<![CDATA[Estate Artistry - Homepage - Blog]]>Sat, 27 Apr 2024 13:33:53 -0400Weebly<![CDATA[Where is John?]]>Thu, 21 Mar 2024 10:49:19 GMThttp://estateartistry.com/blog/where-is-johnI know, I know…  I've been trying to decide on how best to use my time.  After all, we are in the final run up to whatever end game certain people feel like going with now.  I have done next to nothing to fortify my own situation since I began writing, choosing instead to help prepare everyone else that I can reach.  I don't mind winging it through a fair amount of chaos because I have things, and access to other things, that allow for quite a few pivots.  Still I really should get a few parts of my own house in better order. That meant prioritizing activities, but I have not been idle.
 
First there was that nanotech lecture Stephan asked me to do.  I've been working like mad on that since Christmas, but I keep changing my opinions about the material based on new evidence I come across.  I created over 100 slides, had several scripts and I keep tearing them up when I become able to debunk huge parts of it.  I'm at a point now where I may not ever do it.  If you were waiting on that, the main takeaway is this:  None of that really scares me much anymore.
 
Most of what you see and hear people talking about right now is psyop.  Not all, but if it involves a diagram and body area networks and such it is a ridiculously unfeasible goal people are convincing each other they have reached.  Trust me, that vax nanotech cannot talk to anything reliably enough or well enough to make any of Sabrina Wallace's rants something to be concerned about.  She represents one end of a spectrum of town criers repeating electronic bio warfare concepts.  The other end is actually where we are.  They cannot kill at will precisely, and when they do attack with this stuff the effect is more like a lobbing a brick than firing a bullet.  It doesn’t work on just anyone either.  You have to have done something that makes you susceptible or vulnerable.  A bunch of vaccines will do that.  Elective surgery is another no-no, really any surgery done since 2020 exposed those folks to doped drugs and toxins of all kinds.  Unhealthy people are apt to become more so when they least expect it, and in bunches, but if you are in good health and you simply look both ways and watch where you step, that’s all one needs to do to be in the clear.
 
The real weapons are rather simple and damn lethal enough, they don't even need anything all that exotic, and I have been piecing together all the parts of those systems and exactly how and why they are dangerous.  I can't seem to fill in every last engineering gap just yet, but there are a couple guys I talk to now and again that are far from stupid.  Between the three of us we may have it all figured out.  It has just been hard to get it all down in one place, so I cannot really finish what I started until that happens.  I don't like to speculate.  I am limiting my investigations to covert weaponry that is well past a feasibility stage.  All things 'creepy-tech' can either be demonstrated or they cannot.  The list of viable invisible tech threats got a lot shorter since December, but gathering all the nuts and bolts of what remains still takes time.
 
I have been compiling articles as usual, so I have several pages of that I could post and opine on, but blogging on the news and current events is getting old for a few reasons.  For one thing, we are in a repeat cycle.  Same shit different day.  I have already covered what the big plan is and which agendas matter the most, that has not changed.  Nor has the basic timeline.  If you cannot see what's ahead, especially what is expected to go down this year, you have not been following my past articles very well.  The dots are easy to connect now.  The banking implosions will likely happen by this fall, the WHO will likely pass that shit treaty this summer in full defiance of anyone in dissent, a huge percentage of the mid-level satanic management team will turnover globally in 2024 elections to shore up the supply of fresh yes-men in key positions, I expect they will ambitiously float another pandemic as if not a sensible word about the last one had been uttered by anyone and, despite a total lack of any interest outside the central bankers, attempt a launch of both digital ID, and CBDC.  I suspect this will take the form of a bait and switch sort of thing in which they co-opt Bitcoin and Etherium by officially making them into a asset class they can rig that takes the upside out of it for those who invested while they tokenize everything else of value.  Basically, they will begin "the great taking" and watch the show from a safe place, while directing a spectacular clown show of distractions and media circus events to keep everyone entertained and unfocused on the demolition that will be unfolding all over.
 
It's not all gloom though.  People will take a beating, but in the end they are not going to have it.  Covid repercussions woke far too many people up, so depending on where you live, things may get pretty ugly, but overall the bad guys will not pull it all off, and I think they know that.  They will get a little desperate here and there and they will step on their dicks in front of a watchful audience, so I expect to see a fair amount of them back peddling on all kinds of things before the lackeys they installed to grease the skids start jumping ship out of cowardice or panic. 
 
I read someplace that a couple guys tried to wax Elon Musk recently.  Kudos to them whoever they are by the way.  More strange stories continue to pile up, rumors mostly, but the timing is more interesting than the material.  King Charles wants you to think he has cancer.  Jacob Rothschild kicked the bucket.  Royal watchers are claiming Kate Middleton has been sacrificed in some ritual.  Apparently she has not been seen in almost 3 months, but then neither have I.  Who knows what's true anymore, but I sense that "the crazy club" has finally noticed they have painted themselves into a corner.  Nobody can sell an EV, people all over the civilized world don't particularly like being cold, or hungry, or broke.  They certainly don't want anymore "vaccines".  I'd say the handwriting is on the wall and they have finally read it.  I even heard that King Charles has urged whomever the hell he is addressing with this ominous statement that it is time for some sort of military action to happen that forces compliance with their high priority extermination policies.
 
Yeah.  Good luck with that, Chuck.  You vaxxed so many soldiers all we have to do is make them chase us a bit and they will keel over.
 
As for what I prefer to invest time on, I am leaning towards focusing on getting information on the treatments I have for people that are vax injured and cancer ridden out more effectively.  I'd like to take on a few new cases and help people through the cleanup process, collect more info, maybe improve my techniques if I can.  I was just on TNT Radio this week taking about that some with Charles Kovess.  That sort of thing all feels very positive to me, unlike having to consume all this fake news just to keep ringing a worn out bell for the chronically deaf.  I know that’s not everyone who comes across this archive of education and opinion I have spent the last few years creating, but if you have been learning from all this material how to call their moves you are wise enough by now to see through what has become a disheveled mess of "cover your bases" type narratives.
 
I also thought maybe a change in medium might allow me to do more.  I like the idea of doing a podcast.  If I buy a year of Zoom license I can really do a lot with that, but I have an idea about the best way to launch such an effort that involves a few people I know who would really make it interesting.  We have been tossing that idea around a bit this year.
 
I have seen too many people with good information to share initially get all addicted to the idea that their voice is important.  Everyone's voice is important, but not everyone has important things to talk about.  When I do I speak up, but when I don't I keep my mouth shut and watch the enemy, carefully study his moves.  I don't react to every little thing, nor should you.  Too easy to step in a trap that way.  I don't feel any pressure to retain an audience just for the sake of doing that, and I don't place very much importance on anything that is said by anyone with a large audience, since that is the easiest thing for the enemy to control.  Trust me on that, I have managed to get silenced or shadow-banned on just about any platform I leave a fingerprint on.  Anyone with half a million people reading their material is telling you something the enemy wants you to believe.
 
I penned most of this as a response to one of the commenters on my last article who wanted to know where I went.  I also asked him:  "What do you think?  What would you like to see me do?  I could use an outside opinion about now."
 
I didn't get an answer, but maybe someone else out there has one.  Feel free to let me know in the comments below.  If you do please understand that I cannot even respond to comments on my own site anymore (hilarious ain't it?) but I can email you directly or respond in a future post like I did here.
 
This is probably not my last post, but I have grown a bit tired of posting regularly and trying to keep pace with so much bullshit.  Not every story is worth writing some commentary on.  I am tempted to do it, like most of you are, lord knows the comedy has just gotten over the top, but I am also tempted to enjoy what may be the last somewhat normal summer I can before the big meltdown, or uprising, or whatever last ditch effort these globalist fools try to pull off this year.  I'd encourage many of you who can to maybe try and do the same.  I expect to see these guys fuck up every pie they can shove a finger into this year.
 
-John


And for the record, I have no clue what this little twitter icon that just showed up below, all by itself, is for or what it does.  My advice?  Don't use anything with a "+" or an "X" on it.
]]>
<![CDATA[2023 Wrap Up And The Great Taking- A MUST Read.]]>Thu, 21 Dec 2023 23:57:51 GMThttp://estateartistry.com/blog/2023-wrap-up-and-the-great-taking-a-must-readHappy Holidays Everyone.  Enjoy yourself now.  With the way things are going lately it's beginning to look like next year may not supply many reasons for celebration, so look around, take stock of all your blessings and take a moment to be grateful.  Then do a little preparation.  Doesn't matter how you go about this.  Just consider what's most important to you personally and figure out two things:  How you can make sure you have those things if they become harder to get later, and how you can manage without, if getting them becomes impossible.  That's all.
 
This is how I maintain.  It's how I manage stress.  For me, it works.
 
Today I have some important news to cover.  The wretched infestation of globalist gremlins we have been dealing with the last few years are busy making their own preparations; to basically wreck everything in sight, so they can feed their greed some more.

 
POWER, PROFIT AND CONTROL.  That's what is important to them, and that’s all they care about.  They want it all and are getting ready to take it.  Really, it’s a thing they have already done, they just haven't made an official declaration to that effect yet.  What I am going to share with you today, among other news stories and opinions I have, is how the robbery will take place - officially.
 
This plan is NOT just my opinion, oh no, this is THE PLAN.


The Rich Will Get Richer -- Until The Poor Get The Picture.

INTENTIONAL DESTRUCTION: FIRST COVID, NOW COMES "THE GREAT TAKING"
https://www.zerohedge.com/geopolitical/intentional-destruction-first-covid-now-comes-great-taking
 
THE GREAT TAKING...THE PLAN TO HAND OVER YOUR ASSETS TO THE BANKSTERS
David Webb is the Author of "The Great Taking". A free download is available here: https://thegreattaking.com/
 
What is this book about?  You should have a look and find out.
 
It is about the taking of collateral (all of it), the end game of the current globally synchronous debt accumulation super cycle. This scheme is being executed by long-planned, intelligent design, the audacity and scope of which is difficult for the mind to encompass. Included are all financial assets and bank deposits, all stocks and bonds; and hence, all underlying property of all public corporations, including all inventories, plant and equipment, land, mineral deposits, inventions and intellectual property. Privately owned personal and real property financed with any amount of debt will likewise be taken, as will the assets of privately owned businesses which have been financed with debt.
 
If even partially successful, this will be the greatest conquest and subjugation in world history. Private, closely held control of ALL central banks, and hence all money creation, has allowed a very few people to control all political parties and governments, the intelligence agencies and their myriad front organizations, the armed forces and the police, the major corporations and, of course, the media.
 
These very few people are the prime movers. Their plans are executed over decades. Their control is opaque. To be clear, it is these very few people, who are hidden from you, who are behind this scheme to confiscate all assets, who are waging a hybrid war against humanity.
 
David has deep experience with investigation and analysis within challenging and deceptive environments, including the mergers and acquisitions boom of the 80’s, venture investing, and the public financial markets. He managed hedge funds through the period spanning the extremes of the dot-com bubble and bust, producing a gross return of more than 320% while the S&P 500 and the NASDAQ indices had losses. His clients included some of the largest international institutional investors.
 
I actually had an opportunity to meet David recently, on a conference call that went on for hours.  What this man has to say will floor you.  This is NOT a drill.

 
Question:
In the next global financial panic, what are the chances that there will be much of anything remaining in these pools of securities after the secured creditors have helped themselves?

Answer:
There will be a game of musical chairs. When the music stops, you will not have a seat. It is designed to work that way. It is time to ask: cui bono? Who benefits?

It is now assured that in the implosion of “The Everything Bubble”, collateral will be swept up on a vast scale. The plumbing to do this is in place. Legal certainty has been established that the collateral can be taken immediately and without judicial review, by entities described in court documents as “the protected class.” Even sophisticated professional investors, who were assured that their securities are “segregated”, will not be protected.
 
An enormous amount of sophisticated planning and implementation was sustained over decades with the purpose of subverting property rights in just this way. It began in the United States by amending the Uniform Commercial Code (UCC) in all 50 states. While this required many years of effort, it could be done quietly, without an act of Congress. 

These Are The Key Facts:
  • Ownership of securities as property has been replaced with a new legal concept of a "security entitlement", which is a contractual claim assuring a very weak position if the account provider becomes insolvent.
  • All securities are held in un-segregated pooled form. Securities used as collateral, and those restricted from such use, are held in the same pool.
  • All account holders, including those who have prohibited use of their securities as collateral, must, by law, receive only a pro-rata share of residual assets.
  • “Re-vindication,” i.e. the taking back of one’s own securities in the event of insolvency, is absolutely prohibited.
  • Account providers may legally borrow pooled securities to collateralize proprietary trading and financing.
  • "Safe Harbor" assures secured creditors priority claim to pooled securities ahead of account holders.
  • The absolute priority claim of secured creditors to pooled client securities has been upheld by the courts. Account providers are legally empowered to “borrow” pooled securities, without restriction. This is called “self help.” As we will see, the objective is to utilize all securities as collateral.
  • The “self help” applies to “market participants”, meaning definitely not you, the person whose retirement savings are invested in those markets. “Market participants” is a euphemism for the powerful creditors who control governments via debt. The establish their legal certainty with respect to the financial assets while removing yours. Interestingly, besides a small group of the private mafia behind the veneer of the central banks, nobody else is really protected. Not even the multi-millionaires and billionaires if they hold financial securities in the same collateralized structure..

QUOTE FROM SASHA LATYPOVA:
"From my personal experience, I already lived through one “great taking”, performed by whoever collapsed the Soviet Union. When Ukraine became independent from the former USSR in 1991, the ruble and any savings that anyone had at Sberbank (the only bank that existed in the USSR) disappeared overnight, and were not replaced. One can argue this was a very simple exercise given that only one state-owned bank was involved or needed to implement this reset, and there were no financial instruments, only cash savings in that bank. My grandparents had meager savings there and ended up with zero. I had no money at all as a young person, and I guess that can be a plus - when you own nothing, nobody can confiscate it from you. Afterwards, there was no currency in circulation in the country for approximately 2 years until hryvna was designed and printed and introduced. During those years, people (including me) received paychecks in the form of this - gov issued IOUs exchangeable for goods in stores that had any goods."
 
MEET THE BANKING CARTEL THAT IS PLANTING THE SEEDS FOR THE NEXT BANKING PANIC AND BAILOUT
https://wallstreetonparade.com/2023/09/meet-the-banking-cartel-that-is-planting-the-seeds-for-the-next-banking-panic-and-bailout/
 
EXPERTS ON CENTRAL BANK PLANS TO TOKENIZE AND CONFISCATE ALL YOUR PROPERTY
https://www.bitchute.com/video/zp83SuWr3jxE/
 
US BANKS RANKED BY DERIVATIVES EXPOSURE
https://www.usbanklocations.com/bank-rank/derivatives.html

If all of this "finance-speak" makes your eyes glaze over, here is the simplest explanation I can offer:
 
A derivative is basically a loan, but it differs from the type of loan you are probably familiar with in one very important way.  Loans are debt.  Debt is a liability.  Too much debt is a weakness, financially.  But a derivative is not reported on financial statements as a liability.  Derivatives are "legally" (clearly not lawfully) reported as assets.
 
