Neurohacking 412: Codex Based Persistent State Cognitive Remote Kill
How a codex cognitive neuroweapon non-kinetic signal tissue degrading attack works, through your smart tv, computer, body or smart phone. Reverse engineered.
This article is an extension of Neurohacking 411, where not only cyber, but also physical world interactions result from the codex based persistent state cognitive hack, such that a kill is made from over 1,000s of miles away.
This will re-iterate information from Neurohacking 411, for your reading and educatioanl convenience. We are all in this together, it is not just cybersecurity in the virtual world, but humankind, specifically ChinaCCP, has created a weapon (non-kinetic) so evil that it literally can remote kill you from your electronic devices or from non-invasively dosed nanotechnology residing inside of you from the environment or other supply chain sources.
This is all part of ChinaCCP social credit monitoring system and firewall, literally removes non-compliant people globally, inclusive of ChinaCCP coalition members too. Why? because ChinaCCP only cares about China, nobody else, no matter what they peddle (e.g. liars, thieves and now the great deceiver in our lifetime).
How does a codex based, combined cybersecurity and cognitive neurohack work? I've reverse engineered one attack vector. The recent 5 Eyes press release stating world's largest hack by ChinaCCP is based upon the enclosed technology platform and tactic, one of many tactics currently being reverse engineered and shared for counter defensive measures to be built by cyber and neuro security agencies and labs.
Here is the 5 Eyes (intelligence community of Western World) briefing:
https://www.reuters.com/world/five-eyes-intelligence-chiefs-warn-chinas-theft-intellectual-property-2023-10-18/
The East (India) Ministry of Information Technology blocked part of the first wave attack by ChinaCCP through banning their neurotechnology hardware and software from India in 2020, but some got in before 2020. https://www.bbc.com/news/technology-53225720
Neurohacking is a product line extension from cybersecurity groups that conduct work for nation states and nation stateless groups. Think of cyberhackers as contract thieves in the digital age, that made a bunch of money and decided to do a product line extension into neurohacking of the human brain through the pervasive access to neurotechnology in our world and people with non-invasive brain-machine-interfaces niBMIs in them unknowingly.
So how does a neurotechnology based Codex attack vector work? Bare with me as this is extremely simple to understand once you get the physics behind it.
The Foundation:
Step 1: You are getting dosed with mesogens, graphenes and self-replicating nanotechnology now, whether you realize it or not. How can you confirm this? Go get a live blood analysis LBA done with a dark field microscope at 4000x to view the mesogens, graphenes and self-replicating nanotechnology. The material looks like this:
Image Source: Dr. David Nixon Laboratory
Step 2: You are utilizing smart devices. These are the “hardware” devices with neurotechnology in them (chipsets and tx/rx antennas) that can connect to you and your niBMI. The hardware is the “pipeline” and the software and apps are the “content” that is fed through the “pipelines” to you. Keep in mind you can have more than one “pipeline” into your niBMI (many to many relationship). Further your niBMI may also be located elsewhere on your body where the mesogen, graphene and self-replicating nanotechnology is located. Keep in mind mesogens, graphenes and nanotech systems like this are electromagnetic “consumers” and migrate towards your nervous system and body parts with a lot of electrical activity (brain, central nervous system or muscles if you are less of a thinker and more of a physical laborer).
Now that the Foundation has been built. Here is how the hack works with a Codex based attack.
Establishing the Connection to Human:
Step 1: Whaling, going after executives or technical scientific resources non-ChinaCCP highly skilled technical engineers, scientists, researchers, CTOs, CIOs, etc.
CONOPS: Social media networking site, has a ChinaCCP PLA digital soldier on it. The ChinaCCP PLA digital soldier, posing as a business development person interacts with you, obtains your phone number, address through OSINT on your social media system. Then the cyberhacking starts using files, emails, signals, data communications, ai assisted attack, etc. and they penetrate your network and device. If you are using ChinaCCP hardware, then their PLA soldier has a direct backdoor to you, once they are able to confirm that hardware is used by you (e.g. when you register the device for support).
Step 2: Here is how the ChinaCCP PLA Xi “Magic Weapon” works in action. The persistent state hack.
