Compare & Contrast
Compare & Contrast
There are legions of folks out there that think an untestable sky wizard poofed the Earth and humanity into existence, just like there are legions of folks that think "zapping" and "voices in the head" can only be explained by hallucinations.
When encountering the latter, that are ignorant about energy weapons, and resistant to open-handed education, it can help a target's arguments/rhetoric to compare their stances to the former, those that are ignorant and unaccepting of the theory of evolution.
For example:
(A: Creationist Christian/Evolution denier)
(B: Directed energy weapon denier)
A: You think natural selection perfectly accounts for the fossil record, instead of the devil burying dinosaur bones to test our faith? You need Jesus.
B: You think energy weapons perfectly account for all of your symptoms, when the diagnostic process makes no attempt to test for them? You need medication.
A: Why learn evolution when I already know that God did it? Checkmate, atheist!
B: Why learn about neuroweapons when I've already assumed a brain disorder?
A: Who can even understand evolution anyway? A creation myth suits my simpleton worldview.
B: Who can even understand energy weapons? My world view would collapse if it wasn't hallucinations.
A: Oh no no, I'm sure that God did it, just look at this Genesis chapter!
B: Nevermind your well-reasoned argument, I'm sure that's mental illness. Look at this case law!
A: Why are there astronomers when it's obvious there's a firmament for the stars?
B: Why employ directed energy R&D engineers when that's obviously schizophrenia?
A: Everyone knows the Earth has corners, and is therefore flat, because it says so right here in the bible.
B: Everyone knows that unethical human experimentation could never happen with energy weapon satellites, so those claiming to be targeted are therefore delusional, because is says so right here in the DSM V.
A: I hear God's voice, and Jesus is my copilot. I've spent my Sundays with others of the same mindset, and we gather to reinforce our faith in the divine.
B: I hear V2K, and they try to deceive/coerce me with ruses/threats. I've spent time in a psychiatric ward, where they say I'm paranoid, and I go to treatment until I'm "restored to competency".
A: She's a witch because the inquisitor said so. There's no other reason but witchcraft for bad weather.
B: She's schizophrenic because the psychiatrist said so. There's no other reason but hallucinations for this set of symptoms.
A: I speak to holy figures with telepathy. My life revolves around religion. I'm a pillar of the community. I'm Christian.
B: I'm a synthetic telepathy test subject. My life was systematically destroyed for speaking science & technology truths to power. I'm financially crippled and homeless. I'm diagnosed.
Examples feigning ignorance:
1. "I believe everything I hear, as that's how God's plan become known to me. What the hell is V2K? Like anyone could ever impersonate God. That's preposterous! Nice try Satan."
2. "I give my life to a greater power, and let Jesus take the wheel! Some targets say they can be body controlled against their will via non-consensual implants? That's scary as hell!"
3. "If you feel a directional heating sensation from below, it's the flames of Hades licking at your heels, a warning from the heavens. Dielectric heating is schizo nonsense."
4. "Like anyone would put a V2K payload on an energy weapon satellite. The only way to deliver a 'voice from the heavens' is when a supernatural deity figure gives us commandments!"
5. "V2K is too cruel to be real, just like gas chambers."
6. "Do you really believe all these reputable news articles, patents, and military press releases? Clearly you need a copy of this iron age holy book, from which I've derived my deeply held personal beliefs."
7. Who needs advanced electromagnetic concepts when they can just believe in space magic? That's so complex that it must be a delusion, just like engineering."
8. "You're saying medication doesn't work when the source is external, and instead the solution is shielding? So you need medication? Nice try scientist."
Trolling is a art
You may have thought those hours/days spent on 4chan and other image boards, social media, and shitposting forums was wasted time that you could never get back -- au contraire.
Turning the tables on the operators of neuroweapons is not only fair play, it's great for your morale as a target. While none of this should be spoken aloud or physically acted out, if you are being subjected to synthetic telepathy, you can bullshit via the brain-reading component, without moving a muscle.
If you laugh at your own jokes, don't partake (or hone those stone face skills), because even humor can be a weapon, if you laugh out loud at the wrong moment.
It's fun/funny defensive counterintelligence.
Whatever you do, do it for the lulz.
How will they even stay mad at you?
See also:
Input Starvation
Anticensorship Adlibs
Qualifying for Social Programs
For those that own firearms, this is a difficult or unacceptable choice, as accepting certain mental illness diagnoses will prevent you from possessing firearms permanently. However, if you don't own guns, this should be an easy choice, as housing and income programs open up to you, if you allow yourself to be labeled as having a mental illness, even though you understand that what's happening to you is an external stimulus from energy weapons.
When being targeted undermines your work and housing, describe auditory hallucinations and "zapping" symptoms to a mental health professional that can diagnose you, and take that paperwork with you to your county's housing authority, DSHS, and the Social Security administration. You as a target are not lying here, you are describing real symptoms, and allowing the system to draw its own conclusions. Describe your symptoms to social workers, and provide the supporting documentation from your psychology evaluation.
