top of page

PSI TERROR AND ASTRO-CRIME

Psychotronic terror, psi-operators, astro-agents, astro-killers, astro-maniacs

Cyber ​​terror is the intimidation of a victim or victims by arson, explosions, murders, simulating deaths from suicide or accident, killing animals or other forms of intimidation using cybernetic technology. For example, a terrorist can kill a victim’s acquaintances from a telemedicine terminal, for example, a heart notch simulating a heart attack, and threats to a victim can be sent from a state special communications terminal, simple steganography in inscriptions on billboards, packs of cigarettes, children’s drawings with chalk on the asphalt, wall inscriptions with teenagers’ baloons and paint on it other.

Psi-terror is the intimidation and terrorization of a victim by auditory and visual hallucinations induced in the victim’s optic and auditory nerve, which the victim perceives as a voice in his head and images in front of his eyes. These are threats, insults and abuse, kill, cripple, cut out guts, castrate, burn an apartment, kill a mother, father and sisters, repeating up to several years, in a manual mode of abuse or using psi-terror programs: modified chat bots. In this type of terror, the victim is deprived of sleep and poisoned by psycho-depressants, leading to madness, often combining terror with telemedicine torture - artificial pain, incisions and burns. Psi-terrorists on the Internet are called psi-operators. In addition to torture, intimidation and insult, the victim of psi-terror is usually raped by the astral entrance to her body and controlled masturbation, putting the victim’s body on himself like rubber.

Astro-agents, having left their bodies and received the body of an avatar, fly to any other country, penetrate into any room and enter the body of any person, controlling their body as their own. At the same time, astroagents receive images of any room and any equipment, documents, computer screens, full access to the victim’s memory, information about contacts, conversations, life events, projects, trade secrets, banking information, aliases, logins, passwords and PIN codes. Astro-agents receive missions for departures with simple steganography on billboards, covers of books and magazines, in newspapers, advertisements, and even in garbage containers.

Astro killers use the astral projection for murders, sometimes even for intimidation and terrorism. As a rule, an astro-killer enters the victim’s body and kills the victim by simulating suicide or accident, for example, hanging himself in the victim’s body on a chandelier, jumping in the victim’s body from the balcony of the twelfth floor, taking a lethal dose of drugs in the victim’s body. Orders for the murders of astro-killers receive the same way as astro-agents, with simple steganography in inscriptions on billboards, mobile phones, packs of cigarettes and more.

Astro-maniacs have been raping victims for years, astrally entering the body of the victim. At the same time, they feel the victim’s body with their rubber body, with control of speech, movements and getting all the feelings of the victim to their side. By controlling the victim’s body in sexual intercourse with a partner or during masturbation, the astro-maniac enjoys the victim’s perversions, violence and helplessness: sits in the victim’s body on the cologne baloons with the anus, puts domestic dildos into the anus, swallows the victim’s sperm with her mouth, groans in body of the victim and sticks out his tongue, perverted in the body of the victim in all other possible ways.

SEVEN PRINCIPLES OF CYBERNETIC PROTECTION

Cyber ​​protection - protection against seizure of control, primarily by a biological object. There are seven basic principles of cyber defense:

  • Noise generation

  • Compensation

  • Absorption

  • Shielding

  • Delete

  • Poisoning

  • Defeat


The noise-generating type of protection is based on the generation of noise at the carrier frequencies of cybernetic biochips, radio cybernetics equipment, or radio-vision methods. The signal distorted by noise penetrates the receiving circuit tuned to the carrier frequency and becomes an unsuitable device, software, nervous system, or skeletal muscle. Control of a biological object becomes impossible due to corrupted control signals.

The compensating type of protection is based on the generation of a field picture inverse to that created. Under the maxima of the incoming wave, field minima are created; above the minima of the incoming wave, field maxima are created. The fields of the wave and the created field are vector-added, resulting in an almost zero or strongly weakened field. The response of the control object is not caused by weakened and distorted stimulation signals and signals of the communication channel.

The absorbing type of protection is based on the weakening of the field of stimulating signals or communication channels due to the collection of a large electromagnetic field energy by the protective device from the radius of the device. Since the energy density is equal to the square of the wave amplitude, and falls due to the intake of energy, the signal level drops. Attenuated stimulation signals or signals of a communication channel do not cause a reaction of a biological object.

