Estate Artistry - Homepage
  • Home
  • Project Portfolio
  • Customer Reviews
  • Power Washing is AMAZING !!!
  • Estate Artistry News
  • Blog
  • Tree Services
  • COMING SOON - Emmanuel Stone Product Page

CORONA-HOAX 
HAD ENOUGH YET?

This blog page, with all it's historical archived pages contains everything anyone would want to know about the pandemic crisis.  

I have also written two groundbreaking books.  The first was an international best seller that was BANNED BY AMAZON,  making it necessary to re submit it with a bullshit cover and title to get it past their censors.  After 3 months on the best-seller list they BANNED IT AGAIN AND STOLE MY ROYALTIES!

The original title was "
Covid-19 and Induced Anaphylaxis."  The covert title was "Curious?"

Inside I reveal information you won't hear anyplace else.  I explain exactly why and how ALL VACCINES cause injury.  

On April 9th, 2022 I self-published my second book, "What Now?" which includes a vax injury treatment protocol, but please DO NOT follow that.  While the book contains other good information, I have since been able to test the protocols effectiveness and found it to be lacking, however I have since learned what DOES work and in testing that I saw, and documented, extraordinary results.  The new approach reversed a terminal vaccine injury case. 
You can review my results here:

http://estateartistry.com/blog/reversing-vaccine-injuries  
Aeon-213 Capsule Website:  https://www.scalevitamins.com/ 

​If you or a loved one has had their health destroyed, I can help you.

PDF copies of both my books are free, just email me to get them.  "What Now?" print copies are for sale here:
https://www.printshopcentral.com/bookstore/book/what-now-recovering-from-a-tragic-mistake​ ​

Proceeds from book sales funds my work.  You do not have to buy one, but if you do it is the same as donating to me.  I thank you if you do.   

Email me for free PDF copies

Exposing the Bio-API - Part Five

10/30/2023

0 Comments

 
Before I continue, I want to thank anyone out there who is taking this material seriously and helping me focus more attention on it.  A big thanks goes out to Todd Callender who recently brought up this paper I am going through page by page, and the really incriminating one I found after that, on Infowars with Maria Zee.
 

TODD CALLENDER - BOMBSHELL DISCOVERY DOCUMENTS CONFIRM TARGETING POPULATIONS THROUGH WIRELESS TECH
https://www.bitchute.com/video/W3N9Cr9rmjtb/
 
I want to also give people the right perspective on all things AI.  AI is a novelty, more of a curiosity than anything else people purport it to be, this includes broad statements about where it is going and what it can competently do.  My guy feeling is reliance on AI will ultimately bring down the cabal trying to enslave us, because these people appear to be putting a lot of their eggs into an AI-dependant basket.
 
AI can, and is, being used effectively to skim and scam and generate propaganda that divides and misleads us all.  And by combining it with the near bottomless well of information the WEF's stakeholders collect, it is being used with great success to rig entire markets for their benefit, but when it comes to medical applications of the type being proposed all throughout documents and papers like this one, it cannot think its way out of a paper bag, and you need to understand that.
 
Here are a couple clips that expose just how dumb AI is in that respect:

 
THE AI REVOLUTION IS ROTTEN TO THE CORE
https://www.youtube.com/watch?v=-MUEXGaxFDA
and this: 
https://www.youtube.com/watch?v=DJoGm8c523M 
REALLY relevant parallels with copyright law and how computers ruin it, this is where your bio-API hacker exploits will ultimately go.

 
AI has also proved quite useful to thieves who don't care what encryption protection you think you have:
 
AI Helps Crack NIST-Recommended Post-Quantum Encryption Algorithm
https://www.securityweek.com/ai-helps-crack-a-nist-recommended-post-quantum-encryption-algorithm/

And the evil cavalcade of bio-weaponry technology continues rolling out in so many ways still.  Don't buy any of these fake cover stories about street lamp equipment defects.  These lamps are part of this system and they are popping up everywhere by design, not by accident.  They serve a specific function in all of this.
 
PURPLE LIGHTS ALL OVER TEXAS
https://www.bitchute.com/video/HZbFHBViNaQZ/?list=subscriptions
I mentioned one time I had to drive under two of these things on I-95 in a previous article.  They FRY you.  You can feel it, and they damage your eyesight.
 
And then there is this:
 
CELL PHONE TOWERS BLASTING OUT FREQUENCIES ALL OVER THE EAST COAST?

https://www.bitchute.com/video/qNLHrDmxbFTu/
 
This heat map shows the typical pattern of cell tower traffic ramping up throughout the day and tapering off at night, but when you eventually see it ramping up at night, THAT will be a sign of something very bad.  This technology makes people sick deliberately, and the paper I mentioned in the last post plainly discusses by way of multiple measurements how this effect is enhanced by darkness, so that is when they will use it, at night!

I hope this next bit makes you think twice before buying a fancy "smart" anything:
 
YOUR SMART TV IS WATCHING YOU
https://www.bitchute.com/video/J5JGKvEIU50m/
It's smart.  If you buy it, you ain't.
 
TIMELINE: COVID-19 VACCINES AND MYOCARDITIS
https://www.theepochtimes.com/health/timeline-covid-19-vaccines-and-myocarditis-5317985?utm_source=partner&utm_campaign=ZeroHedge&src_src=partner&src_cmp=ZeroHedge 
Is it sinking in yet?
 
The general public, the masses, generalizing, insist on looking up to their figures of authority for reliable information. They are deeply programmed that the truth must come from above, from someone in a position of power, because they've only assumed that authority would obviously know more than they could. After all, they are just a simple citizen, they say.
 
And they also wrongly assume that such authorities must always say the truth because they also assume that there is some kind of mechanism behind that would punish them if they didn't do so. And the worst of all assumptions is that those people in power have their best interests in mind.
 
They don't, and they have never had the best interests of the public in mind. They only have their own, in a heavily narcissistic way, and the interests of the people in power above them.
 
And the worst part of all this is that many people who are awake and conscious enough to know all this I just said still look up to official authority to make up their minds about whatever is happening near and far from them, also assuming that if they are not well informed, not knowing the latest news will affect their lives somehow.
 
To me, this is like having a gazelle mentality, always looking around for a dangerous predator. It is not necessary to be watching everything that is going on because if something is really important, you will know it anyway.
 
It is evident that, from a sheeple perspective, only stupid people—conspiracy theorists—question epistemic truth, as presumably defined by their narrow, authoritarian class. All such stupid people are unintelligent extremists who seek to destroy the social order they disingenuously call liberal democracy.
 
Anyone who uses the “conspiracy theory” label does so, not because they value the evidence, the facts or the dialectic, but because they will not countenance any challenge to their worldview or any dissent from their claimed authority.
 
The “conspiracy theory” charge is an authoritarian propaganda construct, intentionally created to censor legitimate, fact-based opinion.
 
It is time we stand up to the “epistemic authorities” and reject their elitist, authoritarian pretence of intellectual superiority.  It is time to insist that all evidence is discussed, that all the facts are established and reported to the public.
 
It is time to reject the state propagandist’s “conspiracy theory” canard.


This last thing is just a bit of humor that made me chuckle:
A 1953 NEWSPAPER STORY ABOUT THE FUTURE OF THE TELEPHONE - CHECK OUT THAT LAST PARAGRAPH
https://www.bitchute.com/video/nsoa1fHFJVRv/?list=subscriptions
I doubt anyone called this paper back then to complain about woke gay pride.  Those were the good old days.

Now, back to the journal paper…
​

​The next few sections clarify each of the items in Table 4 below:  (It is going to get pretty technical from here)
Picture
1) BIOFET BASED MOLECULAR RECIEVER
"Field-effect transistors (FETs) are a type of transistors that use an electric field to control the flow of current. FETs consist of three electrodes namely source, drain, and gate. In traditional FETs, voltage is applied to the gate electrode which in turn modulates the conductance between source and drain electrodes. The conductance is reflected as the voltage-current alteration in the output channel. FET based technology is now being utilized for affinity-based electrical sensing using nanomaterials (nanowires, nanotubes, and graphene) as transducer unit [30], [159]. FET transistors can be utilized for biosensing by replacing the gate electrode with a biofunctionalized surface called Biorecognition Unit (BU), for the detection of target molecules in the environment [79]"
 
So this is where they begin describing how nano-bio devices like biosensors are constructed, which helps you understand how they work, and once you know that you can begin to see where any given component has functional utility, what its specific capabilities and constraining limitations are.
 
"The BU contains receptors on the surface of the FET channel which binds ligands with intrinsic charges which result in accumulation depletion of carriers in the semiconductor channel, and hence modulation of conductance and current. The addition of BU in conventional FETs for molecular recognition makes them bio-inspired and is therefore called BioFETs. The bioFETs work on the principle of ligand-receptor pairing i.e., binding of a ligand (signaling molecule) to its receptor (receiving molecule) and to produce a response e.g., signal transmission. There a number of ligand-receptor pairs that can be used in modeling BU of bioFETS e.g., antibody-antigen, aptamer-natural ligand, natural receptor/ligand [160] depending upon the target molecule. Semiconductor materials like NW [161], single-walled carbon nanotubes(SWCNT) [162], graphene [163], molybdenum polymers(MoS2) [164] and organic nanomaterials like conducting polymers [165] can be used as transducer channel of bioFETs. Among NW materials, Silicon nanowire (SiNW) has been proven to be the best fit for bioFETs due to their low power consumption, high-speed sampling, high integration density, and high sensitivity [140], [166], [167]."
 
This is how a biosensor can detect the presence and specific amount of any given substance it is designed to detect and transmit information about.  Note that the materials that these biosensors are constructed with are also present in vaccine solutions, so everyone can stop asking the same questions over and over, like "why is that in there?" This is telling you why EVERYTHING in there is in there.  It does not matter whether or not anything is inherently harmful, since those responsible for making these vaccines and similar products are not at all concerned with your health.  They are all necessary precursors for the ongoing construction of synthetic nanobiological architecture. One of the main objectives of this covert global population experiment is to ascertain upper toxicity limits.  Another is to figure out what all can be done to a person  if they manage to avoid obvious exposures like vaccinations, but succumb to other basically unavoidable, therefore inevitable exposures.
 
" In this direction, Kuscu and Akan [78] have proposed SiNW bioFET based molecular antenna which receives information molecules as biochemical signals and converts them into equivalent electrical signals. The proposed model employs the theory of ligand-receptor binding and considers microfluidic advection-diffusion channel for the propagation of information ligands. The receiver model consists of three functional units. The Biorecognition Unit (BU) works as the interface for sensing the concentration of ligands. In the Transducer Unit (TU), ligand-receptor regulates the gate potential of the FET through the field effect resultant from their built-in current charges. The output unit shows the current flow as a result of the modulated gate potential. Moreover, an analysis and optimization framework has been presented by providing a closed-form expression for fundamental performance metrics, such as SNR and SEP. The proposed SiNW bioFET is capable of providing efficient in-device, label free and continuous processing of sensed molecules."
 
In other words, silicon nano-wire biosensors constantly communicate biometric telemetry to whatever collects it.

2) OPTICAL TO CHEMICAL BIOLOGICAL INTERFACE
"Grebenstein et al. [168] proposed a microscale modulator to transduce optical signals into chemical signals. The modulator is realized using synthetically engineered E.Coli bacteria that express protons into the environment upon stimulation from an external light source. Light-emitting diode (LED) of the modulator uses proton pump gloeorhodopsin (GR) to express light. The E.Coli bacteria change the pH level of their surrounding environment as a chemical reaction to an external light source. The proposed testbed achieves higher data rates on the order of 1 bit/min as opposed to previous proposals with data rates of 1 bit/hour."
 
Transducing optical signals into chemical signals:  Again this is the nuts and bolts of electronic drugging.  Optical signals are coming from one part of the nanobio system, like a cell full of Luciferase or a similarly enabled nanobot, and this light is interpreted as instructions for some other part, like a drug storage repository.
 
3) REDOX BASED CHEMICAL TO ELECTRICAL INTERFACE
"New research in biology has recommends the usage of redox as a global signaling modality. Authors in [169] have adopted an approach that is inspired by sonar, which access the redox information through collaborative electrochemical probing. Authors further utilize attuned electrical inputs that are coupled with diffusible redox mediators (electron shuttles) to access redox information in a local environment and generate complex but interpretable electrical output signatures. Redox (Oxidation-Reduction) reaction is also utilized for biochemical-electronic transduction mechanisms in a number of proposals [170]–[174]. A wet lab interface prototype has been proposed recently in [173] for transducing chemical signals into electrical signals by the virtue of redox modality. The interface prototype device consists of a dual film with inner film contains hydrogel-based film entrapping E.Coli bacteria and the outer film consists of a redox capacitor to amplify electrical signals. These cells are engineered as reporters, which respond to the presence of a certain molecule (signaling molecule AI-2) by converting the redox inactive substrate 4-Aminophenyl β-D-galactopyranoside (PAPG) molecules into redox-active p-aminophenol (PAP)."
 
Just more nuts and bolts ways of talking to your central nervous system.

 
4) FRET BASED UPLINK/DOWNLINK BIO CYBER INTERFACE FRET
"(Fluorescence Resonance Energy Transfer) mechanism has been adopted by Abd El-Atty et al. [175] to model uplink/downlink bio-cyber interface for the Internet of bio nano things. In FRET-based optical sensing, bio-cyber interface is designed for targeted drug delivery applications of IoBNT. The downlink of bio-cyber interface is designed by adopting spreading principals of SIR (Susceptible, Infected, Recovered) epidemic scheme and decode forward (DF) basis. Three types of nanomachines are used in the downlink model to realize the targeted drug delivery namely nanoreciever, nano transmitter (Infected) and nanorelay(Susceptible) according to SIR epidemic scheme. The recovered nanomachines are ones that have transmitted their exciton to the nano receiver. The uplink is designed by considering two types of nanomachines namely nanosensors and nanoactuators. Uplink signal notifies the medical server about successful drug delivery through bioluminescence reaction."
 
In other words, a way to rat you out as part of a target group, attack you, and report back to base a successful or unsuccessful exploit.
 
5) SECURITY CONCERNS IN BIOLOGICALLY INSPIRED BIO CYBER INTERFACE
"Currently the research bio cyber interface security is immature and there is a minimum published literature in this field. Reference [176] have presented the possibility of ML based adversarial attacks for biologically inspired bio cyber interface which are presented below. Details of possible generic attacks on bio cyber interfaces can be found in Section V-B."
 
