top of page

Cyber-infection of the president of Ukraine

This article connects the main threats to life, health, and even national security with cryptographic and radiological insecurity caused by numerous abuses of operators of previously deployed networks of cybernetic control and tele-medicine.

Doll. First of all, let us answer the obvious question: how does a doll differ from a person, or, in other words, how does matter differ from a being? Adherents of philosophical currents call the soul the main difference between the living and the non-living. A doll, a substance in itself motionless, does not move without applied external forces to the hands, legs and head.

A doll in body shape, facial expression, the presence of eyes, nose, lips and hair, is similar to a man, which makes it possible to make a doll from a man. And, although it is a very high-tech process, it has already been developed and used.

In the media, dolls made from living people are pathetically called cyborg: cybernetic-driven organisms. This term means the biocontrol of the human body at the level of the biocurrents of the nervous system: the generated biocurrent causes contraction of the muscles and the arms or legs of the body move, on programmed control or along the same, removed, biocurrents of the operator's brain, which, lying down with eyes closed, feels the body of the doll its own. During the "full immersion" in a foreign body. The operator receives biocurrents from the doll’s eyes, and he sees them with his eyes, the biocurrents of the doll’s hearing apparatus, and he hears them with his ears, and even the biocurrents receptors of the doll’s skin, to sense the doll’s body as his own. The operator can move the hands and feet of the doll, walk around the body of the doll in the city or the room, and speak with the mouth of the doll. And these are quite advanced high-tech bio-cybernetics and total immersion!

You can read more about these technologies of feeling of another's body with your own in the popular science article “Full immersion into the body of an avatar or a person” on the pages of the “botting” site with sections of cyber security. In short, a special syringe is injected into the victim's neck or under the skull, under the back of the head, and a small cybernetic biochip, measuring two millimeters in diameter and up to four to twelve millimeters of linear size, is inserted through the needle. This is done by a bribed doctor, during treatment and when the patient is under anesthesia or sleeping pills, during surgery or when the patient is in the hospital. Or the doctor chipped and forced to work for themselves. The cybernetic biochip can also be placed in a dissected wound during an operation, before stitching, and the author has repeatedly detected the cybernetic biochips in the field of surgical operations in several people.

Evidence of this technology for installing cybernetic implants can be found, for example, in the article Cyber ​​Hacker-Surgeon Bogachevsky, on the small Cybernetics and Anti-Control website dedicated to threats to cyber security.

The detection of cybernetic biochips is based on the anomalous electrical activity of a body region with a biochip, the maximum of the electric field, which is produced by modern digital multi-meters in the mode of hundred millivolt voltage measurements. And photographing this part of the body with an X-ray machine - a cybernetic biochip is clearly visible on an X-ray image, a foreign body in the form of a cone or a two-pole component with two leads needed to create the supply voltage of the body's electric field. More details about the detection of cybernetic biochips are narrated by the same-name cycle of articles in the cyber-security section of the Botting Technologies 12 site. These articles describe in detail the principle and method of detection by measurements, provide maps of the electrical activity of cyber-infected people and confirm the method of detection by X-ray (radiological) research.

Chiped victims automatically connect to the cybernetic software control network, called “botnet” in the cyber-criminals jargon. This term comes from the slang term "bot", denoting a program to control a humanoid character. The bot contains the elementary functions of taking, throwing, walking, running, attacking, pronouncing the synthesized text and conducting a conversation (like chat bot). Cybernetic bots do not control three-dimensional people and dogs of games and worlds, but live organisms - we are with you. Cybernetic bots are used not only by cyber-terrorists and criminal organizations, but even by law enforcement agencies, the police, and special communications departments. So, for example, cybernetic bots display chipped agents for face-to-face rates in the suspect’s aisles around the city or to the store. This is a technology widely used in our time.

In addition to automatic control, the network allows “manual” control of victim using bioelectric control and full immersion technologies. In wide access, this technology is now called a phase, and its operators are being prepared from “out-of-body experiences” books. In short, at the initial levels, the operator is allowed to “get out” of his body and get the body quality

.