For example, in Washington State, you can qualify for housing programs and Social Security Disability Insurance (SSDI) income. These programs can save your life as a target, at the sometimes low cost of allowing yourself to be labeled as suffering from schizophrenia spectrum disorders.
Input Starvation
At first it can be difficult to accept that wireless/remote brain-reading is being used, and not keyboard or microphone input from a compromised device. Eventually it becomes clear when no such devices are present, and the V2K voices are still responding to "thoughts" or your internal monologue.
Given this realization, an effective way to make the V2K voices shut the fuck up is to clear your mind or practice meditation. Without input from your brain, the chatbots, AI, or programs have no input strings to formulate a response to, like stopping all your typing into the text input area of a chatbot app. I've found that imagining deep space, being surrounded by a void of darkness, with no stars or other objects present -- like looking out a window on DS9, but into a starless night -- will provide relief from the flood of V2K verbal diarrhea.
While I do not practice meditation, those that do would likely get similar benefits, as long as they are in an otherwise quiet environment, free from distractions and other folks' voices, which could also be used as input.
See also:
Feigned Traditional Surveillance
Remote Brain-Reading Capability
Synthetic Telepathy Capability
V2K Chatbot Capability
Electronic Music
If you experience V2K, intense piercing noise, or other auditory harassment, listening to loud music without lyrics is a good way to overpower and drown out the unwelcome gibbering and noise.
I'd recommend a set of high quality headphones or earbuds, combined with any music source device, from smartphones to standalone iPod style players. Electronic, house, dubstep, glitch, and other beepy boopy robot noises work the best to overpower V2K babble, but just about any genre will work otherwise. Listening to music with lyrics risks the sadistic operators seeing that as an invitation for a repellent V2K sing along.
Examples of electronic music:
deadmau5, Skrillex, REZZ, Feed Me, MSTRKRFT, Daft Punk, Nine Inch Nails, KMFDM, Pendulum, The Prodigy, Bassdrive.
Bluetooth Earpiece
For this to work, you do not even need a functioning device in your ear, so you could buy a broken earpiece off of eBay.
I'm suggesting, those those of us that have V2K voices, that a bluetooth earpiece be worn in public and the workplace, so it can be used as a prop in a ruse. If you find yourself blurting out responses out loud, to something that only you can hear in your head, you can spare yourself social embarrassment by blaming it on your wireless earpiece. This will probably only work a few times, before non-strangers start reminding you to remove your earpiece, so it's important to view this as a temporary crutch while you work on your silent stone face skills. For random people in public spaces who catch you talking to yourself, pointing to your occupied ear has an unlimited number of uses.
Deniability Deterrents
When operating energy weapons covertly, the name of the game is deniability, and as a target, you can prevent some abuse by arming yourself with tools that strip the operators of their coveted deniability.
As a cheap feint, targets can make loop antennas in their windows from 1/4in copper tape, to give the impression that they're monitoring/analyzing for directed energy bands like radio and microwave. For much more money, they can purchase a spectrum analyzer to attempt to find the responsible frequencies, such as a RF Explorer or other wide band SDR.
For directional heating from the side, a FLIR (Forward Looking InfraRed) camera aimed at the target, would record skin heating for evidence, likely causing energy weapon operators to cease and desist, instead of being exposed with undeniable footage.
See also:
FLIR as Medical Imaging
On Signal Hunting
Directional Heating Capability
Ultrasonic Noise Capability
Stand Your Ground
The weapon/channel operators will purport themselves as an unstoppable force, so targets should steel themselves and be like stone, an immovable object. Neuroweapons are a pinnacle of power, and power corrupts, so the operators may often act like totalitarians that don't take no for an answer. They'll act like unwelcome strangers that try to tell you how to be, in your own home, after kicking in your front door -- they commit the ultimate privacy violation with non-consensual synthetic telepathy, and then act like you owe them politeness and information.
You owe them nothing but retaliation.
Many states have de facto castle doctrine, which essentially grants the legal use of force within one's place of abode, against anyone that forcefully "breaches your castle's walls". The same concept applies to your brain/mind. They are in your cranium without your permission, so you have the ethical right to destroy them: feed them lies, as they are your enemy. Say or think fake numbers while punching in your PIN codes, combinations, and passwords, out of pure spite (as target should adopt multi-factor authentication methods). They will act like self defense is an aggression. They will demand compliance, and while you're fucking them off, explain that they're anonymous cowards wearing masks, or get creative with your own favorite insults.
They will say "you have to" do something. ...you don't.
They will say "you must" do something else. ...you don't.
They will threaten you.
They will threaten your friends and family.
They will try reverse psychology.
They will threaten to drop the universe on your head.
They will threaten to level the building that you occupy.
You will become intimate with fear, but you will be unmoved. You will find healthy-enough coping skills to handle the stress, because taking orders means you are crazy.
Your brain, your body.
Your life, your choices.
Not theirs, not ever.
