Cybersecurity 211: Social Network AI Recursion with a Hacked niBMI and CODEX
How does a contaminated or hacked niBMI system, recon, analyze, strategize and then attack after conversion from perch mode to attack mode? This publication takes a cursory dive into the methods.
Artificial Intelligence AI Cyber Physical System CPS (AI-CPS)
Artificial Intelligence AI can be used for good or nefarious means (evil). The interaction of an AI with a social network based upon internet data can be achieved through an AI Cyber Physical system CPS, which is basically a computer program with a neural network behind it and the ability to parse and analyze natural languages and names of people, social media websites, run a bot network, to then go datamine your social network via digital breadcrumbs and social bots that connect to you and then utilize digital codex, AI driven, to track your whereabouts online. The more advanced AI CPS systems can also parse images using pyimage type repositors. [1]
Artificial Intelligence AI Bio Cyber Physical System BCPS (AI-BCPS)
The product line expansion over the past decade or so from nefarious cyberhacking groups, into neurohacking, as sponsored by nation states and nation stateless groups, either self funded through prior cybersecurity bounties or state sponsored or NGO sponsored (think Open Society Foundation by George Soros or Scientology using this tech, neurotechnology, to dupe and hook-line-sinker members into thinking they’re special as they progress to “higher levels of consciousness”), has also enabled a next-generation of hackers, that utilize neurohacking through non-invasively dosed brain-machine-interfaces or simply non-invasively dosed “bugs” that penetrate your body and track you (e.g. like a dog, cat or pet chip, but not hardware based, wetware based). The “globule” that hacks you through neurohacking is comprised of mesogens, graphenes, self-replicating nanotechnology, which results in a synthetic biology attack vector when linked with neurotechnology enabled edge devices or other wetware. [2].
CODEX based Learning Language Models LLMs, Natural Language Processing NLPs and associated BEACONS/BIOBEACONS
The use of a CODEX can be found through older computer science and cybersecurity work in tracking keywords searched or items downloaded to inform national security systems of a person’s online search habits and information consumption. One of the older hacks was to plant a malware on a person’s computer and have it search for a bunch of junk that the actual computer user never was searching for, but in a backend account running in parallel it would mess with the person’s search history and suck up resources of federal, state and local police. This was America’s and NATO’s first symmetric attack vector by bad actor nation states and sponsored hacking groups. Then came AI, which added an asymmetric advantage to the attacking cyberhacker group against NATO Alliance from other groups, nation states and nation stateless groups.
After the success of cyberhacking with AI by nefarious groups who made bounties into the billions (if you consider big tech part of this group, which I do), by exploiting your information. Then the cybersecurity and big tech groups did a product line expansion into neurotechnology, where they applied the CODEX, LLPs, NLPs, etc. through the use of a non-invasive brain-computer-interface niBMI with chipsets on the hardware based upon neurotechnology, bionic chips, neural networks, etc. in combination with a nanotechnology rollout through the food supply chain (think smart label foods, that are packaged in electromagnetic protective bags, seriously). Circa 2010, the US Patent Law was changed from first-to-invent to first-to-file by big tech, that had built-out their moats of neurotechnology to link brains through brainpools via IPv6, such that the big tech firms would be real-time data mining a given nation’s population through use of pervasive neurotechnology.
Then came ChinaCCP coalition and China BRAIN initiative that “officially” started in 2016, but apparently after a prototype was built and deployed on American officials to disrupt America’s budding relationship with Cuba, that succeeded. I had friends in Cuba during neuroweapon attacks in 2016, the non-kinetic-threat NKT attacks were real, you can read Mark Zaid’s FOIA of CIA documents that clearly contradict what the CIA told the US public on national tv in 2023.
After ChinaCCP coalition succeeded in their prototype demonstration of neuroweapon system in Cuba, the BRAIN initiative enabled them to further refine it, continue to deploy unethical, yet novel, self-replicating nanotechnology, which spreads the niBMI into other people from people already linked to ChinaCCP United Front coalition’s AI BCPS, social credit monitoring system and great firewall, that was deployed and coincided with China BRAIN initiative.