Duh.  It should be unsurprising that nobody is funding much research on how to protect or defend you, because this is obviously all about creating biologically disruptive technology and NOT about limiting the extent of the destruction.


6) MACHINE LEARNING ADVERSARIAL ATTACKS
In the case of bio-luminescent or thermal signaling based bio cyber interface adversaries might launch an attack by manipulating the internet-enabled parameters. By manipulating the parameters, attackers can cause inappropriate amount of drug release, initiate self-annihilation of drug molecules and modify monitoring information provide by bio chemical processes. In redox based bio cyber interfaces, changing the input electrical signal can lead the capacitor charging and unwanted redox activity such as activating/deactivating the redox substrate to affect enzyme production. Bio FETs work on the principals of ligand binding through charging of electrodes. The attacker can launch sentry attack to repel required ligands or black hole attack to attract unwanted ligands to bind to the receptor to affect the current control. The changes in external current control can cause the Bio FET based bio cyber interface to exhibit unwanted behavior.
 
This describes how an AI can be used to conduct" Kill-Box Ops" that can target and kill you, and it explains how it would accomplish that.
 
Countermeasures
"The attacks related to biologically inspired bio cyber interfaces can be categorized as ML-adversarial attacks. Possible countermeasures to ML adversarial attacks are [42] Data sanitization: This process refers to pre-processing, validating all the input data, and rejecting the harmful samples. Adversarial training: Inclusion of adversary information in the training samples to recognize attack vector. Defence distillation: Creating secondary ML model with less sensitivity and more general results. Differential privacy: A cryptographic mechanism of adding noise to susceptible features of data. Hormonic encryption. A cryptographic mechanism to perform computations over ciphered data to generate encrypted result."
 
None of the countermeasures mentioned above are really useful or available techniques for use by people like you and I, but there are others, so we'll get to them, just hang in there.

 
D. SUMMARY OF BIO CYBER INTERFACE CLASSIFICATION
"It is obvious from the above-mentioned literature that there are a lot of possibilities for designing a bio-cyber interface. The design model of the bio-cyber interface primarily depends on the application scenario. For example, a bio-cyber interface design and components for sensing applications will be different from drug delivery applications. Our take on the choice of bio-cyber interface option goes in the favor of bio-inspired interfaces. The reason being biocompatible in nature and the research in these interfaces in line with the direction of IoBNT. Extensive in-vitro and wet-lab experiments are required to validate the theoretical proposals for the bio-cyber interface."
 
Now maybe you have an answer to certain questions, like "Why are there still people still pushing vaccines on the public?" or "Why vaccinate the entire world?".  It is because, clearly, to a small group of psychotic, impossibly rich globalists, we are all just lab rats.  And because they refuse to stop experimenting on us, they have left us with very few alternative ways of dealing with the problems they have created.

There is no other way to put this:

WE HAVE TO HANG THEM ALL BEFORE THEY SUCCEED IN KILLING US.


V. SECURITY IN IoBNT
"The advent of skin implanted bio-electronics and the IoBNT paradigm will not only open up a plethora of novel biomedical applications but also its wireless connection capability will enable the adversaries to utilize it malevolently. Connecting the intra-body biological environment with the cyber domain through bio-electronic devices will provide the attackers with an apparent opportunity to devise new terrorist mechanisms to harm the patient remotely. Maliciously accessing the human body through the internet to steal personal information or to create new types of diseases by malevolent programming of bio-electronic devices and intra-body nanonetworks is termed as bio-cyber terrorism [25]. Bio-cyber terrorism can take advantage of wirelessly accessing the human body to launch fatal and life-threatening attacks from a remote site. Therefore security features have to be embedded either in a separate component of the bio-electronic device, which may enlarge the size of the device or might be infeasible in some applications. Another possibility is to delegate security services to external devices in close proximity with sophisticated resources as compared to bioelectronics devices. For example, in a similar field of IMD (Implantable Medical Device), some researchers propose to assign security functionality to an external device like Cloaker or MedMon [177]. Nonetheless, the bio-electronic device must execute a lightweight authentication mechanism at least once to establish a secure connection with external devices. Bio-electronic devices will also be linked to a gateway device (such as a smartphone) to send and receive information from the healthcare practitioner. Because of the technological differences, this section discusses the security needs for nanonetworks and bio-cyber interfaces separately. The security goals, regardless of the underlying technological variations, remain the same. The STRIDE threat approach can be used to model security threats against IoBNT. STRIDE is the acronym for Spoofing, Tampering, Repudiation, and Information Disclosure, Denial of Service and Elevation of privilege. These six categories present a broad classification of threats and can be further divided into other related threats. Each threat category is related to a security goal: Spoofing-Authentication, Tampering-Integrity, Repudiation, Non-Repudiation, Information Disclosure, Confidentiality, Denial of Service- Availability, and Elevation of privileges-Authorization [178], which is presented in Table. 5."
 
So above you have both the justification for "Hangin Em High" and some thoughts on potential electronic anti bio-hacking gizmos and how such devices might work.  However, I would not hold my breath waiting for the same people who are writing this paper to build such devices, or make them available to you.

Picture
Authentication (Au):
"Authentication ensures that the identity of each communicating party is established before executing any operation. Moreover, authentication also ensures that the data is coming from the authorized source and unauthorized users cannot access or modify the data. Authentication needs to be done on users as well as a message [29], [179]. Integrity (I): Integrity ensures that the message exchanged between legitimate entities is not tampered or modified by unauthorized entities.
 
Non- Repudiation (NR):
In the traditional networking paradigm, all the communication transactions are logged to track the network anomalies and gain the attacker’s profile in case the attacker tries to misuse his/her privileges. Nonrepudiation can be violated if the attacker gets access to the logs and delete the records to remove traces.
 
Confidentiality (C):
Confidentiality ensures that the attacker should not learn the content of the message exchanged between the sender and receiver. The data must only be accessible to authorized personnel upon authentication through some mechanism priory.
 
Availability (A):
This goal ensures that the services and communication of the device are always available on request.
 
Authorization (Auth):
Authorization property ensures that only those entities can execute a specific operation that has privileges to order it. Authorization requires that an entity must have been authenticated previously through the regular login (ID, password) procedure to establish the identification."
 
The various methods described above are pretty self explanatory, so I won't comment on them.  They all basically depend on you having access to information you don't have access to, and even if you did you could not be certain it was accurate or complete, so this is a good example of criminal evasive behavior. 
 
i.e. Showing concern for a critical aspect of this kind of R&D while at the same time doing nothing of any significance in that area.

 --------- Next Up in Part  Six  ---------

A. ATTACK TYPES IN NANONETWORKS
This section presents the possible attacks and existing proposals related to the nanonetworks. A summarization of security proposals for nanonetworks is presented in Table 6.
Picture

Everyone is emailing me about the next section and when it will be posted.  If I am a little slow completing the dissection and translation of this paper I apologize.  Please be patient with me, I promised I would so its all forthcoming.  The reason for that is I have come into possession of so much additional and even more informative and incriminating documentation that it has become an intimidating pile. 
 
I am cramming and compiling information at ridiculous pace. 
 
Several people have asked me why I don't do a presentation for MD4CE or some similar presentation on a show like SGT or Stew Peters on all of this.  Frankly, it is because right now its hard, even for me, to convey a lot of this verbally or on the fly as I (somewhat embarrassingly) learned  during a recent phone call with Albert Benevedes.  (The impressive creator behind the  WelcometheEagle88 channel on Bitchute.)  I found myself struggling at times to answer some of his questions because I was taking the call from the road.  Anyway, that is why I probably won't do any media appearances on the Bio-API topic until I feel like I can do a better job of that.
 
Right now, I need lots of notes to properly answer most common questions, but I do have all of that.  What slows me and others down is all the erudite jargon and dual-purpose code speak.   There is so much new vocabulary here one needs to become fluent with, and all of that needs to be translated into plain English to make it understandable for lay people.
 
I have to make people aware of a lot of what is currently in my research pile, because it contains a lot of necessary context for what it otherwise very dry academic literature.  I am also trying to compose and collect various visual aids that help break everything down simply. 
 
Like I said before, the learning curve on this stuff is Mount Everest.  Nobody is going to get it unless I educate them along the way, so if you feel a bit lost, just hang in there and do the best you can for now.  The material I will release very soon, probably before I finish up with this paper, will be very helpful.
 
-John


If you are just finding my blog please be sure to also check out two other contributions I made:
HOW TO REVERSE VACCINE INJURIES:

http://estateartistry.com/blog/reversing-vaccine-injuries
CANCER CURE:
​http://estateartistry.com/blog/cure-your-cancer-by-christmas
0 Comments

Now Do You Believe Me?

10/23/2023

8 Comments

 
I realize most of my readers are expecting the next installment of "Exposing the Bio-API".  It's coming.  I expected to have that done by now, but after posting part four I also began reading some of the other documentation I have been collecting, and there is a lot of that.  Part of the reason has to do with making sure I do not make any mistakes as I decode the language used in that systematic review paper the series is based on, but also because I have found a few more recent papers, so I am trying to confirm what might sound like forward looking predictions I sometimes make about statements in a two year old document. 
 
My intent is to tell you where I KNOW their plan is going, not to speculate generally on where I think it can go.  But it really does not matter if I am a palm reader or the Oracle of Delphi, because if I can think of an evil use, you can bet your last dime they most certainly can as well, and typically, everything that is possible to do eventually does become part of this system as an additional capability. 
 
Most "normies" scoff at the entire concept, thinking it to be too far out to believe, you just can't convince them, (no clue why) that with enough of an army working on a thing, the "impossible" frequently becomes possible faster than the same people realize.  It sucks to know this kind of stuff.
 
Because nobody really wants, or welcomes, an idea taking up residence in their head like; "I am the bio weapon."
 
But I won't convince anyone that’s even possible without solid proof.  I have to have that, because its going to be far too easy to dismiss me personally.  The reasons people come up with are endless, because this stuff is so ugly.  

I'm Sorry.  It Is TRUE.  You ARE! 
And Here Is All The Proof You Need.

Picture
source: American Journal of Bioinformatics Research 2021, 11(1): 1-31
DOI: 10.5923/j.bioinformatics.20211101.0
Even I don't want it to be true, and please believe me when I tell you that.  I tried very hard to find a reason to dismiss this paper myself.  As I read through this I thought of plenty of reasons too, but before I share them, please download and read this document yourself by clicking here:
Picture
DOI: 10.5923/j.bioinformatics.20211101.0
My first thought was it was a fake journal paper.  I read a lot of peer reviewed literature, even stuff currently under review.  One thing you notice about good research is you rarely see authors submit a paper they care about without having someone proofread it for typos, grammar, proper formatting, etc.  This paper is badly written, so I saw a red flag there.
 
It is full of broken English, typos, the same text appears repeatedly in different sections.  Its like someone assembled it by clipping paragraphs from multiple other sources and hastily assembled this thing.  So immediately I suspected maybe the journal wasn’t real, or wasn't credible, or maybe the document number was fake, or the authors were not credible experts, or real people I could look up, so I began vetting all of that.  Here's what I found:
 
The journal is a real journal.  It appears to be legit and venerable, but even with the most respected journals, like JAMA, there is always a possibility of some kind of "pay to publish" thing going on.  We saw that over and over again during the pandemic scare.  If anyone knows of anything like that going on with this one please tell me.  I don't see any of that.
 
  • The paper is real.
  • The document number is authentic.
  • It is actually in this journal.
  • It is currently behind a pay wall and the cost to get it is $299.00
  • The authors are real and I looked them all up.
  • Most of them have published other related papers so they are publishing within their field of expertise.
  • They all appear to be alive, with active profiles and resumes and they appear to be who they purport to be.
 
Authors are credited in the order of their contribution to the paper so the first guy named is the biggest contributor.  Whenever you see a lot of authors on a thing the last guy named had the least to do with it.  He may even be a student whose only involvement was to help out in some way.  Everyone in academia wants to be published, it’s a big deal to them.  Sometimes people are named as a professional courtesy or favor.
 
This paper has 13 authors, which is a lot, but I looked them all up.  The first five listed are important and have very well established careers.  The rest less so, but together, if you look at what all their current jobs are, this adds a lot of credibility to the information provided.  You see experts in all the right places.  It appears the thing that connects them all is some time spent in connection with Northwestern University in Bangladesh.  Looking at the top five we have;

Md. Rahimulla Miah
https://loop.frontiersin.org/people/1376147/overview
Department of Information Technology in Health and Research Associate, Northeast Medical Pvt. Limited, Sylhet, Bangladesh and Former PhD Student, IBEC, University Malaysia Sarawak (UNIMAS), Kota Samarahan, Sarawak, Malaysia  Expert of sensor technology in health with 20 years of career experience in teaching on bio-sensor networks and informatics. North East Medical College Sylhet, Bangladesh
 
AAM Sahzzadur Rahman
https://search.brave.com/search?q=AAM+Shazzadur+Rahman&source=desktop 
Department of Medicine, Northeast Medical College, Sylhet, Bangladesh
Associate Professor of Medicine - ‪‪Cited by 160 - ‪Clinical Medicine - ‪Tropical and Infectious diseases

 
Md. Shahariar Khan
https://www.nemc.edu.bd/our_team/dr-md-shahariar-khan-2/
Assistant Professor  Paediatric  Cardiology  Northeast Medical College
Impact of Sensor Networks towards Individuals Augmenting Causes of Diabetes.
Journal of Endocrinology Research, 3(1), 1-20.  2021
Processed Radio Frequency towards Pancreas Enhancing the Deadly Diabetes Worldwide.
Journal of Endocrinology Research, 3(1), 1-20.  2021

 
Mohammed Abdul Hannan
https://scholar.google.com.sg/citations?user=H1aGKLQAAAAJ&hl=en
Lecturer at University of British Columbia, Adjunct Faculty at Newcastle University
Verified email at mail.ubc.ca
Neural network based prediction of stable equivalent series resistance in voltage regulator characterization
MHM Zaman, MM Mustafa, MA Hannan, A Hussain
Bulletin of Electrical Engineering and Informatics 7 (1), 134-142

 
Md. Sabbir Hossain 
https://orcid.org/0000-0003-1065-2056
B.Sc in Biotechnology and Genetic Engineering (Biotechnology and Genetic Engineering)
Bangladesh Jute Research Institute: Dhaka, BD
2013-12-01 to present | Biotechnologist (Basic and Applied Research on Jute)


So why is this paper so messy?  There has to be a reason for it, but I can only speculate about what it is so I won't waste tons of time doing that.  I just can't help but wonder if maybe it was presented this way deliberately, in a way that would not attract the same attention as a properly written paper, but just to get something out there on the record, like a shrewd whistleblower might do.
 