See also:
False Dichotomies
Shit Totalitarians Say
Ignoring Anonymous Threats
"The Chosen One"
On Neverending Torment Claims
Securing Your Accounts
Mock Executions & Suicides
Anticensorship Adlibs
While it's usually a better idea to quiet your mind (See: Input Starvation), as that is a calorie-free and non-exhausting option, sometimes it's better for morale purposes to give the synthetic telepathy channel a torrent of offensive backlash by using your internal monologue to verbally eviscerate the operators. It's helpful to think about the two-way channel as if it were an IRC chat room, where there are operator/administrator bots that use regex patterns to mute, kick, and word replace user sentences and auto-censor "the seven words you can never say", from users like you, the target.
In my experience, I found that being intensely offensive sometimes resulted in peace and quiet, and always helped my morale. Knowing that there are banned words, and words that are auto-replaced with non-offensive words, one can work around the censorship with sound-alike words and syllables -- meaning you can break a word down into smaller pieces, and use non-offensive words as pieces of longer, intensely offensive words and phrases.
For example,
While I'm an LGBTQ ally, I've had to listen to some folks that act like weaponized rapist homosexuals, and I found that they really don't like being called the combination of the yellow-clad female from Cowboy Bebop (Faye), and the name of the source control tool that github gets its name from (git).
While I'm a member of antifa organizations, for the purpose of dodging abuse, I've pretended to be both black and at other times a white nationalist, by dropping the combination of the joint at mid leg (knee) and the name of Invader Zim's robot pal (GIR).
While I'm a male feminist, I've found several variations of the word that rhymes with hunt, by replacing letters with sound-alike letters, double letters, and interspersed with silent letters.
Remember that you're fighting against automated pattern matching algorithms, and you too can find avenues into offending the shit out of folks, improving your morale, and avoiding some of the abuse. Good luck!
See also:
Input Starvation
Word Replacement & Sentence Clipping Capability
On Hunting Operators
Targets should not even consider doing this until they have fully mastered and accepted all the feints, ruses, and deceptions outlined within this guide. Trusting your deceived senses and making one mistake of judgement, can lead to the death or ruin of an innocent. Before emulating the Punisher, targets must keep all of the following in mind:
- The operators can impersonate nearly anyone, and can feign localized harassment. It'll seem like neighbors. It probably isn't.
- How does one hunt operators that don't need consoles or terminals, and instead utilize the implant-free augment of wireless brain-reading?
- How does one go about hunting "rouge" code?
- How does one hunt an artificial intelligence that isn't meant to be found? How could the developers be brought to justice?
- How can civilians covertly procure and operate wireless EEG data recovery devices, and use that data to feed BCI bayesian branching algorithms to recover words and "thoughts", in order to establish guilt?
See also:
Recognizing Deception Chapter
Wireless Augment Capability
Directional V2K Capability
On Signal Hunting
Another activity that seems like a great idea (because a smoking gun of undeniable evidence is compelling and valuable to law enforcement), but the reality is likely to be that you're left empty handed after investing thousands of dollars on spectrum analyzers and similar signal finding equipment, like frequency counters, etc.
These pitfalls are why I instead recommend electromagnetic shielding, as it will still be an effective countermeasure, even when you're unable to find the signal/frequency/energy responsible.
Do Not Believe What You Hear
This topic should be obvious after reading through the capabilities described in this guide, yet there are still many folks that need to be constantly reminded:
If you're a target, YOU CANNOT BELIEVE WHAT YOU HEAR!
Conversations in-person are good, as are secure device-based calls or messages, but if you are only hearing it in your head (or like it's directional "through the wall/floor/ceiling/window" -- some folks continuously fall for this version of V2K), and are acting like it's genuine, you are FUCKING UP BADLY. Get yourself a tattoo of a crossed out ear if you need to. Seriously, it's NOT your fucking neighbor, you idiot. STOP IT.
If you are getting excited by what only you can hear, or gibbering to yourself in response, you will be assumed to be mentally ill, because let's be honest, it'd be impossible to tell the difference between that behavior and a genuine schizophrenic. Professionals will not care that it's "airborne" (as in, over the "airwaves"), and many professionals will even associate the external stimulus claim as yet another hallmark of mental illness.
So when only you can hear it (or even, a small group), it is NOT genuine enough to action. No recordings? No action.
Neuroweapon operators will often try to goad or suggest targets into saying shit out loud, which IS recordable and observable, obviously. So in addition to not BELIEVING what you hear, you should never REPEAT verbatim what you hear, either, because saying certain things equals a felony, or paints you as someone that you are not.
Even when the target is savvy to ignoring manufactured auditory phenomenon, I get the impression that some professionals/contractors involved with directed energy weapon abuses (perhaps only as pawns/patsies/puppets who will believe everything they hear, like clockwork), are forgoing the collection of recordable evidence, and are instead trusting what they hear as "evidence" that's "coming from" their target, because they can't accept that their sense of hearing is being deceived. Who would dare do that to THEM? This meta game could be enabling the abuse of targets who are only being made to "sound bad" in order to justify despicable violence, and it could also be enabling (forgive my serious LOTR paraphrase) one TLA to rule them all.. all that TLA would have to do is convince all the others that the V2K voice in their heads is genuine, perhaps coming from "their own" covert command structure.