So, how does the CODEX hack work with a BIOBEACON and “social credit monitoring system” with “great firewall” that has been offensively asymmetrically deployed on the West by the East (ChinaCCP specifically, as they use this against their own coalition to control the coalition)? First here is an article clip, confirming the existence of these weapons as acknowledged by US DoD and associated media outlets managed through US DoD AI BCPS [3].
The use of a CODEX can be deployed and monitored through classical and non-classical fields. Example: “EMF spectrum: transverse waves, longitudinal waves, scalar waves, potential fields (electric fields, magnetic fields), quantum fields, standing waves ” that enable CODEX monitoring of internal thought of the mind acoustical music that is heard by the ear, conductive hearing through demodulation of a carrier frequency heterodyned with an audio file, vibrational resonance with an adjacent object or organism, speech, and cybernetic communications through synthetic telepathy.
Therefore, with the use of an AI BCPS and adversarial neurotechnology, an asymmetric attack can be made to undermine a given nation state, alliance or coalition’s population control platform (e.g. AI BCPS). How? through the use of self-replicating synthetic biology and neurotechnology compromised niBMIs in a subset of the population that then spread the contamination and intertwine into the given population, such that the “cultural basis” of the nation state is compromised through the use of CODEX based monitoring and communication subliminal, media, signals, quantum, scalar-wave, transverse wave, longitudinal wave, vibrational to spread the “NeuroStrike” weapon platform that poaches brains from the given nation state’s brainpool and reallocates the brains into ChinaCCP Coalition PLA Xi’s Magic Weapon platform [6,7]. The spread is both EMF spectrum, byte-based (optogenetic) and also physical through self-replicating nanotechnology payload contamination delivery into people uncontaminated by ChinaCCP PLA Xi’s Magic Weapon.
The synthetic biology material, self-replicating, is attracted to “energy” sources, such as light, wifi, bluetooth and electricity. Based upon charge, frequency and the neural networks buiHere is something useful for the group, so you're not bamboozled by a neurohacker in your lifetimes.lt-out in the synthetic biology it can transver to/from people and objects in the environment. If you do not have a smart phone on you, you will get contaminated in the world as of January 21, 2024. The contamination will result in another nation state’s AI BCPS compromising you and your family. Even then, you can still get contaminated by other people who have “unhealthy” synthetic biology.
The niBMI synthetic biology material takes time to grow when in a wifi environment, such that it will amplify a larger signal than the wifi that your laptop has connected to and over time dominate as a conventional cybersecurity attack would perform a “man-in-the-middle”. This has been confirmed by our team’s reverse engineering as shown below through UNIX / LINUX (non-big tech SSID nmcli dev wifi rescan and wifi command line inputs and through a combination of chelators, vitamins, rife square wave pulsed frequencies, and supplements to purge the niBMI synthetic biology network, the monitor the regrowth of the synthetic biology network, while using a computer and only taking liquids high in nutrients Vitamin C, B Vitamins and excess amino acids with proteins.
Once the switch occurs to the niBMI all data is routed and saved in the niBMI (as best as it is functioning). Such that when you are at a different location, etc. you can have your niBMI exposed to neurohacking of the data archived in the synthetic biology. If you are not careful the synthetic biology can then re-transmit the information publicly, which is what the Open Society Foundation OSF, has been working on a “transparent” society where nothing is private.
The security of niBMI and “neurotechnology” should be of utmost importance to every person in the world, especially those residing in free democratic nation states, which can help those stuck in authoritative oppresive regimes free themselves.
Chile is the world’s leader on #neurorights and UNESCO has published a terrific article on their work, as one of Chile’s scientists worked with America on the AI BCPS and assisted Chile in securing their neural data, based upon his understanding and knowledge of the future [4]. Unfortunately, NeuroStrike was being simultaneously deployed during this same time period by ChinaCCP Coalition with their 2016 BRAIN initiative public debut [5].
Okay, so now we have laid the foundation of AI BCPS, CODEX and Neurorights.
Now, how does an adversarial AI BCPS, e.g. NeuroStrike, attack you? It first contaminates you, then hacks into your niBMI, data mines it (hardware neurotechnology from ChinaCCP government owned corporations), then reports the data back to ChinaCCP coalition AI BCPS that then builds a social network around you based upon cyber breadcrumbs as well as neuro data breached by their NeuroStrike weapons. After data mining you (physically and digitally), the system then decides what to do with you “covertly” using subliminal comms via byte-based neuroattack vector. It can use you, enhance you, confuse you, weaponize you, dispose of you, based upon what ChinaCCP AI BCPS PLA Xi’s Magic Weapon has forecasted for you to maximize its’ objective function subject to the constraints of your social network, wealth, influence, etc.