I realize that works both ways and you see it done with propaganda as well, but the important thing here is the information.  Propaganda is easy to spot.  It hangs out there unsupportable by anything other than similar propaganda.  That’s not what this is.  Everything in this paper fits with everything else I have seen and read, it was just shocking to me, to see anyone speak so plainly and bluntly, and also to hear that from a guy who actually understands and actively works as a teacher in this field.  I believe Rahimulla Miah at least, figured out what's really going on and he is, understandably, really freaked out about it.
 
I have been known to say repeatedly in the past that fear has many uses.  I have told people not to believe everything the enemy would have you believe, and not to fear the enemy because you think him to be invincible or because he claims to have something so scary at his disposal that all is lost. 
 
The enemy knows that your fear of what he may have has just as much utility in war what he does have. 
 
An example that proves this is the current state of public debate about what the vaccines are potentially doing to human genetics.  I hear learned people sounding alarms constantly about vaccines causing irreversible genetic damage that is existentially dooming us all. 
 
I don't subscribe to that idea, nor do I even think such a thing is even possible.  Nature always prevails and finds a way forward.  The people funding and coordinating all the research being done in nano-biotech believe human science has surpassed their creator, and that they have embarrassed him with their creativity.  They won't put it in those terms exactly, but regardless of whether or not they realize this or state it explicitly, it is what they believe.
​

​The existence of weaponized bio-nano technology is NOT a bluff. 
They have it.
 

Much of what they claim they can do with it is NOT a bluff. 
I tend not to concern myself as much with finding where
​the actual line is between truth and fiction,
because the capabilities they have already demonstrated they have
are horrifying enough.

 
Their willingness to actually use it is NOT a bluff.  
I can produce example after example of them using it.

​I know what they hope to achieve with this, and I can see a way to do that, but I also see plenty of ways we can disrupt the timeline they are on.  As with any complex plan, this one is being done in stages. The only way this plan of theirs works is if each major contributory objective succeeds on schedule and without a hitch, but pulling off something of this magnitude is a tall order, even for them.  I have to believe we can foul that up, or I may as well kill myself now. 
 
I don't know about you, but suicide is NOT how I roll.  If you feel like me, BE LIKE ME, because I need your help.  One guy shouting from a rooftop isn't going to be enough to derail this.  No matter how outrageous this plan looks to you, don't underestimate these people.  Winning is not a matter of resources, it is a matter of numbers.  If we lose the one advantage we have, they win. 
 
I realize material like this is a LOT to swallow, but man up and believe in your ability to understand it no matter how far over your head it first appears to be.  Like it or not, accept it or not, believe it or not;  you do have skin in the game here.


Picture
The pandemic crisis was the culmination of an immensely ambitious plan and it was the first time many of us began to realize that it was big enough to affect every living person on Earth.  The simple truth is that an impossibly narcissistic, over-the-top psychotic goal has been in motion for over a hundred years, and the bad guys are still trying to keep you guessing about what that is.

They have been pretty good at that thus far, I have to admit.  And they have been using all kinds of other smaller contributory agendas that serve different functions to keep us all off balance and looking the wrong way as each one we take our eye off of advances, inexorably ahead.  Each one has a proper place on the grand strategy board.  Some agendas function as building blocks, others are preparatory steps, some are promotional or preemptive strategies. 

We all want to know what to do, but knowing what the right move is requires being able to see enough of the chessboard that you can choose to occupy a space AHEAD of where they are at any given time on the master timeline.  I think about this by assuming the best version of the enemies mindset I can muster and I try my best to maintain that when making my own decisions.

I put on my "Dr. Evil hat" and ask myself questions like: What would it be necessary to do to ensure that I was always advancing that master plan?  How would I keep pivoting as people get wise to one thing after another?  I look to history for possibilities since there is a clear pattern I can always see repeating.  These guys are not all that smart, and they never deviate from the usual boiler plate cons.  They just dress them up differently.

I now see what I believe is the master plan.  I have felt certain of this before and been wrong.  We all have.  But this time I really doubt there is anything bigger than installing everyone on Earth with nefarious wetware.  I can establish a pretty firm date as to when this scheme was hatched, which was 1922. 
There were a bunch of scientific discoveries that happened in the early 1920's that seeded the bio-nanotech pipe dream.  That’s a long time in the making, but also about the time they had just wrapped up the last big global glitter bomb and were looking for some way to top a series of events they had just cemented into motion that would begin with the stock market crash of 1929 and end with WWII. 

It was obvious this effort would require a lot of manpower, but also a tremendous amount of money to pay all the people they would need to bring this into reality.  So they siphoned and stole that money from everywhere imaginable, right down to the change in your couch cushions before they simply began printing cash wholesale. 

The only other priority while this was going on would be to earmark some of that capital to misdirect everyone making a career in the hard sciences by funding impossible bullshit, so none of them could progress in any area that could, or would, interfere with this plan.

(Today that effort has created new AI problems to overcome that may never be possible to control, not that it is of any importance to them to do so given the over-arching depopulation motives they have.)

The nuts and bolts were all fleshed out in compartments they created simultaneously along the way.  These functioned as silos of intelligence that would provide all the puzzle pieces for the "remotely controlled slave race" they believed was possible to engineer, and they quashed anyone that proved anything "inconvenient" if they were outside of these strictly controlled niche pursuits. 

Before this, the field of medicine had very little in common with computer science and cyber security.  There is very little crossover beyond the obvious.  They even cite this as a current obstacle to further progress on aligning AI with good patient care, lamenting the lack of interdisciplinary human capital available for hire.  They even whine in these policy documents I have about doctors and computer wonks being socially incompatible!  Today this same separation works in their favor, because  the doctors never think to look for any answers in the server rooms the hackers dwell in.

Over the next hundred years, Big Pharma created enough sickness to provide the excuse they needed to earn and burn mountains of cash making the kinds of covert advances in synthetic biology that they would need and justified that work in the usual manner; "for your benefit". 
 
Computing power, databases, and internet capabilities grew until the basic requirements needed for IoBNT were met.  Combining IoBNT with wireless tech, which they pushed until it became the fashion crazed addiction it is today, resulted in a new threat being born.  We need some new terms to distinguish these threats from the ones they use in their propaganda.  The new danger is NOT synthetic viruses created and leaked from bioweapons laboratories. 
We need to call this what it is. 
​
The new threat is coming from weaponized "electronic pathogens".

 
The gross architecture provided by wireless cellular networks gave them their first real capabilities, which they began to salivate over in 1995.  By 2005 they were actively testing on humans.  Their early successes emboldened them even more. Seeing this as a return on their investment the next question was:
Picture
By 2012 these experiments began to scale up to include entire populations through the use of geoengineering programs and controlled mass food production, and we saw this when GMO's first appeared.  Only nobody knew then, or even now, that those early forays into how one creates GMO plants were the entry point for nanotech to begin poisoning the entire food chain.

All during the last century, as time passed, they financed as much fake literature as they could write that encouraged a superstitious belief in vaccines, [again] and they normalized that.  This is why the work of Louis Pasteur had to be medical cannon, and why the work of Antoine Bechamp and Charles Richet had to be forgotten.  My first book was crushed out for this reason.  It was all about Charles Richet and what he taught us pulled the rug out right out from under vaccine proponents.  Believe me, it was getting looked at very seriously by way too many people globally, and that hurt the plan and could not be allowed. 

That was my first clue, and the thing that kicked off everything I would eventually do afterwards.

Then, in 2020, we had the full blown pandemic hoax, the holy covid water, and everything that followed.  Big move.  Successful move.  My second book probably helped their plan, because it included a vax injury protocol I created that was based on their shit literature that they knew would not work, so they let me run with that one.  Why not, right?  Eventually the same advice would even be parroted by credentialed doctors and nobody called them on it.  Nobody but me.  Because I tested that advice myself.  When it didn't work I found where I went wrong and eventually came up with something better, something I then proved worked.  But, unsurprisingly, that is something I can't convince any credentialed doctors to take seriously.

And now that I have been doing this deep dive into the research and development timeline of IoNT, which became IoBNT , everything is coming together to form a very clear picture.
Picture
Picture
​You see, with the decision to force-inject everyone with what they knew would cause massive death, because the method of transhumanizing people is toxic to them.  By ignoring that they created a problem that they knew would start a clock ticking, and they knew how long they had and approximately when it would run out.  Vaccines could be marketed to people like a gift from God for a short time, but only until huge numbers of vaccine injury victims began meeting God in person in greater numbers than they could hide.

Somebody wisely foresaw that vaccine "hesitancy" was bound to turn into vaccine "hell no", so they knew damn well they could never actually vaccinate everyone, and before they hit this wall they would need to have  lots of other ways to dose people without their knowledge standing by, ready and waiting.  They know mainlining this poison is the next best thing to a nasopharyngeal administration vector, so adulterating medical injectables, annual flu shots and covid tests were a no-brainer but, to get everyone they would need to poison them every possible way there was to do that, so no matter where a person went or whatever they did, they were completely surrounded by traps, and almost everything on the planet being manufactured by their own "stakeholders" it was so easy to do that they simply poisoned everything with nano graphene!

They have by now, most certainly managed to nano-install every last person they could in some way.  Nobody can really tell you what is safe and what's is not anymore.  It’s a total crapshoot.

If you ate food, it would be full of nanotech, if you drank any water from the secondary water supply, it would be poisoned with nanotech.  If you if you lived in the wilderness smart dust would rain down on you.  If you hunted for food, the animals would already have been eating the nano-shit accumulating on the forest floor for decades.  If you bought it from the store all the meat would come from vaccinated livestock, everything else would be fake or over processed junk food.  If you got sick from that or for any other reason you would go see a rube doctor who would poison you some more.  If you have teeth, just fluorinating all the water would ensure that sooner or later you would end up in a dentist chair getting vaxxed with adulterated painkillers.  They left no stone unturned in an attempt to leave you without anywhere to escape this inevitable fate.
​
But covid, glorious covid was special.  It would be both a magic bullet and a "catch-all", "invented" long ago, even patented, ahead of it "leaking" in 2019, and that would take the blame for the radiation sickness that would result from firing up every wireless thing they invented.  It is the emissions they produce that has been an ever increasing a threat to health from the invention of the telegraph, to the advances in military radar at the end of WWI, to the very first AT&T brick phone, until the present day, where now we find ourselves all literally trapped in an active planet-sized microwave oven, forever blazing on high.
​

If Hell actually is empty, that is only because it is much warmer up here now!
​
8 Comments

Exposing the Bio-API - Part Four

10/15/2023

2 Comments

 
As I continue working my way through this IEEE paper, please keep a couple things in mind:
 
1. This documentation is a couple years old, and some of the technology it discusses is even older.  
Picture
2. Much of the text I pull out in Part Four sounds like it is talking about wearables like patches and consentual internal medical implants and external monitoring devices, and while such devices are discussed at length the kicker here that is so cleverly understated that you might easily miss it, is he fact that every one of these macro-scale medical devices has a NANO technological counterpart.  This paper is all about nanotechnology.  Everything else is fluff.

​3. All throughout the excerpts that follow you need to tune out all the filler that provides the motivations and justifications for advancing this research and development work and simply recognize and accept that all of that only sounds good, that none of it is really needed, and that it is all an EXCUSE that only makes any sense in the context of a global fear frenzy that has been manufactured out of nothing -- to provide a reason to do this at all.

4. Keep in mind that this nanotech is nefarious SPYWARE, fraudulently necessitated by the faux threat of pandemic health emergencies.   That "bio-security" is a monumental ruse.
And most importantly, understand that the technology being discussed and reviewed is NOT intended solely for use by doctors to help them provide better care for specific patients with specific ailments.  In other words, we are not talking about new advancements that add to a physicians tool bag, that have become available to them for use on a case by case basis, to help them overcome difficult circumstances in certain situations, or as they see fit.  This monitoring in being accomplished by "wet-ware" that has been installed in everyone, including you and I, and despite the many serious health problems associated with its use, this installation was done WITHOUT YOUR KNOWLEDGE OR CONSENT!

5. In the mad bio-security world that is driven by a fear of invisible pathogens, whatever their origin is said to be, it is now possible to conjure "evidence" that YOU are a potential threat, and this is what is so dangerous about all of this.  Eliminating that threat, even if it means eliminating you, is going to be seen as OK if whatever health problem they can point to can be used to single you out as some sort of threat or risk.  Everything is on the table as a means to contain what will be framed as protecting "the greater at-risk population."

Everyone adding to the noise around vaccines and biological weapons is having the wrong discussion. None of them are talking about the actual weapon here, which has already been deployed in everyone whether they managed to escape being vaccinated or not.  Its true, the vaccines are harmful, and this is why, but its not just about toxic poisons, it is why those toxic poisons were introduced to begin with.
 
Recall back to that farce of a human trial Pfizer pretended to do before releasing their vaccines on everyone. Remember that they were "experimental" and that there were specific endpoints stated in the vaccine documentation Pfizer provided. Nobody argues this now, that there was an experiment going on, but what was it?
 
That is where everyone screaming about vaccines kind of dropped the ball. It was assumed the experiment had to do with how humans handled the vaccine. And to some extent it was, but really it was about how the vaccine changed them, trans-humanized them. Really, it was about what could be done with those people if they survived being poisoned, and that is what this documentation discusses rather openly if you properly understand what you are reading. And there is a huge mountain of documentation proving this at the IEEE, a place very few people thought to look.
 
Still some people simply looking at blood samples with a simple microscope are beginning to surmise some of this.

 
DR. ANA MIHALCEA - THEY HAVE PUT ARTIFICIAL LIFE INSIDE OF THREE BILLION PEOPLE...
https://www.bitchute.com/video/qsw9ThL5fbrc/
 
Myocarditis is just the tip of the iceberg. HERE IS THE REST OF IT!
 
