Tuesday, November 29, 2016

Why all the Transmission Hops??

Why all the transmission hops??























Wednesday, November 9, 2016

I'm writing a report to the Federal Government Kill me if you want. I'll post changes and update until I'm finished... update 13

Outline
Zeta. Description of “Intellectual Theft” Relating to Network Engineering.

I. Devices

II. Methods

III. Tactics

IV. Overlays via Transmission Layers, Transference of Network Member's Experience and Memories.

V. Reasons

VI. Counter Tactics and Counter AAR

VII. Psychological Dispositions of Victimized and Offenders

VIII. Implications

IX. Network Types

X. The Loop

XI. Algorythm

XII. Suspected Outlets/ISP mainframe

XII. Resolution

XIII. Security Aspects and Prevention

XIV. Electronic Photographic Residual Appearance Attacks (EPRA/ERPA)

Glossary




Table of Contents

Synopsis
Description of “Intellectual Theft” (Actual,) “master” Thief.
Description of the Types of Hardware and Software Used to Implement an Intellectual Theft Network.

Chp 1
Description of Day “ZERO” Attack Signs and Symptoms.

Chp. 2
Description of Network Engineering. Description of Intellectual Theft Regarding Network Engineering.

Chp. 3
Methods

a. Algorythm

b. Interruption and Disruptive Signal

c. Methods Concerning Network Setup Strategy, that are Deployed to Render the Appearance of an Unintelligent Victim or the Superiority of the “Master” Thief.

d. The Use of Military Style “Psychological Operations” Within the Commission of the Network Activity/Crime.
(Description of remote, physical, and placebo/cover manipulations via subsonic command.)

e. Description of Monitor and WAN Overlays.

f. Subsonic Hypnosis. Frequency disruption (nervous system disruption) to induce a desired affect/expression.

g. Network Differentiation/Identification.

h. Scripting Attacks.

Chp. 4
Methods used by hardware “operators” aka: users or “hackers.”

Chp. 5
Different Methods and Protocol (virtual or electronically transmitted) to Include Analog and Digital Means as well as the “Virtual” Method Used within the Network Structure Describing Layers in the Network Bandwidth and the Placebo Method of Virtualizing That Aspect.

Chp. 6
Reasons and Motive for Conducting the Operation of Network Engineered Intellectual Theft.

Chp. 7
Description of the Experience, Feeds; Hopping physical ><[postage] and electronic,) Effects of Transference and Hopping) and the Counter Operation Aspects/AAR Succeeding the Individual Deployment of Counter Tactics.

a. Transference

b. “Feeds”

c. Hopping

d. Effects

AAR- Identifies Any Counter – Network Actions and Results of Those Actions to Ward off the Attackers.

Chp. 8
Description of Psychological Disposition of Victim and Offender Throughout the “Experience.”

Chp. 9
The Implications of the Security Problem Regarding “Intellectual Theft,” the Security Disposition of all Networks and Aspects of the Security Risk Placed upon Government and Financial Outlets of Those Networks.

Chp. 10
Description of NETWORKS; Network Types; Network Devices, Nodes and Users.

Chp. 11
The “Loop” Description Set Apart from Tactics. (IMPORTANT)

Chp. 12
Algorythm and a Very Short Description of the Process Based upon Historical Truth and Outcome of the Study.

Chp. 13
Description of Suspected Outlets.


Chp. 14
Resolutions to the CRIMINAL Behavior of “Intellectual Theft” Based upon the Strategies, Equipment, and Tactics that are Comparable to the Type of Disruption that the Activity Causes in the Victims Life.


Glossary


Synopsis
By: Joel Anthony Zrolka

Any reference to “Intellectual Theft” within this script, is in reference to the apparent infiltration/intrusion of the human neurological frequency by electronic means and/or network devices along with, the frequencies and frequency distribution abilities of those networks and devices to include:

* ”Satellite” Power Stations.
* Cellular Network Towers and/or antenii.
* PC or Home Computer.
* Cellular “smartphones” or devices.
* Medical Equipment.
* HAMM and PUBLIC radio transmission infrastructure and equipment.
* Commercial Server and Mainframe equipment and nodes.
* Interpersonal Communication and Experiences.

“Intellectual theft” within this report is ONLY pertinent to the definition of intellectual theft in the title of this report as defined in my synopsis with no future or past exterior comparison from the definition herein concerning the electronic methods of “Intellectual Theft.”

Description of Hardware and Software Equipment Required to Complete an Intellectual Theft

Musical Equipment: Mixer, Amplifier, MIDI equipment, resonators, E-Turntable (consistency within the hypnosis network aspect)

Microsoft Windows Operating System PengWin OS, LinWin OS and server networks for ease of use required for Loop Network aspect (seemingly comprised of children;) Apple devices and software, Proprietary Software Application and/or Operating Systems (KEY “master” thief network;) OpenSource Network Servers and Operating Systems, enterprise editions, open OS editions etc. A sole server network mobile and/or static.

Possible military style “retrans” and repeater equipment. Isotopic Radiator development.

Personal Computer or Home Computer equipped for Wireless Communications.

Medical Equipment: KEY E.E.G. (electroencephalogram), definitively the model apparatus to emulate via proprietary software or, the hardware it's self combined with a Server function not readily available to the public to initiate and complete the operations of an Intellectual Attack. (Easily traceable) Lot#; Manufacturers; homemade is possible but unlikely. Homemade components would also be traceable by the individual manifest of parts needed to “Frankenstein” such a device.

Cellular “smartphone” unlocked or carried by cellular carrier company.
Commercial Server Access. Though is not physical hardware or software, it should be viewed as a hardware element based upon it's function. It's an individual linked to an Intellectual Thief Network that is employed by a commercial entity to render the “paranoia” affect of the target subject. It's primary effort is to thwart the identification or realization of such a network.

A static physical location. (headquarters) something easily overlooked, vacant house, shed, premises, cellular network tower, vacant apartment or building. Or Vice Verse i.e. occupied. It will vary based on the Network leadership, or the portion of the network considering the network has several functions in a coordinated manner to achieve the means to an end.

A conduit for electrical services e.g. generator or electric co., outlet for static telecommunications services, proprietary (business) telecommunications services with no customer base, or private entity telecommunications services.

Monitor for target subject whether physical CCTV apparatus or a member of Intellectual Thief Network, to decipher prime opportunities for attack, release, or hold. Operates as a relay for “master” thief or “master” thief network.




Chp. 1 Description of Intellectual Attack

The reference of day ZERO is the definition outlined by “Webster's Computer Dictionary” cited as “ZERO day.” “ZERO day” is defined as the initial recognition of the activity/attack that compromises network infrastructure and a target subject. Many of the subject matters that are described will focus on aspects of Operational value to law enforcement and military. There are topics that I will NOT spend too much time describing, because of the horrible conclusions based upon the subject throughout history, in particular algorythm.

The signs and symptoms of the electronic based “Intellectual Theft” this report identifies and outlines are various circumstances and may seem different with comparisons between physical intellectual theft regarding electronic software contributions and neurological fingerprints of electronic based intellectual theft.

The neurological fingerprints mentioned, are in reference to the reading or output of an E.E.G. (electroencephalogram) on a targeted subject(s). Though, the E.E.G. or an E.E.G. modification (e.g network identifier, triangulation application) modified to act as the E.E.G. but serve as a network identifier is necessary for the positive finding of intrusion/infiltration, it is also a device reserved by the attackers who are mostly confined to a network in effort to provide cover for the activity that is not necessarily annotated as a crime, but fits the criteria of most physical crimes being that, the activity is actually a method of virtualization in relation to the descriptions of those crimes in all 50 states and United States Federal Government as well as most countries in the world.

There are several defining stages of the Intellectual Theft Attack, to include, an attack via frequency on the target subject's mind and through other online and electronic means rendering a “dual front” defensive posture of the target subject, that seems intentional to induce psychotic rage. The dual front defensive posture is going to be displayed in two ways: 1.) Target Subject may/may not act out in violence according to the environmental stimulus 2.) A high electronic profile with many typographical errors and messages that may/may not be comprehensive.