Derivatives exposure is financial weakness, but due to some very deceptive accounting practices that have been legalized by those who benefit from this, derivative exposure is reported as financial strength.  Borrowed money looks like liquid cash on hand on a typical set of corporate financial statements.  When people looking for good investments choose where to invest they look for strong companies, but today they cannot find any.
 
Why would any company use derivatives?  Well, a smart one would not, but those that have do so because the money is cheap and easy to obtain.  When companies borrow funds they do what you would do, they look for the best rates and terms they can qualify for, but a derivative option can look more attractive simply because it gives them access to large sums at rates and terms they DO NOT qualify for.  It's a risky move that could either pay off big or bite them in the ass, and these messed up accounting rules allow them to do this in secret.  Nobody has to know they took such a risk.  It's like going to a loan shark, but they are called sharks for a reason.
 
All kinds of large companies, including banks, securities firms, brokerage houses, etc.  all APPEAR to be solid, but they are not.  If their loans are called, meaning they are asked to pay, or if the repayment terms of these massive loans cannot be met, those borrowers, along with all their investors, will go POOF!
 
And this situation is like a string of dominoes.  All it takes is one big borrower to fuck up somehow, and everything downstream of them collapses.  Now if I had to speculate on which one of the criminal institutions listed in the chart above is most likely to be either deliberately sacrificed or thrown under the bus to kick this off my guess is that it will be the Bank of America.  It's not the largest, but it is large, and in a previous post I mentioned a strange situation that was reported on in Wall Street on Parade not too long ago, in which BofA had apparently prepared for its own impending bankruptcy by setting up numerous financially empty shell companies to take the heat of creditors as well as bankruptcy filing paperwork, but this paperwork has to date not been filed.
 
Is this "legal"?  Probably not.  But then "legal" is a relative term that has very little to do with ethics.  I don't have much of anything to protect, but if I did, and any part of that involved BofA, I would remedy that situation fast.  But in all honesty, it does not matter where your personal exposure is.  If you have any at all you are vulnerable to a total loss of whatever that is.  The best possible position to be in right now is debt-free, in possession of some tangible asset of value, and an ability to provide some kind of skilled labor that will be in demand later should everything go tits up.
 
The way things in general look to me, all things considered, is there is a timetable in motion here, and every shit move on the globalist agenda has an appointment slot.  I cannot really see this economic time bomb ticking away too much longer.  My gut is telling me it will most likely go off sometime next year, so by this time next year, we will all be deep in "the suck".


Something Positive:

 
MY BUDDY TODD CALLENDER TAKES THE DEPOP AGENDA TO THE SUPREME COURT!
https://rumble.com/v40o4ni-todd-callender.html
This outcome should be interesting to watch.  This is a real court case that will formally accuse those responsible for trying to force poisonous vaccinations of Americans. 
 
Todd and I first met way back when he was doing work for America's Frontline Doctors.  Todd rightfully bailed on that group when it became clear that Simone Gold was in the market for a gold toilet seat.  Since then we have been in contact somewhat regularly.  I did a few alt media shows with him, appearing to discuss various things like the real power handling capacity of large cell masts and other pandemic related news.
 
This announcement, that he has a case officially docketed on the Supreme Courts 2024 calendar is a big deal.  It has been suggested, rather astutely I might add, that his case was selected as a setup, to give the kind of predetermined decision we might expect, since the government is not in the habit of incriminating itself, but the fact his case was selected to be heard at all is, I think, a major victory.
 
What this essentially means is the judicial branch of government has just legitimized these claims.  Its no longer a "conspiracy theory".  And this is something I predicted a long time ago, that at some point we would turn a corner with regard to someone officially acknowledging what actually motivated this massive, global scam I call the corona-hoax.
 
I think when this case goes to trial next year the publicity that it generates will be a game changer, if of course, everyone does their part to flood the media with stories about it, to focus attention on the case itself.  Regardless of the outcome, this is sure to be a lighting rod for similar accusations. 
 
As I have said before, if you want things to change you have to stop asking questions and start making accusations.  Todd is leading the way, so my advice is to get behind him.

 
Understanding the Creepy Pseudoscience and Religion Behind Eugenics
 
For those unfamiliar with eugenics, it is a pseudoscience whose thesis is that it is possible to improve the “breeding stock” of humanity (positive eugenics) by ensuring that, for example, the Nazi ideal of pure-blood Aryan Germans breeding with other pure-blood Aryan Germans will create blond-hair, blue-eyed “Übermensch” or “Supermen”. 
 
The darker side is called negative eugenics: the poisonous idea that society can be improved by sterilizing, aborting, euthanizing or even murdering those deemed unfit or “useless eaters”.
 
Many of the largest fortunes the world has ever seen were left to foundations that continue the work of eugenics today.

CENSORED – THE STUDY THAT SHOWS A STAGGERING 17 MILLION DEATHS AFTER COVID VACCINE ROLLOUT.
https://dailynewsfromaolf.substack.com/p/censored-the-study-that-shows-a-staggering
"A groundbreaking study [17 Countries, 4 Continents ] found that 17 million people died worldwide after the Covid “vaccine” rollout and therefore should be garnering worldwide attention and calls for an immediate cessation of all Covid vaccines. Instead, it has been CENSORED!
 
The shocking study, COVID-19 vaccine-associated mortality in the Southern Hemisphere, by Drs. Denis Rancourt, Marine Baudin, Joseph Hickey and Jérémie Mercier was published September 17, 2023, yet, also shockingly the study has not had the attention it deserves, but, has met only censorship and narrative-confirming “fact-checks” on the safety and effectiveness of the as-yet untested Covid-19 “vaccines.”
 
The team of doctors studied 17 countries across 4 continents, in Latin America and in the equatorial region which provided them with a representative sample of the world. “We calculate the toxicity of the vaccine for all ages,” explained Dr. Rancourt, “given the number of doses given worldwide to conclude that 17 million people would have been killed by this vaccine.”
 

ANALYSING BATCH IDS OF THE PFIZER SHOTS, HOW MANY PEOPLE DIED
https://www.bitchute.com/video/828LP0kemJUz/?list=subscriptions
Vaccinator fails pegged.  As it turns out, certain jabbers were much better assassins than others.
 
DR. LEE MERRITT AND I FINALLY MEET!

https://rumble.com/v3zhihw-dr-lee-merritt-md.html
This is a replay of a recent MD4CE conference call which had Dr. Lee Merritt as the guest presenter.  These meetings are sponsored by Dr. Stephan Frost and moderated by Charles Kovess.  I am a regular participant and contributor in this group and attend their twice weekly standing calls.  The core contributors usually come on a bit early, before the replay recording begins, so we had an opportunity to have a quick exchange, at the start of which another doctor, Daria Schooner MD, interrupted to basically explain to Dr. Merritt who I was, since she didn't know, and she explained how important she felt my work is.  Daria graciously described me as the biggest contributor to this group over the past year.  So that was unexpected, and just great, because that introduction gave me the street cred I needed to really get Lee's attention. 
 
Hearing that, Lee asked me for my contact info and promised a personal call soon.  Lee has a lot of knowledge, high security clearance type stuff and work experience in advanced bioweaponry.  She is aware of the bio cyber area but a little sheepish about covering it.  And this is the hell hole I am digging into, so I was gunning for an offline chat with her and she promised me one, so mission accomplished. 
 
You probably won't see a public interview between the two of us unless she wants to interview me for her channel or something to muse over some less dangerous topics.  I want to talk with her about some of the documentation I am not supposed to have, and slipped her one of those papers on this call to review.  She dances around some of these areas publicly, but she knows more, and I want to know what that is, so this meet up is going to be the two of use sharing info and playing the connect the dots game at a level you cannot do on camera.
 
The thing about Lee is, for the last three years I would conclude something extraordinary on my own and a week later I would Lee say the exact same thing on some show.  And I told her that. I told her it made me think to myself, "What the hell?"  Does Lee Merritt actually poach my blog?"  And that made her laugh, which was fun.  It was uncanny how many times this happened.  I was always about 6-8 months ahead on insider stuff and she usually was about 4.  Just by comparing the dates of certain  articles I posted from 2020-2022 with her appearances during the same time proves it. 
 
People don’t generally believe me because, let's face it, I am me, but they do respect Lee, and hearing her later come to the same conclusions I was arriving at was so encouraging, and also like having my own PhD carrier pigeon.   Lee single-handedly kept me at my desk month after month early on.  Today I have so many things that compliment and confirm things she muses about that I know she has not seen yet.  The two of us comparing notes is going to be epic.  Not sure when this will happen just yet but it will, and I can't wait.  I have a whole file just on her at home.

I only heard her say one thing on this call that I would challenge, and that was the stuff about instant flu spread having a historical basis.  I'm not buying that, because of where it came from.  Blavatsky, Steiner, et.al  all these people, and there were 5-6 of them, were parapsychological gurus in their day and they all ran what amounted to fortune teller circuits, spirit cults and enlightenment mystery schools.  They all had a huge influence on people in general, but look into any of them hard and it's clear they had had backdoor relationships to power like Nixon/Dixon and Reagan/Barron.  We are gonna have to hash that one out.  I think offering such weak evidence creates doubt where it should not be, and that whole theory she floats out is one I can shoot a dozen holes in without much effort.  I don't mean to be a censor to anyone, least of all her, but coming from her that sort of acknowledgement is the inch the enemy needs to take several miles of our territory. 
 
There are other things she could include in this presentation that take back territory from them, like JJ Couey's observations as to why the virus/no virus crowds argument only looks strong.  It's not, not at all.  Yeah, it makes sense that if viruses can be disproven a lot of what follows from virology can be debunked, but they do not offer a replacement theory, and there is one, hell, I have offer a great one in my second book you will never hear elsewhere.  Simply maintaining there are no viruses and letting that be your entire position ignores a whole lot of evidence that will never go away.  This evidence is of course all the result of faulty observations, flawed logic, and outright fraud that is misleadingly presented and maliciously used to deceive laypeople, but it is there, and they just ignore that.  Its presence is as serious a problem as believing in fake viruses, that is just as important to expunge from lexicon of professional medicine as dispelling the superstition.  Leaving it there unaddressed has allowed this con to be repeated every couple generations for the last couple THOUSAND years!
 
These people come to the debate table stating they don't have a better explanation for all of that, which is lazy as hell, stubbornly hiding behind this weak defense that they are only there to refute the current understanding, but that’s a half-ass job.  If they win it means what the want is for everyone to just dismiss and throw out "all things virology" and revert back to the previous understanding which, by the way, was demons!  No shit.  Before Pasteur, another con man, showed up on the scene if you got terminally ill, what you needed was an exorcist. 
 
The "no virus" people, a movement spearheaded by people like Tom Cowen and Andrew Kauffman, don't realize that is actually the position they are defending.  And that is why, despite all the good they do, they get lumped into the controlled opposition bin with more serious decepticons like Peter McCullough and Robert Malone.  And JJ Couey gave a perfect explanation for their strange behavior in a clip excerpt I put at the bottom of a recent post: 
http://estateartistry.com/blog/brain-science-the-mind-is-useless-if-the-eyes-are-blind 
 
So definitely watch that.

More Libtard Politics and War Mongering

CONGESTION TAX?
https://www.bitchute.com/video/jbSSY1D0H89M/
This is so ridiculous. "Congestion is costing NYC businesses 20 billion annually?" Oh fuck off, you daft cunt! You don't just float that out like a fact. Based on what? Prove it! When the hell has a business ever moaned about high traffic? Hell, they pay premium prices for high traffic locations.
 
You know what really costs them money? NO TRAFFIC!   Fuckin morons. Hang em high.
 
I have a great answer to this bullshit. Remove the plates on your car. If everyone simply does that they are fucked.

 
NEW YORK PASSES THE BILL ALLOWING THEM TO KIDNAP AND IMPRISON NY RESIDENTS SUSPECTED OF HAVING "COVID" AGAINST THEIR WILL !!!
https://govt.westlaw.com/nycrr/Document/I3783ab18c22411dd80c2c6f42ff0193c?viewType=FullText&originationContext=documenttoc&transitionType=CategoryPageItem&contextData=%28sc.Default%29
Yeah.  You heard right.  If you live in New York you better get the hell out right now.  I swear this is a bridge too far.
 
DO YOUR PART FOR GLOBAL WARMING: STOP BREATHING!
https://www.zerohedge.com/political/do-your-part-global-warming-stop-breathing
Ha!  Finally...  A WEF measure I can get behind.  Attention, all you fools who have been impersonating speed bumps to save the planet:  Here's the ultimate virtue signal.  Go wave this flag.  I promise I will notice you this time.
 
TENNESSEE SLAPS BLACKROCK WITH FIRST-OF-ITS-KIND CONSUMER PROTECTION LAWSUIT OVER ESG SHAM
https://www.zerohedge.com/markets/tennessee-slaps-blackrock-first-its-kind-consumer-protection-lawsuit-over-esg-sham
I covered ESG in previous posts.  This has been how the WEF has managed to reward corporate support of its absurdly destructive climate change policies.  Either you endorse and promote that shit or they will tax your non-compliance with carbon footprint type invoices.
 
Where this sham begins to impact investors is when companies adopt ineffectual "green" policies that involve equipment and practices that are hugely expensive, and as a result become financially dependant upon subsidies offered by the gov't that are UN-sustainable.  Being a climate change whore eventually impacts their bottom line, which is where investors end up holding the bag, and this sort of back-door dealing has finally been exposed for what it is.

 
JOURNALIST WHITNEY WEBB EXPOSES THE WEF FALSE FLAG PLAN TO CARRY OUT A MASSIVE CYBER ATTACK IN 2024 THAT WILL PAVE THE WAVE FOR A REGIONAL WAR IN THE MIDDLE EAST.

https://dailynewsfromaolf.substack.com/p/shes-exposing-the-wef-false-flag/comments
https://www.youtube.com/watch?v=Y36ZEKYMvzM
When it comes to geopolitical mudslinging, I find it endlessly entertaining that the same people who have pursued the declared goal of "Total Information Awareness" all the way to the point of it becoming a reality, constantly float out such outrageous accusations with such thin evidence.
 