Picking up where we left off with Table 2:

Picture
Picture
a: BLUETOOTH LOW ENERGY (LE) COMMUNICATION
 
"Bluetooth (LE) Low Energy technology was introduced to wirelessly connect small low power devices to mobile terminals. This technology is ideal to be integrated with implants for healthcare applications as it supports ultra-low power consumption [102]. It contains tiny Bluetooth radio to actively send and receive messages from nearby smartphone devices. The transmission range of Bluetooth LE is up to 10 m, the data rate is 1 Mbps and the frequency band is 2.4 GHz ISM [103]. Pairing time with other devices is in milliseconds, which is appropriate for alarm and emergency conditions in healthcare applications [104]."
 
b: ZIGBEE
 
"ZigBee has an active transmitter able to communicate with mobile devices over a distance of 10-100 m. Zigbee is considered the most cost-effective technology due to its low power and low data rates. ZigBee can operate on three ISM bands with data rates from 20 Kbps to 250 Kbps [104]. Although ZigBee provides a large transmission range, it is not a good candidate for continuous health monitoring applications due to its low data rates [101]."
 
 If Zigbee is not a good candidate for continuous health monitoring applications that begs the unanswered question of what it IS good for.  That is what I want to know.  It sounds to me as if this would useful when you want to trigger some kind of nano-system event at a distance.

c: IEEE 802.15.6 STANDARD
"The rapid popularity of Wireless Body Area Networks (WBANs) and Consumer Electronics called for a standard communication medium to address the special needs of the WBANs such as low power, low cost, low complexity, high throughput and short-range wireless communication in and around the human body. IEEE standards association established the IEEE 802.15 Task Group 6 for the standardization of WBAN [105], [106]. It quotes: ‘‘The IEEE 802.15 Task Group 6 (BAN) is developing a communication standard optimized for low power devices and operation on, in or around the human body (but not limited to humans) to serve a variety of applications including medical, consumer electronics personal entertainment and other IEEE 802.15 WPAN Task Group 6 Body Area Networks. 2011]. IEEE.802.15.6 has different frequency bands in different countries ranging from 16- 27 MHz [107]. "
 
Were you aware WBAN's were so popular?  I wasn't.  If it is that popular don't you wonder why this vocabulary isn't more common?  Maybe its because the idea of " high throughput and short-range wireless communication in and around the human body" isn't exactly advertised.
 
"Medical Implant Communications Service (MICS) band is a licensed band used for implant communication and has the same frequency range (402-405 MHz) in most of the countries [105]. MICS band is suitable to be integrated for bio-cyber interface as it defines protocols that are compatible with system requirements of bio-cyber interface."
 
The key word here is "integrated".

 
"IEEE.802.15.6 can operate within a transmission range of 3 m with data rates up to 10 Mbps [108]. IEEE.802.15.6 has also been recognized to be used as a standard for Human Body Communication (HBC). HBC uses the human body as signal propagation medium, therefore certain concerns must be taken into account such as increased mobility of the patient, lower power consumption, small battery size yet life to span around a time several months, and management to aggregate burst data in presence of continuous triggers from physiological data. Considering these HBC concerns [109] proposed a medium access method for statistical frame-based time division multiple access (S-TDMA) protocol that demonstrates lower data latency, lower power consumption, and higher transmission efficiency."
 
And here we have been encouraged to believe "shedding" was a thing.  Wake up.  People are not shedding anything physical, they are electronically TRANSMITTING!


d: NEAR FIELD TECHNOLOGY (NFC)
 
"NFC is a passive communication designed to operate in the ultra-low transmission range of up to 20 cm. NFC technology contains NFC tag similar to the RFID tag, which is powered by a readout device. Communication in NFC requires devices to touch each other or be in close vicinity to each other. Smartphone transmits power wirelessly to resonant circuits through inductive coupling which turns ‘‘ON’’ the NFC tag. Once the transmission session is complete, the tag is marked as ‘‘OFF’’ and becomes unreadable [110]. This technology is ideal for implantable devices with a low power source as the communication is powered by the reader device (in our case smartphone). Ultra-Low transmission range in NFC is not a drawback, rather it is a strength as it provides rapid connection [101]."
 
Here you have a reference to a situation in which a healthcare provider uses a smartphone or similar device to "read" biometric telemetry off of some sort of medical implant, of course the implant in this case goes unidentified, leading you to maybe envision a doctor collecting data from a pacemaker or something.

 
e: RFID (ISO/IEC 18000-6)
 
"RFID is a passive wireless technology that consists of a transponder (tag) to be read by an RFID reader. RFID based implants are feasible in situations where battery supply is a major issue [101]. Entire transmission in passive RFID systems is powered by the reader side [111], which in our case can be RFID reader enabled smartphone devices. The read range of RFID is 1- 100 m with the data rate of 10- 100Kbps [104]. Battery-powered RFIDs with active radio transmitters are available which comes with a high cost yet low data rates."
 
Think about this.  They are not talking about an anti-theft sticker on some retail product.  If the RFID implant is a nanoscale device floating around in your bloodstream, then whatever it says about you can be read by a reader device from as far as three football fields away.

C. POWER SUPPLY
 
"Bio cyber interfaces need a continuous power supply for data collection, processing, and transmission. The battery is mass vise the largest unit in the bio-cyber interface and other body implants. Although considerable progress has been done in lithium rechargeable batteries, yet they cannot keep pace with the novel technology requirements and size constraints. Miniaturization of a battery source, energy harvesting methods based on human body movements, and wireless battery recharge techniques have been explored by researchers of MIT for implants in Wireless Body Area Networks (WBANs).
 
Don't think in terms of actual batteries, think in terms of nano-crystalline particles that run on a piezoelectric effect that can be harvested from any number of sources, including the ambient wireless radiation soup we all walk around completely immersed in.  In the next paragraph some examples of those sources of energy are given.
 

"Evanescent waves have been considered in [112] to wirelessly power the electronic devices over a short distance. Other efforts include solar rechargeable batteries [113], piezoelectric nanogenerators [114], micro-supercapacitors [115] and endocochlear potential-based bio batteries [116]. Implantable devices in IoBNT need a continuous power supply and prolong battery life, for this purpose mechanism has been investigated to scavenge power supply from the epidermal layer of the wearer [116]. These energy scavenging batteries are called biofuel cells (BFC), which convert chemical energy into electrical energy through biocatalytic reactions [117]–[119]. Researchers from the University of California San Diego have demonstrated an epidermal BFC [120] to scavenge continuous energy from human perspiration. Lactate is used as biofuel as it is present in human sweat in an abundant amount [120]. Similarly, energy scavenging techniques from the human body can be adapted for power supply in the bio-cyber interface. A detailed energy model for nanoscale devices has been demonstrated in [121] which discusses the power consumption of each component in the nanonetwork."
 
This next section draws our mind back to the idea of "smart stickers" and the like, some of which also come with toxicity problems.  Compared to the nanotech that accomplishes similar functions anything involving a sticker you have to glue on somehow is stone-age tech by comparison.

D. ADHESION SYSTEM
 
"This section briefly discusses the patch material, as biocyber interface is envisioned to be a wearable/stick-able bio-electronic device. The adhesive material for the patch is under high interdisciplinary research investigation as human skin is extraordinarily stretchable ( > 100% where  is the strain), highly rough (superlative height 40 µm), and generally covered with sweat and hairs [122]. Hence, delivering adequate adhesion of skin patches against human skin persists to be a challenging task. Adhesion materials should be carefully chosen to prevent issues like cytotoxicity (i.e., condition of being toxic), skin contamination, damages, risks of infection, and loss of wet adhesion make them less effective. Adhesion materials using electronic materials are extensively reviewed in [35] and bio-inspired approaches for adhesion like gecko-/beetle-inspired mushroom-shaped architectures, endoparasite-like microneedles, octopus inspired suction cups and slug-like adhesive with energy dissipation layer, has been keenly investigated in [122]. Special measures should be taken into account while selecting the adhesive material to prevent data loss and wireless connection due to strain and physical pressure on the patch while patient movement, wrinkling of skin or other factors."
 
And here is where they finally reveal where they are with all of this:

E. SUMMARY OF BIO CYBER INTERFACE
 
"There exist a few proposals in the literature that present interface either using nano EM or MC communication. In the nano EM domain [123] have proposed an architecture of nanonetworks-based Coronary Heart Disease (CHD) monitoring system. The proposed model consists of nanomacro interface (NM) and nanodevice-embedded Drug Eluting Stents (DESs), termed as nanoDESs. The algorithm exploits the periodic change in mean distance between a nanoDES, inserted inside the affected coronary artery, and the NM, fitted in the intercostal space of the rib cage of a patient suffering from a CHD utilizing THz band.
 
"Another paper proposes a straight forward communication scheme utilizing the TeraHertz Band. The architecture consists of nano nodes and nano router, deployed in the dorsum of the human hand. Nano nodes circulate in the blood vessel for the collection of medical data and transmit the aggregated data to the nano router. Nanorouter then transmits the data to BAN (Body Area Network) device through THz band communication, which is then relayed to the Internet."
 
"Some theoretical models have adopted MC paradigm for the design of bio-cyber interface device. For example, authors in [64] have conducted a wet-lab experiment by utilizing artificially synthesized materials as an interface between the biological and electrical world. The proposal employs optical sensitive molecules(pH rodo molecules) that activate upon expression of fluorescence through fluorescent microscopy."
 
These are NOT theoretical models anymore!  "Wet-lab" experiments are in vivo experiments involving people…

"The above-mentioned proposals that utilize nano nodes and nanoDES in THz communication, may not be biocompatible due to the non-biological nature of these devices. Secondly, the use of external devices like a fluorescent microscope can also cause mobility issues for the patient, which negates the whole notion of IoBNT."
 
…and they admit the fact that such techniques "may not be biocompatible", a euphemism for HARMFUL.
 
 
"A novel hybrid approach is presented [30], which suggests utilizing MC based communication inside the human body for its biocompatible and noninvasive properties. The MC can communicate with graphene-based nanosensor, implanted over the human body for communication with external devices. The nano micro interface will, therefore, consist of a THz based antenna and micro/macro antenna. The idea is to limit the non-bio devices inside the human body and to read the intra-body parameters efficiently outside the body"
 
And finally they spill the important bit about all this being done with "graphene-based nano-sensors".
​

Page 13 contains, in my opinion, more distracting filler text that pertains mostly to more conventional and familiar external monitoring techniques such as electronic tattoos and transdermal patches.  I will skip over that to keep the focus on where this is leading.
 
"Traditional methods of drug delivery through oral intake of medicine and via injections are now quickly being replaced by transdermal drug delivery patches."
 
"Fourth-generation transdermal drug delivery systems [133] are now capable to release controlled amounts of the drug upon receiving commands wirelessly through the internet."

 
1) SECURITY CONCERNS IN ELECTRONIC TATTOOS AND TRANS DERMAL PATCHES
 
"Electronic tattoos and transdermal patches can be exposed to security threats as they are continuously connected with the wireless technology. The following are some of the threats that electronic tattoos and transdermal patches may encounter."
 
a: WIRELESS COMMUNICATION RISKS
 
"Electronic tattoos and transdermal patches need continuous wireless network supply in order to receive and send information to the healthcare provider. Mainly the electronic tattoos are connected with a gateway device (smart phone) that relays the information over the internet. In the currently published literature for electronic tattoos, it is noticed that most of the proposals have used Bluetooth or BLE as communication mechanisms between electronic tattoo and gateway device. Bluetooth technology works within close proximity and is considered safe as attacker must be present within the patient’s vicinity to launch an attack. However, Bluetooth version 5.0 has a transmission range of up to 400m moreover, the range can be magnified up to a mile through omni directional antennas.

Did you catch that?  You can be surreptitiously drugged from a mile away by a cell tower!
 

Researchers from Singapore University of Technology and design have discovered 12 different Bluetooth bugs which can affect 450 type of IoT devices including implantable medical devices. Moreover, the security flaw named ‘‘SweynTooth’’ associated with BLE can crash the device, deadlock the device or bypass security to access device functionality.
 
What if the "device" they mention is not some kind of smart Band-Aid, but YOU?
 

Another critical threat to Bluetooth technology is Blueborne attack. In this attack, hackers infect the devices with malwares and gains access to the device to execute malicious operations [134]."
 
And there it is, the nugget of truth at the heart of this discussion:  We are left to wonder who the hackers are in this case, but does that really matter if the whole point is to create a situation in which any human being can be covertly attacked by anyone with a motive and access to their unsecured biology?
 
b: PHYSICAL HARM
 
"The electronic tattoos currently manufactured are tested rigorously to withstand mechanical deformation caused by external strain. However, in cases of long term use and extreme physical stress conditions, the device abilities might be degraded and cause unwanted behavior. The bio-electronic devices which are presently designed in the form of electronic tattoo and implantable patches that do not require any surgical procedures to affix on the human body. Non-medical professionals can apply these devices easily on human skin like stickers. This non-surgical relaxation can be exploited by local attackers to replace the bio-electronic device with an illegitimate device on an unconscious patient. The illegitimate device now becomes part of the communication and can launch several passive and active attacks like eavesdropping, replay attack, and data modification, etc."
 
I personally find it interesting that the example given involves attacking an unconscious patient.  It reminds me of those people who were given covid shots against their express wishes by members of the Cult of Covid in all kinds of hospital settings whenever they were exposed and vulnerable.
 
Countermeasures:
"Some of the possible countermeasures for above mentioned attacks are Tamper-proofing and self destruction: Use of tamper proof package for sensing devices and enable self destruction mode upon countering an intruder attack. Minimize information leakage: Protective measures like generating artificial noise, shielding and adding randomized delay can be taken to minimize information leakage. [135] Run-time attestation: Generation of proof about updation of firmware by a remote entity. [135]."
 
These all sound like weak attempts to create some pretense of responsibly addressing what they see as security gaps that completely ignores the fact they are associated with nanotech that should not even be there in the first place.  However, mentioning disruptive effects that can be caused by generating artificial noise, shielding and adding randomized delay might be important clues if someone was looking for a way to defeat the operability of these systems.

B. RFID TAG SENSORS AS BIO-ELECTRONIC DEVICE

 
Skipping through this…  Remember what I said at the beginning, about every macro-scale tag or tool having a nano-scale duplicate.
 