As stated day ZERO signs and symptoms will vary according to the perception of the incoming transmissions of the attackers based upon the baseline E.E.G. of the target subject (predefined survey upon a target subject.) I can only annotate my findings based upon how my brain perceived the attack subconsciously and reacted to the stimulus of the attack on a conscious plane. Symptoms may include: Static electrical discharge sensations upon the target subject lasting weeks to months, blurred vision prior to the attack by months or years, the amplification of sound through streaming technologies that induce the appearance of paranoia but, not necessarily the actual neurological condition, involuntary movements, muscle spasms, a sense vertigo, uncoordinated reactions/stimulus from surrounding standers by, possibly from either reflex or secondary analog node/operator to emissive frequency dispersing from transmission stream (reaction to residual transmission,) negative feedback from known or unknown people within the target subject's home environment, the emulation of painful processes and medical procedures, disrupted perception of environment e.g. (television; radio; books) situations, broadcasts, or scenarios seem directed at the target subject though, this is only perception, the transmission attack is over stimulating the mind and dislodging the target subject's sense of reality by tapping and corrupting the perceptive areas of the human brain (permanent damage and/or the extent of damage through this portion of the attack is unknown,) hearing music or cadence behind the commotion of overlapping and “stepped upon” transmissions (key interruptions) without headphones or a nearby radio source apart from what is being played outside of the target subject's immediate environment.

The term “master” thief is used to describe the cover network handler/admin or the network node of handlers. The devices used by the “master” thief will vary node by node or according to “master” thief preference. The methods of “master” thief will vary upon his understanding of the circumstances and scenarios regarding his/her discovery. “Master” thief will presumably be dangerous and panicking if his discovery is at hand or a forethought. To simplify the term, “master” thief should be used when describing either the administrative portion of the network of “master” thief or “master” thief him/herself.

Master” thief is a “zombie” controller. Zombie is definable and defined in “Webster's Computer Dictionary” as a program designed to be triggered at the peak of accumulation of target subjects and/or network nodes/individual machines. The application in this report is going to be referencing the interference of normal human behavior with a planted alter-ego/reality induced by emulated “telepathic” (actually, subsonic transmission) hypnotic sequence to provide the cover by “Loop” for the network administrators, explained later in this report.

Master thief” is a network of hypnotists (subjective to “Loop”)and/or part of that specific category within master thief's network. It's “master” thief's primary cover and concealment. “Master” thief operates his network with the primary objective of colluding attempts to discover his/her identity and provides a command and control aspect of his/her network through a hypnotic rhythm. Any reference made in relation to hypnosis is ONLY in whole descriptive as a binary process to induce catatony in part or in completion of the target subject and any “would-be” defense of the target subject. It would be necessary in the event of “master” thief panic, to induce a hypnosis to deploy a strategy to dispose of any counter network or defense of the target subject i.e. murder, take hostage, threaten etc. in that fashion.

The hypnosis network is “master” thief's primary apparatus and is designed to influence suggestive output to prolong a resolution to “master” thief's primary objective. “Master” thief's primary objectives may include the searching and seizing of ideas and knowledge based upon the target subject's footprint that, “master” thief may have obtained through a number of sources e.g. (careerbuilder.com; Monster.com; website registrations; DNS registry; metadata sources; cookies; etc.) The overview of the primary objective seems worthless but in fact, is detrimental to the target subject's life and physical health. A series of occurrences may have taken place before the attack (actual) has taken place, event's such as, intravenously applying poison e.g. mercury, in the guise of medical professionals to induce death upon the conclusion of a successful theft, fraudulent claims from sources close to the target subject's environment e.g. (spouse, sisters, friends, relatives etc.) of “unstable” behavior (that may or may not be true) in conjunction with applying a poison in that aspect, hospitalization to undermine the detection of “master” thief's presence in the target subject's lifestyle and environment when in fact, “master” thief or a node from his network element, is quite near and is working the “pendulum.” Even the wording or phrasing of the activity to produce a successful Intellectual Theft it's self can seem alarmingly paranoid in description, but to the contrary, the description is a matter of honesty based upon the recognizable sequence of events unfolding before the target subject's very senses. The target subject's perception and awareness levels are really the only effective security/identification measure in relaying the description of Intellectual Theft that could easily be misidentified as psychosis or psychological disturbance.

The hypnosis network is responsible for a very wide variety of duties, so broad that it is the single most weakest point within “master” thief's network, and should be dispensed with upon recognition, it's a serious threat to all and everybody in the world and always has been. Hypnosis to my understanding is a volunteer medical procedure that requires a contract or authorization by the subject/patient in relation to the title of this report, that can not be misjudged as authentic by forgery or by any other means, meaning that, the target subject through valid identification standards is first to identify the “forgery”or authenticity of his/her signature. This step negates further interruption within the target subjects mind in correlation with any transmissions that may or may not produce a positive or negative affect in the target subject's behavior taking into consideration any and all network software and network hardware of any “master” thief network node and/or any “master” thief him/herself.

The hypnosis portion of the network is primary, “hypnosis” begins at hour ZERO to thwart defensive measures from the target subject's interpersonal or online network from the start. The main apparatus seems based upon “dry run-shoot” instances and seemingly ahead of “master” thief in-wait of “master” thief, based upon the experience I've encountered with the Intellectual Thief Network. Meaning that, operations section of the network is conducting the next primary target subject while “master” thief is “concluding” with the previous target subject. Conclusion could be murder, taking hostage, stashing, kidnapping etc.

My hypothesis, the sheer volume in number of “hypnotists” available is due to the availability of education compared with the ROI (return on investment) on the topic, within the lodges and laboratories available within THE social network here in the United States of America (public,) fraternities and sororities on campus at colleges, and psychology outlets, seminars, and other educational outlets that provides the hypnosis curriculum for a fee, are beyond the availability of clientèle. My experience with the subject of hypnosis relating to course framework at colleges and universities is negative, I do not know of any colleges or universities that provide a course in hypnosis. It may be touched on in psychology but, I'm sure attention is diverted being that THE algorythm study was conducted 3000 years ago with horrible results in humanitarian efforts and social progress of entire races and nations, of the world. With the advancement of technologies and communications in particular, telecommunications, hypnosis through subsonic measures can have horrible results on modern social and intellectual progress with regards to, the nature of modern weaponry. Any attempts to violate or corrupt the telecommunications networks with subsonic/subliminal hypnosis based on any sequential parameters, should be avoided and dealt with in the harshest of sentencing because, of the volume of attacks via telecommunications whether electronic or on a physical scale that hypnosis could be applied to.


Chp. 2 Apparent Network Infrastructure/Network Engineering Aspects

The network infrastructure is going to resemble an average network setup by diagram in relation to the network “crew.” The admin node works as the controller of the network that is actually the “master” thief device or node. It's possible to “dummy” (impose a subject to act as network admin) that node but, the chances are that, any dummy at that node are a very recent attempt to provide a diversion and steal time from investigative efforts, which means that the “dummy” is actually a patsy for the “master” thief's crime. That Admin node is VERY important and he/she won't leave it or any possible cloned image machines, for inside of a long time frame (won't be left alone for long. Unless the machine is a “reject” or compromised.) As with any other PC or Server, the admin node or controller needs regular updating to prevent the discovery or the hacking of. The admin may send dummy updaters or dummy admin but the odds are he/she wants to maintain a secretive static location(s) or, is ALWAYS with the controller in a mobile unit.


Chp. 3 Methods of Attack 

Methods of this type of electronic attack will include and are not limited to this section, regarding the pace of electronic devices and their development.

The methods include a variety of hardware interfaces combined with software and operators of the devices and software to carryout a telecommunications quagmire, ensnaring a target subject by methodical surveillance, reconnaissance/”footprinting” (electronic and/or physical,) defamous informative findings regarding the target subject, to include the nature of sexual preferences; negative and/or faux psychological profile reports; the stockpiling of criminal charges upon the identity of the target subject within the databases of law enforcement entities all of which, are sure signs of character tampering to enable such an Intellectual Thief Network to succeed or even exist, especially if these reports are ALL negative and contrary to what one specific person could possibly be connected to with regards to criminal activity.

a. Algorythm
The E.E.G. (electroencephalogram) will be a KEY component in all of the methods of ensnarement. The E.E.G. will provide an algorythmic display of the target subject's personality, traits, education level, intelligence level, vital statistics, brain frequency/output in reflex response, and give a readable output of personal thoughts, ideas, and actions in connection with other technologies that will operate as one unit.