This type of vector is why I came up with my cloned authentication fobs idea, which could be used for identity validation, even over exotic channels such as synthetic telepathy. I suspect most unaware folks would accept "things only that person would know" as "proof" of identity.
See also:
On Believing Kindness
Synthetic Telepathy Capability
The Long Distance Game
Artfully Dodging Hammers
The bullshit artists that operate neuroweapons, and less sophisticated directed energy weapons, will attempt to make you look like a nail, to a trifecta of hammers: law enforcement officers/courts, legal professionals, and psychiatrists/mental health professionals. These groups will largely assume mental health detriments when faced with victims of unethical energy weapon experimentation, and that is the deniability that the operators of neuroweapons so badly want. Place a targeted person in front of the vast majority of these groups, and they will look like a nail, and get treated like a mental health crisis in progress (and as potential crimes in the making), likely to get a target prescribed antipsychotic medication they don't need, because they aren't actually hallucinating. However, even though technology manufactured illusions and voices are not genuine hallucinations, they must still be acknowledged as something that only the target can hear or sense. Then, once a target is able to accept that their senses are being deceived, they must work on their stone face skills, to prevent themselves from reacting visibly. Understanding is the first step to acceptance, and only with acceptance can there be recovery. Because when you are still reacting visibly to what only you can sense, professionals will perceive you as hallucinating (when you're not), and will likely attempt to treat you with a class of drug intended to resolve hallucinations (which won't work). This type of medication can be forced upon you by a court, who widely view energy weapon explanations as purely a delusion.
To avoid this outcome, you cannot be perceived as hallucinating. You must also understand that psychiatry requires described symptoms, when there is a complete lack of visible symptoms. If you don't describe or display symptoms such as "zapping" (from directed energy), voices in your head (from V2K), or auditory hallucinations (from the microwave auditory effect), establishment professionals will not diagnose you with schizophrenia or other perceived delusional disorders.
Despite the operators pretending to be psychiatrists and legal professionals, brain-reading surveillance is NOT court admissable, nor can it be used in a forensic diagnostic process, in a psychiatric evaluation setting. Do not fall for the V2K bluffs. The facility possesses no means of calling out a lie of omission (i.e. no brain-reading equipment), and that lie can save your reputation, rights, and well-being from rampant malpractice.
Ignoring Anonymous Threats
With the understanding that without mutual authentication with visual validation, anyone talking via any channel (especially nonconsensual synthetic telepathy), must be considered to be completely anonymous. When evaluating the credibility of a threat, the anonymity of a non-authenticated individual must be taken into account, meaning the threat should be discarded as worthless if they refuse to mutually authenticate or otherwise make their threat credible.
Perpetrators that use synthetic telepathy technologies as a weapon will often impersonate authority figures, such as police and military, as a means of intimidation. Expect to be threatened with more outlandish and escalating tactics when you push back, but note that they will always refuse authentication. You have to ask yourself as a target, that if they were to threaten many people in the same way (such as death by degrees) and follow through, would there be anyone left for them to threaten? Their power structure would collapse if they carried through.
Remember that high technology does not equal trustworthy, and just because someone has the means to put their voice in your head, does not mean that you must take their word on their threats and assumed identity. Not even when they threaten your life, while pretending to be your commanding officer, an intelligence agent, or a head of state. Not even when they threaten someone else's life, as they pretend to be a celebrity, grandparent, or politician. As a target, avoid eating the big lie of these impersonation tactics.
See also:
Non-credible threat
From "When Things Fall Apart" by Pema Chödrön:
Once there was a young warrior. Her teacher told her that she had to do battle with fear. She didn't want to do that. [...] But the teacher said she had to do it and gave her the instructions for the battle. The day arrived. The student warrior stood on one side, and fear stood on the other. The warrior was feeling very small, and fear was looking big and wrathful. They both had their weapons. The young warrior roused herself, and went toward fear, prostrated three times, and asked, "may I have permission to go into battle with you?". Fear said, "Thank you for showing me so much respect that you ask permission."
Then the young warrior said, "How can I defeat you?". Fear replied, "My weapons are that I talk fast, and I get very close to your face. Then you get completely unnerved, and you do whatever I say. If you don't do what I tell you, I have no power. You can listen to me, and you can have respect for me. You can even be convinced by me. But if you don't do what I say, I have no power."
In that way, the student warrior learned how to defeat fear.
--
It's like inviting what scares us to introduce itself and hang around for a while. As Milarepa sang to the monsters he found in his cave, "It is wonderful you demons came today. You must come again tomorrow. From time to time, we should converse."
We start by working with the monsters in our mind. Then we develop the wisdom and compassion to communicate sanely with the threats and fears of our daily life.The Tibetan yogini Machig Labdrön was one who fearlessly trained with this view. She said that in her tradition they did not exorcise demons. They treated them with compassion. The advice she was given by her teacher and passed on to the students was, "Approach what you find repulsive, help the ones you think you cannot help, and go to places that scare you."
Not Going Quietly Into the Night
Let folks know that you're mad as hell, and you're not going to take it anymore. Find ways to wordsmith your rage into powerful talking points. Condense your pain and struggle into one page posters, elevator pitches, crucial conversations, and social media posts. Take care not to "incite violence" or level specific death threats. Wear a literal mask on the streets, and a mask of anonymity online, as those in power will attempt to crush your speech and strip you of your tools of force through all available channels.
