Targeted Individuals
731 subscribers
14.9K photos
910 videos
1.73K files
29.7K links
Targeted Individuals Channel on Telegram.
Download Telegram
@Baldy8653
4 hours ago
All a result of the financialization of the economy. Look at JP Morgan opening a new skyscraper in Ney York to continue stealing from people.
Forwarded from David Avocado Wolfe
This media is not supported in your browser
VIEW IN TELEGRAM
Geoengineering goes mainstream. Climate Trails is NOW available on Amazon Prime or at ClimateTrails.com (1 min, 29 sec)
Join: @davidavocadowolfe 🥑
Forwarded from David Avocado Wolfe
This media is not supported in your browser
VIEW IN TELEGRAM
A former climate activist who broke up with the movement and healed from climate anxiety. (3 min, 3 sec)
Join: @davidavocadowolfe 🥑
Forwarded from PlanofAction
BioDigital Convergence

Part 6

The Network Connection & The Plan

THE PLAN

CYBERSPACE OPERATIONS AND ELECTROMAGNETIC WARFARE

This plan outlines the ENTIRE CONTROL SYSTEM for the BioDigital Convergence !!!!

They laid out the groundwork under the Disguise of Cybersecurity.

It's clear on page 71 underneath the "Targeting" section that this will be used against us while disguising it as Cyber Security

PAGE 11

CYBER-PERSONA LAYER 1-27.

The cyber-persona layer is a view of cyberspace created by abstracting data from the logical network layer using the rules that apply in the logical network layer to develop descriptions of digital representations of an actor or entity identity in cyberspace, known as a Cyber-Persona (JP 3-12).

Cyber-Personas are not confined to a single physical or logical location and may link to multiple physical and logical network layers. When planning & executing cyberspace operations, staffs should understand that one actor or entity (user) may have multiple cyber-personas, using multiple identifiers in cyberspace.

For example, an individual’s account on a social media website, consisting of the username and digital information associated with that username, may be just one of that individual’s cyber-personas.

Conversely, multiple different users may share a single cyber-persona or set of cyber-personas.

Planners must understand that enemy use of cyber-personas can make attributing responsibility for cyberspace actions difficult.

Page 37

ELECTROMAGNETIC ATTACK TASKS 2-26

EA has the unique potential to affect enemy use of the EMS and attack the enemy through the EMS. Other offensive options can affect enemy use of the EMS but are likely to cause collateral damage outside the EMS, whereas EA uses the EMS for its effects.

EA tasks include

- Employing directed energy weaponry.

- Electromagnetic pulse

- Reactive countermeasures

- Deception measures

- Electromagnetic intrusion.

- Electromagnetic jamming.

- Electromagnetic probing.

- Meaconing.

PAGE 71

TARGETING

4-59. When targeting for cyberspace effects, the physical network layer is the medium through which all digital data travels.

The physical network layer includes wired (land and undersea cable), and WIRELESS (RADIO, RADIO-RELAY, CELLULAR, SATELLITE) transmission means.

WIRELESS COMMUNICATION

1) Graphene Radio Nanosystem

Graphene-based nano-antennas have been characterized for use in the terahertz band, enabling wireless communications at the nanoscale.


The physical network layer is a point of reference used during targeting to determine the geographic location of an enemy’s cyberspace and EMS capabilities.

THE PHYSICAL LAYER

BabbleSim

BabbleSim is a simulator of the physical layer of shared medium networks.

Its main objective is to be an aid to develop network protocols and network devices, and to be able to develop, debug and regression test target code in a controlled environment.

BabbleSim Architecture

The physical layer simulation (Phy) and each device run as independent programs each in their own Linux process(es).

In a simulation there will normally be 1 Physical layer simulation and a set of devices. Starting a simulation consists of executing the Physical layer simulation and devices.

Once all devices have connected to the Physical layer the simulation will start

Here's how we know they're doing this under the disguise of Cybersecurity.

Microsoft & the DOD

Azure & DoD IL6

Azure Government Secret maintains an Impact Level 6 (IL6) DoD provisional authorization (PA) at the high confidentiality, high integrity & customer-determined availability (H-H-x) information categorization.

It provides a direct connection to the DoD Secret Internet Protocol Router Network (SIPRNet) and is operated by cleared US citizens.

Azure Government Secret operates on secure, native connections to classified networks with options for ExpressRoute

and ExpressRoute Direct

For Private, resilient, high-bandwidth connectivity.
1
Oh dear, the torturers home residential addresses, all went out onto the dark net.

What a shame, hey.
😁1
Sick of being tortured to death?
Reminder, you have natural law rights to use fatal force in self defence.

Reminder, you have common law rights to use fatal force in self defence.

Reminder, you have Statutory rights to use fatal force (if reasonable in all the circs) ... in self defence.
🔥1
And all of your torturers home residential addresses are apparently leaked onto the dark web.

As I was saying, tragic, hey.
😁1
💯2