A very intimate violation of our privacy on a scale that is beyond any terrorist attack or capabilities of terrorist elements as far as, the reports on the news or even C-SPAN would lead us to believe or have been reported. The consistent study of any given target subject will reveal openings for attack such as transmitting “Push this, that, thus” subsonically over a VoIP or similar “telepathic” network to produce the sense that any given thought, idea, or action of the target subject was not the target subject but actually provided by an “operator” with access to E.E.G. equipment designed to produce the upscale output of the device in contrast to what the E.E.G. device was designed for, providing a sense that the thought, idea, or action was actually the command of the “operator,” depending on any given circumstance or hypnosis (shallow or deep) may in fact be true, but most often the conclusion regarding an infiltration/intrusion of a human being's brain via satellite, radio, or any other transmission type by another human being, renders the argument to the contrary. Chances are, during the footprinting phase of the operation, the target subject's personal algorythm to which his/her brain functions was studied rigorously to apply as an overlay for distraction, or to provide the element an opportunity to create a seemingly successful Intellectual Theft based off of what was recorded previously during the footprinting phase.

The application of sound are used in a method that is consistent with hypnosis, the types of sounds range from music to sound effects. Throughout the Intellectual Theft Attack the sounds are played in a consistent manner but not always one at a time. The sounds are consistent with military style cadence, (a hypnosis to induce a sense of unity among a singular military entity,) sound effects are with a solid repeat 8 track style to maintain the equilibrium to parametrics of hypnosis to produce the desired affect of catatony for the purpose of conducting/concluding the Intellectual Theft with success. Sound effects can range from chains “jangling” (an assumption production method for scapegoating [there are many more different types of this in different aspects of the network operations],) to catch phrases in a timed and calculated sequence, the ticking of a watch (I've noticed a rolex style watch tick, rolex has a very fast and quite motion,) A seemingly uncontrolled child screaming over and over again. “You've been took.” It is still unknown what the definition of “took” is but, the child seems to be under a state of hypnosis his/herself which may have been authorized by the guardians/parents of the child. The sound of his statement seems to have a calculated algorythm based upon my best judgment, of the timing and frequency of his statement. I have not timed the occurrences. There are other “catch phrases” and “slogans” that the child screams, it is unknown whether or not the “child” is a recording or an AI system, it definitely doesn't sound human as the child is “always on” with what sounds like digital distortion encapsulating his screams, that could be voice changer technology or a distortion type pedal for a PA amplifier or electric guitar (possible shift-work.) Not much is known about the child but it's definitely a very disruptive and seemingly disturbed child. Again the transmission is of an electronic relay nature and NOT a psychological disturbance or a “hallucination.” To the definition recorded by doctors and deans of universities, cite a “hallucination can only be visual.” No audio hallucinations have ever been recorded. The terms “hallucination” and transmission are NOT to be confused. There are other instances of a repetitive syncronous and overlapping transmissions based on speech, many “slogans” and “catch phrases” are transmitted as if scheduled.

I've also identified an algorythm technique that combines 3 of relation at any given time, the relation of the target subject to the target subject's relation, often produces a very similar content of conversation based on genetics though, the subject topic of each individual conversation (with reference to the target subject and his/her relatives) may be different, the content of both statements between the 3 relatives will be quite similar because of the genetic connection, and algorythm based on age, (if relatives are playing part in the foul play scheme it will be difficult to make a “law enforcement breakthrough.”) Any relative will do within 2nd and 3rd cousins, to produce another affect that could be perceived by law enforcement in a negative way and reflect upon the target subject when in fact the target subject, is the victim and not even playing a role within the foul play/conspiracy, hence, foul play.. What I'm writing in this particular instance could be used to the obverse or vice verse in effort to exploit an opening for “master” thief to escape or conclude the conspiracy. There is also a point of bridge (P.o.B.) that will often seem to be faster than the target subject (I suspect it is because of the bridged connection that would be to possibly 3 relatives and the target subject, making the assumption of a lead investigator or crook in charge at that node) but, it is because the target subject's E.E.G. wavelength is amplified and bridged to either an investigator, a crook “augmentative and alternative communication,” or all for the thief network to read or have translated wavelength via “augmentative and alternative communication” throughspikes” “loops” or swirls generated by the network resources in a way that is in FACT what one would call “MIND READING.” This also plays a role in transference that I will cover later in Chapter 8. (Put simply, crossing over wavelength like crossing over amplification connections)

I also recognized commercial server attacks that are related or unrelated to “master” thief by genetics or by network identification or however that specific attacker is associated with the attack network. It could be a friend on a social media site, a cousin, an old friend that is no longer visible through social media but only in school yearbooks, or even a stranger as passers by. (Rare instance as passers by.) I'm describing commercial attacks as individuals employed by corporations and small businesses that, attack the target subject through corporate or Business Servers, Virtual Private Networks, Remote Server Locations, and Remote Technicians associated with those corporations through a cloned image of server ISO image and cloned VPN tunnels in reference to perhaps an old employee who was never deleted from the users manifest on the point node that is conducting the attack wherever it may be in the network.

The attacks from servers are usually careless, it is often an employee who doesn't realize that all activity on the network is logged in a manner where if the logs are deleted the conclusion on any given scenario is that, the corporation deleted files in affect obstructing investigative efforts and compromising network security. The network is there to provide a means of storing the company's important and financial documentation, it was the original concept of the computer it's self to conduct complex math and store files in a paperless manner to conserve resources. So any tampering of the log files should be viewed as a serious infraction at any company and defined in law that to tamper with those files is an “Obstruction of Justice” and a means to apply accessory charges to the culprit of the alteration to those log files, as conspiracy.

The algorythmic study of any target subject should be ready to apply to the foul play conspiracy within a matter of weeks to provide years of exploitation.

I've also taken note of an algorythm displacement to enable “master” thief an opportunity to seemingly dismantle the algorythm process (“master” thief tries to avoid this because it is a setback in operations) based on the case study of the target subject to induce an incorrect position in judgment that the target subject is lying when in fact the target subject is telling the truth. The displacement makes the appearance of an incorrect call of prediction, based upon the case study of the target subject and projects the appearance to investigators that in fact the “master” thief is of lesser intelligence (as stated “master” thief tries to avoid this based on ego.) It depends on the intelligence level of both “master” thief and target subject.

At this point since, “master” thief is operating a network node, he/she will become increasingly enraged because of his/her ego and intelligence level exposure. It's assumed that “master” thief at this point will become more dangerous.

b. Interrupt/Disrupt Signals

This type of attack is used often and seems to be the networks less than desirable members, but the network “master” thief sees fit to keep those running at the pace that they're hypnotized to or, the pace that the member node presents based on their own knowledge of the network setup. The signal is very painful, it isn't on a scale of pain that is too unbearable but the affects over a span of time I'm sure, induce a number of age related diseases and degenerative disorders in relation to the brain.

To my knowledge based on my education and experience the interrupt/disrupt signal comes in two versions. 1.) A static discharge from a satellite “power station” or cellular network di/ti poled (as Identified by the FCC) 2.) A streamlined transmission with a simple message encoded into the packet and transmitted to the target subject to remaster a static discharge and hide the interrupt/disrupt attack signal. I'm guessing that it is a very short message, a single number or letter so that the static transmission is relayed in a readable format, even by the brain of the target subject who's wavelength has been prerecorded and studied in the footprinting phase of the Intellectual Theft Attack process.

The static interrupt/disrupt signal is as if being struck by low wattage, low amperage, low voltage electrical discharge like touching a light switch and being “zapped” by the static discharge, the difference is that, the static discharge is being pinpointed in a targeted method to the target subjects brain in the format of a transmission reaching it's destination or a hop repeater. This (“button” as is often identified) type of transmission is very painful, the persistence as I said, are the most painful aspect. Who knows what kind of effects long/short term, dispositional, motor function etc.damage the signal produces within such a persistence and frequency of use.

The streamlined signal or “packet” signal is a more elevated tier type attack. Meaning that, some tier or operations “Sergeant” within the “attack network” discovered an alternative disruption that may or may not be equally harmful. The transmission is more fluid in that, the brain barely notices the intrusion and the distributed letter within the transmitted “packet” (message) is often overlay with sound or “slogan” to inhibit the transmission target subject from discovering his/her secret regarding the streamlined manner, causing a disruption in the target subect's thinking to enable the seizure of personal Intellectual property/knowledge based on the target subject's educational and experience level or inadequacy.
Sound effects have also been used to create diversive efforts and disruption to inhibit network activity discovery. The sound effects include what sounds literally like explosive concussion or collisions inside of your head. They aren't so painful but, they do create a sense of imbalance in concentration and equilibrium.


c. Methods Concerning Network Techniques to Present an “unstable” Victim

There are many techniques concerning the undermining of the victim regarding his/her mental state. These techniques are on a broad base of sadistic and masochistic methods in order to render the appearance of a mentally unstable victim by a form of military style psychological operations and police “trickery.”