Energy weapons are some of the options in the establishment's arsenal, and they will use them to attempt to call folks' mental health and right to posses firearms into question. Most mental health professionals will instantly assume hallucinations and schizophrenia from symptoms of "zapping" and V2K, and the technology operators are well aware of this fact. Know that you should never, under any circumstances, speak about energy weapons or the capabilities used on you, to anyone that works in the field of psychiatry. If you are ever forced into speaking to one, you should deny everything. Do not think for a second that you will be able to teach them about energy weapons. Not only can they not help you, as a target of energy weapons, they will almost certainly use your symptom descriptions to permanently strip you of your right to bear arms by diagnosing you as schizophrenic. Many folks truly find it inconceivable that "zapping" and V2K are anything but a brain disorder. Be very careful who you say these things to, without a mask or anonymity.
Energy weapons are a tool of oppression, and targets are treated like slaves, witches, pariahs, and infidels. Targets could find allies in the Black Lives Matter movement, and antifa organizations. Help plan the next CHOP/CHAZ or an alternative to 911.
We can do it better than this unjust clusterfuck.
See also:
Mass Disarmament
Organizing Chapter
Artfully Dodging Hammers
/r/DirectedEnergyWeapons Sticky Post
Automated Therapy
This topic is written for the possibility of white hat operators of neuroweapon platforms, who have a capability developer role, although it may be possible to create a chatbot-like app that's specialized in teaching targets healthy coping skills, without the fear of being assumed to be hallucinating or suffering from delusions.
A defensive/countermeasure call to arms, to those capable of accomplishing such a feat of programming. There is a need for a more immediate application of therapy, during crucial times when it would not otherwise be accessible, or too dangerous, given the symptom overlap with schizophrenia.
Imagine an AI/program, somewhat like the hologram medical doctor in StarTrek: Voyager, that instead provides on-demand therapy to targets of energy weapons, delivered via V2K, website app, or smartphone app. Like a healing white mage that's triggered to clean up the mess caused by a destructive black mage -- a running program instance counselor for every instance of psychological warfare AI/program.
If artificial intelligence or code can be designed to deceive, disrupt, and disable a target, then surely an AI/program can be designed to heal, restore, console, and teach acceptance of the dark and morbid realities of neuroweapons. Given the current state of surveillance, such a countermeasure could be automatically deployed wherever PsyOps tactics are detected (such as someone's search queries suddenly matching bioeffect symptoms), to teach healthy coping skills in real-time, which would prevent many of the tragic outcomes that regularly afflict targets of unethical energy weapon experimentation, such as the belief that they have been inserted into a "Matrix" virtual world, or that they are surrounded by bad actors or "gangstalkers", because their senses are being deceived, and they have not realized it yet.
See also:
/r/OpenV2K
V2K Chatbot Capability
Phosphenes Capability
Technostalking Capability
FLIR as Medical Imaging
While seated or laying down in a previous apartment, I was feeling a directional heating sensation, that was initially coming from below, and then later on (after my move to a different residence), was hitting my body and head from horizontal angles. I had started experimenting with sheet metals in my apartment in 2016, thinking that perhaps I had a sadistic neighbor that had aimed a magnetron (the microwave generating component in a microwave oven) through their ceiling (my floor). I found that solid copper sheet metal, applied to the bottom of my bed frame and seamed together into one mattress sized sheet, completely defeated the artificial heating sensation that I was experiencing, that felt like a heat lamp that could reach me through the floor.
Months later, while living at the new address, I again started feeling directional heat, but now from side/horizontal directions, which proved to be problematic for an electromagnetic shielding solution. I had the idea that perhaps a FLIR (Forward-Looking InfraRed) video camera could record the heating of my skin, by aiming the camera at myself, which would make for compelling evidence of being targeted with directed energy.
After ordering an expensive FLIR video camera online in 2017, I was astonished when the directional heating sensations abruptly stopped, the same day my order arrived in the mail. I wanted them to continue so I could record evidence, but if the deterrent of being discovered by one of these cameras will prevent perpetrators from hitting targets with directed energy, then I advocate for FLIR video camera ownership. What is your health and well being worth?
Note that you cannot aim the FLIR video camera at property or buildings that you do not own/occupy, as the infrared band conveys so much information, that viewing/recording a private property legally constitutes a search. This action now requires law enforcement authorities to acquire a search warrant before surveilling a private property with infrared video -- so don't aim your new FLIR video camera at your neighbors' houses.
EMP Devices
Some targets claim to have unwelcome cranial implants, and this topic is intended to acknowledge that electromagnetic pulse generating devices could be a possible remedy. The intent is to use the EMP as a means of destroying the integrated circuit transistors present in the implant, permanently disabling all capabilities of the device.
Note that implant claims are also a commonly perpetrated deception toward targets, and may merely be a misdirection, intended to consume the target's time and money with fruitless medical imaging sessions (and EMP device costs!).