Please make sure to read-up on how our team keeps our bodies, brains and associated systems clean by signing-up to this newsletter or scheduling an appointment.
So, if you’re hacked (neurohacked), what is a simple way to tell?
3 Steps to Confirmation you’ve been neurohacked or are neurally monitored through wireless spectrum.
Step 1: Utilize a hardwired (no wifi) computer to purchase a hardware 2FA FIPS key for two factor authentication. Utilize the hardwired (no wifi) computer to add 2FA FIPS to your social media account or given online login system.
Step 3: Then go back and utilize the wifi network, after dosing with a chelator/zeolite, to try to log into your social media account. If the social media account can’t verify or validate the hardware 2FA FIPS key for login, then that entire data flow is goingo through your niBMI (malfunctioning, hacked or monitored).
Step 4: Then go back and utilize the hardwired network with 2FA FIPs key to login and see if it works. If the login works then you have confirmed that you have a neurohacker in your niBMI system.
Important Note: all data flow through the niBMI can be hacked at a later point in time by the neurohacking AI system. The 2FA FIPS key data, if real-time emulated by an niBMI in our team’s professional opinion can also be hacked, since the data flow is through the niBMI and if linked to an AI BCPS then the AI BCPS also knows the 2FA FIPS key data (since it is all transmitted via cybersystems). Therefore, any contamination of your niBMI can also enable the linked neurohackers (if the niBMI globule active for the data flow and phoning home to ChinaCCP PLA Xi’s Magic Weapon). This is how hardware 2FA secured systems can be compromised by a “neurohacker”, even air gapped.
MUSINGS & THOUGHTS TO PONDER FOR YOUR FUTURE W/SYNBIO
The CODEX thought (while you are logging into) a given website or platform O/S on networked or non-networked computer system can be logged by the niBMI and then data mined while you are at your computer terminal (if not secure spectrum or cyber or neurotech hardware) or data mined at a later point in time by a “neurotechnology honeypot: wetware enabled person or hardware device or animal, yes biological life can contain mesogen, graphenes and nanotechnology, synthetic biology enabling them too, which is weird if you think about it, cause synthetic telepathy can be coming from your neighbors dog, your family’s cat or your dead buried animals outback in your pet graveyard, contiuously energized and transmitting what they were trained on prior to passing. Perhaps, this is why there is so much media about “zombies” because the synthetic biology when fully integrated into an organism enables it to live after the biological matter has decayed. Just saying, self-replicating synthetic biology enables some super weird stuff in the world these days. Be mindful, today not only what you verbally communicate, but also think is monitored not only by your national security system, but big tech, neurohackers and other groups. Tripwires of the mind’s thoughts are now real, senses can be manipulated as well with the synthetic biology (visual cortex, hearing, smell, taste), why do you think COVID-19 interrupts your sense of smell? Cause it is contaminated synthetic biology or not properly configured synthetic biology or hacked synthetic biology.
Welcome to the future, cyborg technology enabled, non-invasively dosed niBMI and body suits in and throughout your skin to the bone.
[1] hackerearth.com
[2] https://www.researchgate.net/publication/332787743_A_carpool_matching_model_with_both_social_and_route_networks
[3] https://americanmilitarynews.com/2021/12/china-creating-brain-control-weapons-and-weaponizing-biotech-us-says/
[4] https://courier.unesco.org/en/articles/chile-pioneering-protection-neurorights
[5] https://pubmed.ncbi.nlm.nih.gov/27809999/
[6] https://www.wilsoncenter.org/article/magic-weapons-chinas-political-influence-activities-under-xi-jinping
[7] https://www.hudson.org/defense-strategy/xi-jinping-vision-artificial-intelligence-pla
If you haven't already grokked this yet.....but knowing you, you already have!
https://open.substack.com/pub/lionessofjudah/p/coming-soon-to-a-15-minute-city-near?r=2ppbne&utm_campaign=post&utm_medium=web
Are you doing consulting for companies or individuals too? I’m interested.