The “dry-run” process I had mentioned earlier regarding network “contact” by the network engineers or “master” thief is the first implementation of the first stage of the entire “operation” that I'm efforting to describe as ACTUAL Intellectual Theft. The dry-run process is directly related to the footprinting process which is, as I have stated, a mapping of the routine procedures of the victim. The observers want to record your daily activities and review those activities to find an exploit opening for breach in disposition character operations of the target subject. The network seems professional but lacks the type of leadership that is present with military standards so, to the best of my knowledge there are no military officers involved in the foul play operation. (When all is understood regarding the nature of the crime it comes down to the heinous crime of foul play) If there are military officers involved they're low grade. Thus, all less than desirable grades and appointments of military officers should be recorded, reviewed, and posted as “threat” regarding ONLY this type of activity.

The dry-run, based on my observations involves routine surveillance of the target subject, from within the proximity of the target subjects home, work, and routine activities. The method starts slowly with approximately one surveyor, which usually goes unnoticed. The one “surveyor” is possible “master” thief or “master” recon team. The operation involves that of tactics which, may seem professional according to military standards, but to military eye's are clearly the contrary. It is possible that the “master” thief “crew” has military members or ex-patriots in their employ but, the leadership of the organization (name unknown) is obviously below leadership standards according to military standards of any branch. The surveyor as mentioned provides initial research to progress the case study on the target subject to provide a fair extended survey process to “ensure” a successful theft theft/foul play operation.

The acquired information is relayed to the rest of the network's surveillance team while the “master” thief is in trail wrapping up incidents and measures to prevent discovery from the prior target subject. When the surveillance team receives the information regarding the next potential target subject I'm sure that the network uses relevant information collected online though search engines or married family and friends to determine whether or not the potential target subject is the correct type of subject to proceed with the theft/foul play scheme currently being “PLAYED” out on me. I've been observing the transmissions and activities of the network for three years, and I believe I have enough information to pass along in report.

The network is very damaging to the family aspect of our society as the network has acquired enough funds through the prior operations to actively and continually pay patrons, family, and friends of target subjects of the foul play/conspiracy CRIME I am annotating in the title of this report, to continue the activity.

In an effort to return to the dry-run process I am writing in reference to the foul play scheme I have identified in this report in the TITLE of this report! The dry-run process from initial contact, is perpetual. The dry-run is part of the LOOP aspect that I will identify in the final chapter of this report in full description. What I understand to be a “dry-run” process in this case, is perpetual in the sense pertaining to these instances to that, the dry-run is used to provide cover and concealment for “master” thief. It's designs seemingly are listed tactics to be repeated over and over again to provide a time span or exploit opening for an enabler of a new staged process to provide an opportunity for “master” thief's escape or completion of the Intellectual Theft unnoticed. “Master” thief doesn't care how many people are in tow, he/she will provide them scraps, “We have food for you.” is often repeated over and over in a duplicate fashion to encourage “master” thief supporters (feeding them, a negated finance) and provide a sense of “reassurance” to the target subject that something is being done to rectify his/her circumstances. It seems to the target subject that, at least he/she won't starve to death while in what is known as “SOUP.” The “SOUP” is another portion of the “LOOP” process. The “SOUP” is another method of transmission cover. It is also used in two ways. There is an amplification technique that I will identify later in this chapter that works surprisingly well in provoking the target subject. The provocation is necessary for the rendering of an image of a “psychologically disturbed” or “unstable” target subject. It is the prime method used to PROVOKE or ENCOURAGE RAGE in the target subject, it is VERY important to remember this particular aspect of the CRIME hence, the “SOUP” and the “LOOP.”

The “SOUP” seems to be a collective that for a reason I believe to be subsonic hypnosis, are endeavoring to help “master” thief to be successful. The reasons are unknown based upon my observations. “Master” thief doesn't seem to make a more comforting atmosphere for either friend or foe. The hypnosis seems perpetual as with the “LOOP.” I've found the hypnosis technique is in every aspect and phase of “master” thief's crime. He/She is infatuated with the hypnosis to a panic. I've also observed hypnotic suggestion that is most likely shallow that seems to apply “he” to a “she” if you're not paying attention you will call “she” a “he” or “he” a “she” without even realizing that you have done so. It is unknown whether they left the hypnosis open but, there is definitely a “switch” trigger word or sound. The switch trigger word can be applied to any hypnosis with an obverse action and is more annoying than it is painful. If you let it carry on it will be a problem later.

Scenarios for subsonic hypnosis tend to vary upon what the network is trying to accomplish according to their agenda. The “scripting” is a pure example of the induce breech of openings/exploitation settings for hypnosis. The “SOUP” will proclaim that, what you're trying to relay to any given party regarding the target subject's disposition is that the scenario was scripted and that the target subject is a leech or is actually part of the foul play conspiracy him/herself. I'm not sure if the hypnosis topic needs to be more clearly defined, I'll try to fit the subject into this report in a brief synopsis type chapter. Most hypnosis is subsonic or subliminally transmitted, some seems to manifest through manipulated actions induced through the transmission layer (whether repeater system; microwave; analog etc.) within the target subjects environment to passers by and by standers that often seems combined with an amplification of possible stimulating comments, sounds, or movements to either provoke the target subject or induce a hypnotic effect whether the passers-by or on-lookers realize that they're being used to inflict the desired affect upon the target subject or/not.

d. The Use of Military Style Psychological Operations (PsyOPS)

The hypnosis aspect of the operation is directly related to this portion of my report. PsyOPS “agents” are using theatre, hypnosis, music, obversity, and treason as the framework for a PsyOP style method of “command and control.” It is possible that a military PsyOPS ex-patriot(s,) expatriates, or veteran(s) are coordinating with the “SOUP” in order to provide the “SOUP” layer hypnosis, provocations, and exploits within the psychii of the target subject. The sheer volume of hypnosis exploits I've discovered within the “SOUP” are beyond any human comprehension. It is practically impossible to avoid the hypnotic process and you become compliant often to subliminal suggestion (i.e. “walk to the kitchen;” “Sip.” inquisitive suggestion e.g. “where's your lighter?” “turn left, turn right.” Simple commands) transmitted by transmission operators, which are often hypnosis trigger words to enable a manufactured sense of an unintelligent, robotic, or remotely controlled target subject that is actually being stepped on in an ulterior effort to blame the target subject for the crime that “master” thief and his network are committing. Simply, “Master” thief is committing but trying to blame the target subject.) It is another aspect of the “SOUP” that enables the foul play operation to be successful, if it is to be a success. Meanwhile, while all these suggestions and inquisitive suggestions are taking place, the Intellectual Thief Network is providing a method of victim replication by ordering a network member to commit to every action the target subject makes through the case study findings of the target subject who is to be inserted as the “new” character representing the target subject when the target subject is disposed of however he/she is disposed of. Keep in mind the target subject and his/her personal neurological algorythm have all been previously studied and maintained through constant surveillance over the course of years, possibly decades if family members are present within “master” thief's network. In this manner, it is very easy to suggest that the target subject is related to other crimes aside from the networks move to provide “evidence” of the target subject's “involvement” and “leadership” role within the ongoing foul play scenario recorded in the title of this report.

Another measure the attack network takes (to secure themselves as supreme intelligence based upon the contrary act of infiltrating the target subjects brain activity with E.E.G. [in the first place], microwave transmissions and all other types that can be used to complete such a breach,) is to provide templated scenarios and event diversions to corrupt any investigative measures and thwart the recording of the activities carried out by the “master” thief network. The “master” thief network seems to be successful with others in this manner but, with eye's on the circumstances, a child could recognize the actual mentality of the attackers. If the attackers are hacking the minds of people it is not necessarily because they are more intelligent, it has to do with an inferiority complexity that seems to drive the attackers. It's unknown whether or not the attackers are educated or trained. The methods used are not intelligent based on the equipment with the design regulations that ARE stamped on the back of ALL electronics devices to provide assistance in acquiring the proper usage and operation of the device whether by component or by unit as enforced by law.