Legal notices:
- If you build an EMP generator large enough that it interferes with communications equipment, you can be charged with operating jamming equipment by the federal government.
- If you damage someone else's property (cars, computers, TVs, phones, electronics, etc) with an EMP discharge that travelled through your/their walls (even when using the EMP generator as a medical device), you are legally responsible for the damages.
- As with firearms/explosives, if you possess component parts that are illegal when combined, and can be shown to have the intent of combining and using them, I imagine similar charges might be leveled at someone with the component parts of an EMP generator, and non-medical intentions.
- EMP generators are not destructive devices per the BATFE, NFA, and GCA, as they do not contain explosives, nor do they push a physical projectile. I cannot find an instance where EMP devices must be registered as weapons.
See also:
Types of electromagnetic pulse
Hackaday DIY EMP generator
ATLAS-I (largest NNEMP generator built)
Securing Your Accounts
For banking, job sites, email, instant messaging, hosting/certificates, and social media accounts for sites such as reddit, I recommend that targets use the following authentication process, which will prevent recovery of your plaintext password, even while being monitored by malicious brain-reading, "remote neural monitoring", or synthetic telepathy technologies:
When you need to make your unknown managed passwords portable:
1) Purchase a Yubikey compatible with your device(s).
2) Add the new Yubikey to your password manager account.
3) Download the password manager app to your device(s).
4) Launch password manager app, type account/password.
If using an unknown master password in KeePass, use a USB debugging adb shell to send the password without typing, or a less secure method is to use a secure email account, and copy into the desktop web app and paste from the mobile app.
5) Connect Yubikey to device, touch contact point or use NFC.
6) Logged in.. copy and paste needed passwords into mobile apps.
Electromagnetic Shielding
Zero Knowledge Processes
Since this guide covers technologies that have the capability of remotely reading one's pre-speech or internal monologue (thought identification, brain-reading, remote neural monitoring, synthetic telepathy), additional security measures must be adopted by targets, as even highly complex passwords become worthless, if they are not handled properly.
Any password that a target can instantly recall from memory should be considered compromised, so such a password must be combined with an additional factor of authentication, such as a chip-enabled smartcard, a yubikey or nitrokey, and/or a smartphone authentication app such as Google Authenticator or Authy.
For passwords that do not need to be remembered, such as service accounts for scheduled tasks/cron, targets should generate random strings of complex character sets, and never once read or manually enter the generated password, opting instead to copy/paste using the clipboard. As an administrator, you can simply change the password later instead of remembering. In Windows Server 2012 or newer environments, Group Managed Service Accounts should be used as often as possible, as they use Kerberos exchanges with the Domain Controller to generate 240 character values, instead of manually rotated passwords.
Further, to prevent Van Eck phreaking (the act of reconstructing the screen image of an LCD from stray electromagnetic emissions -- most LCDs are not shielded to prevent this), the generated password should never be visible as plaintext anywhere, on any display device. Note that one can still copy passwords (CTRL+C) from active fields in windows that have been dragged off the edge of the desktop -- otherwise hiding their contents from screen snoopers.
Preview of the 'Cloned Authentication Fobs' topic:
As a means of ad-hoc identity authentication, cloned TOTP authentication devices (or rather, their cloned seed keys) can be used, when public key infrastructure is not available. For targets, they should have adequate device shielding to prevent Van Eck phreaking from recovering the generated code. With proper usage, these cloned devices are reusable zero knowledge TOTP code generators. As long as both devices remain in sync with a real time clock, they can be used as a means of identity validation for the cloned device owners.
See also:
Zero-Knowledge Protocol
Zero-Knowledge Encryption
Securing Your Accounts
Cloned Authentication Fobs
Why You Should Never Use Google Authenticator
Defensive Counterintelligence
Said in the simplest terms, Do. Not. Share.
Participating in the new/novel conversation medium of synthetic telepathy makes some people forget that they are speaking to a completely anonymous operator on the other side. High technology does not equal trustworthy.
The operators (and their AI counterparts) will pretend to be friendlies, while they collect HUMINT from you, while you're within the walls of your own home or apartment.
When you do share, you should be lying constantly.
Provide bogus hit confirmations for pulses of directed energy, such as "Ow, fuck you!" via your pre-speech, when you've felt nothing. Vice versa when you did feel it, and sprinkle with genuine hits to intentionally ruin their dataset.
Provide bogus details about your friends and family.
Provide plausible but wrong information that you believably feign to be true and genuine.
Remember, you've never mutually authenticated or visually validated your completely anonymous conversation channel. They could be an intelligence apparatus or military psyops neighbor down the block that're dreaming of a court-martial. They could also be any other bad actor, pretending to be any TLA they wish, and threatening to stomp you and your family's guts out for not complying with their ruse.
"In wartime, truth is so precious that she should always be attended by a bodyguard of lies." -Winston Churchill
Conditioning the perpetrators
This can be a monumental waste of time if you've been pitted against an artificial intelligence, as the operators can simply reset the AI's knowledge/behavior back to a default/canned state, in the same way that a hypervisor resets a virtual machine back to a saved snapshot.. so don't spend too much time on this.
