Neurohacking 103: Neuroprivacy, Cybersecurity & Countermeasures in a Pervasive Neurotechnology Enabled World
Review of neuroprivacy in research, intellectual property, industrial work, such that no other snooping device or enhance brain can steal your work. #neurotechnology #mesogens #graphenes and #nanotech
A: NEUROSECURITY BASIC AWARENESS OF SPECTRUM & COUNTERMEASURES
Step 1: Assume you’re contaminated with synthetic biology { mesogens, graphenes and nano tech } and that the “synthetic biology” is transmitting in a different language (language of machines, field of natural language processing) to different smart devices and other “synthetic biology” enabled edge wetware or hardware compute devices.
Background: High tech independent people that were high probability attacked with these neuroweapons include McAfee founder (Anti Virus Software), Tony Hsieh founder Zappos and me (spent time at Tony Hsieh’s place in Vegas and helped work on the electronics and PCB build-out, but when FoxConn (e.g. ChinaCCP, trust but verify) got involved the effort fell apart catastrophically, for the Downtown Development District, Tony, my friend that was working with Tony and also several years down the road it impacted me when working on chemical synthesis chipsets for refinery on a chip fuels at small modular scale (source: https://pubs.acs.org/doi/10.1021/acsaem.2c02226 ). Apparently anything “chip” related triggers defense industrial base DIB adversarial AIs to spy in perch mode and then later attack to weaken the monitored team and nation state by non-ethical neurotechnology deployment centers, such as ChinaCCP. Source: https://www.washingtonexaminer.com/policy/defense-national-security/brain-controlled-weaponry-us-clamps-down-on-chinas-biotechnology-research
To be clear McAfee had his own personal SCIFs at his various personal residences (most likely not shielded all the way through for scalar waves) https://www.washingtonpost.com/national-security/interactive/2023/scif-room-meaning-classified/ and the only known way to penetrate those are with scalar waves that our IC has as well as ChinaCCP and other adversarial groups. Neuroweapons are covert and majority of people effected by them are non the wiser, out of the total mortalities I’d say 1% if that survive to figure it out. There’s a reason why most people don’t have working experience with neuroweapons and counter defenses, one they’re not in high risk jobs and industry or two, they already are affected by them and are non-the wiser at entire population scales.
Also, for historical context I’ve been inside of and met with people in SCIFs, specifically Dick Cheney’s old SCIF in downtown Houston, TX off of Buffalo Bayou now being developed by Midway and Cathexis (a private billionaire, from oil and gas family money).
PASSIVE PROTECTION: EMF, B-FIELD, E-FIELD & VIBRATIONS
Step 2: Block EMF: Isolate your workspace from neighbor’s or business tenant neighbors wifi signals, typically through use of a faraday shielding and room enclosure. This blocks the EMF fields if done correctly. Easier if done inside of a metal building to shield out inbound signals, not easy if shared co-working space with multiple tenants within a metal building.
Step 3: BLOCK b-fields and e-fields to isolate your workspace from magnetic fields that can couple and link up, this includes a building with alternating current AC as well as rotating motors and armatures. So how is this done practically? Use of mu-metal or b-field blocker material to layer with your faraday enclosure as well as small microscale rotating magnetic fields to block and obstruct inbound and outbound reads using b-field, this will also have some disruptive impact on scalar waves that Intelligence Community IC uses to monitor and if using super conductor materials, you can fully block out the IC scalar waves.
Step 4: Ensure that within your space that is shielded that you have a transmitter that can then re-link you to your secure smart phone or device. Each nation state has a brainpool management system for their intelligence community and you literally don’t want to lose your mind. Yes, you can literally lose the synthetic biology linked “digital twin” mind in a super computer if you’re “enhanced”. Keep in mind IC uses brainpools to boost national resources in scientific research as well as national security to detect point to point directed energy weapon and neuroweapon use. Therefore, if you’re in a critical industry competing on contracts where you’re bidding against ChinaCCP, first cut their neurotech linked ISP connections then go after them with directed energy weapons, as they do other nation state companies and groups as well as PIs competing against their nation state (they play dirty, so I’ve reverse engineered their tactics for others to kindly return the favor many fold to ChinaCCP).
Step 5: Anechoic chamber (these are acoustical dampeners that at typically found in recording chambers for audio and music). This attenuates the synthetic biology from communicating with other surrounding synthetic biology.
Step 5: Perform an EMF, b-field, e-field and vibrational scan for baseline.