Measures PsyOPS (keep in mind unknown if PsyOPS element is trained or self taught from PsyOPS manuals) will use to provide extended cover in effort to complete the foul play/conspiracy is to employ their friends in the police departments to tag along and provide as much cover for the network as possible in any means the “police friend” can, whether through digital or physical means, until he himself is in danger of being discovered. Who wants to throw away a police friend? I suspect police will use the target subject's name to pass around from police department to police department in effort to suppress target subject's ability, to spy the surface and find an opening for evidence to leak through the transmissions of the police departments (if police departments are founded to be involved with such an operation) part, in the foul play conspiracy identified in the title of this report. PsyOPS knows target subject's primary objective is to make sense of the incoming transmissions and MUST be suppressed if the operation that is, the foul play conspiracy is to succeed.

e. Description of Monitor and WAN Overlays

Monitor is meant to be defined in this section as a physical monitor such as an apparatus designed to monitor or a physical network subject to monitor the target subject by visual means.

WAN Overlay is meant to be defined in this section as any means to confuse onlookers and investigative efforts through electronic and/or physical means via server outlets from Internet Service Providers (ISP,) corporate elements, law enforcement, or Intellectual Theft Network.

f. Hypnosis (a brief cover all) The Methods to Deploy and Neutralizization

Scenario based hypnosis – Scenario based is within the frame of a conversation, action, relaxation, chore etc. it is meant to provide an outlet or exploit for future use regarding the network tactics being deployed. As I've stated the tactics are prelisted and templated, so what you have, is an operator setting the exploit or the “field” for future hypnosis exploitation the operator within. The Intellectual Theft network in this aspect is a virtual “monkey working round the clock” so to speak. Scenario based hypnosis is a setting to provide a desired disruption at any give point in network communications to the target subject(s.) It is an attempt to discredit the target subjects intelligence and provide a renewed sense among the network of “superiority.” It's a morale maintenance apparature (seemingly.)

Virtual Environmental/Algorythhmic hypnosis – based on signal type. The algorythmic hypnosis has various methods, it can be static discharge (transmission stimulus) the tapping of your own feet through applied stimulus regarding transmission stimulus. It can be overlay through your own actions through whatever type of activity you're conducting e.g. (writing a report through a word processor application while listening to music.) The music you're listening to is providing overlay to subsonic/subliminal transmission through the media application. This type of activity is often through a remote or physical server at the ISP/business with the assumption that the target subjects computer and home network are secured, especially the settings within the router. Transmission tactics tend to project a sense of inferiority upon the target subject. It is often combined with the transmission of network engineers to produce the desired effect whether to discredit or manipulate the actions and intelligence of the target subject.

Physical environmental hypnosis – The physical environmental hypnosis is a series of actions and events within the target subjects surroundings to either provoke or influence emotion, action, and inaction. The series of events are “ticky” type events, sounds, actions, amplifications, or any other method to stir the target subject. (NOTE: Prime activity of the Intellectual Theft Network is to project the notion that the target subject has psychological instability.) It can be a wide variety of things in the environment considering, the target subject's immediate environment at any given time to include negative remote manipulations/projections/amplifications that aren't limited to the WHOLE of the manipulations, they can be amplifications in PART of conversation or in part of action, to produce a desired affect upon the target subject. The actions and events occurring, are hardly noticable if you're unaware of the network disruptions and stimulus being applied throughout the duration of the network's session or, if you can not hear the transmissions. (actually the length of the completed or abandoned Intellectual Theft.)

Event based hypnosis – Event based hypnosis can be very similar to the virtual environmental hypnosis but, these are things that are more physical being that the target subject is interacting with the object e.g. (cell phone or computer) or person inducing the hypnosis or subsonic stimulus i.e. subliminal suggestion during sleep, conversation, or physical interaction e.g. (sirens in the Illiad) usually portrayed by monitor activity in both senses of surveying equipment and physical stimulus by another human being. The examples and definitions of the event based stimulus/hypnosis are listed above in all three definitions regarding Scenario, Virtual, and Physical Hypnosiis

Placebo/Virtual Event hypnosis – This is my favorite. It is the acting out of a supposed hypnosis that is so far out mind or so far in the past of the session length, that it seems as though, it could be hypnosis but is just untriggered because of the lack of information regarding the trigger word to deploy the hypnosis that the suggestion relates to and the inferiority of the operator transmitting the stimulus void of hypnosis. It's based on bad algorythmic placement. Thus, is NOT a real hypnosis at all, just a mockery of this report again, to project the assumption to the reader that the target subject is in fact mentally or psychologically unstable which may or may not be true, based upon the stimulus received by the target subject which is actually provocation to induce that affect! (Note: Very important to remember.)

Remotely Manipulated hypnosis/Virtual remote controlling – This is a combination of remote manipulation meaning, the involuntary forced movement or forced action of any part of the human anatomy to induce signal relay communication through hand gestures or facial expression or even body language by means of electronic stimulus that, may include devices such as drone controllers, industrial CCTV remote camera manipulators, possibly even a toy type “Walkie-Talkie.” The “retransmission unit” or cellular tower (same concept) and satellite power stations provide enough power to amplify the desired signal to induce the gestures. These are components of the network that are wide open to attack based upon they're interval and the placement of the components in remote locations with regards to population. The manipulation is often accompanied by the placebo type hypnosis to project again, that the target subject is subhuman, robotic, or not of his/her mentality but in fact scripted or someone else's property to be manipulated without any intelligence of their own.

Recommendation for neutralizing the hypnosis in any form – find hypnotist, retrieve release note, and dispatch/KILL the hypnotist.

g. Network Differentiation/Identification

In order to be intelligent one must be more intelligent than his/her box. If you're the only node in the network, you will know your network identification by your router and node IP Address. To differentiate between a Virtual Interruptive Network (tunneling attack) and your VPN partners, you must understand your Virtual Private Network Service. If you don't understand how your VPN works, the chances of infiltration to the network are greater. If you're part of a corporate network the odds are that, your IP Address is pooled and reassigned everyday either statically or automatically by admin assignment when you startup your node. Knowing the IP Address of your device and the IP Address of devices is key. (For either telepathic VoIP, or VPN or physical network for that matter.)

h. What-You-Say attack
In the event of an Intellectual theft, the network conducting the attack doesn't really seem all that interested in what the target subject has to say whether it is relevant to the success or failure of the attack. The attackers seem remotely configured to enact a pre-ordained plan. There seems to be no deviation from the scoped plan, and no compromise to any setbacks. It seems as though the plan is THE plan and “that is all.” It doesn't necessarily lead an investigator to believe that the network is professional at all. It would seem that the intentions of maintaining the specified design is a serious flaw within the network. It has no outward display of flexibility. Often catch phrases are transmitted over and over to either provoke, divert, post the startup of either the next chain of sequence. The whole network seems completely hypnotized into a no fail state of mind. Success or death. The numbers of the network could exceed any perception being that, the method being used is via hardware, software, and signal bridged (by computer network definition) to the target subject's nervous system (the brain.) The network for upkeep and maintenance, could leave the target subject for sometime with hypnotized members of the network to carry out specific tasks such as the relentless reiteration of catch phrases and amplified stimulus that I mentioned in the c. 

Methods Concerning Network Techniques to Present an “unstable” Victim section to continue the provocation and torment as means to stupify or degrade the ability of the target subject to make a valid conclusion and defensive posture, in effort to succeed at a later date, while the higher ranking network members are off conducting the operation on other target subject(s.) Which is why I think the operation is an unprofessional inflexible plan without deviation.

The amount of members depends on the the loss of the network. if they lose a network member they only need hypnotize another. In reference to what-you-say, what-you-say is used in any combination of ways except for the original context. What you said, can only mean the number of variations that could be contrived from the statement and NOT the context that it was meant. This seems mandatory according to the networks plan, is often perverse, and ongoing. When the network feels threatened by the target subject, it seems to replace itself with children to take the sentencing for the crime. It's a pathetic network and “that's how you tell.”

i. “Scripting” Attacks

Scripting attacks are defined for this report's purpose in this section, as a method of attacking the intelligence of the target subject based with a projected sense of inferiority by the “master” thief network upon the target subject(s) with a number of scripting sequences, reverse scripting, scenario based algorythmic Q & A, and virtually any means within those descriptions that may be used to apply and obtain the desired result upon the target subject. Scripting for this report's purpose is not in reference to the authoring of program scripts for applications or dependencies of applications to exploit or to function. The scripting for this report's purpose in this section is in reference to the cinematic affect that can be acquired by and from audio stimulus and suggestion. The audio stimulus is applied through streaming technologies whether satellite driven or ground cellular network combined with a multitude of other devices that are available to medical professionals along with Long Range Acoustic Device (LRADs) effects that are actually within the cellular network abilities.