These are the same clowns that are always being caught off guard by whatever sort of attack succeeds, after which we are treated to a Broadway show quality level of shame and lament over some gaping hole of a blind spot they somehow had, which provides an equally lame excuse that then seamlessly morphs into closure that neatly zips up a story that always ends the same way;

​Where they generously grant themselves "self-forgiveness", for being conveniently asleep at the switch.
 
At some point, any reasonable person can only conclude that the entire foundational premise of "National Security and Defense vs. Invisible Enemy" is a total farce in which both sides of any conflict consist of colluding members on the same deep state committee.

THE U.S. STANDS ALONE IN THE WORLD SUPPORTING GENOCIDE AGAINST THE PALESTINIAN PEOPLE
https://vaccineimpact.com/2023/the-u-s-stands-alone-in-the-world-supporting-genocide-against-the-palestinian-people/
This article is pretty long, but one of the things you will learn if you read it, is all of the reasons the US has for supporting this atrocious genocide.  Are the good reasons?  Not really.  In fact, it's worse than you ever thought.
 
FULL SCALE NAVAL WAR BREAKS OUT IN RED SEA AND (PROBABLY FAKE OR FALSE FLAG) "CYBER ATTACKS"
https://vaccineimpact.com/2023/full-scale-naval-war-breaks-out-in-red-sea-as-cyber-attacks-take-down-fuel-station-distribution-in-iran/
Add Taiwanese container shipping line Evergreen and Belgian tanker owner Euronav to the growing list of major shipping firms halting all sails through the Red Sea strait. This brings the total to seven.
 
Also, the UK Navy disclosed more details regarding today’s incident in the Red Sea, reporting that an explosion hit the side of a commercial vessel near Yemen. The Norwegian owner of the ship confirmed that an “unidentified object” had impacted the vessel on the port side.
 
12/19/23 Bloomberg reports:
YEMEN HOUTHIS SAY THEY ATTACKEDMSC CLARA CONTAINER SHIP
YEMEN HOUTHIS CLAIM THEY ALSO ATTACKED SWAN ATLANTIC OIL TANKER
 
Between 10% and 12% of global trade passes through the Red Sea each year.

 
US EARNS THE HATE WITH THINLY VEILED MOTIVES
https://www.zerohedge.com/geopolitical/houthis-vow-keep-attacks-us-unveils-details-multi-national-naval-force
https://www.zerohedge.com/markets/red-sea-blockage-means-new-round-surging-cost-push-inflation
So we're not defending Israel, we are "protecting" free trade?  Is anyone buying this charade?
 
REINER FUËLLMICH IS STILL IN PRISON!  A MESSAGE FROM REINER FUËLLMICH
https://expose-news.com/2023/11/19/a-message-from-reiner-fuellmich/?cmid=3cdb44fa-eb81-4d42-adc9-2cf88935dba6
"As has been reported in the Expose, attorney Dr. Reiner Fuëllmich was arrested on Friday the 13th October while trying to renew a passport. He was detained in Mexico and escorted back to Germany where he was rearrested and imprisoned. There has been very little publicity surrounding his arrest and current situation, however, we have previously published an update on Dr. Fuëllmich that had been shared by his friend Dr. Elsa Schieder and attorney Dagmar Schoen on the 28th October."
 
IS YOUR STATE SUPPRESSING YOUR GUN RIGHTS? TRY STARTING A MILITIA
https://www.youtube.com/watch?v=dCSF8mZy80M
Washington Gun Law President, William Kirk, heads out to Holton Township in Michigan, who not only declared themselves a Second Amendment Sanctuary, but also have formed the town's first militia.  This move, which goes far beyond the normal declaration and instead implements a militia which anyone who is lawfully permitted to carry a firearm may join. 
 
So learn why they did this, why others may want to think about it, and why some will never be able to do this, and arm yourself with education today.  


You Vill Eat Zee Bugs…

PHARMA FOOD: BIOTECH ON YOUR PLATE WITH ELZE VAN HAMELEN
https://live.childrenshealthdefense.org/chd-tv/shows/financial-rebellion-with-catherine-austin-fitts/pharma-food-biotech-on-your-plate-with-elze-van-hamelen-fr/
Believe it or not, I actually know Elze Van Hamlin.  She and I spoke quite often after my first book was published and she wrote a fabulous two page spread on it that appeared in Gezond Verstand in November of 2019.  The magazine was in Dutch but it has a fairly large circulation that extended all the way to South Africa, so Elze almost single handedly delivered me a global audience with that review. (after which it was promptly censored globally)
 
Anyway, she is quite the researcher herself and pretty well known in Europe.  In this clip she is being interviewed by Catherine Austin Fitts, who did a deep dive into this toxic sludge and compiling all the supporting research at Solari for this expose Elze is doing on what this shit actually is, and I gotta say, it's quite a bit more than I knew about it.  I knew enough to know I should not go near it, but after hearing this, to say these products are simply nasty and toxic is a gross understatement.  You should hear this.
 
To me, knowing what I know about vaccines, vaccine production, and vaccine history, it sounds a lot like these products are literally oral vaccine formulations.  The lack of health and safety oversight, the flawed production processes, the ridiculous amount of money being thrown at developing a thing that has no market whatsoever reveals almost as much about the real purpose behind this stuff as the ingredients that go into it. 
 
I see them doing the same thing with these Franken foods as they did with deadly vaccines, where they made up the term "medical countermeasures", to hide the fact that they were never intended to be any sort of medicinal product.  The vaccines were always biological depopulation bioweapons meant to murder people in hideous ways.  Funding and pushing synthetic foods is the same play, different day.  The environment in which this work advances is literally a wild west in terms of any real checks against the levels of sinister that are possible.  Just like the vaccines, nobody is legally responsible for anything connected to this agenda.
 
Someone out there might want to put some of this shit under the scope to see what it looks like.  I am tempted to do the same but like the vaccine solutions, which I would advise against even coming into physical contact with, I frankly don't even want to handle it.  It is basically bovine (but I suspect also probably human) fetal matter, cancerous tissue and chemical poisons, created with a process that can only breed and harbor rapidly proliferating bacterial pathogens. 
 
Remember all the stories about unclean Pfizer production facilities that were shipping out vaccines by the barrel?  Same deal.  Lab grown meat is straight-up carrion, soaked in a bath of artificial flavorings, and I guarantee the plan they have is to label this as "organic" to sneak some version of it into everything like they poisoned everything medicinal with graphene.
 
Yikes.  This is beyond repulsive.  Branded as such or not, I think I have eaten my last fast food menu item, and damn close to passing on anything I don't slaughter myself.  Seriously, man, I'd rather trap and fry squirrels than take a chance at the supermarket right now.
 
FDA APPROVED, CONTROVERSIAL LAB-GROWN MEAT BECOMES A REALITY
https://www.zerohedge.com/commodities/fda-approved-controversial-lab-grown-meat-becomes-reality
"FDA Approved"  has a new meaning you all better become aware of and take seriously. 
 
It means "Poisonous, Unsafe, Not for Human Consumption, or Use"
 
"In 2025, the nuggets segment is expected to account for the largest share of the lab-grown meat market,"
 
Ya hear that?  Pay attention.  NO MORE NUGGETS FOLKS!


This Will Probably Be My Last Blog Post For The Year.

I attend the regular standing weekly calls sponsored by Medical Doctors for Covid Ethics International.  This is how I manage to meet and talk to all the alt media people with any celebrity status, and I am one of their main contributors.  They are hosted by Dr. Stephan Frost and moderated by Charles Kovess, who has a regular weekly show on TNT Radio.  Charles has interviewed me on that show a couple times.

On a recent call we heard from an attorney who was doing some important case work, and he finished up quick.  We ended the call on time, but about 15 people still wanted to discuss other topics.   Charles Kovess had to scram, so he gave me host privileges and the remaining participants began asking me questions about synthetic biology.

THREE HOURS LATER…

Everyone was so gob smacked Stephan Frost insisted I give a formal presentation for MD4CE in January to the usual room of 80+ participants (which is stacked with at least 40 PhD's. from every field).  The exact date is not set because I told him this is going to take a LOT of work to create.  I am working feverishly on this now. This will hopefully clear a lot of people up as to what's really going on, but a 90 minute presentation on this material is a massive project. (Probably 60 pages of script, a huge slide deck with diagrams and video clips, source appendix, etc…) No xmas break for me, that’s for sure, but I did manage to obtain a dedicated research assistant in AU, thankfully, to help with the visual aids. 

The topic will be Nanotechnology, and the Tools of Electronic Biological Warfare.  This will cover bio-photonics, optogenetics, teslaphoresis, synthetic biology, and the Bio-API material I have been covering here in a series of articles.  Despite there being a bunch of people out there all talking about this stuff I seem to be the only one I can find that is able to lay it all out in the proper context, and that needs to be done.

Preparing for this lecture will unfortunately take precedence over penning blog articles, so I apologize to my regular readers for that.  I will continue to follow certain developments however, and if something really important pops up I will give it a mention, but until this project is finished I am gong to have to devote a lot of attention to it.
 
When a final date is set I will announce it here, and for anyone not on the invite list, a replay will appear on Charles Kovess's Rumble channel 48 hours after.
 
Thanks for stopping by.
 
I wish everyone a Merry Christmas and I will see you again in the New Year.
 
In the meantime;
DO NOT COMPLY!
 
-John
]]>
<![CDATA[Exposing the Bio-API - Part Six]]>Fri, 08 Dec 2023 23:12:56 GMThttp://estateartistry.com/blog/exposing-the-bio-api-part-sixBefore we jump back into it, a little related news:
 
NETWORKING NANO-BIOSENSORS FOR WIRELESS COMMUNICATION IN THE BLOOD
https://phys.org/news/2023-11-networking-nano-biosensors-wireless-communication-blood.amp
UhOh... Problems getting the signal through?  Bummer.
 
LED LIGHTS.
https://www.youtube.com/watch?v=5CyfrRNTKfM
Isn't it interesting that the Biden puppet recently outlawed incandescent bulbs.  Hmm, I wonder why.  Remember Li-Fi?  Optogenetics?  Bio-photonics?  If not, maybe you should look those terms up and see what they mean.  Because these LED bulbs just may be talking to some part of you that you depend on.
 
THE POLYCRISIS
https://www.zerohedge.com/geopolitical/polycrisis
Look left, now right, now up, now over there…  everywhere except where you should be looking.
 
EU MOVES FORWARD WITH DIGITAL ID DESPITE SECURITY CONCERNS AND POTENTIAL FOR ABUSE
https://www.zerohedge.com/political/eu-moves-forward-digital-id-despite-security-concerns-and-potential-abuse
Think about that picture on the back of every dollar bill, the pyramid with the all seeing eye at the top.  Take note of how there is a little gap between the bulk of the pyramid and the cap stone.  All of the WEF's key "stakeholders" are up top.  Its not as if they do not know their precious vaccines kill people.  Its not like the can't see the millions of people that fill the streets of London bitching about this or that. 
 
It isn't that the wheels of governmental bureaucracy turn slowly, or that the voices of millions of dissenters who protest every day, objecting to  the global agendas their supposedly elected leaders relentlessly move ahead with cannot be heard.
 
It's that they are not elected.  They are carefully SELECTED…  and they are all either well paid or appropriately blackmailed to ensure they turn a blind eye and a deaf ear to all of that.

 
DID BRICS JUST COVERTLY LAUNCH THEIR CBDC?
https://www.bitchute.com/video/8rZujYVffhFO/
I don't know for sure, but probably.

CBDC won't work unless they can also bulldoze the digital ID through as well. So they way you stop this is to refuse both. The people behind all these agendas are really obvious, even Putin, who is playing the role of a villain and a populist champion at the same time. Listen to Putin and he's defending rights, listen to US political tripe he's the devil. What I would remind this fellow of is:  Its all just theater.
 
Putin is a BRICS big dog, just like China, but everybody has skin in the NWO game, you see them putting on this show basically for you, so you think there are sides to this drama, and to encourage you to take one.
 
There is only you, "Joe Average" with average wallet size, and the globalists who are actively consolidating everything an obedient sheeple needs to comply with owning nothing and being happy (in front of their screens and video games, all medicated, dying from vaccines, and cheering for whoever is dropping bombs on people they don't know), SO THEY CAN DENY IT WHEN YOU GET OUT OF LINE!  That’s what all of this, including the current Gaza conflict, is.  It is a "hey, look at the right hand" trick while the left punches you in the nuts. 
 
Don't be a sucker and you won't get sucker punched.



Picking up where we left off in Part Five, (page 19) what I will be showing you next are the various ways in which the vulnerabilities inherent in this nanobiological interface can be exploited.  People who work in IT network engineering and cyber security fields will no doubt be much more familiar with a lot of these type of common exploits than I am, but the general concepts are not all that hard to grasp, and they really do not require very much explanation beyond what is laid out in these sections.
A. ATTACK TYPES IN NANONETWORKS
This section presents the possible attacks and existing proposals related to the nanonetworks. A summarization of security proposals for nanonetworks is presented in Table 6.
1) EAVESDROPPING
"Eavesdropping refers to passively listening to the transmission between two nodes. The listened information can be stored and later used maliciously to launch attacks. Eavesdropping in nanonetworks can take place when two legitimate nanomachines are exchanging messenger molecules and a nearby malicious nanomachine intercepts the messenger molecules silently. The passive eavesdropper can be detected in nanonetworks by a mechanism such as stochastic geometry, distance estimation techniques. The active eavesdropper might absorb the messenger molecules in the case where MC is used as a communication medium, this attack might be prevented through secrecy capacity. Other anticipated eavesdropping prevention mechanisms include beamforming, game theory (collation formation games), and artificial noise generation."
 
Here the discussion is around intercepting either actual molecules or data concerning their presence.  In mathematics, stochastic geometry is the study of random spatial patterns, so the discussion is about how available this information is to a potential eavesdropper (hacker) by analyzing things like an eavesdroppers proximity to the information exchange going on.  I am not sure what "secrecy capacity" refers to, possibly some sort of encoding that makes the information more difficult to decode.  Beamforming refers to methods that are available to limit the possibilities for data interception by focusing the communication much more precisely.  Coalition game theory, I believe, is a reference to subset of game theory which involves making deductions about who or where an eavesdropper might be based on his likelihood of belonging to a certain group.  Finally, artificial noise generation is just what it sounds like, obfuscating the target of an eavesdropping attempt by muddying up the information the hacker is able to access in some way.
 
The rest of this section cites a few specific proposals that have been offered about of how these approaches might be used to enhance security, but I don't see anything mentioned below that is new or necessarily bulletproof.
 
"Several proposals have been demonstrated to detect eavesdropper location and secure the nano communication paradigm from eavesdropping attacks.
 
