Translate

Monday, October 2, 2017

Surveillance Based Intellectual Property Theft (TechnologyWiki.org)

Original Article Adapted from Sister Site: TechnologyWiki.org

How the Shadow Government Commits Intellectual Property Theft

* Neural monitoring[2] - Brain wave frequency based thought surveillance (can be done remotely & via implant)
* Frequency surveillance of electronics[3]
* Smartphone & computer microphones
* Search engine surveillance
* Software backdoors
* Surveillance data is processed, threats assessed (e.g. a company name that a target comes up with)
* BCI technology is used to implant stolen thoughts to psyche profiled targets
_______________________
Neural Monitoring Based Intellectual Property Theft

Thought monitoring is perpetrated through artificial intelligence brain wave frequency surveillance and the shadow government commits egregious intellectual property theft via these methods.
_______________________
Intellectual Property Theft Based Social Engineering

There is a system of surveillance and Ai simulation where each potent thinker is brain mapped and examined for psychological operations based social engineering. Various intelligence agency sources are perpetrators and are as dirty as they can possibly get in dealing with intellectual property theft. Odds are you have seen a Hollywood film (and a lot more) that has been involved in some form of electronic control grid implemented intellectual property theft. Early 21st century media is infested with mkultra based intellectual property theft.
_______________________
Ai Simulation Based Intellectual Property Theft

Intelligence AI's simulate the global population and commit a form of intellectual property theft without the related person even thinking it. Brain mapping is carried out on targets and AI algorithms are formulated in the image of persons to simulate their thought acumen, this can be then packaged into CIA agenda friendly electronic control grid implementations such as Hollywood films, music, popular social media, business, etc.
_______________________
Reasons for Intellectual Property Theft

* To co-opt an oppositional but inevitable threat
* To transplant a potent idea from a target to an asset
* To destroy oppositional activity
* To prevent revolutionary societal change
* To protect industry profits
* To prevent a threat to the shadow government's evil from proliferating
----
Prosecution:
As a victim of surveillance based intellectual property theft I want nothing more than the swift and thorough prosecution of the war criminals committing these acts. Intellectual property theft is just the tip of the iceberg of what these sources are afflicting.
----
References:
[1]: Wiki page is an original article written by Omnisense
[2]: Apparatus and method for remotely monitoring and altering brain waves - (Google Patents)
[3]: Civil Case: John St. Clair Akwei vs. National Security Agency (NSA) - (DeclassifiedDocuments.com)

Thursday, September 21, 2017

The Cover Story - (psyop.wiki)


psyop.wiki



Original Article Found @ psyop.wiki

Cover Story Definition:
Cover Story: A cover story is a false explanation that is used to conceal the truth[1]. A typical cover story design is a rational false conclusion promoted to obscure the origins of an action.




The Cover Story

• Cover stories have been developed to conceal sensitive truths in the public eye
• Cover stories are designed to convince with logical fools gold
• An army of shills parrot establishment cover stories
• All main components of the electronic control grid have cover stories
• New Age cover stories developed for literally all end game technological abilities
• The biggest electronic harassment cover story is mental illness
• Spiritual warfare cover stories are being used to obscure technological crimes
• It appears some belief systems were engineered with cover stories in mind
• Assassination cover stories (Hidden behind “natural causes”, cancer, heart attacks, etc)

“An idea behind using cover stories, such as religious or new age, is to encapsulate
the opposition into a state of inability to identify the real perpetrators.” ~Omnisense

____________________________

Directed Energy Weapon Cover Stories

This technology has interacted with quite a large amount of people, however it is almost always misidentified as other sources...

Directed Energy Weapon Cover Stories:
• Mental illness as an electronic harassment cover story
• End game technology packaged under persuasive “spiritual warfare” illusions
• Directed energy interaction packaged as the supernatural
• Government technology under a cosmic being facade
• Religious themed illusions / Using religion mythology as a means for cover stories
• Extraterrestrial contact as a psychological operation cover story
• Ghosts as a cover story - AI orchestrated phantom illusions
• End game technology as a sorcery cover story
• End game technology as the real source behind effective voodoo
• Witchcraft as a directed energy cover story
• Black project science under a black magic cover story
• Directed energy attacks deceptively packaged as physiological ailments
• Synthetic signals in the brain from implants framed as physiological ailments
• “Psychic Attack” as a directed energy attack cover story
• “Spiritual Attack” as a directed energy attack cover story
• New Age cover stories (e.g. Disembodied spirit illusions)
• Old age mythological gods used as a cover story
• Human based electronic harassment with aliens packaged as the perpetrator
• Scientology methods as a cover story for technological remote influence
• Exotic neurobody illusions (e.g. Chakra, entity attachments, ethereal implants)
• Inter dimensional being interaction as an electronic targeting cover story
• Exploitation of illusory explanations to conceal directed energy crimes

“People who have already assimilated the cover stories are often not ready to hear the truth.” ~Omnisense