Scripting – Scripting for this section of the report is in reference to the producing in advance of any given stimulus, the theatrical authoring of a scenario or Q&A based attack on the target subject in advance of the strategy to subdue the target subject and exploit success to “script's” deployment. The scripting ranges as a broad array of ideas resulting from the sheer numbers of the attack network's broadcast upon the target subject(s.) Examples are too numerous to produce in an effective manner but if you attack someone with audio equipment with the type of theatrical scripting the experience forces upon the target subject, you could imagine how inferior over a strictly streaming audio network any given target subject can appear over an extended period of time. I'll do my best to describe a scripting attack. The simplest attack seems to relay by using the title of the attack against the target subject by provoking the target subject until the brain becomes catatonic ENOUGH to be able to persuade “on listener”s that, in fact the target subject(s) is inferior to the attacker by means of being scripted simply by exclaiming that the target subject is “scripted.” (Sounds childish but, it has it's use for extended attacks.)

Reverse Scripting – The “reverse scripting” method is in reference to letting the target subject upon extended provocation revel in the apparent sudden silence and try to interpret the chain of audio events that have been inflicted upon the target subject(s) for possibly hours, days, or weeks. During the “silent” period the provocation will remain persistent with background noise and of course the “always on” child. During the silent period through my experience with it, the target subject will roll around ideas in his/her head and act out residual hypnosis that is either “passed” or current. The strategy by the attack network in this case, is to sit and wait to “ambush” any given conclusion that the target subject may come to realize. Often, the conclusions will seem of sound thought based upon the extended aggressive audio stimulus. The thought and ideas will be intercepted by the target network equipted with E.E.G technologies and used in a way that is obverse to the reasoning and use in a virtual theatrical “improv” set type provocation. For instance, the attack network will wait for the target subject to conclude his thoughts on any given stimulus, let the target subject “script” his assumptions that may or may not have relevance, to which the attack network will rebuke with the hopes that the target subject will forget the instance of thought, the level of provocation will depend upon the attack networks realization of how close to being correct the target subject is. If the target subject is correct in his assumptions, you can expect the provocation to be extreme.

Algorythimic Scenario Based Q&A – The algorythmic based Q&A is a method to algorythmically question and answer in effort to apply the APPEARENCE of the “superior” intelligence of any given member or group of members of the attack network based on the question at hand. To implement the strategy is only to come up with simple or complex sets of questioning, and based upon the case study of the target subject, (regarding brain wavelength output) reply and answer any given question in reference to the case study findings that are based upon psychological profiling of the target subject, or answering the questions before the target subject makes his own conclusion (or, as the target subject has made his/her conclusion in his/her mind to be intercepted with the assistance of E.E.G. Servers and technologies)or reply regarding the simple or complex sets of questioning thus, applying case study findings algorythmically to resolve the question sets for the target subject in advance but, it is ONLY in psychological appearance to “on listeners” or the readers of this report. An oddness of type, audio illusion. (In appearance ONLY that the target subject is under the attack network's control or “in command” as a node within the network for scapegoating purposes.)


Chp. 4
Methods Used by Hardware Operators

The definition of hardware operators is in relation to network admin nodes and high ranking personnel with the technical “know-how” to conduct the manner of network function described in this section. The manner of operation is that of an individual conducting server functions that relate to the attack defined in the title of this report. The scope of duties is relatively small in description, but requires the talent to operate the equipment described in the description of hardware section of this report. The duties of this aspect of the Intellectual Thief Network could include: Operating the subsonic layer of communication to provide a means to an end, or virtual cover and concealment regarding the task at hand, remote manipulation of the target subject and any other individuals in the target subject's environment depending on the array of equipment transmission.

The equipment transmission is what I believe to be a pinpoint stream, but as with light you will have dispursed array from the pinpointed transmission for example, when you turn on a streaming flashlight the “StreamLight; MagLight” for instance, transmits light in a pinpoint fashion while in the pinpoint array or the wide array stream, while the illumination creates a dispursed affect in the pinpoint stream not only illuminating the pinpoint target brightly but also providing an auratic illumination of the immediate environment surrounding the pinpoint target. The equipment used by the admin nodes as hardware operators include all natures of electronics devices and their transmitting equipment e.g. (NIC cards di; ti antenna array, Military and industrial grade retransmission units, repeater system; analog Commercial Band functions to include HAMM; and analog police radio traffic.) I understand that the use of these devices ( in the past) in a alternate manner of communication than that of which, I am describing has been permitted within the guidelines and policy of the use of the equipment and FCC standards, but the extreme over-indulgence of the type of power that is related to the equipment is beyond that which is humanly or extra-terrestrially acceptable.

Hardware used to provide the type of unacceptable communications is NOT limited to developmental research regarding the “isotopic radiator” and any developments to that device, or any other method of “telepathic” radio communications. The hardware is not limited to Server communications used by commercial business and corporations when it should be. I don't think Thomas Jefferson had the isotopic radiator in mind when he suggested to “Advertise, Advertise, Advertise!” The equipment is not limited to “public” radio or public use of Commercial Band radio. The type of hardware is not limited to LANParty type equipment designed by “mainboard” corporations or elements within the “mainboard” design infrastructure. Those parties seem to know what I am talking about when I discussed the issue with an Agent in customer service at DFi industries in Germany. The manner of the agent's tone with punctuation, seemed remarkably opposed to the brand and band of communications that are occurring that I don't even want to give a name to.

The operations of hardware Operators in description as I said, are vague, but when you revel in the type and amount of individual processes at any particular job on this planet that has assignments to, and the complexity of a device that fits in your hand such as a “smartphone” can be enormous. The “smartphone” is a prime example of the types of hardware used to carry out operator function it has all the components required to conduct the type of operations I am referring to. The “smartphone” has a microphone, a speaker, multiple outlets for wireless type communications and methods to distribute the communications i.e. bluetooth; wifi; and satellite routed communications. The “smartphone” was NOT intended for commercial sales to the public, to my understanding the technology was intended to be reserved for high ranking and trusted resources within the Federal, state, and local governments and NOW poses a significant threat to every nation's way of life on the planet regarding the type of subsonic relays that are transmitted through us daily. Some of those transmissions are harmless, but when all of those transmissions become harmful what is to be done in reference to the sheer volume of “smartphone” in use?

The operator poses a threat on the scale of a stock manipulator network within the New York Stock Exchange or any other KNOWN terrorist organization throughout the world for that matter. He/she provides the threat through the day to day duties that the operator whether within policy or operating outside of the framework of those policies. The operator really shouldn't be more than a wooden manniquin or paper masche` model maybe even a blow up doll, the job of the operator duties can be conducted better with a “dummy” character than any live resource or Artificial Intelligence (AI.)


Chp. 5
Different methods and protocol (virtual or electronically transmitted) to include analog and digital means as well as the “virtual” method used within the network structure describing layers in the network band width and the placebo method of virtualizing that aspect.

The protocol is the network's overall plan or event oriented hypnosis at any given time through any given provoked or concluded scenario to and from the target subject. Electronic Protocol sounds seem VoIP (TCP/IP) with “telepathic” bridging. The bridge as I mentioned seems to be a combination of Medical Equipment (E.E.G.) and “augmentative and alternative communication” for paraplegic/quadriplegic patients combined with Servers and Controllers.

Virtual methods, are any of the stimulus regarding emotion, to deploy a sense about and within the target subject's conscious. That means transmitting the recording of a state of emotion over a broadcast to a targeted subject and force “playing” the emotion to run live in the target subject's mind in addition, providing any stimulus needed to produce an electronic manifestation of that emotion. The equipment needed to provide such a feat is only an E.E.G. and a transmission source. The E.E.G. Would have been used to record the emotional pattern of a recorded subject though, the pattern of the target subject and would be displayed to the E.E.G. Device differently because of the individual “fingerprint” effect, the emotional transference would be received by the mind in approximately the same way that the recorded subject had perceived said “emotion,” in the target subject. (Comparatively, crossing over the connection of an amplifier and speaker.) It's a method of generating a palatable conclusion among observers that the network's “inman” (most likely a Doctor noting the medical equipment) has pinpointed the psychosis of the target subject that in reality does not exist unless, the target subject is mentally unstable or has a LONG history of mental instability to start with. I can only assume that those types of targets were rehearsed with first, before the Intellectual Thief Network began to roll-out it's network operation.