The shielding type of protection is based on the protection of a biological object or premises with shielding material, for example, metallized radioprotective fabric, wallpaper, paint, glass. Due to the large coefficient of signal suppression by the shielding material, the weakened field does not cause a reaction of the control object.

The eliminating type of protection is based on the detection and removal of biological microchips, biocontrol devices, and psychotronic signal sources. Biochips are detected by a field detector and are surgically removed from the body of a biological object. Sources of electromagnetic radiation are removed from the nearby living environment of the control object.

The poisonous type of protection is based on the introduction of a biological object into the bloodstream or at the location of the microchip of a reagent that poisons the biochip material by reacting only with internal components such as a semiconductor material. The biological shell of the microchip should not be destroyed, so that the dead implant does not pathologically react with living tissue of the body.

The striking type of protection is based on the destruction by the ultrasonic speck of the insides of the subcutaneous microchip - the cybernetic biochip, without destroying the biological membrane and decaying of nearby tissues. Technically, this is possible using a Phased Array connected to a computer and creating a controlled ultrasound spot of a given power and coordinate.

CYSE-8.jpg

AntiAstral-12 device protection against astral hooking

CYBER THREATS OF THE ASTRAL PROJECTION

Phase is a virtual and augmented reality environment based on radio vision, high quality graphics, bio-control chips and full immersion, bio-control of amazing quality. The controlled characters in the physical space of the phase are avatars and living people.

The name "phase" is given by the most popular instructor in this technology, Mikhail Raduga. It is formed from the phase states of the brain in indirect techniques for exiting the body. For example, one of his popular textbooks on getting out of the body and getting the body of an avatar or another person is called "A Practical Textbook on Out-of-Body Experiences." Another textbook, for example, is Clint Marsh’s book “The Mentalist. Workshop,” which was on my shelf. The old, but still used, name for the phase space is the astral projection. The astral projection operators are also called astronomers, due to the ability of their virtual bodies - avatars to fly in the global physical space.

Due to the peculiarity of the lying position of the phase operator during exiting the body and being outside the body, in the body of an avatar or another person, phase operators are also called slippers, from the English slipper - sleeping. The so-called agents using astral projection technology, astroagents.

Due to the ability of phase operators to enter the bodies of other people, feel the body of another person by themselves and control it, implemented at the level of biocurrents of the nervous system, phase operators and astral projection are called psi-operators. This term denotes the ability of the operator to control any mental processes of a person controlled by him: feelings, thoughts, speech and actions (movements). The article was written after 15 years of contact with phase operators, reading books on this technology and an interview with an astrologer of the twentieth level.

The terms "astral" and "astral projection" have been used for years in mass disinformation on this technology with low-quality esoteric brochures. This misinformation was based on religious fears, teachings on magic and witchcraft, faith in ghosts and souls of the dead. The reason for this was the classification of human biofeedback information in the highest categories of classified information. Now computer control of a person, bio-cybernetics and cyborgs, are well-known and are even studied in school circles of young neurotechnologists who mount biochips in the nervous system of experimental animals. This information is no longer secret.

After this brief description, we will talk about the main problem of phase space: the absence of any security. Since phase operators have access to the body of almost any person, except for secretaries and protected their own operators, with full access to memory and control the movements of someone else’s body, the operator can do anything in the person’s body: jump from the balcony, bring it barefoot in the cold for amputation, take to an operation on the brain for reprisal, hit his head on the iron, brutally beat in the body of a friend or father, rape with perverted masturbation and much more. This is the main modern cyber threat to humans.

As chemistry does not save from radio frequencies that induce biocurrents in the nervous system, so radioprotective tissue with gaps does not break the connection between biochips and command servers, no one is protected except for the above categories of people. Chemical dissolution or poisoning of biochips is fraught with the loss of abilities related to the external components of the human psyche.

Protective technologies that prevent malicious psi-operators and astroagents include passive and active radio wave protection (radioprotective fabric, broadband jammers) and methods for detecting, neutralizing or removing cybernetic biochips and implants - a liquidating type of protection.

bottom of page