Islam et al. [180] proposed a secure channel for Molecular communication. Firstly, a Diffie–Hellman algorithm-based secure key is exchanged between sender nanomachine and receiver nanomachine. Then hardware ciphering is performed using the secret key. As MC is a resource-constrained paradigm, therefore, Exclusive OR (XOR) cipher is used in this work due to its simple implementation and inexpensive computation. Moreover, hardware ciphering used in this work further reduces the associated time, instead of its software counterpart. The results are presented through simulation. In our opinion, the proposed method is simple and computationally less expensive but the overall security is compromised as MC needs more mathematically resilient models for security.
 
Guo et al. [181] have proposed a mathematical model for eavesdropper detection and localization in a random walk channel. This is the only work in MC that considers the detection of an absorbing malicious receiver in a random walk channel. The authors have chosen transmitter side detection of the eavesdropper because the MC channels are 1-D and receivers cannot affect the transmission and secondly the molecules absorbed at the receiver are quite small that do not aid in detecting eavesdropper presence. Simulation has shown accurate results in detecting the eavesdropper’s presence.
 
Recently a proposal for physical layer authentication for Diffusion Based Molecular Communication (DbMC) has been proposed in [182]. The channel impulse response of 1-D DbMC has been exploited to detect transmitting eavesdropper in the transmission region."

2) BLACKHOLE ATTACK
"Blackhole attack refers to the attack where malicious nodes spread attractant molecules to draw the network traffic towards a different location from the intended target. Blackhole attack is similar to sinkhole attack in WSNs but the sinkhole attack disrupts the routing process while the blackhole attack physically moves legitimate nodes away from the target. When it comes to blackhole attacks in nanonetworks, there are a variety of approaches that can be taken. For example in a scenario of artificial immune system support application, the white blood cells that are responsible for detecting and tackling the infection, can be attracted by malicious nodes to stop them from detecting an infection in the host system."
 
The place my mind goes to whenever I read something like the section above in red is the converse of any given example.  Here the reader is supposed to think in terms of white hat motives, i.e. preventing a hacker from interfering with white blood cells that are trying to attack an infection, but turn that around and you have the opposite scenario; a hacker trying to CAUSE an infection.
 
Everyplace you look regardless of the literature you choose to read, everything being discussed is framed in terms of patient benefits and physician capabilities, but this tech has been weaponized, so what is really being discussed is how to protect the weaponry, how to make the weapon more effective, more accessible to criminals, etc.  You cannot just read it the way it is presented but rather one MUST consider two opposing intents for the use of this technology to see the whole picture.
 
"Blackhole attack and its countermeasure using two approaches, Bayes rule and simple threshold approach for MC have been proposed in [183]. Blackhole attacks are type of DoS (Denial of Service) attack in which nanomachines can be drawn away for target e-g in case of targeted drug delivery the actuator nodes might not reach the target due to Blackhole attack."
 
Ask yourself this:  Which situation is more likely to require a higher level of security?  A situation in which a hacker is trying to deliver a life saving medicine or the situation in which the hacker is trying to poison a target subject?  If the situation is one in which insulin delivery or uptake in a diabetic is blocked is blocked, the vulnerability of the diabetic is being leveraged to harm the diabetic.  This is how "life saving" capabilities become weapons in the blink of an eye.

3) SENTRY ATTACK
"Sentry attacks are opposite to Blackhole attacks where legitimate nanomachines are impeded away from the target, due to a large number of repellent molecules spread around the target location by malicious nodes. This kind of attack can be fatal in medical applications where instant lifesaving action needs to be taken e-g nanorobots that are designated to prevent bleeding by repairing veins are attacked by a sentry to impede from reaching the target. Sentry attack and its countermeasure using two approaches, Bayes rule, and simple threshold approach have been proposed in [183]. Giaretta et al. [183] have proposed a blackhole attack and sentry attack for MC. The authors have described two scenarios where (L-BNTs) Legitimate Bio-Nano Things are repelled from reaching the targeted site in targeted drug delivery application, thus keeping Bio-Nano Things from performing the normal operation. In the second scenario called black hole attack, M-BNTs (Malicious Bio-Nano Things) are attracted to the targeted site which can lead in a delivery unwanted dosage of medication in the targeted area.
 
Next, in the proposal, a countermeasure that enables the Bio- NanoThings to make decisions and cooperate in order to overcome blackhole and sentry attacks during target localization is proposed. The mechanisms are based on known cellular decision processes using Bayes’ rule as well as artificially designed genetic circuits that evaluate chemical signal threshold (this will be known as Thresholdbased decision process), which are both lightweight enabling them to be easily implementable on resource constrained Bio- NanoThings. Results show that the proposed countermeasure is effective against the attack, where L-BNTs successfully move towards the target."
 
What I hear being explained in the section above is how someone can potentially be "medically extorted" by a nanobio-hacker.

4) SPOOFED, ALTERED, REPLAY MESSAGE ATTACK
"This attack can be launched by malicious nodes by spoofing legitimate nodes identities to become trustable and enter the network. Furthermore, the malicious nodes then send fake messages in the network and alter the data. In the case of nanonetworks, consider an exemplary communication scenario where a legitimate node ‘Alice’ is transmitting messages to receiver ‘Bob’. Attack can be launched by an intruder ‘‘Eave’’ impersonates to be Alice and tries to control Bob by sending malicious commands.
 
A distance-dependent path loss based authentication scheme for nanonetworks using the terahertz band has been proposed in [184] for spoofing attacks. Rahman et al. [184] have proposed an authentication scheme for terahertz band EMbased nanonetworks. This work exploits physical layer attribute i.e., distance-dependent path loss for authentication at nano receiver. Moreover, an algorithmic solution has been proposed for the authentication scheme. Experimentation verification of authentication scheme via tera hertz time-domain spectroscopy setup at QMUL, UK."
 
This is where I begin to get very concerned, because this is the type of exploit I believe is being used to electronically torture those people known as "targeted individuals".  I have interviewed some of these folks, and the things they report happening to them can be truly shocking.
 
What I can tell you authoritatively about this is this type of exploit is it includes making of use of a persons own electroencephalogram patterns to harass them.  It has become known that anything your body and brain perceive is the result of electrical signals generated by your central nervous system.  These signals can be reduced to EEG patterns that can now be recorded and played back. 
 
What has also become known is the fact that your patterns are unique to you.  One cannot transmit a recording of someone else's EEG patterns to you and cause any reliable effect with that procedure, but if your own EEG patterns are recorded, something that is possible with all these embedded biosensors and associated medical data cloud storage, and then replayed by re-transmitting them back to you, something that is also possible with the same nanotech, then you will re-experience the recorded event JUST AS IF IT IS HAPPENING TO YOU ALL OVER AGAIN!  The target of such an attack is physically unable to distinguish between actual stimulus and simulated stimulus.
 
Now this makes for some really frightening scenarios.  If, for example, you are selected as a target, a handler, (which does not have to be a human being, many times this is accomplished with an AI program), will monitor you over a period of time.  During that time actual people may present situations, provide stimulus, or place you in certain situations you must react to, to ensure they are recording your EEG readings in various emotional states, under different levels of stress, whatever it is they want to use later.  If these recordings are then re-transmitted back to you surreptitiously, they can literally drive you crazy with them. 
 
They can force a person to re-experience whatever experience they have recorded as if it was happening all over again, which is what many targeted  individuals report.  Hallucinations, sounds… anything.  Instant fight or flight reactions can be induced over nothing and at any time.  So you can see how sinister a threat this can be if we are using this nanotech for medical monitoring on a widespread basis, and that is exactly what they are doing. 
 
File those recordings away with a unique identifier, in this case it is that Bluetooth ID the vaccinated all have, and some spook has an instantly accessible control file on you that allows real control over you. 
 
This is the capability they have been cultivating all this time and selling to everyone in the form of various benefits, like making the blind see, the lame walk, direct neuro-prosthesis control, early detection of diseases, and so on.
 
A distinct subset of these patterns also run your autonomic nervous system, so this would include the electrical signals that cause your heart to beat regularly or cause your breathing to be automatic.  All those bodily functions that you don't have to consciously think about are included as part of your autonomic nervous system.   Give a bad actor control over these functions and a bio-hacker can murder you and make it look like an accident.  They can cause a stroke, give you a disease, or induce some sort of mental psychosis that will drive you, unaware, into the psychiatric profession where you can be institutionalized.
 
Imagine the level of influence one could have over a head of state, were he to become compromised in this way through what he thought was a simple vaccination.  And these are exactly the sort of advantages pitched by people like James Giordano when he lectures on deploying weaponized IoBNT in intelligence applications.
 
Think this is not being used today?  Think again.  Giordano comes right out and admits it, without the slightest hesitation, even openly stating that the kind of manipulations made possible by synthetic biology is currently actively deployed and being used everywhere.

B. ATTACK TYPES IN BIO CYBER INTERFACE
"To ensure an end-to-end protection of IoBNT applications, the security of these bio-electronic devices is a prerequisite. In order to pursue a preliminary investigation for types of attacks that are possible in bio-electronic devices, the attack vectors are explored in related fields like WBAN. (Wireless Body Area Network) [28], IMD (Implantable Medical Devices) [178] and Wireless sensor networks [187]. This investigation has helped us to individuate attacks that are likely to occur in bio-electronic devices. The major objective of a bio-electronic device in the IoBNT healthcare application is to enable two-way communication between intra-body nanonetworks and healthcare provider. The communication mode is divided into two categories: inbound and outbound, making it easier to recognize and categorize attacks. Figure 6 presents possible attack types in case of bio cyber interface."
 
Are you paying attention?  I hope so.  They are talking about the abuse of wireless body sensor networks, the whole focus of another paper I mentioned in this post: 
http://estateartistry.com/blog/now-do-you-believe-me

1) EAVESDROPPING
"Eavesdropping is a passive attack that enables the attacker to covertly gain access to confidential information. The bio-electronic device might possess critical information like patient identification information, clinical history, disease detail, treatment detail, patient location, and battery status, etc. This confidential information can be exploited not only to breach a patient’s privacy, but also to launch other types of active attacks. Eavesdropping can be realized during the communication of bio-electronic devices with biological nanonetworks and during communication with the gateway devices.
 
Countermeasures:
Traditional networking paradigms employ encryption schemes like RSA and DES, to prevent against eavesdropping attacks. These encryption schemes are effective for the prevention of eavesdropping attacks, but these are computationally expensive and must be adopted after analyzing the resources of bio-electronic devices [188]. Lightweight encryption schemes like Elliptic Curve cryptography has been proven to be effective for resource-constrained devices [189], also a review on other lightweight encryption schemes has been presented in [190]"
 
Do you hear in this last paragraph how someone is already complaining about how difficult it is to protect this system with traditional encryption?

2) REPLAY ATTACK
"This type of attack can be launched after a successful eavesdropping attempt. The eavesdropped authentication sequence of the legitimate devices can be replayed to get illegitimate access into the communication channel. Moreover, an attacker can copy previously sent commands from legitimate users to replay the message again which in the case of bio-electronic can have a number of consequences like drug release multiple times which harm patient’s health, unnecessary and repeated queries for patients physiological values to engage and deplete the resources, etc.
 
Countermeasures:
Authentication schemes, Intrusion detection, delegate authentication to external devices. (See Section VI)."

 
3) MAN-IN-THE-MIDDLE (MITM) ATTACK
"A MITM attack is projected through illegitimate devices when they become part of communication between legitimate transmitting devices, and legitimate devices are spoofed to believe that they are communicating with the authorized device. In the case of bio-electronic devices, the attacker must be in the vicinity of the patient to launch the MITM attack. From the communication perspective, the MITM attack can be achieved by replaying the legitimate authentication sequence to get access to the communication channel. MITM is the type of an active eavesdropping attack where the attacker not only listens to the communication but also alters the data and communication sequence.
 
Countermeasures:

Traditionally MITM is prevented using encryption schemes. A lightweight scheme to prevent implantable medical devices from MITM attacks has been proposed that utilize chaotic generators for randomness and a signature algorithm to prevent third-party interference [191]."
 
Unfortunately, there is currently no encryption scheme that cannot be broken, which means there is no viable protection against this kind of exploit.


4) RESOURCE DEPLETION (RD)
"Bio-electronic devices are essentially capable of performing in-situ [77] operations and for this purpose they contain built-in processing unit, memory unit, and power unit. However, these units are only able to perform trivial tasks due to resource limitation in terms of space, power consumption and computation complexity, which comes with their minute size. The attacker can cause resource depletion by sending multiple authentication messages with the wrong credentials to occupy the processor. Each authentication request is processed which exploits the memory to create access logs and drains the battery. Moreover, bogus communication packets sent by MITM can utilize and drain the resources.
 
This sounds to me less like a hacker exploit and more like a way around limited nano resource limitations.

 
Countermeasures:
 Access control mechanisms, Anomaly detection system, user notification, and use of rechargeable batteries. Moreover, mitigation from resource depletion attacks can be achieved by using passive wireless communication media like RF signals and the use of novel energy preserving techniques like ZPD (ZeroPower Defence) [192]."
 
Again, I hear this paper discussing how to maintain control by overcoming the limitations of an underpowered nanobio network installation.  A LOT of what is covered in papers like this can be read two entirely different ways depending on what one considers "a potential problem" to be.  You must always think, "problem for whom?"


5) INJECTION ATTACKS  (<--HA! Pun intended???)
"Injection attack can be performed by the illegitimate users in three ways, insertion, alteration and replication [135]. In insertion attack, hacker generates new seemingly legitimate data packet into the communication channel. In alteration attack, hacker captures the data packet from communication link, tampers with the values of dosage commands from the inbound channel and alter the values of bodily parameters in the outbound channel. In replication attack, attacker re-sends previously executed commands into the system. Insecure communication between bio-electronic and gateway devices can result in an injection attack. This attack can have fatal consequences on the patient. For example in a scenario where a diabetic patient is fully dependent on wirelessly controlled insulin and glucose monitoring pump [73], the alteration in dosage values received from health care provider can result in hazardous consequences like underdose can cause hyperglycemia and overdose can result in hypoglycemia both of which can be fatal [193].
 
Countermeasures:
Careful mitigation strategies are needed to be designed which include authentication protocols [194], access control mechanisms [178] Intrusion Detection, Input validation, and Authorization techniques."
 
In other words… they don't have any countermeasures for this yet.
 
6) DEVICE TAMPERING
"This attack is majorly launched in the bio-electronic devices by local attackers, due to low transmission range of bio-electronic devices. The device can be reprogrammed or physically replaced to perform the malicious tasks that are not intended by the device in the first place. This attack can also be launched by accessing the device remotely by sending fake firmware update and device upgrade message that alter the software configuration of the device to perform maliciously [195]. This attacker can alter the original treatment prescribed by the healthcare provider and replace it with false treatment which can cause life threatening consequences.
 