"The role of RFID sensors in envisioned healthcare applications IoBNT is promising due to their easy integration with implanted interfaces for communication with the Internet."
 
"RFID is a wireless technology that utilizes RF signals to identify objects with RFID tags. RFID system has two components: a tag which is a microchip to store electronic information and radio antenna to receive signals."
 
"Passive RFID tags are ideal for IoBNT applications…"
 

"RFID technology can be used as sensors [148], for sensing applications of IoBNT and can be used as a bio-electronic interface on its own. RFID antennas that are sensitive to environmental changes like gas [149], moisture [150] and temperature [151], have already been developed."
 
"The sensing capabilities of the RFID system can be exploited to measure the chemical and biological values of the human body. 13.56 MHz) or ultrahigh-frequency (UHF, 400 MHz) bands, has proven adequate in powering the adaptive threshold rectifier. The HF band is for patch sensors, whereas the UHF band supports’ implantable sensors [30]."
 

"The envisioned Bio-electronic interface with RFID enabled technology is likely to have the following components to be operational in the IoBNT domain. RFID sensor tags that contain chemically coated thin- film resonant sensing antenna for sensing target chemical substances in the environment. Recent RFID tags are thin and flexible, allowing them to be embedded easily in the human body for health monitoring purposes [37]."
 
"Novel methods for the fabrication of electronic devices through inkjet printing are getting research attention in Consumer Electronics (CE). Nanomaterials like graphene, carbon nanotubes, silver, gold and copper nanoparticles, conductive polymer and their based materials are used as inkjet ink to print electronic devices."

Remember the guy I mentioned previously who made a working AM/FM radio out of a single carbon nanotube? https://www.sciencedaily.com/releases/2007/10/071031135307.htm
 
"A comprehensive review of inkjet-printed nano-material based flexible radio frequency identification (RFID) tag sensors for the Internet of nano things has been presented in [38]."
 
You know when you go into some hospital for a routine screening and they give you some dye in a cup and tell you to drink it?  Yeah.  Just imagine what all could potentially be in that.
 
Now watch the utterly absurd length they will go to, to come up with bullshit uses for this tech.  It seems like they will say anything to sell it.
 
"Another smart health proposal using RFID technology has been presented in [62], where a smart bandage manages chronic wounds by wirelessly transmitting wound pH status to an external readout unit in the smartphone, using radiofrequency identification (RFID). This is a lightweight, noninvasive bandage proposal that saves the patient from regular hospital visits for dressing change."
 
Are we really "saving the patient" here?  Or are we just taking humans out of healthcare and eliminating personal care by eliminating nursing?

 
1) SECURITY CONCERNS IN RFID BASED BIO CYBER INTERFACE
 
"RFID tags, when used with interconnected devices in environments like IoT and IoBNT can be easily compromised by attackers. Following are a few possible security threats that must be considered when using RFID based technology as bio cyber interfacing option [135]. "
 
Duh.
Picture

Welcome to the Brave New World,
where everything that can go wrong with your computer
can now go wrong with YOU! 
Aren't you glad someone asked you if you wanted this
before force migrating you into accepting this "upgrade"
to the latest and greatest nano biological system architecture?

 
Remember the "Blue Screen of Death"?
Picture
Picture
"The device has the wireless capability to be turned on wirelessly and it disappears once it has performed the required task, thus eliminating… "
[THE EVIDENCE]
Picture

Part Five coming soon…
 


​
If you are just finding my blog please be sure to also check out two other contributions I made:
HOW TO REVERSE VACCINE INJURIES:

http://estateartistry.com/blog/reversing-vaccine-injuries
CANCER CURE:
​http://estateartistry.com/blog/cure-your-cancer-by-christmas

2 Comments

Exposing the Bio-API - Part Three

10/11/2023

1 Comment

 
Today I am going to begin going over some basic components of a system that is INSIDE YOU.  This is not the end of it, its not all of it.  These are the BASICS.  Folks, the learning curve on this is literally Mount Everest and I am nowhere near even the first base camp. 
 
Some guy recently left a comment on a thread I shared some links on comparing me to Ed Snowden.  I laughed out loud when I saw that.  I mean, thanks, whoever you are, but I'd rather not have anyone thinking I deserve that much respect. 
 
I spent 20+ years in high tech startup environments, always swimming in a shark pit on the bleeding edge of things with some product or another where 20-30 million bucks was a typical net return or total loss, and there just came a point after which I said "Nope, that’s enough for me.  From here on out I am just gonna polish the shiny black box with the rest of the senior citizens." 
 
So I am not enjoying being yanked out of early retirement to back track through all this technobabble again, and Ed Snowden I am most definitely not, but even back then my role was more of a visionary than a nuts and bolts guy, and that’s the kind of mentality one needs to grasp this sort of concept. 
 
It's not "what you can do" as much as "what you can do IF…" 
 
The danger I clearly see here is too many uber wealthy, psychopathic eugenists thinking in those terms, all of whom have been investing their billions equally in both building out this technology AND hiding it.  And what a brilliant job they have done at both! 
 
This is the only conversation topic that is relevant today.  Everything else is a misdirection, with the debates surrounding all of that providing cover for this core project.  100 YEARS in the making!  The level of swarm collusion this took is impressive to me.  These people are Nth level dangerous, and they have nearly succeeded in what they have been trying to do.  This is the end game we are in now.  If this is not exposed and the criminal motives driving it acknowledged, we are all toast.  They can start turning us off at will now. 
 
This is just another proof of concept type field test:
https://www.youtube.com/watch?v=oph-IGQJXac They dropped people on the street in Wuhan with this, suffocated fans at a Travis Scott event in Texas, and walked people off the roof of sky scrapers in downtown Singapore during covid lockdowns like remote control lemmings.  Every time you see a "spinner" drop dead there is a guy somewhere doing a demonstration for some other guy he is blackmailing. 
 
Nah, we are well beyond the experimental stage here.  We need people that are a lot better than I am digging into the available material, so please help me get this overview into the hands of such people.  There is very little time left.

III. A DETAILED DESIGN OF POTENTIAL BIO CYBER INTERFACE DEVICE
" Bio-cyber interface is the hybrid and most sophisticated device, that is capable of communicating between nanoscale and microscale devices [22], [25], [44]. This device receives aggregated data from nanonetwork, processes nanoscale data in its transduction unit to convert it into a format suitable for the conventional network (e-g Internet) and sends it microscale devices. The components of envisioned bio-cyber interface are described in detail below:"
Picture
So basically, this is the name given to the mediating device mentioned earlier.  It is how the commands given by the medical server communicates with the intra-body nano network.
 
1) ELECTROMAGNETIC TO BIOCHEMICAL SIGNAL CONVERSION UNIT
 
"Electro – Bio Transduction Unit converts the electrical signals, received from external devices into biochemical signals, and transmits them to intra-body nanonetwork for further processing. This unit consists of a decoder, a drug storage unit, an external physical effect source, and an injection chamber. The decoder receives the signal transmitted from an external device and derives logic gates. The logic gates are binary commands that produce some physical effect in the environment like thermal, optical or magnetic radio-frequency (RF) signals. The physical effect source (thermal, optical or magnetic field) placed around the drug storage unit, stimulates the nanomachines to release their content in response to external changes in the environment. The injection chamber injects the released molecules into the blood vessel network."
 
 Here the "environment" being referenced is the one inside your body, so the triggering stimulus for this internal nano-system to do something can be initiated with heat, light or RF frequency signals, and since this system includes a drug storage area, whatever that contains can be released into your bloodstream on demand.
 
All throughout the various literature I have been reading the last three years one thing that kept popping up as a recurring theme was mental health and there were endless opinion pieces about how to deal with people who are tagged with some mental health diagnosis, more troubling than that was how psychiatrics was being used to herd people into various groups that courts were deciding had to be forcefully administered some sort of treatment that ran the gambit from re-education classes to mandatory medications.  Imagine how this capability streamlines all of that.
 
"The drug storage compartment of the bio-cyber interface contains nanomachines that are fabricated with materials sensitive to external physical effects like changes in light, temperature, pH or enzymes [65]. The injected nanomachines traverse the blood vessel network and are anchored at the targeted site due to high affinity. The nanomachines are equipped with ligands (i.e., signaling molecules in the MC channel) that bind to reciprocal receptors (i.e., receiving molecule) and are only expressed at the targeted site [63]. The process of electromagnetic to bio chemical signal conversion is depicted in Fig 5 [63]. Bio and non-bio materials can be used to engineer nanomachine, like liposomes that are drug nanocarriers fabricated with a coating that is sensitive to external environmental factors [64]."

​This paragraph simply explains how this is achieved mechanically, but what it makes me think about are what people have been calling "spike proteins" and how these things attach to a vessel and cause blockages because platelets would get hung up on them.  Here it seems these objects have been something else all along.
 
"Photosensitive materials release encapsulated molecules when stimulated by light at certain wavelength emitted from an external laser source [66]. The process of photoisomerization destabilizes the bilayer membrane of liposome upon light illumination and allows the release of photoresponsive molecules. For example, caged compounds release molecules by bond breaking [67] and gold nanorods generate heat as a response to their conformational change [63], [68]. Temperature-sensitive materials release their contents upon a nonlinear sharp change in temperature of the environment such as temperature-sensitive liposomes [69], [70] and dendrimers [71]. Such a sharp change in temperature triggers the thermo-responsive liposomes to release encapsulated molecules in the environment. Thermoresponsive liposomes should ideally maintain their load at body temperature (37◦C) and deliver the encapsulated drug only upon an increase intra-body temperature [63]."
 
So hit you with a laser, something happens, raise your body temperature, something happens.  "Caged compounds" stand waiting for orders.  I don't like where this is going, do you?

Picture
"Magnetic particles release their contents in response to magnetic radio-frequency signals generated by an external source."
 
And then additional examples of the nuts and bolts of this process are given.

 
Picture
In case you missed it, that was an example of how you give someone diabetes or take it away.
 
2) BIOCHEMICAL TO ELECTROMAGNETIC SIGNAL CONVERSION UNIT
 
 This is how information travels in the opposite direction, from your body to the medical server.
 
" The bio electro transduction unit detects the concentration of received molecules and converts the molecular signals into electrical form. According to [63], this unit employs a cell structure to be used as a bioluminescence bioreporter. The bioreporter works on the principle bioluminescence reaction that produces a reporter protein upon excitation from an analyte."
 
 An analyte is a part of the nano-biosensor used to "report" on you.

Picture
Some familiar terms here, like Luciferin and Luciferase, which we have heard beside other familiar terms like quantum dots.  Fluorescence molecules and luminescent materials.  Like the stuff that gives covid vaccine vial solutions that eerie bluish glow first pointed out by a Pfizer plant worker in charge of quality control who was dismissed and sued for doing her job a little too well?
Picture
"like carbon and graphene"!  I think I've heard enough, how about you?
 
B. COMMUNICATION UNIT
 
"
The connection of the human body with the Internet is the basic notion behind the IoBNT paradigm. bio-cyber interface can be used as a module for connecting the human body to the Internet. bio-cyber interface must possess the capability to wirelessly transmit the aggregated intra-body data to the healthcare provider. Bio cyber interface is responsible for communication with the intra body nano networks as well as with the internet. Therefore, it must contain two communication units i.e., one for intra body communication and one for external communication with the internet."
​
Picture

​There's your 6G frequency applications.

Picture

​So information travels around inside the body via "an aqueous medium that allows the flow of molecules towards the destination"  (i.e. blood) or by zipping around with "molecular motors".

 
Picture
 
[19] L. Felicetti, M. Femminella, G. Reali, T. Nakano, and A. V. Vasilakos, ‘‘TCP-like molecular communications,’’ IEEE J. Sel. Areas Commun., vol. 32, no. 12, pp. 2354–2367, Dec. 2014.
Picture
On and on this goes. 

It's all about drugging you against your will by slipping you electronic mickeys!
​

" most of the work in nanocommunication and IoBNT domain is dominated by MC."
Picture
Again with the graphene and carbon nanotubes.  I mentioned in a previous article a story about the guy that created a working AM/FM radio from a single carbon nanotube to illustrate what could be done with this material, so these are functional antennae arrays that people have growing all over, and spreading throughout their body.  And don't miss the active denial that this is harmful when they say:
 
"The THz spectrum is less vulnerable to propagation effects such as scattering, which makes it ideal for intrabody communication due to its safety for biological tissue i.e., non ionization"
 
The only thing they like here is "less vulnerable to scattering".  Non ionizing has nothing to do with this being harmless.  It is the constant modulation and phase shifting of these frequencies that causes harm.  This is how you keep signals separated so commands sent to your nano network of cooties don't interfere with commands sent to mine and it produces an effect like an EMF jackhammer that is breaking everything it touches.


Picture
You hear that?  "researchers in the field of chemical engineering have been working on wireless chemical sensors (WCS) for more than a decade now"  THIS IS OLD!  And what they can do with it couldn't be more clearly stated.
 
Here's all the specifics:
Picture

That’s enough for Part Three.
Part Four will cover each of these technologies, explain where the power this system runs on comes from, and summarize the entire section.

 
If you are just finding my blog please be sure to also check out two other contributions I made:
HOW TO REVERSE VACCINE INJURIES:

http://estateartistry.com/blog/reversing-vaccine-injuries
CANCER CURE:
​http://estateartistry.com/blog/cure-your-cancer-by-christmas

1 Comment

Exposing the Bio-API - Part Two:

10/9/2023

1 Comment

 
Before we get started, let's play a little game of "Could it be…"
 
This is not a game in which we express our opinion, parrot things we have heard in an authoritative way, claim or dispute facts, or debunk lies.  This is going to involve using your imagination, and that’s all.
 
I'm going to ask a question I would simply like you to think about as we continue learning about the level of technological sophistication that has been achieved in the bio-nano world and explore how it functions.

 
Could it be, that the reason modern medicine is failing us so miserably, is due to the fact that very little is actually true in this field?  Could it be that a "doctor" is a person who possesses what amounts to a photographic memory of the pages of a fictional novel?  Could is be that a "medical specialist" is another kind of expert that can tell you unwritten back story about people, places and things that appear in the story?  Could it be, that a "medical researchers" area of expertise has to do with things like the type of ink that was used to print the manuscript, where the printed paper came from, how it was made, and so on?
 
