18

The United States on Dec. 16 placed trade and investment restrictions on dozens of Chinese entities over their role in weaponizing biotechnology and other U.S. innovations to bolster the Chinese military and to further its human rights abuses.

Among the 34 Chinese entities targeted was the Academy of Military Medical Sciences—China’s top medical research institute run by the Chinese military—alongside its 11 research institutes, for aiding the Chinese military with biotechnology, including “purported brain-control weaponry,” the department stated without elaborating on the technology.

https://mb.ntd.com/us-blacklists-dozens-of-chinese-biotech-firms-that-aid-military-including-for-brain-control-weaponry_715459.html

11

This is a catch all topic for these keywords: "Remote Neural Monitoring", "Havana Syndrome" and "BadBIOS".

The relation among them is that they are all weapons based on electromagnetic waves (radio) used by militaries for covert crimes against civilians on an ongoing total war. While there is some infighting between the operatives with access to these weapons, civilians make up a bigger proportion of casualties.

I will write something bellow to kickstart the topic, but it is not my intention yet to convince lay people of the existence of these weapons, but rather to welcome others in the known to cross-check findings.

Electromagnetic Spectrum Dominance

Anyone within range of phone radio towers is under total surveillance by advanced military covert radars.

Remote Neural Monitoring captures everything in their brains and their body movements, while Havana Syndrome induces brain damage. BadBIOS (hardware backdoors) captures everything in their computers and phones and can sabotage any computation, delete files or insert files.

Evidence of this can't be given by others because the operatives sabotage any attempts (see what happened to John McAfee), but one can investigate independently. Big groups like Microsoft who can deploy vast telemetry have a better shot. One of the reasons that Microsoft decided to push Windows 11 is because their telemetry has shown recurrent anomalies happening on older devices. But even Microsoft is gated by the Department of Defense refusing full collaboration. While Microsoft says Windows 11 and modern CPUs will give "security" to regular consumers at the same level used by the US military, the DoD refusal to let the public know why they are pushing for the physical removal of Chinese carrier network equipment indicates that, while they intent to secure their citizens from other countries, they don't intent to secure the citizens from the DoD itself.

NATO's push to add Cognitive Warfare as another domain of combat may mean that the truth about these weapons will surfaces as they move from the testing phase on guinea pig civilians to full blow deterrence inducing weapons like nuclear bombs. Countries like Chile have already proposed legislation about neural-rights, but the media has failed to pick up that their own neurons are under assault now, so public debate has been lacking. Maybe not for long, given how the pace of people who oppose the use of these weapons has been picking up.

11

WSJ has made a 13 minute video about how they used many bots to try to uncover how TikTok suggests videos. The video could have stopped at the first 30 seconds and it was all they would need to say, but they really want to deceive themselves and their readers about what is going on: TikTok taps into military surveillance that all who are within the range of a phone tower are subjected to. The same source for TikTok is also fed to terrorists who use it for crimes against humanity. A simple experiment with an air-gapped computer is all it takes to attest some of this, but unless you have been recruited to be part of the covert operations, you won't know the full extent of it, like I do.

Link to WSJ's video: https://www.wsj.com/video/series/inside-tiktoks-highly-secretive-algorithm/investigation-how-tiktok-algorithm-figures-out-your-deepest-desires/6C0C2040-FF25-4827-8528-2BD6612E3796

This suggests once again: journalists need not apply, the second american revolution needs only those who can act instead of only writing useless words.

20

I made for myself a feed reader that can visit pages that need JavaScript (with Puppeteer), make feeds from it (PHP script), make full feeds out of it and write the result to an email file (msg/eml). I then take these files to an air-gapped computer (no network ports, no radio dongles) and read it there with a localhost web stack and custom JavaScript that makes it easy to read hundreds of entries every day. The emails include images and even videos, so there is no need to visit the sites manually most of the time.

Besides learning what is written in all these feeds, I have come to learn what isn't written: the US military has access to all PCs (even air-gapped ones) by using radio to control all CPUs (BadBIOS). They use this for blackmail, sabotage and theft. All done by state sponsored cyber terrorists. This is the reason the US is insisting that countries don't use Chinese 5G: China has discovered what the US was doing and now can either do it themselves or block the US' radio transmissions - and the US doesn't want to lose their backdoors.

I also learned that the big social networks tap into the data mined by the US' military to surface recommendations in their timelines. TikTok was called a national security threat, but isn't the only one that is tapping the surveillance machine: Twitter, YouTube and Facebook are on it too.

I am willing to partner with researchers who want to replicate my findings and reverse engineer the malware they inject on the RAM of PCs. There is more that I haven't written here, but ask away and I will reply. For those who don't have the skills or don't want to face the danger of going against a corrupt military, but that still want to stand against the violations of Human Rights that are going on, just spread the word. Thank you.

21

Title gives my conclusion from empirical events I witnessed and inside info. PSP runs on the same circuit, but isn't the backdoor per se, which has been around for much longer.

The same way AMD was able to change the crypto algorithms for the Zen chip they licensed to China, they can change how the CPU behaves at any system, even those already deployed. This can also be used to sabotage any program or computation, making BadBIOS vastly nastier than Stuxnet.

American military made a grave mistake to partner with the morons of the Brazilian military, who are letting knowledge of this spread like a fire (and misusing it for petty profit and inside jobs to justify a police state). Israel, UK and France also have access, but are much more professional.