However, if you are able to ascertain that your perpetrators/operators/programs are susceptible to conditioning: deceiving them via synthetic telepathy by mentioning false "most hated" behaviors or words, can often result in the program/operator attempting to utilize these "hated" phrases/behaviors against the target. For this to work, you have to do some acting to sell what sounds like a flip out in your pre-speech, to reasonably make an observer believe that they have found a repellent phrase.
For example, pick a harmless nonsense insult, that you wouldn't mind someone using against you constantly (because you're about to lead them to believe you hate it), like "clown shoe" or "slobber goat". Really truly act like you hate those insults, and you might just avoid some abuse, because the operators are too busy (or their program is now preoccupied with this new "highly effective" taunt) calling you "clown goat" to say anything else that's actually hurtful.
Cloned Authentication Fobs
Prototype drawing: https://imgur.com/mVPIvbY
In the context of identity validation over any communication channel, manufacturing pairs of "two factor fobs", that always generate the same 6-digit code when their button is pressed at the same moment. This grants users the knowledge that the other side of a channel possesses a clone of the fob (device with secret key) they're also holding. This authentication process is intended to prevent impersonation tactics where visual validation or other mutual authentication is not possible. When a bad actor is unable to produce these digits (even while brain-reading you to recover plaintext), their impersonation ruse will fall apart.
Process to use these fobs across a communication channel:
0. Prior to communicating remotely, two persons would need to perform any one of the following:
a. Exchange cloned fob hardware or single-purpose phones in-person.
b. With this custom hardware, use IrDA in-person to generate and share a new key.
c. When using Android hardware, scan the same QR code key with both/all phones.
Note: Using any surveillable means to exchange the secret key is retarded.1. Phone call or other communications channel initiated.
2. Answering party picks up and challenges for authentication:a. Counts down from 3 and then states "mark".
b. Fob button is pressed by both parties while closed on the "mark".3. Only the caller/initiator opens their fob (not the answering party).
4. Only the caller/initiator reads the digits from their fob across the channel.
5. Answering party only then opens their fob, and confirms the digits match, or hangs up.
6. If confirmed, repeat countdown and fob button press, but this time the roles are reversed:a. Only the answering party opens their fob (not the caller/initiator).
b. Only the answering party reads the digits from their fob across the channel.7. The caller confirms the digits match their fob (second press), or hangs up.
Preventing channel take over after authentication process:
Depending on the form of communication being used, the parties may want to continue using the fobs after every statement made to the channel.
Otherwise, if this is not done, a bad actor could overpower a channel (e.g. handheld radio), and impersonate the other party, without digits.
For example, you could agree to read the last two digits from the fobs, instead of stating "over" after completing your statement.
This validates that the person you're talking to continues to posess the fob, and isn't being overpowered or man-in-the-middle'd.
Fun fact: I had this add-on idea while listening to dispatch radio chatter, while cuffed in the back seat of a Sheriff's vehicle.
Steps and caveats on using off-the-shelf Android hardware:
1. Purchase two or more Android devices at a retail store. They must have cameras (for QR code scan).
a. Install the Google Authenticator app on all devices via some method. (Offline How To)
2. Purchase a cheap netbook/laptop and install the below. These will generates key strings, which are used to generate QR codes.
a. Choose Offline Method to Generate Random Key Strings
i. List of random number generators
ii. Open Hardware USB RNG for Linux ($40 USD)
iii. USB RNG for Windows and Linux ($50 USD)
Note: The true randomness of the generated key strings is critically important.b. Choose Offline Method to Generate QR Codes
i. Firefox add-on
ii. Chrome extension
iii. Windows and Mac OS X application
iv. Windows application
Note: Everyone working with the generated key strings must make a point to not read the string, and immediately destroy it after use.3. Purchase copper flashing and electronics solder to craft small Faraday enclosures for the phones, to prevent Van Eck phreaking.
4. Either DIY build a shielded room, or talk a medical imaging technician into letting you use their MRI exam room for 5-10 minutes. This is intended to prevent the key string from being recovered from the netbook/laptop LCD screen, again via Van Eck phreaking.
5. Use the offline netbook/laptop to create truly random strings of characters, then copy/paste (do not type) the key strings into the QR code generating software.
6. Use the Google Authenticator app on the Android devices to scan the generated QR code. Immediately destroy the generated key string and QR code after scanning.
7. Place Android devices in their copper enclosures and exit the shielded room.
8. Phones are now usable as authentication fobs by using the process above. Device screen must be turned off or within a closed shielded enclosure, when fobs are described as being closed.
Because using Android devices presents multiple security attack vectors, one must take extra precautions when using them:
1. The antenna should have traces severed, as these devices will only be used offline. Blocks baseband attacks by air gapping the device.
2. Only operate within a Faraday enclosure or shielded room, as their stray emissions can reveal the LCD screen picture. Blocks Van Eck phreaking attacks by containing the emissions. See TEMPEST.
3. Use a bladeRF SDR configured as a GSM/LTE picocell, connected to a computer with a syncronized real time clock, to ensure the TOTP app has accurate time, without connecting to the cellular network. I suggest running a pigtail cable from the SDR directly into the Android device's antenna header.
