Targeted Individuals
729 subscribers
14.8K photos
910 videos
1.72K files
29.5K links
Targeted Individuals Channel on Telegram.
Download Telegram
PAKISTANI GANGS R&PED 100K LONDON GIRLS

https://www.youtube.com/watch?v=eh_PVH3v2dA
Decentralize everything = the solution.

Decentralised PERMISSION-LESS systems.

Like #ToastAI uses ;) #DeFi
@MarkFin9423
4 hours ago
The thing Gen-Z needs to keep in mind that should give them existential dread is that ID verification, Digital ID, AI, this is all the brain child of environmentalists. For the generation that do not know the ideology of environmentalists I will inform you right now. Environmentalists are some of the most evil ideologies on the planet. it's the more fancier but just as if not more evil brother of "U-gen-icks". The idea behind environmentalism is the idea that there are too many people on planet earth and that global warming can only be prevented through depopulation, never mind the fact that on the pollution front, it's corporations that are the biggest polluters of all. Simply put, environmentalists is on the front end used as a scam to enact more taxes on to the people in the name of protecting the environment when time and again, every prediction scientists makes about global warming is a bunch of paid bias BS.

On the back end, there are people, rich CEO types that genuinely want to depopulate the planet, because they would rather do that than to hurt their own profits by taking accountability for any poison they bring out that "might" affect the world at large . How do they do that? Replace all the jobs with AI so everyone is homeless(no clean food, no clean water, no healthcare access = shorter lifespans), Instill ID verification and digital ID so corporations can track and blacklists individuals who speak against their anti-human policies, and finally the one I did not mention, immigration, transitions every first world country into a third world country so the mixture of no clean food, clean water and healthcare eventually results in a lower population. This ideology is pure evil and keep in mind AI is being managed be environmentalists CEOS, most tech is run by environmentalist CEOS, banks are run by environmentalists CEOs. Let that sink in. In many ways Kingsman(the spy movie) kind spoiled the silent part out loud but it's not some convoluted evil plan using audio, it's a slow unaliving by a thousand cuts on all sides. That's my take anyways.

https://www.youtube.com/watch?v=RWDfmAD7rpE
😱1
@Baldy8653
4 hours ago
All a result of the financialization of the economy. Look at JP Morgan opening a new skyscraper in Ney York to continue stealing from people.
Forwarded from David Avocado Wolfe
This media is not supported in your browser
VIEW IN TELEGRAM
Geoengineering goes mainstream. Climate Trails is NOW available on Amazon Prime or at ClimateTrails.com (1 min, 29 sec)
Join: @davidavocadowolfe 🥑
Forwarded from David Avocado Wolfe
This media is not supported in your browser
VIEW IN TELEGRAM
A former climate activist who broke up with the movement and healed from climate anxiety. (3 min, 3 sec)
Join: @davidavocadowolfe 🥑
Forwarded from PlanofAction
BioDigital Convergence

Part 6

The Network Connection & The Plan

THE PLAN

CYBERSPACE OPERATIONS AND ELECTROMAGNETIC WARFARE

This plan outlines the ENTIRE CONTROL SYSTEM for the BioDigital Convergence !!!!

They laid out the groundwork under the Disguise of Cybersecurity.

It's clear on page 71 underneath the "Targeting" section that this will be used against us while disguising it as Cyber Security

PAGE 11

CYBER-PERSONA LAYER 1-27.

The cyber-persona layer is a view of cyberspace created by abstracting data from the logical network layer using the rules that apply in the logical network layer to develop descriptions of digital representations of an actor or entity identity in cyberspace, known as a Cyber-Persona (JP 3-12).

Cyber-Personas are not confined to a single physical or logical location and may link to multiple physical and logical network layers. When planning & executing cyberspace operations, staffs should understand that one actor or entity (user) may have multiple cyber-personas, using multiple identifiers in cyberspace.

For example, an individual’s account on a social media website, consisting of the username and digital information associated with that username, may be just one of that individual’s cyber-personas.

Conversely, multiple different users may share a single cyber-persona or set of cyber-personas.

Planners must understand that enemy use of cyber-personas can make attributing responsibility for cyberspace actions difficult.

Page 37

ELECTROMAGNETIC ATTACK TASKS 2-26

EA has the unique potential to affect enemy use of the EMS and attack the enemy through the EMS. Other offensive options can affect enemy use of the EMS but are likely to cause collateral damage outside the EMS, whereas EA uses the EMS for its effects.

EA tasks include

- Employing directed energy weaponry.

- Electromagnetic pulse

- Reactive countermeasures

- Deception measures

- Electromagnetic intrusion.

- Electromagnetic jamming.

- Electromagnetic probing.

- Meaconing.

PAGE 71

TARGETING

4-59. When targeting for cyberspace effects, the physical network layer is the medium through which all digital data travels.

The physical network layer includes wired (land and undersea cable), and WIRELESS (RADIO, RADIO-RELAY, CELLULAR, SATELLITE) transmission means.

WIRELESS COMMUNICATION

1) Graphene Radio Nanosystem

Graphene-based nano-antennas have been characterized for use in the terahertz band, enabling wireless communications at the nanoscale.


The physical network layer is a point of reference used during targeting to determine the geographic location of an enemy’s cyberspace and EMS capabilities.

THE PHYSICAL LAYER

BabbleSim

BabbleSim is a simulator of the physical layer of shared medium networks.

Its main objective is to be an aid to develop network protocols and network devices, and to be able to develop, debug and regression test target code in a controlled environment.

BabbleSim Architecture

The physical layer simulation (Phy) and each device run as independent programs each in their own Linux process(es).

In a simulation there will normally be 1 Physical layer simulation and a set of devices. Starting a simulation consists of executing the Physical layer simulation and devices.

Once all devices have connected to the Physical layer the simulation will start

Here's how we know they're doing this under the disguise of Cybersecurity.

Microsoft & the DOD

Azure & DoD IL6

Azure Government Secret maintains an Impact Level 6 (IL6) DoD provisional authorization (PA) at the high confidentiality, high integrity & customer-determined availability (H-H-x) information categorization.

It provides a direct connection to the DoD Secret Internet Protocol Router Network (SIPRNet) and is operated by cleared US citizens.

Azure Government Secret operates on secure, native connections to classified networks with options for ExpressRoute

and ExpressRoute Direct

For Private, resilient, high-bandwidth connectivity.
1
Oh dear, the torturers home residential addresses, all went out onto the dark net.

What a shame, hey.
😁1
Sick of being tortured to death?