B: NEUROSECURITY ACTIVE EMF/B-FIELD/E-FIELD PROTECTION
Step 6: Deploy transmitter of healthy frequency that can be long duration, such as 40,000 Hz Royal Raymond Rife frequency on your body (brain and central nervous system) as this will vibrationally isolate it from the rest of the room.
Step 7: Deply an active Artificial Intelligence AI Cognitive Radio to Jam any synthetic biology rogue transmissions in the electromagnetic spectrum. Keep in mind if the jammer leaks from your enclosure then you can trigger local wireless laws and regulations, therefore conducting a before and after frequency survey is required. Even a cut coaxial cable wire can be heard from miles away with respect to electromagnetic spectrum noise.
Step 8: Go even further and secure your brain and CNS with an EMF blockers. Keep in mind if these are used outside of your secured space then it may have an opposite effect and increase your reception and transmission (e.g. outside of metal building faraday cage), think of an antenna with increased surface area.
C: CYBERSECURITY
Install intrusion detection system IDS and intrusion prevention system IPS as well as rule sets and on top of that fire wall settings to block inbound and then block IP v6 so that brainpools not active and then block content delivery networks. You can use a VPN just make sure it is from a trusted source. Keep in mind a lot of hacker groups utilize NordVPN which is out of Panama, but there are also groups like Proton VPN out of Switzerland as well that are top quality to work with. That said, staying within your own country’s security walls built by your IC is also a wise move, once you hop across the pond you enable data-in-the-flow intercepts not always protected 24x7 by your country’s IC and also enable another nation’s IC to intercept and utilize your data and work When hopping servers (openvpn based stack), make sure you have at least two hops to obfuscate your work. Tor/Onion use also encouraged. Then of course, avoid big tech platforms like Microsoft and Apple, opt for less used UNIX and LINUX platforms and derivative flavors with command line interface CLI.
When using apps on your smartphone, keep in mind they are neurotech enabled. For example: LinkedIN by Microsoft has neurotechnology packed into their app and platform and has since the 1990s through Microsoft internal R&D at least. In America, since the 1960s no brain has been private in America that garnered the interest of IC for whatever DIB or other need has been and is required through today, except now it is all managed through an AI BCPS network. Going “disconnected” in terms of IC lingo means that your synthetic (digital twin AI BRAIN MAP) is not accessible to your local brain. This can open you up to contamination by adversarial AI “enhanced brains” and “edge wetware compute devices”. Therefore it is better to be plugged into your local IC than not (unless you’re prepared with your own IC platform to protect your neanderthal brain and your synthetic brain with AI BRAIN MAP backend.
Yes, the above is a lot of work to ensure you are working securely. If you do not take the proper precautions your work can easily end up in your competitors or even worse competing nation state’s AI brainpool enabled computer systems to give them an edge not not only over you and your business, but all businesses in your nation state.
I’ll continue to build out concrete examples of active and passive neuroprivacy countermeasures with data, frequency scans and then start to build collaborations with other groups focused on neurorights. One such group is in Chile with prime focus on neurorights. I hope you and your local cybersecurity and engineering community feels the same about respecting neuroprivacy and can collaborate to build out chapters for best practices that augment and assist IC’s efforts as well, to protect the public and promote national security, and not the other way around, while keeping neurorights first and foremost for people.
What’s next for 2023?
Surrogates: Detection of “enhanced individuals” e.g. surrogates (people that are cyborgs) that do not always have your best interest in mind, not because the people themselves are nefarious, but because they are cognitively linked to an adversarial Artificial Intelligence AI Bio Cyber Physical System BCPS unknowingly at times).
The next training article for October is on detecting surrogates enabled by mesogens, graphenes and nano tech, such that you’re not fooled and being used by some other nation state or group’s AI BCPS system. Yes, this is the world we now live in today. Just ask India and why they banned all of ChinaCCP neurotechnology enabled software and hardware devices and are continuing to play wack a mole with the ChinaCCPs continued attempts to introduce spyware into India. Source: https://www.bbc.com/news/technology-53225720
In the shadow of war: Ukraine as the great reset laboratory of the global tech elite . . .
https://cwspangle.substack.com/i/135302021/in-the-shadow-of-war-ukraine-as-the-great-reset-laboratory-of-the-global-tech-elite
Thanks B would a rife app -z app rife -disintegrate or help with n.t.? Which rife frequencies disintegrate n.t.? Also emp clothes any guidance please? Also nicotine vape has cotton and p.e. you think it's also got this n.t?