Could it, in fact, be that everything that is done in the field of medicine is not at all what we have been told it is, but instead, is a field of science that has been cleverly created and supported, that has grown into what it is today over the last century or so, simply to provide us with a seemingly credible group of people whose only real purpose has been; to create plausible, authoritative explanations that someone somewhere knew would be needed, to divert attention away from the real effects of something these same hidden hands were covertly doing?  A ruse that would require someone else we would believe, like an approved and accredited doctor, that we would either go to ourselves or be directed to go to for such answers, who would tell us whatever we needed to hear so we would not go looking for other reasons to explain what was making us sick this whole time?

 
I throw this out only because these are the questions that run through my own head after everything I have learned trying to answer both patient and doctor type questions.  I have found the doctors unable to even agree with each other, let alone explain anything to my satisfaction.  Finding answers has been left up to me.
 
I heard James Rogowski share a beautiful analogy he came up with the other day to illustrate what goes on when you consult a doctor about a health matter.  James compared that to having a problem with your car that you are alerted to by an idiot light on the dashboard.  In this case, it was the low oil light. 
 
You bring your car to a mechanic, who will serve as the "car doctor" in this analogy.  His advice to you however, is NOT to add more oil, although he will make a pretense of checking around for leaks, and this is time he will bill you for. 
 
Instead of addressing the problem of not having enough oil in the engine, and solving it by adding more, he diagnoses the problem as "annoying light syndrome" and advises you to remove the bulb.  If you don't agree with this you may see another "auto-doc" [pun intended] who denigrates the first guy in some way.  "Oh you don't need all that" he tells you.  "Just place this tape over the over the annoying light." he says, before sending you on your way with a note for the guy at the auto parts counter.
 
Unfortunately for you, just like a poor auto mechanic, modern medicine does not concern itself with any sort of healing.  It is in the business of disease management, so they don't cure diseases.  They only mask the symptoms of any affliction in a way that creates more, so sadly, this analogy is quite accurate.

Resuming now with the IEEE paper:
Picture
Picture
Picture
Notice under the heading of "Security in IoBNT some of the exploits that will be discussed, and the  vulnerabilities that make these exploits possible to execute on both nano-networks and on the biocyber interface itself.  Things like "eavesdropping, spoofing, and replay".  We will look at those closely.
Picture
That detection capability, all by itself is extraordinary.  The measurement of most toxins is done in parts per million (PPM).

Picture
So we have two categories, electronic and biological and each is a self contained unit.  The electronic variety utilizes carbon nanotubes and graphene nano ribbons.  These are the hairball like structures everyone with a microscope is seeing in both vaccine solutions and in blood samples, particularly clots and masses that have been extracted from the living and the dead.
​

Picture
So here they tell us some of this is large enough to be seen with an optical microscope, so these are the curious objects the people who examine samples are finding in their own labs.  Notice also how a cell phone acts as a "gateway device", spying on whatever your biosensory network is reporting and making that data available to a terminal with a human operator.
Picture
Setting aside the fact that it is this communication that causes a myriad of health issues that may force you into a medical situation where the ability to survey this data non-invasively is the main "advantage" driving this research , there is an obvious underlying ethical problem with all of this.  First of all, you never agreed to have this technology installed inside your body.  Second it creates the problems it seeks to address.  So what then is the point of this if the stated reason for doing it is to advance and improve medical treatments for conditions that would not exist were it not for this, and lets properly call it what it is, INVASIVE technology?
 
Exactly.  That’s not the reason.  However that is both the justification and the noble sounding excuse that is used to enlist the people that create this stuff, and if objections are raised it leads to a defense that all of this is being done as a benefit to you.  They are getting away with this precisely because the dangers of it are completely ignored and dismissed.  Nobody working on this is allowed to say this tech is harmful.
 

"The material used to compose nano devices can be only biological [60] (proteins, DNA sequences, lipids, biological cell) or they can be synthesized with non-biological materials such as magnetic particles and gold nanorods. There are a number of naturally occurring nano devices e-g protein motors that bind certain types of molecule on cargo transport them through filaments and unbind them at destination, liposomes capable of storing and releasing certain types of molecules, biological cells coated with non-biological material for non-cell native functions(e-g absorbing mercury). An envisioned bio-nano thing is presented in Figure 4."
 
Non-native functions like absorbing mercury?!?  Someone please explain why this is an "upgrade" to my physiology.  Oh wait, I get it.  Can't have mercury laden vaccines killing you off before the experiment is over.
 
Where have you heard these terms before?  How about lipid nanoparticles envelopes that conceal mRNA sequences that cause your body to manufacture spike proteins?  That was part of the explanation Moderna gave us for how its amazing vaccine platform supposedly worked.  Forget that they were fighting covid, which is the result of radiation poisoning you get from all this EMF tech chatter.  

" biological cells coated with non-biological material "  There is your polyethylene glycol (PEG) coating that encapsulates the lipid nanoparticle envelopes.

So ask yourself, those of you who believe in vaccines and covid viruses, was all of that bullshit?  I think we can now lay all of that nonsense to rest.

Picture
 Now look at the diagram above and think back to images Dr. David Nixon published:

Picture
Picture
Source: https://drdavidnixon.com/1/en/topic/images
Do you see the biosensor?  How about the graphene carbon nanotube wiring them together?  Ya.  SUCK IT Peter McCullough!  There's your stupid covid virus right there.  And these things do move about on a slide.  Do you see the little locomotion jet in the previous diagram?  Or am I the only one with eyes.
Picture
You get these thing inside you by eating them in foods (like magnetic meat) or by injecting them (like inside a vaccine).  And they…
 
"can easily be placed in hard-to-access areas (e.g., deep inside tissue) and perform therapeutic operations."

 
Coincidentally, they can also perform DESTRUCTIVE operations!
Picture
There's your radio, encoding and decoding messages.
​

Picture
Still want the latest iPhone?  How about all you guys chasing Bluetooth signals in people?  Are you getting the picture now?
Picture
This is the place where all the data on you will be warehoused that all the criminals will get into eventually  so they can steal it and sell it to each other.  And by criminals I am talking about the government that financed all of this to give them a way to kill you that you would never see coming, and without you ever knowing it was them doing it.

Everybody working on these projects needs to stop immediately!
 
You are not helping people. 
You are not a champion of the human race
that is working to eliminate illness.
There is no need to monitor health
or warn people about health issues.
You are not enabling early treatment options
or detecting super-cooties
or any of that.

 
YOU ARE EVIL!

PART THREE of this series will pick up with a detailed design of a bio cyber interface device.
 
If you are just finding my blog please be sure to also check out two other contributions I made:
HOW TO REVERSE VACCINE INJURIES:

http://estateartistry.com/blog/reversing-vaccine-injuries
CANCER CURE:
​http://estateartistry.com/blog/cure-your-cancer-by-christmas
​
1 Comment

Exposing the Bio-API - Part One

10/7/2023

1 Comment

 
This post is part one of a series in which I will expose and demystify our common enemies greatest weapon, something they have been quietly building since 1922!
 
While this information may sound rather scary it is not my intent to scare anyone with it.  Please, don't share it in such a way that frightens anyone else.  We have all collectively done quite enough of that. 
 
I believe it is more scary to be in the dark about why the things we see happening all around us are happening at all.  I am doing this to empower you, by showing you how these magic tricks are being done.  That is how you need to present the material to others.  It is OK to get angry about this.  It is not OK to condone or allow it, or worse, pretend it is not real.
 
Let's get started.  This will be:


A Systematic Review of Bio-Cyber Interface Technologies
and Security Issues for Internet of Bio-Nano Things


IEEE - Received April 26, 2021, accepted June 21, 2021, date of publication June 29, 2021, date of current version July 7, 2021. Digital Object Identifier 10.1109/ACCESS.2021.3093442
 
Not everyone will immediately recognize how valuable this information is, but that's ok, because I am going to take you on a walk through of it paragraph by paragraph, all 38 pages of it.  It is critical you take this slow to understand, and not misread or misinterpret anything in this paper. 
 
Every scientific field has its own technical jargon, but this one is special.  Whether or not you realize it this is a black projects operations manual.  There are a number of terms that function as code words because they have dual use meanings, just like the legalese in contract language.  There is the explanation you think you understand and then there is the application reference.  This technique results in a kind of obfuscatory steganography that allows the bad actors, who purposefully fund this work, to conduct a fully compartmentalized operation like this one right out in the open, and leave the evidence of what they are doing hidden in plain view.
 
When we are done with this you will have the keys to their kingdom, I promise you that, so save a copy of this post and any others that follow, in case I get droned for doing this.  Everyone is worried about nano-tech, vaccine time bombs, transhumanization, biowarfare and genetic tinkering.  Like anything, all that  can and is being used against you, but it can all be defeated, defused, removed, and reversed.  I am going to show you how the weapons work, and how to destroy them.
 
The first thing to notice is the date of this document, which is July 7th 2021.  It is two years old and there may be more recent updates.  I did a little digging on IEEE Access, which is where the IEEE archives research and policy papers, but to read most of what is there you need an IEEE member log in credential.  Obviously, I don't have one, so I can only access the papers that are currently under peer review and of those, certain ones are featured and  presented in their entirety.
 
I can access a list of  all archived material and run searches, but I cannot open the documents without a login.  Even so, if you simply search the title of this paper (I did that in Brave browser) it will pop up at the top along with lots of other returns which have links to all sorts of related whitepapers, so anyone can dig up proof of what I am talking about.  I am picking this one apart for you so you don't misunderstand it and maybe help you become familiar with the lingo and what these terms actually mean.
 
As you will see, research of this type is done under the auspices of advancing medical healthcare technology but it is explained largely in information technology and cyber security terms.  The veiled language allows authors to openly share details about covert technology and all its nefarious uses without being overtly obvious that is what they are doing.
 
I will begin with a review of the abstract.
Picture
Right off the bat there are some admissions:
 
We are discussing "tools that can be used to control, reuse, modify, and re-engineer cells’ structure, as well as enabling engineers to effectively use biological cells as programmable substrates…"
 
They are talking about using the body as a read/write storage medium.
 
"…to realize Bio-NanoThings (biological embedded computing devices)."
 
This term encompasses a lot of different components that include nano biosensors.
 
"concealable devices that can be used for in-vivo applications such as intra-body sensing and actuation networks, where the use of artificial devices can be detrimental."
 
Here we see the admission that these are spying devices placed inside the body, that form networks that can be "actuated", and that they can be used to cause harm.
 
"Such (nano-scale) devices can be used in various healthcare settings such as continuous health monitoring, targeted drug delivery, and nano-surgeries."
 
Here you see three of the code words that define areas in which this technology will be promoted as amazing advances in science, justified as beneficial tools used for patient care.  This is how the people working to design and develop this tech troll for the funding that supports their work, and they will take money from any source they can obtain it from.
 
"These services can also be grouped to form a collaborative network (i.e., nanonetwork), whose performance can potentially be improved when connected to higher bandwidth external networks such as the Internet, say via 5G. "
 
5G is a giant nothing burger.  The communications platform being discussed is properly labeled elsewhere as 6G and 7G.  If operates in the THz bandwidth and creates both the medium used by nano-hardware and the bridges that convert and connect the nano-sized world to the micro-sized world.
 
Here, the nanonetwork they are referring to is known as the PBAN, or personal body area network.  This is one tier on a multi-tiered system of networks that collect and parse information about the state of the body.  This includes metrics like heart rate, blood pressure, glucose levels, temperature, etc.  This is a lengthy list as you will soon see.
 
"However, to realize the IoBNT paradigm, it is also important to seamlessly connect the biological environment with the technological landscape by having a dynamic interface design to convert biochemical signals from the human body into an equivalent electromagnetic signal (and vice versa)."
 
IoBNT stands for "internet of biological nanotechnology" and the paradigm mentioned is this idea of creating a computerized system that uses human being as nodes in a biological mesh network.  To operate this system you need a terminal, that is the dynamic interface design.  This is a software that allows a person to manipulate settings that influence or controls a body, or group of bodies that have this nanonetwork installed in them, and that this terminal is connected to, and it does this by disrupting key bodily processes. 
 
This system communicates using electronic signals.  That is the "technological landscape", so this tells you there is a two way communication going on, and that the body acts as both transmitter and receiver, and that the messages are encoded and decoded as EMF waves.
 
Using the body in this way exposes it to harmful radiation that causes symptoms that have been disguised and diagnosed as the fictitious illness we call covid.  But that is not the only illness they can inflict.  The covid diagnosis was invented simply to provide another explanation  for the symptoms of radiation sickness, which are an exact match, or vaccine injury which can include almost anything else.  As far as radiation exposure goes, installing this nanotech carries the same risks that implanting your cell phone inside your body would, but even worse is the fact that with this nano-gear installed, your body becomes a device an operator can log into and interact with by using a control software which resembles a developers application programming interface.
 
"This, unfortunately, risks the exposure of internal biological mechanisms to cyber-based sensing and medical actuation, with potential security and privacy implications."
 
Ya think?  So there are risks involved they readily admit.  They admit it is harmful to the body, that changes can be "actuated" and like anything else in the digital computing space you can now be hacked by anyone who manages to obtain access to the data center or cloud that hosts you health data, and they can then use your stolen biological information to create exploits.  This is what this system was designed to enable, and the term "exploit" is specifically used over and over throughout this document. 
 
This is a system built by hackers, for hackers.
 
"This paper comprehensively reviews bio-cyber interface for IoBNT architecture, focusing on bio-cyber interfacing options for IoBNT like biologically inspired bio-electronic devices, RFID enabled implantable chips, and electronic tattoos."
 
This is the hackers toolbox and all the tools at their disposal.
 
"This study also identifies known and potential security and privacy vulnerabilities and mitigation strategies for consideration in future IoBNT designs and implementations."
 
We will tell hackers where the vulnerabilities are so they can exploit them, and various ways the system can be compromised such that their efforts can be impeded.  Mitigation strategies are where ways to mute or destroy nano tech is discussed, along with counter measures hackers might employ and how to implement them.
Picture
If you want to pull additional documents on any of the areas this paper covers these are the terms you enter into the IEEE archives search function.  As I said previously, you will need a member log in credential to read most everything stored there, but there are other platforms some of these documents make their way to, like Google Scholar and ResearchGate, so if you just search on the title, sometimes you get lucky.
 