Countermeasures:
Tamper proofing and self destruction, device hardening, and Physically unclonable Function (PUF)."
 
Yeah, keep talking.  Not buying it.


7) DENIAL OF SERVICE (DOS) ATTACK
"Denial of service attack causes disruption and blockage of information flow between legitimate communicating parties. An attacker tries to suspend services of the bio-electronic device to make it unavailable for communication and processing. DoS can be launched in the form of any of the above-mentioned attacks. The DoS attacks such as battery drainage, sleep deprivation and outage attacks can be performed by hackers after getting access to the devices. As the power source of these devices is limited and attackers can send an unlimited number of messages, causing the battery to drain. In outage attacks the device can be made unavailable by stopping it from carrying its essential functions, behaving abnormally or premature shutdown. These types of attacks can pose serious consequences for the patients [135]. Moreover, the hacker can intentionally drop the forwarded packets, making the recipient deprived of requested data.
 
In other words, say a person is compromised such that medically they need something regularly to survive and that thing is delivered electronically.  All ya gotta do is interfere with the delivery of whatever that life saving thing is, and they go poof.
 
Countermeasures:
 Intrusion Detection."
 
 (Go Onnn… How?  Oh sorry, you got nothin)

8) MALWARE ATTACKS
"Malware attack is another type of network attack that is common in IoT based applications. Malware attack is used to remote control a distant device maliciously, steal sensitive information from a device and use it to launch further malware attacks. A system infected with malware attack may start running certain programs automatically like sending messages, re-configuring internal software and turning of anti virus. In case of IoBNT application an infected bio cyber interface might start dispensing inappropriate amount of drugs, thus causing harm to the patient. Some of the popular malware attacks that are still active in IoT environments are Mirai, Echobot, Reaper, Emotet, Gamut and Nucer [196]. There different types of malware attacks, but malware attacks specific to IoBNT applications can be botnets, rootkit, ransomware, and keylogger attack.
 
Botnets: In this type of attack, attacker gains access to a number interconnected devices by launching malware and further control them to steal information, launch DDoS (Destributed Denial of Service) attack to launch unplanned system downtime and even sell network access to other cyber criminals.

Let's get real for just one moment, pull back from the microscope and recall some of the more "Macro" sized  crimes we all saw recently.  Could this botnet model also be used to describe the act of capturing a whole bunch of government regulatory agencies to enable a bunch of criminals to deny you of your right to bodily autonomy?
 
Ransomeware: The attacker gets hold of the device by encrypting user’s data and locks the device, thus, restricting access of the owner to the device. The attacker than demands for some ransom amount by displaying messages on the device screen.
 
And if the device in this example is your body…?
 
Keylogger: It is a malicious piece of code that records the keystrokes of user to gain access to ID and passwords. This attack is dangerous than brute force attacks and strong passwords does not provide protection against this malware.

Kind of sounds like what happened when you were told you were getting a life saving vaccine when what was really happening is you were injected with a whole swarm of nano sized biosensors that could record your EEG keystrokes.  
 
Rootkit: A malicious piece of code is installed on IoT device that hides its identity to steal data, reconfigure the device, or control the system by executing malicious commands. This kind of attack is most dangerous as it bypasses all the security mechanisms and successfully hides its presence.

Now we're talkin!  Something malicious is installed on an IoT device, meaning you, that steals your health by re-configuring your immune system function and thereby taking over your bodily systems and forcing them to execute malicious commands that disable you.  Well, well, well… If that ain't just the perfect description of a vaccine bio-weapon I sure as hell don't know what is!
 
After all what is a booster shot if not the latest malware update, eh?

 
Countermeasures:
Access control, device hardening and system monitoring, Antivirus, Intrusion Detection. (See Section VI)."
 
Access control             =    "Your account has been suspended for violating TOC's"
Device hardening        =    "That’s all conspiracy theory"
System monitoring     =    "Don't read that without the proper context"

Antivirus                      =    "Safe and effective"
Intrusion Detection    =   
"That’s all mis/dis/mal information."

All these brave new medical advantages just keep sounding better and better, don't they?  Don't be surprised if one day someone refers to the message below as "The Blue Screen of Health."

9) FIRMWARE ATTACKS
"Firmware updates are necessary in order to ensure proper device functioning. The firmware updates can be done remotely or directly(through usb port). An advertisement is usually broadcast on the network whenever a new version of the firmware update is available. Hackers can send false firmware update requests to the users in order to access the firmware and program it with malicious code. Fake firmware updates can cause fatal consequences to the patients.
 
Countermeasures:
Firmware Encryption, periodic firmware updates, malicious firmware detection."

 
C. SUMMARY ON THE SECURITY OF IOBNT
"The protection of IoBNT based systems is crucial as the consequences of security compromise can be detrimental. A summarization of existing security proposals for nanonetworks is presented in Table 6. Apart from the software attacks mentioned in the above section, there exist some other attributes can effect the security of IoBNT. The origin from where the attack has been instantiated can help in providing some insights into the profile and goals of the attacker. Local attacks require the attacker to be close to the physical location of the patient. Local attackers can replace the bio-electronics device with a maliciously programmed device, can eavesdrop the communication between bio-electronic devices and gateway devices to gather information to launch an active attack remotely. Remote attacks are launched outside the premises of the bio-electronic devices. These attacks can be launched by accessing the smartphone of the patient that is delegated a gateway device, to send malware and reconfiguration requests to reprogram the device. In wireless communication, attackers can evade the system in two possible ways: active and passive. Passive attack is launched by an attacker silently without revealing their presence in the system. A passive attack can violate the privacy of the patient and can reveal confidential information about the device.
 
By just intercepting the communication, a passive attacker can gather information like the patient’s location, diagnosed disease, type of treatment, etc. This information can be used to further mount active attacks. Active attacker not only enables the attacker to read the transmission but also uses this information to disrupt the communication. The active attacker can modify the messages in transit, drop the messages so they do not arrive at the destination, block the communication, reprogram the device and even induce a shock to the patient by manipulating the device. As the major application of area of IoBNT is bio medicine, therefore, breach in security means life threatening consequences."
 
Still think this is all impossible?  Here is an example of the worst kind of hacking described in this paper already becoming a real problem.  


PWNING ELECTROENCEPHALOGRAM (EEG) MEDICAL DEVICES BY DEFAULT
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/pwning-electroencephalogram-eeg-medical-devices-by-default/
 
Key Takeaways:
Default credentials, while written off by the vendor in this case as seldom used and unnecessary to change, can lead to the exploitation of active directory environments.
 
The way NeuroWorks configures their EEG Software initially leads to a high likelihood of out-of-the box remote code execution.
 
If an administrator changes the default password, the software will not function properly, thus the vendor recommends not changing the default password.
 
Multiple host machines with the EEG software installed suffered from this vulnerability, allowing an emulated threat actor to obtain remote code execution on each host machine as a local user, and privilege escalate to obtain domain user credentials.
 
Depending on the environment, domain users who login to these machines could potentially have their credentials stolen, and with specifically assigned domain permissions – lead to a much larger compromise in the active directory network.
 
There’s a high probability of operating systems with Neuroworks Natus EEG Software installed lacking antivirus or endpoint detection response measures, making it a valuable target for threat actors to gain a foothold while trying to maintain network persistence.


Hacking Countermeasures my ass!
Nobody is working all that hard to secure your biology.

 
The ability to able to maliciously hack your biology
was all this type of research has ever been about!



Next up in Part Seven:
VI. Potential Mitigation Strategies



If you are just finding my blog please be sure to also check out two other contributions I made:
HOW TO REVERSE VACCINE INJURIES:

http://estateartistry.com/blog/reversing-vaccine-injuries
CANCER CURE:
http://estateartistry.com/blog/cure-your-cancer-by-christmas
]]>
<![CDATA[A Good Man, A Champion, Needs You]]>Mon, 04 Dec 2023 02:38:09 GMThttp://estateartistry.com/blog/a-good-man-a-champion-needs-youJonathan J. Couey is a fellow WARRIOR.  He is a PhD that works at Children's Health Defense, and he is fighting evil, for you.  He just lost his best friend, like just now, to a sudden brain aneurysm.

Let him know you are behind him.  That he is not alone.

j.j.couey@gigaohmconsulting.com 

​The condolence note I sent him is below:

"We are very alike JJ.  You are a champion.  The world needs champions.  I fight this evil every hour of every day and it's not enough, but together there are enough people like us out there, and together, we can vanquish it. 
 
Believe it, know it… Act "as if" and you can manifest, with sheer will, that which you need.
 
My own brother is in the hospital right now having parts of him lopped off because he refused to listen to me.  He will die within a cpl years, followed by his wife and my two young nephews.  I have seen this before, and see it more and more.  I have two best friends, both have dying parents.  One has been to three family member funerals this year.  It's not my fault, nor is your best friend's passing your fault.  Never let your mind go there. There is nothing more you could have done.  Nothing would change this.  Guilt will not bring them back.  These things happen for a reason.  Lessons are being given.  You either receive them, or ignore them.  
 
God gives each one of us what we need to do the best job we can at whatever it is we are doing.   He can be brutal sometimes.  You have to understand how to take a beating like that and turn it into fuel.  He is not trying to destroy you.  He is helping you destroy those that mean to do you and the rest of his children, your friends children, harm; because you can.  He didn't take a friend.  He gave you a sword.
 
Because in your hands it would do the most good.
 
Take time to grieve, but then go out and swing it with the righteous and divine fury of the Lord!
 
(Know that when you do I will be there at your side, without fear, and proud to be there.)"
 
-J

]]>
<![CDATA[Brain Science: The Mind Is Useless If The Eyes Are Blind]]>Fri, 01 Dec 2023 12:20:12 GMThttp://estateartistry.com/blog/brain-science-the-mind-is-useless-if-the-eyes-are-blindToday I am going to give you a scary look behind the "National Security" curtain, but not to scare you.  These are things you need to know.  I share them to empower you.  

First imagine the most evil character you can, a person hopelessly devoid of any redeeming qualities. A completely lost soul, incapable of empathy, and for whom there is no possible path back to anything resembling humanity.

Now imagine the kind of thing that would give such a character wet dreams. 

Most people cannot come close to what this might include.  What I want you to think about, is what would happen if a person like this devised a way to acquire capabilities that could give him practically unlimited power and control over others.  A power he would be inescapably compelled to utilize.  Capabilities that would enable him to mangle the entire civilized world, to flog it, mercilessly, into a form he would truly enjoy.
I am not suggesting there is a guy out there like this. 

​What I am telling you,
is that there are many of them. 
What you are about to see is one guy, that is going to explain what they have been working on, secretly, and rather expertly.  A carefully organized plan that includes the powers I just described, that has been unfolding right under your nose and on schedule, for the last hundred and twenty YEARS! Because it has taken that long to create what was needed to make this possible, cover their tracks, set boundaries that would limit what entire fields of science were allowed to pursue, and to also create the perfect situation in which to finally bare their teeth.

And if we allow them to succeed, by continuing to underestimate their abilities as we have been doing all this time, justifying our tolerance of the intolerable by thinking such a plan must surely be impossible, they will, very soon, with the just the flip of a switch,
 take most everything they want from anyone that has it. 

They have the means now, to be 
invincible.  Just a few more moves left in this game before the big shocking realization that that we are trapped and cannot escape, that will move us all past a point of no return. 

Please do not scoff at this.  I have mountains of proof this is real.  Help me drag this operation, and them, into the light of day, and stop this runaway train.

BRAIN SCIENCE FROM BENCH TO BATTLEFIELD:
THE REALITIES AND RISKS OF NEUROWEAPONS | CGSR SEMINAR
https://www.youtube.com/watch?v=aUtQbriWt64
This is a 2017 presentation by James Giordano at Lawrence Livermore National Laboratory’s Center for Global Security Research (CGSR). He elaborates on how neuroscience can be weaponized and used in warfare.
 
Meet "Slipping Jimmy" Giordano.
 
This guy is a classic example of what a hyper-Machiavellian, pathological lying psychopath looks like…
Picture
AND SOUNDS LIKE!
 
The first lie he told was in his opening remarks, where he began by gently chastising YOU for what he internally views as childish over reactions, before feigning what I think is the worst ever impression of a guy trying way too hard to sell you his custom personality cloak of self-effacing humility, by reminding you, reassuringly, not to worry, because: "We don't know what makes you, you".  After which, he then goes on at great length and excruciating detail, explaining exactly how he can make you into anything he wants to for the next hour, adding that this currently viable form of brain hacking that he is so proud of is not only out of the beta stage, not only lethally effective, but that it is:

"without a doubt, actively deployed and in use today, everywhere, internationally".

Don't  let his calm demeanor and poker face fool you.  This behavior is a typical "tell" that betrays the level of insanity, inhumanity, and the total absence of empathy that defines all psychopaths. 
 
You see, "Slipping Jimmy" Giordano chose that opener with ice-cold, calculated care, for its manipulative utility, and delivered his lines as all high functioning psychopaths stereotypically do, but he also simultaneously demonstrated how acute psychopathy presents itself with an irresistible display of high stakes gambling behavior. 
 
What's the bet? 
 
He is wagering that nobody will notice
it is this very capability he is there to explain which makes his first statement the lie that it is
 
In other words, it doesn’t matter what you were before he fucks with you, using all this torture tech he loves to create for the torturers that pay him to figure out the nuts and bolts of how to do it, because nobody cutting the paychecks that fund this shop of horrors ever placed any value on that whatsoever. 

It's what kind of "you" they can force you to be that matters here, confirming the thing I always say that should never be forgotten, no matter what the area of research is:

"Once a thing can be utilized as a weapon, that is the only thing it will ever be"

This is simply high tech eugenics.  Always has been.
 
This man should be jailed immediately, but preferably shot dead.

As you listen to his lecture, pay particular attention to "Slippin Jimmy" Giordano's content (not his presentation of it)  He is a textbook example of a high functioning psychopath.  Work backwards from his material and you will discover, as I did, that doing so will massively reduce a huge pile of research bulk into a manageable list of key bullet points.

Then go back to whatever you have collected yourself and evaluate it for relevance, and to see if any of the random puzzle pieces you think are important intersects solidly with it and your focus will be where you need to be. The tenants of apophatic inquiry should guide your critical thinking, not the presence of any presenter. 

Giordano's character flaws make him a weak link.  Use that.  And use HIM.  He did me a huge service by  summarizing the mountain of documentation that was paralyzing me.  He did the work I was struggling to do, and did a masterful job of it.  I could make a similarly brilliant presentation of my own simply by pressing the pause button frequently, and talking over him, and I may in fact do exactly that.  