____________________________

Remote Influencing Technology Impersonations

Beings Commonly Impersonated:
• Neighbors (Targeted Individual v2k)
• Black Ops Agents (Targeted Individual v2k)
• Family (Targeted Individual v2k)
• Deceased Loved Ones / Deceased Relatives / Deceased Pets (Psy Ops v2k)
• Demons (Mind Control Cover Story)
• Jinn (Spiritual Warfare Cover Story)
• Archons
• Inter Dimensional Beings (New Age Psy Ops)
• Extraterrestrials (Cosmic Being Impersonation Programs / UFOlogy Bastardization)
• Entity Attachments (New Age Psy Ops)
• Shadow Beings (e.g. To Cause Fear from an Obscure Source)
• Archangels (To Impersonate a Higher Authority)
• Lucifer (To Persuade into Evil)
• Satan (Satanist v2k)
• RA (New Age Psy Ops)
• Spirits (Spiritual Warfare Illusions)
• Ghosts - Phantoms (Directed Energy Trickery)
• Faeries (Rehashed Old Age Cover Stories)
• Higher Self (Mind Control Cover Story)
• Panpsychism Based Impersonations (e.g. Gaia aka Mother Earth Speaking to People)
• Saints & Mother Mary (Religious Impersonations)
• Holy Spirit (Psychological Direction Method / Sleeper Assassin Method)
• Ascended Masters (Impersonation of a Higher Power)
• Jesus (Any Vector of Vulnerability is Exploited)
• Person’s of Note (e.g. To get a Target to Murder them, To Psychologically Direct)
• Any Mythological God of the Past (These can be pretty cool)
• God / Allah / Yahweh / Jehovah (Impersonation of the Highest Power)
• Done via Electronic Telepathy Contact (Voice to Skull - v2k)

"Directed energy weapons operate invisibly while the inducible mental limits of directed energy weapons are the limits of consciousness itself, this makes for an incredibly potent environment for illusions of all types." ~Omnisense

References:
[1]: This page is a copy of and/or adapted from pages in the currently unreleased book manuscript: The Electronic Control Grid, by Omnisense
[2]: Originally Posted @ PSYOP.wiki

____________________________

More on Psychological Operations:
Psychological Warfare De-Occultism: www.psyop.info
Psychological Operations Wiki: www.psyop.wiki
Ancient Information Warfare: religiondebunked.com

Wednesday, September 20, 2017

Radio Frequency Body Scanning by Intelligence Agencies


Radio frequency scanning surveillance data is one of the most unknown and prominent surveillance abuses of the 21st century.
How it Works:
1. Electromagnetic scanning technology (e.g. Interferometry, RF capture)
• Done by satellites & microwave transmitters used with the cover story of cell phone towers
• Fields of electromagnetic waves are generated by the sun, the earth and existing technologies with a capability of being utilized for alternate purposes than is publicly known or explained (e.g. remote neural monitoring or body scanning)
• After scanning, surveillance data can then be processed by artificial intelligence and implemented into various brain-computer interface (BCI) designs for consumption
• Electromagnetically scanned physical environments along with the contents of a mind can be interfaced in an undetectable fashion with end game frequency science
• Full spectrum technological remote viewing of a person, place, or thing is possible via frequency science

2. Radio frequency neuroscience connected to surveillance data
• Surveillance based virtual reality - Surveillance based BCI
• Mechanics of the mind are controlled via radio frequency neuroscience to create and augment the users experience
• Intelligence agencies use directed energy neuroscience to represent surveillance data in a fully immersive & touchable VR based on real people's bodies and thoughts
• The shadow government ultimately controls this apparatus, and uses it as a perk for secret society members (e.g. Pick any person's real body to have sexual VR experiences with)
• Full sensory immersion based on surveillance of sexual intercourse can also be represented in VR from either person's perspective (e.g. seeing through a target/victim's eyes)
• No particular gender or age is a limiting factor of the sexual perversions of the ruling class, with the exception of the geriatric
• The most sick minded of the shadow government have a taste for BCI sadism while surveillance of molestation and rape is also Ai processed and experienced in a perverted fashion (This is done in collusion with the CIA and other assets of the shadow government worldwide)
Highly Probable or Confirmed Perpetrators:
• The Vatican / The Society of Jesus / The Jesuits
• The CIA
• United States Military - U.S. Navy / U.S. Air Force / U.S. Army
• The Pentagon
• Department of Defense (DoD)
• National Security Agency (NSA)
• National Geospatial-Intelligence Agency (NGA)
• Federal Bureau of Investigation (FBI)
• Department of Homeland Security (DHS)
• Security Industry Companies
• DARPA - Defense Advanced Research Projects Agency
• Israeli Government / Mossad / Zionist cabal
• UK Government / MI5 / MI6 / GCHQ
• German Government / The Federal Intelligence Service (Bundesnachrichtendienst)
• Government of India / Intelligence Bureau (IB)
• Chinese Government / The Ministry of State Security (MSS)
• Russian Intelligence / Federal Security Service (FSB)
• Japanese Government / Public Security Intelligence Agency (公安調査庁)
• Danish Government / Politiets Efterretningstjeneste (PET)
• Government of France / French Intelligence / French Military
• Spanish Government / The National Intelligence Center (CNI)
• Australian Government / Australian Secret Intelligence Service (ASIS)
• New Zealand Government / Security Intelligence Service (SIS)
• Canadian Government / Canadian Security Intelligence Service (CSIS)
• Brazilian Government / Agência Brasileira de Inteligência (ABIN)
• Saudi Arabian Government / General Intelligence Directorate (GID)
• Plenty of unnamed corporations within the military industrial complex
• Every unnamed & corrupted military worldwide has potential to be involved
• Every unnamed intelligence agency worldwide has potential to be involved
• Secret societies connected to the intelligence community
• Rumor: Every party that has figured out remote neural monitoring has been initiated into a secret coalition controlled by totalitarian secret society members

"Each agency plays it’s role in the integrated global system."
~Black Project Engineer Dr. Robert Duncan


More on this topic
Martin Bott: Measuring illegal surveillance with Radar in Germany - (Youtube.com)

Wednesday, September 13, 2017

Omnisense Bio

I am an underground music producer, independent author, graphic designer, filmmaker / videographer, de-occultist, activist, futurist, targeted individual, street historian, and researcher. I make futuristic psybient music and produce content exposing black project technology & covert operations.

Free / Donation Music Store (Helps fund my websites)

Universal Aspects™ Multimedia Company