4. Keep the devices physically secure (keep it within your sight, or on your person), as access to the phone hardware equals likely key compromise.
Securing Your Communications
These suggestions are made with the audience's assumed understanding that the "endpoint" of you, the human organism, can be monitored. Cryptography tools and processes are not effective for data privacy unless your phone/computer have not been compromised (through malware or Van Eck phreaking), and you are physically present inside a heavily shielded room or facility that prevents the recovery of plaintext from your brain.
Preventing Sleep Deprivation
Shielded Facilities
All hospitals with an MRI exam room, incorporate extensive RF/electromagnetic shielding in that room. The problem is convincing the staff to allow you to make use of the room for sleep/sanctuary, without them assuming the worst by calling security and psychological staff in response.
Sleep Aiding Medications
See Sleep Aides under the 'Treating Medical & Psychological Effects' chapter.
Shielded Sleeping Enclosure
Clamshell 4x8x4ft Enclosure Prototype:
The intent of this project is to design a twin-bed-size enclosure in SketchUp, with broad spectrum shielding coverage, with easy/pictoral build instructions, using inexpensive/cost-effective building materials, while only requiring minimal power tools and specialty tools, with a goal total build cost of around $1,000 USD, for aluminum.
For copper, the cost will be 3x to 4x higher for materials.
For Graded-Z (aluminum sheet, then copper sheet, then lead sheet), cost will be 6x to 8x higher for materials.
WARNING: Failure to properly ventillate this enclosure before falling asleep will lead to hypoxia, which can and will result in your DEATH. The copper heatercores, axial fans, and fan battery backup unit are REQUIRED.
Draft Materials List:
- 5x sheets of 1/4in MDF (4ft x 8ft)
- 10x indoor/untreated 2x4 boards (8ft x 3.5in x 1.5in)
- 2x 6ft steel piano hinges
- 2x boxes nickel-plated steel tacks
- 100x steel washers, 2x metal latches, 2x wood glue
- Bulk truss screws (1/4in), wood screws (1.25in & 3in)
- 2x 140mm-200mm copper heatercores for ventillation
- 2x Noctua NF-A14/A20 series axial fans for quiet air exchange
- 1x 12v fan alarm module to wake you up if a fan stops spinning
- 2x 12v fan power supplies to run fans and alarm module
- 1x 12v relay to run the 12v power supplies in parallel for redundancy
- 2x UPS to run one 12v fan power supply each, and beep to wake you up in case of blackout (or add a blackout buzzer)
- TBDx panels/rolls of copper/aluminum sheet metal
- TBDx rolls of copper/aluminum tape (2-3in wide)
- 50x feet wire mesh strip electromagnetic gaskets (or search, ebay, etc)
See /r/emshielding sidebar for sheet metal rolls/panels, conductive fasteners/tapes, and other useful shielding material links.
Draft Tool Requirements:
- Power circular saw, power screwdriver
- Hand seamer, hand tin snips, hand metal folding tool
- Measuring tape, tack hammer
Draft Optional Gravity-assist Open:
- 8x plastic enclosure-mountable pulley wheels
- 2x metal wall-mountable pulley hangers
- 50x feet of 550 paracord
Draft Step-by-step 3D Build Pictures:
https://imgur.com/a/Oc1Do
Draft Step-by-step Build Instructions:
1. Affix two full 8' 2x4 boards, side by side, to the top side and front edge of a sheet of MDF, what will become the bottom of the enclosure.
2. Cut four pieces of 2x4 board, each 40.75" long, and affix two pieces, side by side, at each side of the bottom MDF sheet.
3. Affix bottom 6ft steel piano hinge, and prop up a full sheet of MDF behind the bottom sheet, to be used to support the side pieces in the next step.
4. Cut 6x lengths of 2x4 board: 2x 46.25", 2x 44.25", 2x 42.75" -- place both 4ft square MDF end pieces, and fasten using 2x4 lengths as shown. Longest piece at front of enclosure, shortest at back.
5. Cut 3" from the end of two 8' 2x4 boards, then fasten the back MDF sheet you propped up in step 3, along with the 2x4s you just cut, as pictured. These 2x4s will become the top panel pivot point.
6. Affix top 6ft steel piano hinge to the top surface of the 2x4s installed in previous step.
7. Flip over the current structure, cut openings in either or both of the 4x4ft end panels for your ventillation heatercores (which must be outfitted with axial fans, to push/pull air from/into the enclosure -- recommend Noctua brand for silent operation. Then connect the fans to an Uninterruptible Power Supply unit or custom standby battery circuit, so you don't run out of air if the power goes out.), then apply chosen sheet metal to the current four faces of the outer surface of the enclosure, maintaining seaming around edges and corners.
8. Apply sheet metal to both remaining sheets of MDF, covering one face, and wrapping the sheet metal around the edges, creating a ~2" overlap on the opposite side. These panels will be attached to the piano hinges, to act as doors.
9. TBD
Aug 2019: See this post in /r/emshielding, for instructions on how to complete this prototype.