Network Bandwidth would be those layers reserved for emergency medical, police, and fire station. It sounds like the repeater that I used in the Military Police Corps known as the “Military Police Repeater System.” The bandwidth is encrypted and only another receiver running the same equipment/key/frequency should be able to receive those transmissions but, if you bridge the device you can transmit to whatever receiver/transmitter you would like to communicate with to include a human brain. You could bridge a human to human by using the repeater system and the hardware bridge device by transmitting the signal of the repeater combined with the signal of brain A bridged via some E.E.G. compatible hardware (exists) to Brain B but the layer reserved for the repeater system does not have the capability to provide accommodation for that type of function because, of the amount of devices you're trying to sync to an encrypted repeater device. The system would definitely let someone know.

I've experienced a few times where the attack network tries to emulate the results that you could pull from this type of communication but the effort is based on algorythm and always seems quirky.


Chp.6 Reasons and Motives

The reasons and motives for the type of network activity that I am describing are quite simply for personal profit of the network and to provide cover and concealment for network operations conducted on other target subject(s,) also to provide cover and concealment for extra-network activity outside of the network functions that I believe are plotted without deviation with exception of individual deviants.

The extra-network functions could be the cover and concealment of FOUL PLAY operations that work in the networks interests. If the network is only interested in the personal profit of the networks capabilities and provides assistance in only one direction, you have a root before your eyes. If the transactions star pattern from a waypoint, you have possible root or collection point.


Chp. 7
Description of the Experience, and the Counter Operation Aspects Succeeding the Individual Deployment of Counter Tactics.

The experience is somewhat of the setting and displeasure of being remotely controlled like a remote control (RC) car. Often the experience will be seemingly a manifestation of someone else's direction or what seems to be a conclusion drawn from the mind of another by the target subject even though, the target subject is actually drawing up the conclusion that is being relayed by a literal HUMAN relay (Being used as Network Apparatus, most likely a fresh young mind for the operations sake) who is using a CPU/GPU or other processing unit outside of what can be done with an E.E.G as a network bridge. The network “master” thief and/or partners are actually bridging to a CPU/GPU (Central Processing Unit and Graphics Processing Unit) to be able to produce the spoken display of what the target subject is thinking before the target subject can relay his/her thoughts him/herself. Especially in an extended attack the target subject can often seem slower than the Intellectual Thief Network and it's operators creating the illusion that the network is indeed the conveyor of the thoughts and actions of the target subject, (whether inventive or creative, angry, happy, or sad) are actually the thoughts and actions of the network operators but is only illusion. There is a overlapping factor in that, 95% of the time being, that algorythmic displays are often guessed by network operators and the fact that the target subject will fight on an intellectual level or go on a killing spree (It could be related to the outbreak of killing sprees These United States have been experiencing in reference to “school shootings”) primarily, the reason you might observe the illusion of the inferiority of the target subject at any give time that either is or is not there. Very difficult to put into words being that, the baseline for intellectual superiority does not exist.

The CPU and GPU were created to be the brain for complex mathematical equations produced and calculated by our earliest computer systems Both, the CPU and the GPU are of the same caliber semiconductors the only difference is in the cache, the CPU will hold more cache than the GPU. The GPU is set upon one task where the CPU is threading multiple tasks at a time. The fact that people have found a way to bridge computer components and use those components like a prosthetic, is a constant threat to the security of our inventiveness our collective brainstorming within think-tanks not to mention the toll that it will take on the competitive nature of our species, when it comes to the inventiveness of our minds for instance, WAR. The only reasonings anyone would have for bridging a human being to an apparatus outside of a serious debilitating medical condition would be to emulate a target subject in effort to become the target subject through collusion and subterfuge. There is no other reason being that the computer will do the mathematical equation for the human without his/her assistance in the processing the task of any given mathematical equation or problem. It is sheerly a means to complete an identity theft based on superficial reasons that really don't play a part in the development of any of us, let alone the consequences it will have regarding diplomacy with other nations when those with the aptitude to fill those diplomatic positions, deteriorate in aptitude because the operators of such a network have attacked those personnel for so long that, the brain deteriorates in it's processing ability for the human being. I don't think you'll want marionettes dictating or authoring policies that effect collectively everybody, especially when there are weapons of military grade involved in any given diplomatic intervention or process. The results WILL be catastrophically damaging.

a. Transference- Transference is defined ONLY as a residual manifestation of emotional, movement, and sensory manipulation that is possible through transmission of the emotional, movement, or sensory output of either a recorded or live subject, bridged via software and/or hardware to the target subject (human being under attack.) Transference can be the emotional output of human being that is felt on a residual plane as the target subject from the attacker through transmission hopping, relaying, or repeating. (Almost as if human beings were being used as a pharmaceutical drugs, for example.)

b.Feeds”- Feeds are defined as any source of transmission that inhibits the closing of the frequency bridged to the target subject, to enable the target subject to carry on in a normal frame for the remainder of his/her life. The ONLY measure that would benefit the counter attack network for the target subject is to eliminate the “feeds” either through armed conflict or by force.

c. Hopping- Hopping is defined as the transmission re-amplification, relaying, or repeating in a retransmissive manner, i.e. Retrans unit, upon the target subject and the near by environmental objects that would be conductive enough to create a desired affect whatever it may be. This relates to the appearance of psychosis upon the target subject to create a means to the conclusion of a successful “Intellectual Theft,” or to render the appearance of the target subject to a less than desirable perception among surrounding “by-standers” and “on-lookers” through the provocation that accompanies the hopping technique to induce the abnormal appearance and reactions of the target subject though, it only a reaction to the applied stimulus. Those reactions may or may not seem so sane or insane to any “on-looker” or “by-stander” but, that depends on the level of involvement or knowledge of the “Intellectual Thief Network” conducting it's operations that any given “by-stander” or “on-looker” has. I often refer to the network in this report as an “Intellectual Thief Network” when in reality the measures and operations being conducted in such a network are really “meshed” into a grand array of circumstances. I believe low-level type target subjects with a reasonably intelligent output to co-workers who may be network operators or surveyors, are prime subjects to be attacked in reference to the target subject then, marked for case study and “footprinting.” The footprinting process is described in Chp. 1 of this report.

d. Postage- I suspect though have lack of evidence to report of the posting of postage reserved for and addressee on the envelope or shipping invoice of postage and cartons to illegitimate addresses. This helps provide a cover for target subject impostors assisting the network in it's operations. The “assistive” impostor at the alternate address where the postage may be delivered to, might be only an assistive element and really have no connection to the network operations. As I've stated I only suspect without support of evidence but, I thought it might attract attention to the serious nature and operational forethought that is going on within the networks of these attacks. It actually seems childish when you observe it for an extended time. The age ranges of the attackers might extend into the adult ages and NOT just be an adolescent operation.


Chp. 8
Description of Psychological Disposition of victim and offender throughout the “experience.”

The psychological disposition is the appearance of psychosis. The appearance is the result of many forms of stimulus directed at the target subject. The many forms are defined throughout this report. Some may involve crossed wavelength through bridging subject to target subject. The primary goal of the theft network described throughout this report is to obtain money through electronic methods, whether physical or through electronic manipulation via software running hardware items that may be or may not be proprietary or commercial. The software and hardware used have been described throughout this report (to include ransomware and malware promoting ransomware.) Though electronic record keeping is a modern method of keeping personal documents, the methods used to disrupt the manner in which anyone keeps records can be prevented. It's really not a difficult thing to avoid, it's more difficult to maintain a satisfactory dispositional appearance in light of the incoming stimulus. Which, as I have stated is the primary focus of the type of network that I am describing in this report.

When religious factions are concerned the type of activity that the network is conducting may and will at some point breakout into violence. With certain sects of Jews and Muslims without reference to Gypsy but not limited to, the effects are going to be disastrous based upon the spiritual aspect of those religious sects. Either an infliction upon those sects based on a misidentification of the circumstances regarding the outright violation of those religious sects and their religious values and how those religious sects will react to the stimulus that the network operators are transmitting.


Chp. 9
The implications of the security problem regarding “Intellectual Theft,” neurological infiltration/hacking, the security disposition of all networks and aspects of the security risk placed upon government and financial outlets.