Read between his lines. Understand that his true role in this is organizational, that he is the prize "pitchman", and you will then have the biggest picture there currently is. 

When you are trying to place a value on some piece of information you must first figure out where that puzzle piece fits.  If there is "no clear fit" what you have is something of low importance, a misdirection, false narrative, diversion, time suck, etc.  Some fringe things fit, but many don't.  Some things you may be spending way too much time on are simply failed explorations, mental floss, or suppressive fire.
 
Remember: 
A PhD is an inch wide and a mile deep.  You don't need to be one to understand this.  In fact, its better to be an inch deep and a mile wide.
 
But to effectively explain it to others, you need to be 50 miles wide, and ferry people across this trench by honing your own ability to pole vault over craters of disinformation like a ninja, without looking down, or backwards.  Some rabbit holes need to be back filled with cement. 

Over explaining, over citing, obsessing on supporting documentation… everything good researchers do when they prepare a lecture, in this case, will ruin your case delivery, because it leads to intractable debates that serve a very real operational intelligence security function.  Those debates (i.e virus/no virus, medical literature, environment, economics, politics, ethics, healthcare for all, biosecurity, et.al.) are intentionally placed obstacles designed to thwart or derail the efforts of anyone trying to expose the real agenda, the vision, the motivation, ultimately, the end points of it all. 
 
They are distractions that you should  recognize, and
rightfully treat, as the armor plating around the core operation.
 
Mousey protests and activism that results in activists being satisfied when they hear people asking the right questions is completely ineffective.  


Don’t question.  ACCUSE!  There is more than enough evidence.
 
In other words, what distinguishes a "truth warrior" from a "truth WAR-LORD" is this:
 

The war-lord never wastes time trying to make dents in this armor when planning his attack strategy against such an elite and overly prepared class of criminals. 

The War-Lord's goal is penetration.

I sincerely hope seeing this lecture will rattle a bunch of you "sleeping people" awake.

For those of you who are awake,
my hope is that it will make you mad enough to take some decisive actions.

PSYCHOPATH KLAUS SCHWAB HAS A WARNING TO THE WORLD
https://www.bitchute.com/video/Fx2DGjeMLizW/
So here we have a quick recap of something "Col. Klinck" tipped us off to a while back:  "The covid-19 crisis would be seen as a small disturbance compared to a comprehensive cyber attack."
 
You might think you know what he's talking about.  Back when he said this I thought I did, but considering what I have learned since then, today I look at this a bit differently, and I would encourage you to do the same.
 
Back then, given the overbearing "Russian Man Bad" narrative they were pushing, we were all encouraged to believe what he was referring to was a Putin-inspired hack attack on the power grid, or the internet, or both, and that our reliance on these things would be the end of us all were they ever disabled.  They even gave this a name if you recall: "cyberpolygon". 
 
However that was all before myself and others let the Bio-Nano Electronic Warfare cat out of the bag.
 
You have to always remember that while these psychopaths love to telegraph their moves and laugh behind closed doors about how we are all so stupid that they can openly disclose their intentions and it will go right over our heads, they also relish tricking us with misdirections.  They want us looking away while they skulk about in other areas and advance different aspects of multiple coordinated agendas.
 
What I now think our favorite Nazi is referring to is a biological cyber attack.  It makes sense, doesn't it?  Now that you are starting to become aware of all the things they have been doing under the guise of diagnostic medical devices that are supposed to save us all from the next covid-esque surprise, all this time they have been doping us all with graphene vaccines, medical injectables, foods, etc.
 
The ultimate control they hope to obtain over the populations of the world has always been a thing they intended to exercise covertly, with synthetic biological nanotech, and they have managed to do this right under our noses.  While everyone was duly aware of being chipped, we were expecting actual chips, and only the most stupid people were opting into that idea as a novel way to buy a latte or open a door.
 
When you consider what is now possible to do to a person that has become vulnerable to the weapons of under-the-skin bioterrorism, the scamdemic probably would seem like a small disturbance in comparison to electronically causing that sudden death syndrome everyplace in everyone they consider to be expendable.
 
Depopulation?  Mission easily accomplished.


Sound Sleepers Suck


If I had to summarize ​the level of psychological maturity that characterizes sleepers; the truth is that these people we are surrounded by are children, capricious brats terrified of disobeying "authority" figures, who feel they would lose everything, such as their "self-esteem" (which they clearly don't have) if they tried to do so.
 
This is my point.  There are very, very few true adults around.  People don't really want to grow up because they have not had to.  They are technically considered to be adults, but they are are actually selfish children with practical experience, and the system we all live in is a playground/cage for these children, where functional game rules are imposed in such a way that "validations" from "authoritative" figures have to be competitively fought for without scruples.
 
I believe that the problem stems not only from their level of education, (more aptly described as their level of indoctrination), or cognitive sophistication, but can also be due to the level of awareness and courage that someone has, or believes they have.
 
The system is founded on encouraging support of everything except those valued maxims that would bring it to its knees, namely truth and justice.  The system works in such a way as to make it inconvenient, even repulsive, to integrate these characteristics into oneself.
 
Selfish "adult" children are raised to value lying, and to believe in "mors tua vita mea" (A Latin expression that means "Your death, my life".)  It is considered the law of the jungle, and is used in competitions where only one winner can be chosen.)  If we consider the phenomenon of feral children, we can see the degree of (persistent) mental conditioning to which human beings can be subjected, which then becomes the limit of one's horizons.
 
We are dealing with a mass of selfish, capricious, evil little shit kids, who all have one over-arching character flaw in common -- Cowardice.
 
Our ruling class are another thing entirely, and the best descriptive term I can think of to embody their collective behaviors is Self Absorbed Predation:  A complete focus on oneself to the exclusion of the rights and liberties, and in fact, the very personhood, of those around them.

To be so self-absorbed is to embody an unhealthy mix of the dark triad of traits: Narcissism, psychopathy, and Machiavellianism, and such individuals do not see other people as an end, but as a means, meaning they see others as mere objects to be used, rather than subjects to be connected with.  They need not concern themselves with any sort of obligatory stewardship roles, for those they consider beneath them neither deserve nor demand basic human dignity.


Who are "They"?

To answer that question I will, once again, strongly recommend you take this clip in, frequently, to help you see "them" more clearly:


Dr.SHIVA™: SHATTER THE SWARM. How The Few Control the Many.
https://www.youtube.com/watch?v=OEkgZtu_Q2Q
This is a BRILLIANT 15 minute whiteboard presentation that explains the hidden hand that is so hard for people to see by explaining its organizational structure. 

Its not a pyramid or club, it is a self-reinforcing swarm.  I am not promoting anything but this presentation, you cannot miss the message.  Even normies get it super quick.  It's an A-HA experience for everyone that is way more powerful even than Jones Plantation.

I have one more brutally blunt, but perfect answer, to a very hard question. 

JJ COUEY EXPLAINS CONTROLLED OPPOSITION BEHAVIOR
https://www.bitchute.com/video/bbuvc9LL181M/
Please listen to Jonathan Jay Couey, PhD explain the behavior of people who you see talking all the time, faux activists that carefully avoid certain topics, earning the suspicion those of us with a superior degree of awareness have about them; the people we notice that are curiously just as shifty as they are believable, that we accuse of being agents of "controlled opposition".  This is a long roster of names that is sure to include people you follow, and possibly even some you foolishly trust.
]]>
<![CDATA[ONE DOWN!  Henry Kissinger Dead At 100]]>Fri, 01 Dec 2023 03:13:20 GMThttp://estateartistry.com/blog/one-down-henry-kissinger-dead-at-100HENRY KISSINGER DEAD AT 100
https://www.zerohedge.com/geopolitical/henry-kissinger-dead-100

I thought this deserved a special place in my archive. 
I invite everyone who reads this to crack a beer or pop a champagne bottle,
and raise a glass to acknowledge this momentous occasion,
as the curtain finally falls on the worlds most ghastly gremlin.


Fuck you Henry!
May you burn in hell for all eternity like a Christmas Yule log.
]]>
<![CDATA[Trust The Plan… (Will Fail)]]>Sat, 11 Nov 2023 19:29:47 GMThttp://estateartistry.com/blog/trust-the-plan-will-fail
Picture
GAZA DEVASTATION SHOWN IN SATELLITE IMAGES
https://www.bitchute.com/video/FwI7vtRIoRrc/?list=subscriptions
As some of you are aware, I cannot add my responses to readers that leave their thoughts in the comment sections below my articles because my web host, iPage, has somehow managed to shadow ban me on my own website.  I know, its hilarious.  For whatever reason, iPage no longer provides any live technical support, and I have better things to do than wasting hours exchanging texts with a chat bot in hopes of resolving the problem.  I am however able to respond to comments directly with an email, something I frequently do.
 
Every so often the time spent doing this turns out to be a good opportunity to collect my own thoughts on  a matter and occasionally my response ends up being something I later think is worthy of sharing with the class.  The commenter below was very gracious and, I think, tried to offer me some encouragement, which I appreciate, after reading a recent post which conveyed a bit my own feelings of apathy and impatience with screen addicted social media drones.

Barb has just posted a comment on your blog post, Everyone… Just Stop Saying Apocalypse!:
(Which is here in case you missed it: http://estateartistry.com/blog/everyone-just-stop-saying-apocalypse )

John,
You bother because there ARE people who may think like you do - but totally are missing the "writing gene" and do not have the talent and skill to create an enjoyable read about a decidedly un-enjoyable "event". You give a person "hope" - and some days, there isn't enough of that going around. Thank you for "bothering". :)
 
To which I replied:
 
You're welcome.
 
There is maybe something else to hope for, but to see why you might want to look forward to it you have to understand what the actual plan for us all is.
 
I think everyone in the "know" understands the function this conflict is supposed to serve in the larger scheme of things.  That group of people is substantial, and growing rapidly.
 
It is supposed to catalyze the largely controlled governments of key militarized countries in rest of the world taking sides in an intractable conflict and as a result going to war with each other.  This would accomplish three main objectives in the lead up to a one world government under the direction of the Davos cult. 
 
First, it would further advance the depopulation agendas that started with multiple manufactured scamdemic crisis that has stalled due to multiple, now failing, forced vaccination programs.  The objectives of these programs are currently being advanced covertly through the use of adulterated medical injectables, so in that respect we can consider it to have been quite successful.
 
Second, it would satisfy those stakeholders that have always stuck to historically tried and true methods of nationalistic global restructuring that shuffles the deck of power players in their favor.  War is a racket that has always been relied upon for the creation of generational wealth that funds eugenic psychopathy.
 
Third, the resulting economic devastation, that this time will have a global impact, due to decades long reliance on service industries that rely upon just in time manufacturing and critical supply chains, will overshadow the deliberate transfer of wealth that that will be the result of popping the "everything bubble" created by the global derivatives market.  The derivatives collapse will subsequently destroy the value and stability of all fiat currencies and therefore accelerate the financial reset needed to successfully introduce CBDC as the world's first centrally controlled reserve currency, which will effectively lock the doors of the prison planet they envision.
 
The problem with all this is that does not appear to be the way things are unfolding.  The world is taking sides, but it is the populations of those key countries, not the governments, that are turning their hairy eyeballs towards Israel and those supporting what can only be seen as an ethnic cleansing of the Gaza strip.  Bibi Netanyahu is taking on an increasingly Hiter-ish glow, and those supporting him are increasingly looking like vampires in the sun.


MASSIVE PROTEST IN CENTRAL LONDON TO CALL FOR A CEASEFIRE IN HAMAS
https://www.bitchute.com/video/avC9MtduS9YA/?list=subscriptions
 
What was supposed to be a centrally orchestrated global coup de-tat is turning into a populist mutiny.  Which to my way of thinking is all the more reason to kick the nano-biotech "zombie apocalypse" sooner than planned.  They are not quite ready for that yet.  I lean more towards the idea that launching this phase of their operation into high gear a bit farther down the operational timeline is more in keeping with the rate of progress in other supporting areas.
 
The pump is primed, certainly, but key components of the biosecurity super state have not yet been broadly implemented, among which is the much maligned Digital ID initiative, arguably one of the most important pillars of the totalitarian penopticon they have been so feverishly constructing.
 
Next year, I think, will be a critical milestone in this plan.  The crumbling economic state of the US will quickly accelerate, creating wave after wave of public rebellion, so they expect that to be a good justification for a more conventional form of direct confrontation with people and groups they define as "domestic terrorists".  The WHO will most likely ratify that obnoxious pandemic preparedness treaty next summer, in full defiance of its detractors, and further raise the ire of freedom loving populations all over the world.  This will foment the "rising level of unhappiness" Klaus Schwab has openly warned his stakeholders they should prepare themselves to address. 
 
Once the treaty is ratified, a hasty use of electronic bioweapons that cause all manner of biological plagues will quickly follow.  Too quickly, I think, exposing the sources of the problem and the hidden hands pulling the levers. 
 
The digital ID must be in place before it can be used as planned, and I think there is a very high probability that all this turmoil will derail attempts to implement it on a broad enough scale.
 
On the global stage, the US is rightfully being outed as the Machiavellian villain it has been, politically and militarily, since WWII and Brenton Woods, and American support of "Adolph Netanyahu" is a lightning rod for this increasingly global perception shift.
 
I don't expect to see anyone overtly attacking American civilian populations the way Israel is targeting Gaza, (although an internal false flag operation may be an ace held reserve) but they may very well begin targeting Israel.  Several nations have already threatened as much, and one has begun launching missiles at Tel Aviv.  If the "chosen people" of Israel are chosen once again the way they were in WWII, "the powers that should not be" will have finally bitten off more than they can chew.  I would caution others not to be so quick to defend the actions of Israel. 

Remember "The Jews" are simply a people, for the most part innocent and ignorant of what their rulers are up to, but their rulers are the ones calling the shots.  They are the ones that are creating the conflict there, and presenting the rest of the world with a credible threat they are all being forced to react to. 

 
I would further remind others that those rulers are not "Jews" in the traditional sense, that defend exclusively Jewish values.  They are Zionists, fake Jews, Jews in name only, hiding behind the perception of the Jewish people as a persecuted set, for the political cover doing that provides them with.  They are part of a hive mind whose public face is the Davos cult and their key stakeholders.  This is the enemy.  This is the cancer that needs to be excised from the face of the Earth if the rest of us are to survive and prevail.
 

REAL JEWS ARE AGAINST ZIONISM
https://www.bitchute.com/video/X9lUahNTJDPD/?list=subscriptions
 
ZIONIST SUPPORT OF HAMAS
https://www.bitchute.com/video/1xZo8h3LtilE/

There is no clean way to resolve the existential problems we face today.  They impact each and every one of us.  But the uglier the solution, the faster we can collectively excise the malignant cancer that has been responsible for it all.  
 
