them and growing a map of your network, wireless, wired and neurotechnology enabled assets (smart devices).
The neurohack first starts by a person getting zero-day’d or simply hacked on their smart device. Then the smart device neurotechnology system (app or hacked smart phone) attacks the person’s neurotech niBMI system (in brain, stomach and central nervous system (both sides of skull so it can transmit to external environment, prior issue with BMI’s invasive).
The person walking around in your company’s infrastructure is literally mapping out everything with the neurohacked mesogen, graphene and nanotech system, including the passwords the person is using to access computers, doors, safes, etc.
After the neurohacker has completely compromised the person (neurohackers are linked to AIs or other niBMIs in wetware devices or people). The person can be used to “glitch-out” where the niBMI inteferes with the person’s normal routine and inserts an EEG pattern that results in the person having a typo or freezing-up or even weird characters being written on their computer or notebooks (physical, not digital). When the person “glitches-out” is when they can drop a usb drive, send an email, copy some files, without their knowledge, due to the neurohack. Then even your air gapped trade secrets at the company are compromised. This is what the 5 Eyes just freaked out about in late 2023 with the largest global hack by ChinaCCP’s PLA Xi’s Magic Weapon system, which is comprised of social media apps like Tik Tok in people around your work, home and family, that spreads contaminated self-replicating nanotechnology, which can link them to your employee for the adversarial AI BCPS to perform data recon then start the full neurohack build-out or not depending upon the value of the asset (e.g. person’s brain, network, wealth, influence, etc.).
So, how do you detect a neurotech compromised person? Simple, just scan for contamination, verbally verify if they have Tik Tok or other ChinaCCP apps on their phone or any ChinaCCP hardware, after verbally verify do a physical check for the device to be allowed on-site, if the person is fully compromised, they can say things that they don’t realize they’re actually saying (yes, this is how an AI BCPS neurohacked person operates, not on their own at all times). You can get different people (not knowing beforehand to ask the neurotech comprimised person the same things in the same sequence and log the answers to detect if they’re fully compromised or not by ChinaCCP Xi’s Magic Weapon or any other proxy of ChinaCCP coalition utilizing their neurotechnology stack for hacking and trade secret pilfering or influence (e.g. sabatoge your organization).
One simple solution is to not have wireless in a secure or engineering area and utilize a lock box for their personal smart phones before entry into the room or office. You need to have the lock box or secure bag away from the person’s body, not adjacent to it. Further, the person needs to have a non-ChinaCCP issued business smartphone to link them to your business and ensure while they are on-site that their contamination is being minimized and neurohacker detection maximized.
Here are some useful details that I’ve logged while debugging a contaminated person’s niBMI and removing the maltrained mesogen, graphene and self-replicating nanotechnology globules (this requires chelators and vitamins and diet modification to purge the neurohacked person’s mesogen from ChinaCCP - if you need info on this ping me directly on here (you can do that by signing-up, first interaction is no cost if you subscribe, after that I have an hourly rate).
Here are some notes referencing attack vectors and further introductory information and data on contaminated person, where overlapping wifis at residential house plus a dirty harmonic system (pulsing b-fields) by utility “Entergy” resulted in contamination spread of the self-replicating nanotechnology that compromised the person with contamination. Yes, self-replicating neurotechnology and communications go through (e-field, b-field, EMF, space, land (telco systems) and air, inclusive of longitudinal waves (music and acoustical related vibrations of matter).
Cybersecurity: Understanding Neurosecurity
If you’re in information technology or cybersecurity or in engineering and care about defending your networks and people, then this is the article for you.
What is neurotechnology and how can cybersecurity experts defend against Non-Kinetic-Threats NKTs?
Neurotechnology is comprised of a three part system, where one part is inside of your body (non-invasive or invasive brain-machine-interface bmi. The second part is the person’s local smart phone that links up with the person through byte-based interactions, such as visual cortex (optogenetics), electromagnetic spectrum utilizing frequencies, and third a background EMF spectrum in the local environment of the person that can be influence by other location transmitters, space systems, land systems and air systems.
