Neurohacking + Cybersecurity 102: Synthetic Biology in the Middle (SBIM)
So, what is the latest mass scale black hat hack on people? Synthetic biology in the middle intercepts, basically data in the flow, but with wetware. Here are real world examples of niBMI hackers.
Have you ever received this super weird error on your web browser and thought, that doesn’t make any sense. Am I getting hacked?
Yes you are getting hacked, but it might not be as simple as malware on your computer, it could be malware inside of you, people around you or animals around you these days. Sometimes it is hard to tell the difference between the animals and people these days, pun intended.
In first quarter 2024, I’ve started to receive cybersecurity requests from people and their family members filing their taxes where their data is getting intercepted and Google chrome browser is flagging it with suspicious activity indicators. Note, Microsoft Windows is not catching these attacks, but Google’s AI is.
Malware inside of you is enabled by synthetic biology, which is comprised of mesogens, graphenes and self replicating nanotechnology. Further, you could have someone warring by your wifi network doing a man-in-the-middle attack. Therefore, there are now (5) five plausible reasons these days for being alerted to this type of unusual traffic from your computer network alert:
Malware on your laptop, desktop, tablet, phone, etc. (hardware computer)
Malware in your synthetic biology (wetware computer)
Malware in one of your pets, neighbors, rocks, etc. synthetic biology (wetware computer) enabled
Old school script kiddy warring using data sets from wiggle.net and then updating them using Kali Linux type platform for offensive (red team) attacking and hacking of insecure residential wifis.
Router hacked, where firmware compromised. The router connects your home to your cable modem and is a common attack vector these days.
So, how to determine if you have a computer that is contaminated with malware or wetware? Simple method here:
Just turn off all wifi and bluetooth wireless on your laptop and get a hardwired RJ-45 ethernet cable and connect your laptop or device to your router.
After resetting your router to OEM firmware (there is a reset pin, press it, while it is still powered on and plugged in to the electrical outlet).
Then unplug the router from power, unscrew the cable or unplug the fiber to the internet on back side or side.
Then immediately disable all wifi on the router (unscrew those pesky insecure wifi antennas as well).
Then plug the router back into power and disable via firmware/software interface all the wireless on it.
With the power plug disconnected to your router, also unplug your cable modem and wait 5-15 minutes,
Then plug in your cable modem first, let that connect, then plug in your router with wifi disabled. There needs to be a wire going from the non-wireless router to the cable modem or fiber modem.
What you have done is flush out any persistent state threat from the router and cable modem gateway.
Note: if you have an all-in-one cable modem + router, return it immediately those devices are so insecure you are an open target for ChinaCCP cybersecurity hacking and neurosecurity hacking teams.
Then reconnect your laptop or computer or tablet or phone hard wired to the internet (put tablet or phone on airplane mode). Then retry the internet connect and if it works, then you know that you’re getting attacked with a niBMI synthetic biology in the middle attack or an old school man-in-the-middle attack.
The latest and greatest hack these days is the niBMI synthetic biology in the middle SBIM attack vector.
This type of attack looks like this when logged from wireshark via TCP/IP retransmission that generates the Google chrome browser error listed above:
Therefore, the use of any wireless communications in the world today is extremely insecure and my professional recommendation is to use hard wired ethernet and cat-5/cat-6 or fiber optics.
If you need help with securing your computer networks against cybersecurity and neurosecurity threats please do kindly consider our team’s services. Have expertise in networking, client-side, server-side as well as neural/ai and associated platforms. Further, have expertise in how to defend your site against synthetic biology enabled wetware attacks. If you are not aware of this attack vector, it is very covert and I would encourage you to have a spectrum survey conducted, which I can help you with.
Keep reading with a 7-day free trial
Subscribe to Brandon’s Substack to keep reading this post and get 7 days of free access to the full post archives.