I pity the people of Israel, but I loathe the Zionist infestation that rules over them more.
 
-J
CROWD CHANTS "F#CK JOE BIDEN" DURING LIVE SPEECH AT THE WHITE HOUSE
https://www.bitchute.com/video/3rCsJRCSdOLi/?list=subscriptions
The most popular president in US history?  LOL. Popular my ass.  Biden is living (sort of) proof that you cannot vote your way out of this mess we are in.
  
THE DANGERS OF SYMPATHY
https://theunityprocess.com/the-dangers-of-sympathy/
Some thoughts on sympathy, and how it can be manipulated with guilt, called “guilt manipulation”, to herd people towards desired outcomes.
 
I found this article to be rather counter intuitive, and for that reason, quite instructive.  I edited the authors words grammatically just a bit in the excerpts below, to clarify what I took to be his intended meaning, but the rest of the original article is a good read, and it further clarifies and defends the opinion below.
 
With sympathy, sympathetic people aren’t uncomfortable from their own feelings, but from seeing/hearing the painful feelings of others, so they then take the feelings from supposed victims, because taking on a victim’s feelings is more comfortable than letting the victim stay in those uncomfortable feelings. This means it isn’t about the other person, their experience, or any lessons that they need to learn from going through the experience, but about the sympathetic person rescuing themselves from their own discomfort that comes from watching/hearing supposed victims in discomfort. Sympathy is a form of theft, as it steals the outcomes from a so-called victim, which is in effect stealing what should be the victim’s responsibility from them, to take the burden of that responsibility onto themselves.
“Socialism itself can hope to exist only for brief periods here and there, and then only through the exercise of the extremist terrorism. For this reason it is secretly preparing itself for rule through fear and is driving the word “justice” into the heads of the half-educated masses like a nail so as to rob them of their reason… and to create in them a good conscience for the evil game they are to play.”
                ~Friedrich Nietzsche
 
“Of all tyrannies, a tyranny sincerely exercised for all the good of its victims may be the most oppressive. It would be better to live under robber barons than under omnipotent moral busybodies. The robber baron’s cruelty may sometimes sleep, his cupidity may at some point be satiated; but those who torment us for our good will torment us without end, for they do so with the approval of their own conscience. ”
                ~C.S. Lewis


WHY IS IT SO DIFFICULT TO WAKE PEOPLE UP TO THE TRUTH?
https://theunityprocess.com/why-is-it-so-difficult-to-wake-people-up-to-the-truth/
"If you’re not interested in eating a full serving of humble pie, this may not be the post for you to read—consider yourself warned."
 
THE FDA'S TIES TO THE GATES FOUNDATION

https://www.zerohedge.com/political/fdas-ties-gates-foundation
"In 2017, the US Food and Drug Administration (FDA) entered into a memorandum of understanding (MOU) with the Bill & Melinda Gates Foundation.
 
Under the MOU, the two entities agreed to share information to “facilitate the development of innovative products, including medical countermeasures,” such as diagnostics, vaccines, and therapeutics to combat disease transmission during a pandemic.
 
The FDA has MOUs with many academic and non-profit organizations, but few have as much to gain as Bill Gates, who has invested billions into pandemic countermeasures.
 
Experts are concerned the Gates Foundation could have undue influence over the FDA’s regulatory decisions of these countermeasures."

Sorry, it does not take an "expert" to conclude that!

YOU MIGHT BE EATING BILL GATES LAB GROWN MEAT TONIGHT
https://www.youtube.com/watch?v=0iUWtLSRlDc
Bugs are for BAIT.  Not the plate.
 
CDC ROLLS OUT 'WILD TO MILD' FLU SHOT CAMPAIGN TO REACH VACCINE-HESITANT
https://www.zerohedge.com/political/cdc-rolls-out-wild-mild-flu-shot-campaign-reach-vaccine-hesitant
"CDC Promotes 3 Respiratory Virus Vaccines for Fall With No Safety Data - The new Quadrivalent flu shot is just one of three vaccines coming down the CDC's pipeline this fall. The agency recommends bivalent COVID-19 vaccines—recently authorized by the U.S Food and Drug Administration (FDA) without clinical data—flu shots for individuals 6 months of age and older, and the new respiratory syncytial virus (RSV) vaccine. The CDC has not provided any data showing it is safe to co-administer these vaccines to any group, including those who are immunocompromised and pregnant women."
 
Once again we see the CDC employing their spell casting techniques with twisted language.  Those special groups they love to single out, like the elderly and the "immunocompromised", are simply groups they specifically target market to because they are halfway through deaths door already.
 
"The number of Americans willing to roll up their sleeves to get a flu shot declined during the pandemic, as many who received the vaccine appeared to get sick anyway, and as concerns grew over potential side effects.
 
In response to dwindling numbers, the Centers for Disease Control and Prevention (CDC) on Monday launched a new digital ad campaign it hopes will encourage the vaccine-hesitant to get the shot, even if "breakthrough infections" occur."
 
If you can read between the lines and you properly understand the context and reasoning behind these ad campaigns then, you can look at these attempts as I do.  They are evidence of people waking up and getting wise finally, so they are actually positive developments.  Tough times for the Crime and Death Corporation. You gotta love the desperation.
                         
The agency’s new messaging is simple: The flu shot won’t prevent a person from getting sick but can "tame" wild flu symptoms into mild flu symptoms in those who get vaccinated but still get sick."
 
Which, on its face, is yet another example of a blatant use of logical fallacy being employed to manipulate people, and its a fallacy for this reason:  One cannot, absent some impossible god like omniscience, make a claim about future events being this or that without knowing, with certainty, those same future events.  So, to make a claim that you will be better off if you do xyz than if you didn't is based upon absolutely nothing.  And this explains the reason why they have no data to support such statements:  It is because every time you see this argument being used it is in defense of a thing that is new and untested.  They of course know it will harm you, and probably kill you, but then that is the real intention they are trying their level best to conceal.

In a weakly transparent way, Linda Wastila, professor and Parke-Davis chair of geriatric pharmacotherapy, with a doctorate in health policy is trotted out to impress you, and recite her scripted lines; i.e. paid endorsements and reassurances.  

Nice try.  Go fuck yourself, Linda.
ORWELL MEETS YOUR STUFFY NOSE
https://www.zerohedge.com/medical/orwell-meets-your-stuffy-nose
"this is, once again, a matter of directing all attention to the vaccine industry, so that even the common cold can be cited as a reason to get, for example, the new RSV vaccine, which is helpfully promoted in the New York Times "

GETTING THE WORD OUT ABOUT 'APEEL'
https://www.momsacrossamerica.com/_apeel
Meet the "organic" company coating all your fruits and vegetables with a waxy, toxic chemical sludge.  All you parents can stop demanding that your kids all clean their plates.  "Little Johnny" finally has a good reason not to eat his vegetables.
 
MELVILLE FINALLY LOCATES HIS THINKING CAP
Several contributors whose work I find valuable are aware of the substack ramblings published by a guy by the name of Shawn Paul Melville.  We all love to hate Melville for providing useful research as an excuse for pushing terrible health advice that almost certainly enhances the effects of the scalar tech weaponry he promotes as an effective defense to the weapons of electronic warfare.
 
Despite the transparency of his efforts, I continue to skim his material for potential clues.  And also because I find his propensity to step on his own dick when chastising others publicly for their "scientific ignorance" to be enormously entertaining.
 
That said, I thought this last article he posted deserved a pat on the back.  Loose lips still sink ships.

 
EQORIA CAUGHT HARVESTING MINDS… IN 2014!  Shawn Paul Melville
https://shawnpaulmelville.substack.com/p/eqoria-caught-harvesting-minds-in
 
I left the comment below on his page in response to this article, which he posted on Nov 9th:
 
This makes a lot of sense to me, Melville.  The Davos cult has already successfully infiltrated governments around the world. Klaus "Col. Klinck" Schwab even openly boasts about that.  The migrant situation causes a great deal of obvious systemic disruption that keeps everyone focused on population control systems, which is an attitude they encourage, but this deeper level, infiltrating the populations of captured countries with manipulable loyalists, is just the sort of subversive tactic I would expect to see.  
 
And the idea of feeding these defacto NWO nationalists for extended periods from menus that will no doubt be rife with "nano-nourishment" is a new level of sinister.  It could be that what we are seeing is the early stages of the creation of a mind controlled zombie army that will provide further catalyst for the same stakeholders to justify their totalitarian bio-surveillance super state.  Such an army would have a completely imperceptible conscription process with EQORIA consumers providing the perfect selective breeding farm for future "domestic terrorist" candidates. 
 
Good job on this.  I am considering giving you some recognition on this theory in an upcoming post
(But I never promised him he would necessarily like it.)
 
Time will of course tell how this eventually unfolds, but even if these plans are dragged out of the shadows and into the light of public awareness I see a number of serious morality dramas playing out as a result.  Considering their potential for being used as semi-sentient weapons of war, the question of what to do with the victims of these non-consentual biological war crimes will most likely be among the more challenging questions the rest of us will eventually face. 
 
-J. Lukach
 
In the interest of full disclosure, while I have investigated a number of Melville's citations, I know next to nothing about EQORIA.  I would never order anything off a random kiosk, so looking into that any deeper seems to me to be a waste of time.  But I did actually read through a lengthy prelude to this post, presented as some kind of confirmatory evidence proving EQORIA was the spawn of Satan.  That posting included an endless series of telegram screenshots of him conversing with what appeared to me to be an AI-chatbot, which ended with the bot cussing him out and threatening him with the FBI.
 
If Melville is nothing else his antics at least are entertaining.

DIRE SITUATION IN ACAPULCO, MEXICO DUE TO CATEGORY 5 HURRICANE OTIS
https://rumble.com/v3rw2jm-urgent-media-blackout-dire-situation-in-acapulco-mexico-due-to-category-5-h.html
All things considered, since this happened Acapulco has "weathered" the storm well, however, this event is yet another example of militarized weather manipulation.  It was not a hurricane, it was a wind event, more closely resembling a tornado, with very little rain.  It was generated and hit EXACTLY on Acapulco, no warnings were generated at all, just like in Maui, and it went from a tropical storm to a Cat 5 in a matter of just five hours.  This is how you can tell it was no where near natural.
 
It is not "climate change", it is not an act of God.  It is an artificial weather event.  Hurricane Katrina, Paradise, California, Canadian wildfires, Maui, the list is long. 
 
If you don't believe we can make it cold, hot, dry, rainy, windy, etc... you are dead wrong.  This is easy to accomplish now, and it has been possible to do since the 1940's and has been actively employed ever since.  This is now being used to produce "evidence" for climate change agendas, so its all an carefully orchestrated SCAM!  Deniers, just pull your heads out of your asses, because everyone knows this, and sees it clearly, except you.

 
DEW's and DON'T's - Science FACTS
https://www.youtube.com/watch?v=-MVs37rxJL0
I decided to include this clip because it addresses a number of subjects, like the question of what caused of fires in Maui and other places.  I chose not to cover Maui here because it is so time consuming but maintain in private discussions with others that if there was a directed energy weapon involved, and I do believe there was, that the energy was not beamed down from space or even from an aircraft.  This is due to the actual physics involved, which is overlooked frequently when people are enamored by a scary concept.
 
The reality is that this energy cannot travel through that much atmosphere and do much of anything because air diffuses that energy effectively.  If DEW's are in use they are GROUND BASED systems and a sufficiently powered cell tower is really all you would need.  We have those.  Maui has those.  The military maintains a base there that has such equipment.  It was a military operation, not question about that.
 
 The guy in this clip also talks about small satellites, also known as "cubesat's"which are surprisingly small, basically a handheld device, and this is what makes up Elon's Musk's Starlink service network.  20,000 or so of these cubesat's are to be activated when its all said and done, and what these devices actually do and what they can do will become important later as we explore the whole nanobio electronic weaponry area some more.

 
WHEN BIO-ELECTRONIC IMPLANT ENTERS THE MODERN SYRINGE ERA
https://www.sciencedirect.com/science/article/pii/S2444866417301307
 
HE WAS ON HIS CELL PHONE WHEN SUDDENLY ... HIS CONTRACT EXPIRED
https://www.bitchute.com/video/Htg7932H4zsO/?list=subscriptions
 
DR. JOSÉ LUIS GETTOR, EMERGENCY PHYSICIAN:  "STOP THE INSANE (DARPA GRAPHENE HYDROGEL) SWABBING!
https://www.bitchute.com/video/cz7RRsgCoFLn/?list=subscriptions
 
The articles above will also become more important when I get back to the Bio-API discussions.


I will close today's post with a favor for my friend Lonnee Rey, who actually got me started as a published author.  Even though my first book was subsequently banned, while it was available during the first three months, it did become an international best seller, and briefly held the top spot in Amazon's social sciences category.
 
Lonnee had a lot to do with that, so if any of my readers have ambitions that include becoming an author themselves, I would encourage them to attend Lonnee's upcoming writers workshop.  This next one is for contributions to Volume Four of "Rattled Awake".  While I have not attended any of the previous "Rattled Awake" workshops myself, Lonnee tells me that, amongst participants, the experience of hearing others share personal accounts of their own "A-Ha" moments was no less than transformational.
 
Personally, I can't really recall any specific moment when I "woke up", but then, unlike most, I have spent the better part of my life waking up to all kinds of weird things going on around me, and my perception of that activity has always ensured that my own behavior was always on the fringe of what is considered "acceptable".
 
I can tolerate being judged far better than being of no consequence. 
 
But that is not exactly "normal".  Most people, I think, could benefit from a little reassurance that they are not a member of some fringe minority, that they are not, and never have been… alone.

 
Lonnee's promotional flyer and sign up link are below:
Picture
]]>
<![CDATA[A Cool, Clean Drink Of Water]]>Sun, 05 Nov 2023 14:11:06 GMThttp://estateartistry.com/blog/a-cool-clean-drink-of-water 
Let's all take a break from our troubles today.  This post is going to be, as the title suggests, something refreshing. 
 
With all the doom and gloom going around it's all too easy to feel face down in it.  I remember so many things about life I sorely miss before being forced, kicking and screaming, into the sort of fear based, threat infested, zero-trust dystopian setting that, prior to today, was only imagined to serve as the prelude to some crappy summer movie plot. i.e. Hunger Games.
 
I remember going to a pub and actually meeting people, and enjoying myself.  I remember having lots of friends.  I remember when an invitation to a pot-luck backyard shindig made people feel special.  I remember when people actually accepted invitations.  I remember looking forward to a night out at the theater, and going to concerts or other events.  I remember being happy.  I remember anticipation, excitement.  I remember being a fan of some beloved cast.  I remember what it was like when I was a kid.
 
