Targeted Individuals
731 subscribers
14.9K photos
910 videos
1.72K files
29.6K links
Targeted Individuals Channel on Telegram.
Download Telegram
Forwarded from David Avocado Wolfe
This media is not supported in your browser
VIEW IN TELEGRAM
A former climate activist who broke up with the movement and healed from climate anxiety. (3 min, 3 sec)
Join: @davidavocadowolfe 🥑
Forwarded from PlanofAction
BioDigital Convergence

Part 6

The Network Connection & The Plan

THE PLAN

CYBERSPACE OPERATIONS AND ELECTROMAGNETIC WARFARE

This plan outlines the ENTIRE CONTROL SYSTEM for the BioDigital Convergence !!!!

They laid out the groundwork under the Disguise of Cybersecurity.

It's clear on page 71 underneath the "Targeting" section that this will be used against us while disguising it as Cyber Security

PAGE 11

CYBER-PERSONA LAYER 1-27.

The cyber-persona layer is a view of cyberspace created by abstracting data from the logical network layer using the rules that apply in the logical network layer to develop descriptions of digital representations of an actor or entity identity in cyberspace, known as a Cyber-Persona (JP 3-12).

Cyber-Personas are not confined to a single physical or logical location and may link to multiple physical and logical network layers. When planning & executing cyberspace operations, staffs should understand that one actor or entity (user) may have multiple cyber-personas, using multiple identifiers in cyberspace.

For example, an individual’s account on a social media website, consisting of the username and digital information associated with that username, may be just one of that individual’s cyber-personas.

Conversely, multiple different users may share a single cyber-persona or set of cyber-personas.

Planners must understand that enemy use of cyber-personas can make attributing responsibility for cyberspace actions difficult.

Page 37

ELECTROMAGNETIC ATTACK TASKS 2-26

EA has the unique potential to affect enemy use of the EMS and attack the enemy through the EMS. Other offensive options can affect enemy use of the EMS but are likely to cause collateral damage outside the EMS, whereas EA uses the EMS for its effects.

EA tasks include

- Employing directed energy weaponry.

- Electromagnetic pulse

- Reactive countermeasures

- Deception measures

- Electromagnetic intrusion.

- Electromagnetic jamming.

- Electromagnetic probing.

- Meaconing.

PAGE 71

TARGETING

4-59. When targeting for cyberspace effects, the physical network layer is the medium through which all digital data travels.

The physical network layer includes wired (land and undersea cable), and WIRELESS (RADIO, RADIO-RELAY, CELLULAR, SATELLITE) transmission means.

WIRELESS COMMUNICATION

1) Graphene Radio Nanosystem

Graphene-based nano-antennas have been characterized for use in the terahertz band, enabling wireless communications at the nanoscale.


The physical network layer is a point of reference used during targeting to determine the geographic location of an enemy’s cyberspace and EMS capabilities.

THE PHYSICAL LAYER

BabbleSim

BabbleSim is a simulator of the physical layer of shared medium networks.

Its main objective is to be an aid to develop network protocols and network devices, and to be able to develop, debug and regression test target code in a controlled environment.

BabbleSim Architecture

The physical layer simulation (Phy) and each device run as independent programs each in their own Linux process(es).

In a simulation there will normally be 1 Physical layer simulation and a set of devices. Starting a simulation consists of executing the Physical layer simulation and devices.

Once all devices have connected to the Physical layer the simulation will start

Here's how we know they're doing this under the disguise of Cybersecurity.

Microsoft & the DOD

Azure & DoD IL6

Azure Government Secret maintains an Impact Level 6 (IL6) DoD provisional authorization (PA) at the high confidentiality, high integrity & customer-determined availability (H-H-x) information categorization.

It provides a direct connection to the DoD Secret Internet Protocol Router Network (SIPRNet) and is operated by cleared US citizens.

Azure Government Secret operates on secure, native connections to classified networks with options for ExpressRoute

and ExpressRoute Direct

For Private, resilient, high-bandwidth connectivity.
1
Oh dear, the torturers home residential addresses, all went out onto the dark net.

What a shame, hey.
😁1
Sick of being tortured to death?
Reminder, you have natural law rights to use fatal force in self defence.

Reminder, you have common law rights to use fatal force in self defence.

Reminder, you have Statutory rights to use fatal force (if reasonable in all the circs) ... in self defence.
🔥1
And all of your torturers home residential addresses are apparently leaked onto the dark web.

As I was saying, tragic, hey.
😁1
💯2
Bitcoin Core and Bitcoin Knots are both implementations of the Bitcoin protocol, with Knots being a derivative of Core's codebase, maintained by developer Luke Dashjr.
The primary differences lie in their philosophy, features, and user focus. Bitcoin Core serves as the reference implementation, emphasizing stability, standardization, and broad consensus, and is used by the majority of nodes.
In contrast, Bitcoin Knots targets advanced users seeking greater control and customization, offering enhanced features and stricter policy controls.

A key technical difference is in mempool policy and spam filtering. Bitcoin Knots includes advanced filters that allow node operators to reject non-financial transactions, such as those embedding large data payloads via OP_RETURN, by default.
It enforces a strict 42-byte limit on OP_RETURN data, a policy aimed at preventing network spam and preserving Bitcoin's function as peer-to-peer electronic cash.
Bitcoin Core, on the other hand, has increased its datacarriersize limit to 100,000 bytes in its v30.0rc1 release, a change that has sparked debate over potential network misuse and a departure from Bitcoin’s original monetary purpose.
Core maintains a neutral stance, not filtering transactions based on content, which some view as a commitment to decentralization, while others see it as enabling spam.

Bitcoin Knots also offers more granular configuration options through its bitcoin.conf settings, such as rejectparasites=1, datacarrier=0, and permitbaremultisig=0, giving users fine-grained control over transaction acceptance.
It provides a more feature-rich experience with advanced debugging tools, a graphical user interface, and support for features like disabling SegWit, which Core does not allow.
Knots has historically been proactive in addressing security vulnerabilities, such as patching the CVE-2023-50428 exploit related to inscriptions before Core.

While Core is regularly updated and widely used, Knots is less stable and used by a smaller, more specialized user base.
However, supporters argue that Knots strengthens network resilience by promoting client diversity, acting as a backup in case Core becomes compromised, and fostering a more robust, decentralized development ecosystem.
The choice between the two often reflects a philosophical stance: Core represents a consensus-driven, standardized approach, while Knots embodies a more libertarian, user-controlled vision of Bitcoin.

AI-generated answer. Please verify critical facts.