I. INTRODUCTION
"With recent pandemics and the associated lockdown regime, there has been renewed, if not accelerated, interest, in exploring electronic and remote delivery of healthcare services. One of the recent trends is in the Internet of Bio-Nano Things (IoBNT) systems, which comprise biological nanonetworks that sense biological and chemical changes in the environment (i.e., human body) and send the collected data over the Internet to data centers for further processing."
 
This refers to the bad guys here wanting telemedicine to replace standard healthcare along with providing that care via internet.  This new system of "McHealthcare" will eliminate the need for a doctor to be personally involved and enforce a rules based medical system governed by pre-programmed procedural protocols. 
 
Imagine a dystopian future scenario in which you are told a new pandemic has begun and the danger here is a virus or other contagious disease that is so dangerous you cannot risk infecting a doctor with it, so you will be directed to a kiosk or whatever to receive whatever care you require.  This technology is a requirement of biological security and preparedness measures.
 
" These nanonetworks can also perform medical actuation from the commands sent remotely by the relevant healthcare providers. Typically, biological nanonetworks consist of nanosized computing devices (also referred to as ’Bio-Nano Things’), which work collaboratively to achieve sensing and actuation tasks within the deployed environment [1]–[8]."
 
This is your "remote control".
 
" Supported tasks include targeted drug delivery (TDD), continuous health monitoring, tissue engineering, and tumor detection [9]–[16]. Conventional wireless communication technologies are generally not suitable to support communications within the nanonetworks due to limitations in transceiver size, computation capability, and propagation channel of the bio-nano things. This necessitates the design of novel communication technologies for these nanonetworks [17], [18], and examples include molecular communication (MC) [19], [20], nano electromagnetic (EM) communication at Tera Hz band, acoustic and nanomechanical communication [21], [22]."
 
We can drug you, spy on you, collect personal health data, genetically modify you, and detect the tumors you develop as a result of us constantly exposing you to the radiation this harmful non-consentual installation generates INSIDE your body as it talks to other external parts of this system.
Picture
The minute size of nanodevices makes them resource-constrained and unable to communicate directly with macro-scale devices. To achieve this objective a hybrid device needs to be incorporated within IoBNT architecture.  They commonly refer to this as the bio cyber interface which can provide a seamless interface to the biological world inside the human body and the cyber world of the Internet. 
 
For the last couple years, this is what I have been referring to as the Bio-API, but up until recently I really didn't have a very good understanding of what was involved or how it worked.  When I would see scientists like Dr. David Nixon show what he saw through his microscope when examining vaccine solutions, or look at the debris in live blood analysis done by Dr. Anna Mihalcea, I saw what I was certain were the components of this system, but without a guide like this one, I was unable to identify what component they were looking at, or what purpose it served.
 
Knowing what kind of components are needed helps a great deal, and some of them have unique shapes and properties, like an ability to give off light.  Knowing what the various types of luminescence are helps to identify some of these bits, whose functions are described in this paper.
Picture
Source: https://www.edinst.com/blog/photoluminescence-differences/
​

Picture
Second skins include various types of materials that can be used to make "smart" clothing.
 
The term "bio driver" is explained better in another paper I have this way:
Picture
Picture
Picture
The properties of recently studied nanomaterials, such as graphene, have inspired the concept of Internet of NanoThings (IoNT).  Graphene is now everywhere and it is showing up more and more in the foods you eat.  I have warning people about the magnetic meat being sold by large grocery chains, telling them not to eat it.  Now maybe you understand why. 
 
The funny thing about graphene is what happens when it comes into contact with living tissues.  It becomes paramagnetic and electrically conducive.  This is what they are referring to when they say "materials characterized by electromagnetic properties"  These are the very same properties that make the interconnection of nanoscale devices possible. Despite being an enabler for many applications, the artificial nature of IoNT devices is detrimental where the deployment of NanoThings result in negative effects on health.
 
Graphene has been found in covid vaccines.  Just as it is in humans, graphene is introduced into livestock by way of mandatory livestock vaccination programs that are required by the FDA.  Cows and chickens get covid shots too now.  Graphene is now in all vaccine formulations and most mass produced medical injectables. 
 
But when I raise what have become well-known heath concerns to grocery chain store managers, one thing they do is show me an FDA certification that ensures that the meat is safe for human consumption.  With this assurance they feel comfortable selling it and they assume that this approval provides them with protection against any liability if it harms you in any way. 
 
My response to a piece of paper written by a captured federal agency is: 
"I don't care what criminal wrote this, I am not going to allow you to sell me and my family poison food products!"   Informing them that graphene and its derivatives, like reduced graphene oxide, are toxic industrial chemicals, and showing them easily obtainable proof establishing that fact, puts them on notice that they cannot hide behind the FDA.
 
…But I digress.
 
Lets listen to these fools discuss how IoBNT can be misused.
Picture
Notice how the need for cyber security is acknowledged, along with a less than encouraging outlook on being able to overcome associated security challenges.  I'm not going to sugar coat this.  Enabling bioterrorism was the reason for creating this system, and is currently, the ONLY way this technology is primarily being utilized today!  The only reason for even building any security into this mess is to make it possible to limit user access to it by requiring them to rent that access with a limited subscription fee, or buy it with a software license.
 
This is a pay to play, for profit industry.  For a few bucks they are selling the ability to hack into your body.  And because misusing this technology includes inducing lethal effects, this is literally a license to kill.
 
Did anyone else out there ever look at the name "Pfizer/BioNTech and think to themselves, "Gee, that is a funny sort of company name."?  

​Well, read it again this way:  Pfizer: BIO-NANO TECHNOLOGY DIVISION!
 
From here the paper goes on to compare the information presented with articles and surveys published by other authors.  Take note of how this document differs.
Picture
In other words, that particular survey they name, and the other literature they refer to, won't help you understand the bio cyber interface and what it's more important bits and parts do, but this paper will.
 
Still, some of these other citations look very interesting to me.  Like this one:


Picture
[41] P. K. D. Pramanik, A. Solanki, A. Debnath, A. Nayyar, S. El-Sappagh, and K.-S. Kwak, ‘‘Advancing modern healthcare with nanotechnology, nanobiosensors, and Internet of nano things: Taxonomies, applications,
architecture, and challenges,’’ IEEE Access, vol. 8, pp. 65230–65266, 2020.
 
This discussion of other related papers goes on at some length.  Another survey paper in the citations presents state-of-the-art in security and safety issues of the Brain Computer Interaction.
 
"This work thoroughly identifies some novel cyberattacks, their impact on security and safety and their countermeasures.  Some of the attacks like misleading stimuli are strictly related to BCI as it indicates alteration of the nuerosignals generated by the patient."
 
They are talking about messing with your mind in ways that involve changing the way you perceive reality and how you distinguish between what is real and what is not.  We already know from the testimony of scores of targeted individuals that have been covertly used as experimental lab rats what sort of tortures can be created with this capability. 
 
And then there is this troubling admission by the authors of this document:
Picture
These researchers are not getting paid to secure you,
they are getting paid to provide access to you!


​This introductory section concludes with some advice on where to look for related documentation by providing key search terms to enter when perusing journals that cover the topics they specifically name: 
Picture
I want to keep this expose digestible for laypeople so I will limit each post to about ten or so pages in length and get as far as I can in each post, but the series will  cover the entire document.  Now you have it as well, so you can follow along with me as I go.
 
This concludes PART ONE.  I will continue to dissect the content of this and other material which will expose the current level of sophistication involved with this technology, what can and is being done with it, and how it has fooled the entire world into believing in pandemics, and viral contagions, all for the purpose of terrorizing us into willingly surrendering our freedom, and to force us into slavery under the control of a global technocratic police state.
Unbeknownst to you, these weapons of biological electronic warfare have been perfected and unleashed upon us all, and today your own body is being used against you.  This is an unconscionable evil that that has been released, and it must be exposed, its development halted, its use outlawed and prosecuted, and everything related to it destroyed.

Part Two of this series will pick up where this article left off,
starting with a breakdown of the "Internet of Bio Nano Things"
System Architecture.


If you are just finding my blog please be sure to also check out two other contributions I made:
HOW TO REVERSE VACCINE INJURIES:
http://estateartistry.com/blog/reversing-vaccine-injuries
CANCER CURE:
​http://estateartistry.com/blog/cure-your-cancer-by-christmas
1 Comment

This Is (only?) A Test…

10/2/2023

18 Comments

 
I want to cover one simple thing today, and give you an educated opinion on something FEMA is testing on Wednesday, October 4th.  I realize that is TWO DAYS away from today.  My timing was deliberate, I have been sitting on this information for quite some time now. 
 
There are a couple reasons for that.
 
First, and probably most important, I have been burying myself in a research bubble the last month, actively trying to gather some credible information about an area of science that people largely know absolutely nothing about, so that anything I talk about has something that can be verified backing it up.   This blog is not a fear-porn fire hose.  If anything I try to defuse uneducated speculation here and limit my discussion to activities and events that actually should be noted and remembered, and in some cases, actively monitored. 
 
We all have limits on our bandwidth.  I have a lot fewer of those than you probably, so I invest my time educating myself as much as I can in areas that require a lot of time and effort to understand, with the goal of being a credible expert in those areas.  I have earned a reputation for being able to do that, and I regularly challenge the experts peddled out as such to the public.  I selectively attend presentations and participate on panels with other people who are there to evaluate information entering into public discourse. Because I know what questions to ask I frequently win debates with recognized "experts".  If their knowledge is biased or lacking in some way I will expose that every time, so my opinion is often sought out and respected by those that ask for it.
 
Unfortunately, this is not one simple thing.  I am going to be forced to touch on a number of other areas that have a relevant cross over that must be considered.  You will not be satisfied with the extent I cover those other areas because this post would go on forever.  I will however provide a deeper dive into each very soon.  This is a "need to know" article.

Let's get into it.
 
FEMA TO BLAST ALL SMARTPHONES , TVS, RADIOS WITH MASS ALERT TEST ON OCTOBER 4
https://www.zerohedge.com/markets/fema-blast-all-smartphones-tv-radios-mass-alert-test-october-4
On Oct. 4, the Federal Emergency Management Agency (FEMA) will push mass alerts across the nation on every television, smartphone, and radio with a notice that USA Today said would read:
 
"This is a nationwide test of the Emergency Alert System, issued by the Federal Emergency Management Agency, covering the United States from 14:20 to 14:50 hours ET. This is only a test. No action is required by the public."
 
FEMA's last test occurred in 2021 during the Covid pandemic. At the time, the emergency agency sent test alerts nationwide, causing all phones, televisions, and radios to blast an annoying sound.

 
But its much more than that…
 
THIS IS AN ILLEGAL HIGHLY SUSPECT EXPERIMENT
https://www.bitchute.com/video/kGA1WixbiBAV/
Listen to Mark Steele explain the REAL purpose of this FEMA PSA.  My advice?  Don't be anywhere near a big crowd at this time and turn off your devices when they blast this message out.
 
So what is this… really?
 
Emergency broadcasting systems are in use practically every day, and they have proven themselves to be very useful and important systems.  In this case however, consider who is using it.  FEMA is not your friend.  FEMA is a human livestock management agency, literally.  FEMA is deployed whenever there is a need for political damage control and population herding, so nobody with a preference for self-preservation should follow any advice FEMA offers.  FEMA reduces a problem by reducing YOU to balance an equation.
 
The system FEMA will be testing has a dual purpose.  You know the publicly stated purpose:  Keep you informed in the event of an emergency.  The covert purpose is signals processing that deploys the weapons of electronic warfare.  These are weapons you cannot see that cause things you can see, effects that will be explained away mostly as predicable and more or less normal.  This is to maintain the secrecy around black project "proof of concept" experimentation.
 
It can be hard to differentiate between a proof of concept phase and a deployment phase.  Typically, common sense will tell you that if a thing happens but it happens in a scattershot or incomplete way, that points more to a testing situation.  If a thing happens and the effects are dramatic and unprecedented, that points towards the event being an active deployment.  These is a very general and shallow basis of determination, but its all you really have unless you are either involved in some way or have directly specialized or compartmentalized operational knowledge.  I have a bit of the latter.
 
Factually what we know is since March of 2020 there has been a very visible governmental preoccupation with constructing and implementing a myriad of facets supporting a global bio-security super state.  There is absolutely no credible reason for this, so like climate change agendas, the entire operation is a smoke screen.  A big part of this is the "One Health" campaign being shoved down everyone's throat by the WHO.  This includes programs full of people they will tell you are tasked with monitoring and swiftly reacting to biological threats of every kind, and their answer to any they claim to find will come from the Bill and Melinda Gates foundations and its horn-headed evil twin, the GAVI Alliance.  Their role will be to deploy "disease firemen" to the scene armed with rapid response testing kits they manufacture to confirm their lies and ultimately, forcefully inject you with a miracle antidote they also manufacture, which they will magically come out with in less than 100 days.
 
These remedies will undergo no prior testing of any kind, certainly no human testing, and you can expect them to be as lethal, but likely more lethal, than anything produced and distributed as a response to covid.
 
If you were just born yesterday, covid is a fictitious illness.  Covid is radiation sickness and vaccine injury.  These people cause every problem they address, NEVER FORGET THAT.
 
i.e.
Apple Tells Support Staff To Remain Silent On iPhone Radiation Concern
https://www.zerohedge.com/technology/apple-tells-support-staff-remain-silent-iphone-radiation-concern
 
That shockingly offensive little rodent, Yuval Harawi, has been gloating publicly on behalf of Klaus Schwab, about the amazing capability they intend to bring into reality once you are transhumanized, to "biologically hack you like the animal that you are".  They will know what you are thinking, control your behavior, and manage everything you need to live while taxing you for it.  This includes food, shelter, air and water.  This is the product of the "4th Industrial Revolution".  As the modern day Robber-Barons they see themselves as, if you fall out of whatever line they instruct you to cue up in, you will be punished by depriving you of whatever meager allowances they graciously provide, up to and including your right to live.
 
This is not an exaggeration. 
 
Figuring out how to do exactly this has been the purpose of every grant-funded "philanthropathic" penny since the idea first occurred to them in 1922!  Today, the fruits of all of those labors have been harvested and installed, pretty much everyplace they need to be, so choosing what to do, how much to do, and the timing of those decisions is all that remains.  The details of how this will be accomplished are possible to uncover.  I know a lot of these details now, but there are only a handful of people who play the connect-the-dots game at this level.  I am aware of three and in contact with two, so hopefully that gives you some idea how effective their game of misdirection has been.