VIRTUAL ATTACK, DIGITAL ENABLED THROUGH NANOTECH, CYBER & NEUROTECH:
Someone online shares a specific article with you. You being a good and happy person are glad to learn and happily receive the article (e.g. codex). You read the article shared with you by someone online, think ChinaCCP coalition (inclusive of Russian neurohackers). Remember spies are always helpful and wanting to be your friend (don’t let this disuade you from hanging out with truely good people, but spies use these tactics to gain your trust, by helping you out).
The person that shared the article with you, a codex, has other intentions. Keep in mind the person online could also be an AI bot. Recall that codexes are books with language in them. LLMs by AI combined with the hardware neurotechnology backdoor can then link your brain with the niBMI in it to the “AI computer, think AI brain map, but maps of everyone getting hacked to build a super-brain for access to via brainpools by a competitor nation state, cause in cognitive warfare the best brains win, especially those with access to a supercomputer AI that cognitively stole the world’s leading scientists brains, this by all means is NOT a stretch for ChinaCCP with their BRAIN initiative kicking off in 2016 and a bunch of IC people getting shot up with old analog nanosecond pulsed neuroweapons before China got into more advanced neurotechnology” or person (this in energetics terms is called a psychic attack. I’m a member of USPA, bunch of retired IC people are part of it as well as people who detected anomalous events in life that didn’t make much sense given known physics, but decided to rationally and logically ferret out the truth less known.
When an AI bot or person shares a specific codex with you, you read the unique codex and your niBMI autolinks with their neurotechnology enabled terminal AI. “Voila!”, your brain with niBMI non-invasively dosed is now linked to their neurohacking platform that can datamine you for contacts, intellectual property, etc.
PHYSICAL ATTACK, DIGITAL & SIGNAL ENABLED THROUGH NANOTECH, CYBER, NEUROTECH & EMF TRANSMITTERS:
This is the part, where humanity, specifically ChinaCCP, has built a weapon so evil, that no other human, no matter race, creed or nationality should wish this upon another human and why all of us should unite against ChinaCCP evil Magic Weapon.
Once you have been linked, persistent state, the AI can issue assembly instructions to the nanotechnology (mesogens, graphenes and self-replicating nanotech), such that it can emit a harmful frequency (e.g. antenna transmitter inside of you). Then, when you think certain thoughts or read certain materials, the material inside of you that was assembled by the neurotechnology LLM AI can physically harm you through electromagnetic spectrum emissions within your body. The converse is true, the electromagnetic spectrum emissions within your body can also heal you.
How does the AI program the nanotechnology within your body through use of neurotechnology? Through the use of electromagnetic spectrum:
Optogenetics (that is why these product lines, glasses and blockers, exist for defensive countermeasures)
Note: in order for the neurohacking to be successful, it requires three parts:
Part 1: neurotechnology enabled smart devices (chipsets, transmitters, screens with meta materials). These are the pipelines.
Part 2: nanotechnology inside of your body non-invasively dosed brain machine interfaces niBMIs
Part 3: software and apps with viewing time, when you accumulate the nanotech inside of you and the “fresh” nanotech can then get programmed inside of you. During this time more than one mesogen, graphene and nanotech system may be coded in your body, such as an adversarial one linked to ChinaCCP that enables spying. If you are eating food with self-replicating nanotech in it exported from ChinaCCP and by ChinaCCP neurotechnology hardware (pipeline)Wireless (again, that is why these product lines exist for defensive countermeasures)
Reiterating: this is all part of ChinaCCP social credit monitoring system and firewall, literally removes non-compliant people globally, inclusive of ChinaCCP coalition members too. Why? because ChinaCCP only cares about China, nobody else, no matter what they peddle (e.g. liars, thieves and now the great deceiver in our lifetime).
Seeing is believing, here is some of the self-assembly AI instructed through nanotech, neurotech, cyber and signals:
Image Source: Dr. David Nixon Laboratory
This is one of the most disturbing attack vectors using signals transmitted to kill a human remotely, through use of neurotechnology when combined with nanotechnology (mesogens, graphenes, self-replicating nanotech) and codex based persistent state re-connects hooks.