The chosen victim is “led” by several psi-operators, two or three people. While one of them resides in the body of the victim, the others eat, go to the store and toilet, perform daily duties. Female operators, nurses, soldiers and other “ordinary” operators “lead” the man to the victim so that it would not be disgusting to feel the male genital organs between his legs, especially in the bathroom and toilet. The operator even goes to the bathroom in a strange body, for example, to masturbate, and to the toilet, where he has to do sanitary procedures on the toilet in a foreign body. Therefore, male victims wear female gender.

Legal aspects of entering a foreign body with violations of the sexual integrity of the person are described in the article Cyber-rape from the victim’s position on the same site, and there are several maniacs using this technology of out-of-body experiences for cyber-rape, with evidence of their guilt.

Chiped victims from a significant percentage of the population "belong" to all operators of the phase at once. The operator chooses a victim for a time of “sharing” in her body, and without an operator, the victim is controlled by a “bot” - a character management program. A few years ago, the phase numbered about two million operators from Russia, Ukraine and the United States, according to its most popular instructor, Mikhail Raduga. His textbooks and demonstrations of the initial levels of the phase can be easily found on the Internet at the request of “astral projection” or “school of out-of-body experiences”. Today, it is the main technology of cyber crimes, including acts of terrorism, murder, rape, imitation of suicides. The operator can do anything in the victim's body, even hang himself on a chandelier in a strange body, and gain access to the halls with tele-medical terminals, on the screens of which one can make cuts of any organ of a chipped human, such as a brain hemorrhage vessel or stroke and death. This is a large international cyber-criminal network with millions of astro-agents recruited. Obviously, this organization represents the main modern cyber threat.

The victims of cyber criminals are both “ordinary” citizens, police officers, officers and generals of special services with their families, and even presidents. The easiest way to determine cyber infection is described in the article “Detection of cybernetic bots” on the website “Cybernetics and Anti-Control” and it is strongly recommended to read this article to understand the following presentation. One of the ideas of the method is based on the knowledge of the rule of assigning the role of a bot to the full name of the victim. The control program and the role of the victim in machine scenarios are selected by her last name. So, if the last name contains the word work, then a worker management program is attached, if the last name contains the word accountant, then the accountant management program is attached. Similarly, by depriving a victim of the ability to think, feel, make decisions, and control himself, the victim is automatically assigned the main task, according to the same rule. And the victim's computer-controlled body mechanically executes this program.

To reconcile the remaining vestiges of the victim's reason with the actions of the body, the victim is “washed” with brains, hypnosis programs, suggestions and verbal beliefs. The victim may not understand for years that he does not control himself, does not make decisions, and is deprived of reason, that she has artificial feelings and computer speech synthesis, up to the choice of sexual partners and love on bio-currents. Some victims undergo verbal processing based on years of verbal belief, hypnosis, and addiction to obey the operators and programs. In the media, this treatment is called psi-processing, and in Russia there are between three and eight million of its victims - they are diagnosed with a psychiatric diagnosis.

The president. The latest demonstration of this message will be a demonstration of the cyber-infection of the President of Ukraine - Petro Poroshenko. His role, the war with Russia, is chosen by his surname, recorded as Porushenko in transliteration, and it is clear that he beats “By Russia” by the name “Po Russia nko”, which is typical of a cyber-infected victim controlled by a bot. And the question of the article will be: how many operators, spies, rapists, maniacs and terrorists, out of two million, put on the body of the president connected to the botnet and how many years has he controlled himself?

Presidential candidate. Another shocking example of cyber infection is the victim of the presidential candidate of Ukraine, Yulia Tymoshenko, suspected of terrorism - the murder of deputy of the Supreme Council Shcherban. The following is proof of the engineered synthesis of this scenario, followed by brainwashing or controlling behavior.

Timoshenko.png
bottom of page