I do not scare easily, but I admit, I have had my moments.  This is a credible threat completely outside of anything you or I can control, but let that be a source of serenity if you can.  I will give you one more.  As dangerous as the world has recently become, even this sort of thing has its challenges.  I can't see these plans working out as they expect them to.  What I can see happening, what I fully expect to see, is a lot of collateral damage, because they cannot back up now. 

 
Pass or fail, the die is cast.


THE HUMAN BIOFIELD IS A BODY PART
​

You have been told it does not exist.  If you believe it does you have been calling this your aura and a bunch of other things.  It is real, and you can even take a photograph of it using Kirlian photography, which is a photographic technique used to capture images of electrical coronal discharges.  You body is electrical, and it has an quantifiable, measurable electrical output of about sixty watts.  All bodily process are powered by this energy, and approximately 80% of that is used to power your immune system.
 
This energy can be co-opted, hijacked, and even harvested, to power other systems like internal nano bio-sensors as well as external systems linked to weaponized AI.  You heard me right, but I realize you probably don't believe me…  YET.
 
Despite your skepticism, (which I encourage, because without it you would have no reason to listen to me or investigate more), you have been hearing all kinds of people talking about all the ways they will use the data they collect in every possible way to manipulate this system.  This includes using YOU, as the backbone of an entire system that has been in place and functioning since 2005, they just don't talk about what that system is.

 
It is an invisible body part called The Human Biofield.
 
The slide below is from an IEEE meeting that took place very close to where I live, in Alexandria, Virginia in the spring of 2022.  The presenter is explaining electronic drug delivery within the larger context of biosecurity, within which, "health monitoring" plays a huge role.  You can watch that conference here if you choose:  https://rumble.com/v3ks9wd-september-25-2023.html There is also an Easter egg you might be able to find in the comments section that I placed there.
Picture
These researchers are giddy with excitement as they come ever closer (they think) to eradicating all disease via remotely operated electronic means.  In this mythical utopia, everything from drug administration to actual surgery will be possible to accomplish via telemedicine.
 
Now think about that for a minute, because they haven't done that.  Here's what they are selling:
 
Imagine yourself feeling bad.  You reach into your pocket, whip out your cell phone, call up the "feel better" app and mash the green button.  But it gets even better, now there is no app, no cell phone, no telemedicine chat bot, no diagnosis.  The state will monitor your health and ensure you are in tip top shape from cradle to grave.  In this fantasy nobody even knows healthcare is, its just something that happens.
 
But we know better.  We know that if there is a choice where something like this can be used for good or evil the evil use prevails.  Anything you can fix can also be broken with the same multi-tool.  If there is any functioning grey matter at all left in your head the pattern you ought to be able to recognize by know is one in which good people advocate and fund the evil use, while the benefits they thought they were going to get never materialize, forever remaining in development - but just around the next corner so long as the cash flow continues.
 
Show me your flying car, free energy, your hover board, the cure for cancer (I have that by the way).  In reality, we never receive any of the benefits which are the reasons given to do all kinds of research.  But reality is not where they want you to be.  They want to you dream of better things.  As long as you are asleep, all you will get is more forms of torture, because we were never intended to be the beneficiaries of such efforts.  Once a thing can be weaponized, that is what its use is.
 
In "Wellville" you never meet that guy from the government who introduces himself to you claiming to be there to help.
 
Right now you do…  Whenever you skip a vaccine.  That’s why vaccinations are just a way to get this ball rolling.
 
But whether you are vaccinated or not you are infested with biosensors.  We ALL are.  They are simple devices, nothing like that Mark of the Beast chip Christians are afraid of, and you have literally been eating them and inhaling them since 2005.  They have been raining down from the sky, and sprayed on you.  They are in every blade of fucking grass now and you had no idea this has been going on, so don't freak out.  You ain't dead yet.  Right?
 
The Bio-API is a real thing, trust me on that.
 
The problems all begin when someone starts flipping switches, logging in, and adjusting the settings on pull down menus included with the interface, and like every piece of software you are familiar with, you access them by purchasing paid subscriptions and signing license agreements. 
 
Why is the IEEE involved?  Well, that is the Institute of Electrical and Electronics Engineers, and what they do, among other things, is establish the standards for things like the communications protocols used by Wi-Fi enabled devices.  
The 802.15.4 protocol is assigned to Bluetooth biosensors!
The 802.15.5 protocol is assigned to wireless body sensor networks!
The 802.15.6 protocol is assigned to Wide Area Body Networks (WBAN)!

This is a pay-to-play, fully commercialized industry you never knew existed, just like your own Biofield, and the state sponsored military, the same one who executed Operation Warp Speed, has an all access pass.  What was that about?  Well, if you don't know you are probably dead already, but for the sake of those who aren't, it was about executing YOU.
 
Think this is all defense contracting?  Think again.  Amazon bought a subscription to this.  Amazon AWS can "mesh" with any Body Area Network for its shipping services.


Now We Come To the Meat Of This Article.

(Finally, right?)

This week's FEMA broadcast will either be something or nothing.  There have been a lot of alarms sounded by people in the alternative media about this being a dangerous trigger signal.  Most of them have a poor understanding of what they are talking about, so this includes people like Todd Callendar and basically any fucking doctor, who by the way, cannot be more unqualified to voice any opinion on this whatsoever, so tune them all out.
 
I know Todd and used to talk to him frequently, but lately he has been hard to reach.  I intend to correct his understanding of how all this works, but I have other priorities as well, so he will either get back to me or not.
 
These people are expecting widespread breakouts of Marburg, viral releases, and bioweapon activations of all kinds.  I like a lot of these folks, some are friends.  Some of that has a basis in reality, but unless they have everything correct, and I mean everything, they are a mini-skirt wearing teenager in an auto repair shop telling the mechanic what's wrong with their car.
 
But all the attention they have been grabbing has put a lot of people on alert, which is not good if you are Dr. Evil and prefer to work in the shadows when nobody is watching.
 
As doctors go I do like Dr. Lee Merritt.  She is no dunce, and because she has actual work experience in advanced bioweaponry research anything she is concerned about is at the very least something you should consider.  Lee is doing what I am doing, which is powering down my home at the master circuit switch and leaving town without any devices, to get as far away from people and cell towers as she possibly can.  I know that’s next to impossible to do on short notice in the middle of a work week.  Which is why this test is not being conducted on Sunday afternoon during a holiday weekend.  That aside, where does one go?  I can't completely isolate, but I can go camp out in a low density area with spotty cell service.  That will have to suffice.

 
There are three main areas of concern with respect to this event:
 
Nano Payload Releases:

There is a technology out there that has been in use for a lot longer than most people realize, so the high risk groups listed below are ones I am certain of, but I am also sure there are many more that are potentially at risk as well.  It involves the use of nano spheres as payload carrying structures.  These are manufactured using various meta materials that vary in terms of their durability.  Nobody with an optical microscope has ever seen one of these things directly.  At three to five nanometers in diameter you need an electron microscope to see them at all.  Interestingly, they most resemble the cartoon representation everyone has seen of a spike protein covered cell.
 
High risk groups include
  1. Since 2020, all vaccinated people (this includes Quadrivalent flu shots and nasal sprays).
  2. Since 2020, any recipient of a blood transfusion.
  3. Since 2018, anyone that has received medical injectables like insulin, or required them to undergo a recent surgery.  This includes common dental anesthetics.
 
The weakest structures were used in early covid vaccines.  They ruptured in the vials during transport or at some point after they were thawed out, radically increasing the lethality of the solution, and this resulted in what most of you recall as "hot lots".  Those who received injections from these vaccine lot numbers had as much as 600% higher instances of death and permanent disability.  I covered all that in archived posts as it happened and throughout the scamdemic.
 
The structures with the best shelf life are made from carbon silica and are as hard as a ceramic pot.  All types are full of perforations that are plugged up by a synthetic molecule called Rotaxane, which ensures that whatever payload the structure carries, it is securely kept inside this box.  These nanospheres can harbor any sort of payload that will fit inside of it, anything but a virus, because there is no such thing as a virus.  Other possibilities include all kinds of poisons, acetates, antigens, additional bio-sensors, heavy metals and other toxic chemical agents.
 
As with all extended release medical drug applications that utilize Rotaxane, the molecule is dissolved with a specific resonate pulse modulated electronic frequency, which allows the contents of the nano sphere to be released.  Bottle open, Genie out.  This is the basis of concern for anyone waiting on the "next one" that Bill Gates alluded to with an evil smirk on his face. 
 
But what you have to understand is that discrete symptoms can be dialed in by manipulating the Biofield.  This means that the doctors that will be diagnosing what they see going on as a list of symptoms that match up with this or that, failing to understand that a signal like this is causing them to appear.  So they will be used as pawns once again, being fooled by a SIMULATION of an illness
 
So the minute Todd Callendar hears about someone bleeding out their eyes he is going to scream "Marburg!"  Its not Marburg, Todd.  It is simply bleeding eyeballs, and you can't catch it unless they also aimed this signal at you.  What's worse, is doctors will immediately try to treat whatever they think they see, and if nothing they try fixes it and they complain about that, because they will -- Presto!   Instant incurable pandemic of international concern, cue the disease firemen, the covid measures, then out comes the vaccine for it a week later.
 
These effects can impact everyone susceptible to it in a targeted kill box as easily as they can be directed at just one person through the use of their personal unique identifier.  If you got swabbed during the scamdemic you can be sure they have yours on file, because it is derived from your DNA. 
 
What do you think all those low power Blue tooth signal emitting people are broadcasting?  Its their exact location and unique identifier. 
 
And here's another newsflash for ya:  They don't need a cellular infrastructure to dial you up on the network, because YOU are the network.  The guy next to you can just as easily transmit that trigger signal!  Now maybe you see why the viral variant narrative works so well.  Nobody sneezed on you.  You got zapped.
 
I don't think they are ready just yet to launch the "big one"  Its more likely they will cause a small event to encourage more biosecurity measures and re-train you to follow covid measures all over again.  I have also heard rumors about this being postponed until later.  October 11th was one such date going around.  But if the WHO gets their treaty in place, like they plan to next summer, then all bets are off.

 

Picture
Excessive Radiation Risks:
This is one very good reason not to be in a large crowd or surrounded with devices capable of receiving this message.  Remember, this has never been done before.  Imagine you are at a football game, big stadium, everyone has a phone in their pocket.  Add to that every hackable human.  Now you are in a microwave oven with 10,000 cell phones all on calls when the oven is turned on.  That CAN'T be healthy.
 
We fry ourselves constantly, but not like that.  Consider the common situation below, which is why people frequently feel shagged out after a long road trip:

 
FM8 - THE RADIOLOGICAL TRAP SYSTEM
https://www.bitchute.com/video/TnWDOSo7MNpw/
Putting it together yet?  Geez, I hope so.  I don't know how more obvious I can make this.
 
Power Consumption And Grid Stress:
This is what Mark Steele mainly warns people about.  Pay attention to Mark.  Listen to everything he says, because unlike so many other babbling grifters Mark is an actual expert and highly qualified to talk on the subjects he covers.  This same sort of test was supposed to happen in the UK not very long ago, but it didn't come off as planned, largely due to awareness efforts made by Mark and others who have become more technologically adept.
 
This kind of signaling requires a LOT of power.  Or does it?   We are talking about lighting up literally hundreds of thousands of devices simultaneously.  Your phone is always busy, but its not always using a lot of power or creating a lot of emissions.  But when your phone gets a text it powers UP from standby mode.  
 
If we are using the cellular network to send a message than yes, that does put stress on the entire power grid.  Your phone has a battery to make it light up, but the tower does not.  To send that out once it takes whatever that takes.  But multiply that number by however many devices need to get the message and you will see transformers catching on fire.
 
According to Mark, it can potentially be enough to collapse it.  The estimate inside the UK was 300,000 devices would be pinged.  But in the US that number is tens of millions.  I don't think anyone knows what problems that might cause.  Will we see a few outages?  Widespread and/or long lasting blackouts?  Remember, blown transformers have to be replaced.  it's not like there is a forty cubic mile warehouse of them stacked up in a pile.
 
And what about the smart meter on your home?  Those things are mostly cheap Chinese made junk, and they catch fire all the time. Check out groups like the "InPower" movement and learn how many people lose their house each year because of these firetraps.  It may surprise you just how common the problem is.
 
One last thing, the MSM has been priming the pump predicatively.  It is full of talking head dummies clamoring over the threat of Russian cyber hackers and how they are all conspiring to launch a cyber attack on the US that cripples the country and returns us to the stone age for 10 years cause "Russian man bad".

 
I'll say it again:  These people cause every problem they address, NEVER FORGET THAT.
 
I hope I have given you some valuable information today.  But if not, go listen to others talking about this. 
 
Either way, please help out the cause and share this, or something like it, to everyone you can.  Let them make up their own mind.  Personally, I don't care if anyone believes me or not.  Even inaccurate fear porn can have a positive effect by creating backlash the perps have to deal with.  
 
The enemy wants you DEAD. 
 
They prefer you commit suicide, but ANYTHING that gets that done is on the table, and they have plenty of stealthy ways to do the job now.  We The People need to unite against this threat.  They will always shoot you in the back, so stare at them and let them all know…

WE SEE YOU.
WE KNOW WHAT YOU ARE DOING.
DO ANY OF THAT,
AND YOU WILL NOT GET AWAY WITH IT.


18 Comments
    Click here to E-Mail me

    Author

    John Lukach - Former slave

    PayPal canceled my donation account!
    The information I provide here and in my book can save your life.  If it did, or you just want to support my efforts, please download CashApp and send a cash donation to me with the hash tag:
        $Had Enough Yet

    No pressure.  But if you do that, THANKS!

    Archives

    January 2025
    October 2024
    September 2024
    August 2024
    July 2024
    June 2024
    May 2024
    March 2024
    December 2023
    November 2023
    October 2023
    September 2023
    August 2023
    July 2023
    June 2023
    May 2023
    April 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    September 2019
    July 2019
    March 2019
    November 2018
    October 2018
    June 2018
    February 2018
    January 2018
    April 2017
    March 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    January 2016

    Categories

    All

    RSS Feed