The baseline neurotechnology background is set with a Kalman pulse signal that is transmitted globally and has a given pulse frequency. Known pulses using scalar wave are 3.3 to 3.4 Hz for neuron firing interaction (non-synthetic) and 10 Hz for visual cortex interaction (non-synthetic) on a global basis. Then on top of the organic brain is a synthetic brain, which if not contaminated, should “enhance” your life if you’re not residing in an authoritative repressive nation state that is utilizing the next generation neurotechnology synthetic biology system. The Kalman filter with synthetic biology is set based upon transmitted frequency from satellite systems, local cell towers and other transmitters.
Therefore, if you are outdoors in a non-shielded building, you will receive the global kalman filter pulsing at rougly 3.3 to 3.4 Hz, undetectable to most, unless you have a sensor or detector. The reason why people who get shot up with electronic weapons complain about a noise distracting them, is that they got abruptly detuned from this background kalman filter pulse that they were “tuned into “ previously.
If you’re indoors, in an unshielded building, then the kalman filter will penetrate the building into you.
Your local smart phone when you also have synthetic biology inside of you, will then adjust your frequency from the background environmental frequency into a isolated frequency, supposedly not shared with others.
When you are around other people, non-contaminated, then your cognitive functions in synthetic brain remain fully functional. However, if you are in an environment, contaminated with people fully loaded up with synthetic biology, then you can be directly affected by these people. You can be directly affected through their synthetic biology transmissions, data, wetware directed energy weapon DEW (Neuro S/T), and also have their synthetic biology directly contaminate you and link you to their AI BCPS, which if linked to an adversarial nation state or group, will then start to build a transmitter into your body, such that you are not only tracked by your national security agency AI, but now the “contaminated” mesogen, graphene and self-replicating nanotechnology, comprising a synthetic biology system.
Therefore:
Neurohacking is comprised of three attack vectors that can directly jeopardize you:
Contaminated people with another AI BCPS linked to them besides your given nation state. Example: ChinaCCP NeuroStrike and people using Tik Tok. These are Non-Kinetic-Threats NKTs, when the electronic transmission attack occurs, but also synthetic biology-Threats when the self-replicating nanotechnology is transferred from them into you. After the synthetic biology is transferred it is trained to emit frequencies that could be harmful or to connect to your wifi and then phone home to a neurohacker group’s AI (nation state based, big tech or a rogue neurohacker).
Contaminated products, from another nation state or region with mesogens, graphenes and self-replicating nanotechnology. ChinaCCP manufactured export goods, specifically consumable products that you can ingest and eat, such as food.
Neurotechnology hardware, such as smart TVs, smart phones, smart IoT devices from non-friendly nation states that can link into you and build a tracker. Examples, include bank payment gateways and point of sale terminals, that complete a 2FA utilizing neurotechnology. However, if you’re contaminated, then the mesogen, graphene and nanotechnology “globule” in you can then also perform an attack on you to obtain your pin # on debit card for example or obtain additional useful information for the cyber neuro enabled thieves, unknowingly or knowingly.
Touching or being by an electromagnetic frequency transmitter (cell phone (now days smart phones), wifi access point, radio broadcasting antennas, etc.) or television screen, computer screens that emit photons and also have an e-field around them in units of [V/m], will re-energize dormant mesogens in your body, that will start to retransmit their pretrained and encoded protocol commands (wifi, bluetooth, nfc, zigby, etc.) as the synbio material can self emulate over time and also can be byte-based programmed through optogenetics or other e-field, b-field, emf (transverse wave or scalar wave) or acoustic vibrational based methods.
Data Log (from screen snap as well as data outputs to text input program)
Keep reading with a 7-day free trial
Subscribe to Brandon’s Substack to keep reading this post and get 7 days of free access to the full post archives.