The implications of the security problem is potentially disastrous and catastrophic to mainstream society. It's not so much the money that is involved in taking “hostages” in this manner. In the manner I am describing it is not possible to literally take hostage but, only provide a constant appearance of psychosis to redirect law enforcement away (by way of routinuity) from the target subject to make way for the operation to continue, possibly to promote a future redevelopment of circumstances for the attack network to take advantage of.

The neurological infiltration aspect of the network operations are actually the easiest to to draw a conclusion of how the network operators are conducting their method of attack. Because of the presence of medical equipment used to conduct the operations that I am describing, you must assume that a doctor is involved being that the accountability of medical equipment such as an E.E.G. device is 100% accountability at all times in reference to the policy described in the devices user rights and permissions based on EULA and FCC compliance.

The potential disaster regarding is, complete network failure that will extend all the way to the stock market and Federal Defense Systems INEVITABLE.

The RISK of catastrophic network failure is beyond 99%. Meaning, that it's a total risk to modern civilization, NOT just lifestyle!


Chp. 10
Description of NETWORKS; Network types; network devices, nodes and users.

I'm assuming since I am hearing the transmissions that are the source of provocation in this type of attack, would be the network structure, that of BusLine network with microphones. Completely illegal!


Chp. 11
The “Loop” description set apart from tactics. (IMPORTANT)

The “Loop” as I call it, but to the network it is described as “Soup.” The Loop is actually the identification of the word it's self, it is a sequence initialized hypnotically or by remote manipulation or even subsonic transmission to induce the same set of events, occurrences, and verbal provocations in a Pi type manner (over and over again), the “Loop” is a physically induced loop error emulation through the manipulation in those methods that I just mentioned of the “Loop” and that portion of the network who may or may not know that they in fact part of a criminal network.

NOTE!!! The “Loop's” function is to maintain psychological stimulus upon the target subject to maintain the appearance of a psychologically unstable target subject.


Chp. 12
Algorythm and a very short description of the process based upon historical truth and outcome of the study.

Algorythm is the study of a chain of events, numbers, or letters that occur over and over in either, extended or a shortened interval. The process was studied extensively in China around 200 B.C. that ignited a chain of events that completely destroyed China for the next 600 years. The best thing to do, is ignore the algorythm unless you are under attack from a network to the likes, that I describing in this report. The results are always Pi and there is no further study needed unless you're referencing to the secret architecture and implementation of encryption.


Chp. 13
Description of suspected outlets.

The suspected outlets that I believe the attacks are coming from, is from within the ISP (Internet Service Provider) and friends and family of those installation's employees. I also believe the attacks are coming from their partners in the software development industry e.g. Microsoft; Apple; even Linux. They're using all three to try and avoid any pinpoint suspect but the truth is that Microsoft bought out the OpenSource Foundation and developed a “new” system that replicates UNIX. So, the system isn't so new and turns out to be a complete takeover of software development. MONPOLY! It also turns out to be very dangerous.

It remains unknown whether some of these attacks are being conducted from within law enforcement barracks and departments. It would be great cover and concealment for this type of operation to exist.


Chp. 14
Resolutions to the CRIMINAL behavior of “intellectual theft” based upon the strategies, equipment, and tactics that are comparable to the type of disruption that the activity causes in the victims life.

Knip it in the bud, or KILL the entire network as soon as it appears. Every time!



Glossary

AAR- After Action Review.

Admin- Any node or member of a network conducting network administrative functions.

AI- Artificial Intelligence.

Algorythm- A sequence of actions, numbers, and/or letters that reappear in extended or short intervals.

ASIP- Advanced SINGARS Improvement Project.

Bus Line- Alternatively referred to as a line topology, a bus topology is a network setup in which each computer and network device are connected to a single cable or backbone. The following sections contain both the advantages and disadvantages of using a bus topology with your devices.

CCTV- Closed Circuit Television.

CPU- Central Processing Unit.

Crossover- A crossover is an electronics device that takes a single input signal and creates two or three output signals consisting of separated bands of high-, mid-, and low-range frequencies. The different bands of frequencies feed the different speakers, or “drivers,” in a sound system: tweeters, woofers, and subwoofers. (The concept can be applied to transmission technologies.)

E.E.G.- Electroencephalogram

EPRA/ERPA- Electronic Photographic Residual Appearance/Electronic Residual Photographic Appearance.

EULA- End User License Agreement.

FCC- Federal Communications Commission.

Footprinting- Surveillance of an object or target of physical attributes and day to day activities of the object or target.

Foul Play- 1.) if the police think someone’s death was caused by foul play, they think that person was murdered The police said they had no reason to suspect foul play. Detectives have not ruled out foul play.

2.) an action that is dishonest, unfair, or illegal, especially one that happens during a sports game

GPU- Graphics Processing Unit.

HAM- WW2 communications development project that was the predecessor to the SINGARS system.

IP Address- a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network. URL nomenclature or dial-up address e.g. (telephone number.)

ISP- Internet Service Provider.

Loop- Is a portion of the attack network that operates as an emulated/simulated “Loop Error,” for cover and concealment of attack network operations.

Malware- Software that is intended to damage or disable computers and computer systems.

Military Police Repeater System- An encrypted military assigned frequency and device designed for the Military Police Corps that was distributed to low-level law enforcement as part of the Patriot Act “Inter-Agency Information Sharing” portion of the Patriot Act Bill.

Network Bridge- A network bridge is a computer networking device that creates a single aggregate network from multiple communication networks or network segments. This function is called network bridging. Bridging is distinct from routing, which allows multiple different networks to communicate independently while remaining separate.

OpenSource- Denoting software for which the original source code is made freely available and may be redistributed and modified.

Pi- 3.14

PsyOPs- Pertaining to Psychological Operations according to military doctrine or civilian education.

Ransomware- A type of malicious software designed to block access to a computer system until a sum of money is paid.

Retrans Unit- A single antenna array unit to re-amplify the incoming signal as hop to it's targeted destination in a stream to avoid interception.

Server- Mainframe node of a network along with remote servers that act as an extension of the mainframe server to provide a service from a remote location.

SINGARS- Single Channel Air Ground Radio Signal. Project.

Soup- See “Loop”

Stimulus- Something that incites to action or exertion or quickens action, feeling, thought, etc.

Subliminal- (of a stimulus or mental process) below the threshold of sensation or consciousness; perceived by or affecting someone's mind without their being aware of it.

Subsonic- Below the frequency, pitch, and volume of individual human hearing, that produces a subliminally induced affect.

VoIP- Voice over Internet Protocol

WAN- Wide Area Network

MIDI- Musical Instrument Digital Interface.

Telepathy- (within the scope of this report) Telepathy is a manner of communications that emulates or simulates the telepathy “super power” ability.

1.) The supposed communication of thoughts or ideas by means other than the known senses.

Telepathic- Of a telepathy type.

Wavelength- 1.) The distance in the line of advance of a wave from any one point to the next point of corresponding phase

2.) A particular course or line of thought especially as related to mutual understanding

3.) A unit of measure on medical instruments in reference to the recording of activity in neurol;ogical studies

VPN- Virtual Private Network




Sources

https://www.opensource.com/resources/what-open-source

https://www.opensource.org

http://www.computerhope.com/jargon/b/bustopol.htm

http://www.dictionary.com/

http://www.google.com

https://www.wikipedia.or/network/bridging

http://www.idoceonline.com/definitions/foul/play

http://www.merriam-webster.com/dictionary/wavelength

Hacking Exposed Network Security Secrets and Solutions 7th edition- by Stuart McClure and Joel Scambray.

Network Hardening Network Security- by John Mallery and Jason Zann.

Merriam-Webster Computer Dictionary 10th edition by: Brian Phaffenberger

www.crutchfield.com/ISEO-rgbtcspd/learn/learningcenter/car/crossovers.html




P.S. I want to change the look of what I mean by "hypnosis." I'm guessing that the hypnosis is shallow like a lucid conscious state type hypnosis. I guess for ease of manipulation. Often it might be a controller, subliminal messenger, and subject for clandestine attacker network "operations." I highly doubt sanctioned by any government.

P.S.A. Add proxy network bridges defined as conductive hops to the list of equipment. It turns out a hop can be used as proxy via elevated conductivity to organic tissue. I suppose this type of "use" would depend on the conductivity of the subject upon the target subject.

I'll continue to update.




*** This report was a hasty observation annotation that took 2 years to make sense of the perpetual state broadcasting and, is a simultaneous log of reflex response to network broadcast stimulus.***