My parents divorced very early, so when I was a young boy, Sunday was visitation day for my father.  The basic template for visitation day went something like this: 
 
I would get dropped off with my brother at church and attend Sunday school, where we would do arts and crafts and produce silly things like painted rocks and holiday greeting cards with macaroni, glitter and Elmer's glue.  My father would pick my little brother and I up around 11am in some mid-life crisis sort of vehicle, and the rest of the day would be spent with him at my grandparents house, whose garage was filled with things to play with, and when we tired of dragging everything in and out we would settle in for dinner and an evening in front of the TV. 
 
This was in the early 70's, well before cable television was even available everywhere, so the Sunday night line up was pretty standard fare and we had maybe 6 main stations to choose from and a bunch of UHF channels.  Everyone took turns picking a show.  For grandpa this was Walter Cronkite reading the news at six. My grandmother followed that with The Laurence Welk Variety Show at seven.  My brother and I got to vote next, so long as we agreed. 
 
Eight o'clock was the beginning of "parental discretion" programming so our channel choices became even smaller then, but everyone back then bought a weekly copy of something called "The TV Guide", and we would always consult that to see what any upcoming show was about.
 
For anyone under 50 years old, televisions back then were pieces of furniture.  Giant wooden consoles that were wired to a bare metal tree on the roof, and UHF channels were the double digit stations you had to tune into with a second knob on the console.  That was the "Alt-Media" of the day.  UHF was full of wonders. 
 
You had Bob Ross, Flash Gordon, Alfred Hitchcock, and Jack Benny.  You also had Star Trek, which was the best.  

Star Trek was sexy, edgy… "grown-up" sci-fi.  It was also in color, a big plus.  It was full of action, and it frequently had scantily clad women whose costumes, just barely, failed to trigger my grandmothers frequent "TV veto" power move.
Needless to say, I was completely hooked, and a new "trekkie" was born.  I can still vividly remember every episode.
 
Today, the Star Trek franchise is a total embarrassment, an insult to what it once represented.  The importance of good story telling has been forgotten. Lazy writing has resulted in every story arc being a shallow repeat of the last and another excuse to further debase the original vision of a future in which humans had become something more dignified. 
 
It is no longer a vision of the future, but a lament of the present.
 
Today's Star Trek magnifies our faults and excuses our weaknesses, and every character is some variation on a LGBTRHGVLDSHFJKE+10 theme.  The cast is rife with weeping men and women, debauched villains, and mentally unstable officers mired in some galaxy wide grift.  Strong male role models are completely absent, replaced with pussified, bi-curious or even full on queer counterparts, longing for a mission to Uranus.
 
Like most television and movies now, it's unwatchable.
 
Not everyone liked Star Trek, I get that, but a lot of people did.  It not only gave us grand things to look forward to but actually created enough real confidence, industriousness and desire in people that many of the props used in the show, portrayed in the 60's for their futuristic, "whiz-bang" flair, have become real, even commonplace.  My point is, there used to be entertainment one could find that provided a temporary escape from the troubles of today, shows that gave us something positive to look forward to, a reassurance if you like, that all things pass, and that there was a pleasant destination ahead we would eventually reach. 
 
I find myself missing that quality a lot of older shows had.  There's nothing like a good story to temporarily transport you to another place, preferably someplace better, for a little while, where you can rest up and renew. 
 
Star Trek painted a picture of the future I wanted to live in and hoped I would one day live to see.  As Star Trek declined, with it went that desire.
 
But today I saw something that rekindles that flame.  Believe it or not, there is a re-production of the original show, a fan fiction facsimile, that is so faithful to the original concept that it was actually very easy to forget that there was another actor playing Captain Kirk.  It's called "Star Trek Continues".  [link below]
I have seen a few fan fiction attempts at this, so believe me, I was as dubious about even being able to finish a single episode as most trekkies would be but the sets, the costumes, the acting, the soundtrack, even the sound effects were just flawless!  There are several cameos by actors that appeared in the original show and even some of the cast are apparently children of old one.  Scotty is played by Chris Doohan.  This new cast even somehow managed to retain all the character development and ease in their roles that the original cast had attained by the time the show was cancelled after only three seasons.  By the end of the first episode the little kid in me was back.   I was just blown away. 
 
Nothing was enhanced in any way or brought up to modern standards.  The show basically is, as it was, a Star Trek time capsule, with the premise being that these additional episodes would fulfill the original promise of a five year mission: To explore strange new worlds, seek out new life and new civilizations.  To boldly go, to all the places the current "Discoprise" will never see, because there are no men onboard who can identify a wrench or tell you what its for.
 
I watched the first episode, which was a follow up to the second season original series episode "Who Mourns for Adonis", in which the crew of the Enterprise come face to face with the God Apollo, who has taken up residence on some lonely world they were checking out.  As that story unfolds, we learn that Apollo is the last surviving member of the pantheon of Greek deities who both watched over and tortured mankind from the top of Mount Olympus in ancient times, who left Earth long ago, when humans had outgrown the need for parenting. 
​Finding a complete synopsis of the original episode is easy enough, 
(https://www.tor.com/2015/11/03/star-trek-the-original-series-rewatch-who-mourns-for-adonais/) so I won't pen a lengthy recap here, but it was one of the better episodes that aired. 
Long story short; Apollo went from loving and benevolent to power drunk and mad, a fair allegory that could be applied to many of the current events of today.  A battle ensued that ended with Apollo's defeat, after which he begged the forgiveness of the rest of the gods for his arrogant choice to remain behind when the rest of them chose to vanish into this place he explained the Gods must eventually retire to, when they can no longer find anyone to worship them.
In this new episode, two years after the events of that day, the crew has a close call with a strange object in space that almost destroys them.  As it turned out, they destroyed the object instead, but as a result are very surprised when in so doing, they accidentally run into Apollo again when he suddenly materializes onboard!
 
They learn from him that the place he begged to be let into back then turned out to be a terrible prison that consumed each of the other Gods one by one until once again, he was the last of them to remain.  Unable to escape he survived only by allowing this prison to parasitically feed off him.  Ironically, the same guy that forced him there, Jim Kirk, also freed him when the Enterprise destroyed the wandering prison object. 
 
This time around, because he was now mortal, very old, and dying, he begged for mercy, fearing his own inevitable passing.  He asks the crew to take him to some inhabited planet and leave him there, "so that he could feel the sun upon his face once more, live out his remaining years in the company of other mortals, and not be forced to  face death alone", leaving Captain Kirk to wrestle with the decision.
 
Wow!  What a wildly imaginative twist of fate, and to top it all off the SAME ACTOR that played Apollo back in 1967 returned to star in this episode!  But it wasn't just the thrill of finding a hidden stash of new original Trek episodes to watch for the first time that made me want to drop everything else to sit down and write about an old TV show, and it had even less to do with being a fan of Star Trek. 
 
I was completely unprepared for the waves of emotion that washed over me when I saw this.  


Without leaking any spoilers, the message of this new episode was about the virtue of self sacrifice.  There was no predictive programming, no mention of viruses, no pretexts that weaved in a reason for anything in the story that was the result of climate change, no fighting over resources of any kind.  The story was about overcoming personal character flaws, sound moral reasoning and forgiveness.  It was about once again portraying humanity in a dignified manner.  Most of all, it renewed a sense of confidence in humanity I had all but lost chronicling the events of the last few years, in which every sacred cow we have ever had has been systematically and unceremoniously slaughtered.
 
All it took was a hour long play to restore a vibrant and renewed sense of hope.  If you loved the original series for what it was, and are disappointed with what it has become, you need to see this.  There are nine new time capsule episodes in all.  I have every reason to expect the rest of them will be as good as the first, and just as uplifting.  If this review has wet your appetite for nostalgia, rather than binging out on a Re-Trek marathon, I suggest maybe spacing them out and taking them in at times when you feel kind of low.
 
If you have always hated Star Trek, I suppose my advice will lost on you, but I don't think you really have to be a long time fan of the show to appreciate the contrast with daily life today.
 
We all need something like this to jog our collective memory, to help us realize that we all still have a choice about what we become, and to remind us of all why those choices are so very important.
 
That is my positive message for today.
 
-John


 

]]>
<![CDATA[Everyone… Just Stop Saying Apocalypse!]]>Wed, 01 Nov 2023 16:09:21 GMThttp://estateartistry.com/blog/everyone-just-stop-saying-apocalypseI am sick of hearing the word "apocalypse". 
 
(And no, I am not going to capitalize the word.)
 
All you "professional panic-er's"  haven't got enough to do.  Clearly.  We don't need more town criers.  The market is saturated, there are no openings.  Maybe apply for a real job, one you can handle, one you are well qualified for.  Try flipping burgers at McDonalds.  I hear they are paying over $20 bucks an hour now in California.
 
Every other email, video clip, newspaper article, industry trade paper, every financial report is "all apocalypse, all day"… and all the same. 
 
Oh no, it’s the apocalypse. 
The apocalypse is coming. 
We're in the apocalypse. 
See?  Look at Gaza, it has to be the virus, oops, sorry, I meant THE APOCALYPSE!
 
The finance people are the only ones with anything legitimate to complain about.
 
Have you all learned nothing whatsoever over the last three plus years of covid/climate change mania?  Has it not become crystal clear that the entirety of mass media, all your social media, your parents, the people at work, even the majority of "NPC on the street" mouths are completely controlled by a handful of people running countries and companies that limit free speech with constant censorship, cancel culture, and pre-determined, AI vetted, targeted messaging?
 
Have you still not learned that everything you think you know, and just about everything "everyone" is sure of, is 99.999%  gas lighting propaganda supporting false narratives?
 
Can you name any?  C'mon, try hard.
 
I can fire off a list, off the cuff, several pages long!
 
Can we all just calm down and curb the "End Times Enthusiasm" a bit?  Maybe take it down a notch,

OR THREE?
 
Take the misery going on right now in Gaza for example.  Just because I tend not to indulge in religious or political discourse, I am not unaware of it.  I won't proselytize or preach.  I know better than to take a side or parrot other opinions.  I want you all to just stop for a minute and look at a map.
 
The Gaza strip is a piece of land that is a little over seven miles wide and twenty five miles long.  That works out to just 140 square miles of coastline, adjacent to a tiny country that would be as unknown and foreign to most people as Djibouti were it not for the US flooding it year after year for decades with enough money, military and weapons to bury all 140 square miles of Gaza in paper, steel and gunpowder!
 
Gaza is the same size as Detroit.  It is smaller than Philadelphia, larger than Edinburgh, smaller than Dublin, half the size of New York City, and twice as large as Washington DC. 
 
It is one third as big as Los Angeles, one fourth as big as London, one fifth as big as Cape Town, one tenth the size of Yosemite National Park, three tenths the size of Phoenix, Az., and four times larger than Disney World.
 
At 10,762 square miles, Israel the same size as Hawaii.  It is a third larger than New Jersey and half the size of Lake Michigan. 
 
HAMAS is funded by Israel and run by Mossad, like ISIS was funded by the US and run by the CIA, and the rocket attacks you hear Israel whine about are mostly fireworks.  The idea of Israel defending itself from Gaza terrorists is like me begging for sympathy after punching a kitten in the face.

 
You tell me.  Does that conflict qualify as a "World" War?
 
Or does the rest of the world have to  be persuaded a bit, somehow, to get involved?
 
Israel is SEVENTY SEVEN TIMES larger than Gaza and it is drowning in guns and ammunition.  They have bullets for breakfast, landmines for lunch, depleted uranium munitions for dinner.  All this armament is the personal gun collection of a psychotic lunatic who just loves the smell of napalm in the morning, who also just happens to have a nuclear missile concealed carry permit from the US.
 
What is so shocking about Israel and a guy like that using Gaza as a firing range?  The backstop is the damn Atlantic Ocean! 
 
If this was a Las Vegas prize fight it would be like 5'9", 235 pound Mike Tyson defending his title against a 443 foot tall, 18,095 pound challenger.
For all you cheering "sports fans" at home in the United States, you are clearly upset by a lack of action.  This conflict is a G-Rated, family-friendly war movie, not nearly as exciting as crushing Saddam Hussein for "using chemical weapons on his own people" or bombing Bashar Assad for "gassing his own people". 
 
No, this is more like a hacked up retread of "Escape from New York" edited for time and content.
 
Personally, I cannot be more appalled by the violence, more ashamed of my own country for enabling and  condoning it, or more sympathetic to those who have become victims of it, but it is a flash in the pan and without your help and encouragement it would end about as fast as that fictitious Tyson fight would. 
 
And let me just preempt all you would-be commenters, before you wear out your fingertips penning editorial admonishments.  Don't take my use of satire as a reason to try and suck me into this bullshit.
I REFUSE TO ALLOW MYSELF TO BE MANIPULATED BY THE SAME ASSHOLES
THAT CONTINUE TO BRAZENLY STERILIZE, DEPOPULATE, IMPOVERISH
AND COVERTLY TORTURE EVERYONE ON THE ENTIRE PLANET!
The Israel/Gaza conflict is not WWIII.
The Globalist Bio-Surveillance, Totalitarian Takeover Is.

If you are going to take a swing at anything, make it count.


]]>
<![CDATA[Exposing the Bio-API - Part Five]]>Mon, 30 Oct 2023 20:04:40 GMThttp://estateartistry.com/blog/exposing-the-bio-api-part-fiveBefore I continue, I want to thank anyone out there who is taking this material seriously and helping me focus more attention on it.  A big thanks goes out to Todd Callender who recently brought up this paper I am going through page by page, and the really incriminating one I found after that, on Infowars with Maria Zee.
 

TODD CALLENDER - BOMBSHELL DISCOVERY DOCUMENTS CONFIRM TARGETING POPULATIONS THROUGH WIRELESS TECH
https://www.bitchute.com/video/W3N9Cr9rmjtb/
 
I want to also give people the right perspective on all things AI.  AI is a novelty, more of a curiosity than anything else people purport it to be, this includes broad statements about where it is going and what it can competently do.  My guy feeling is reliance on AI will ultimately bring down the cabal trying to enslave us, because these people appear to be putting a lot of their eggs into an AI-dependant basket.
 
AI can, and is, being used effectively to skim and scam and generate propaganda that divides and misleads us all.  And by combining it with the near bottomless well of information the WEF's stakeholders collect, it is being used with great success to rig entire markets for their benefit, but when it comes to medical applications of the type being proposed all throughout documents and papers like this one, it cannot think its way out of a paper bag, and you need to understand that.
 
Here are a couple clips that expose just how dumb AI is in that respect:

 
THE AI REVOLUTION IS ROTTEN TO THE CORE
https://www.youtube.com/watch?v=-MUEXGaxFDA
and this: 
https://www.youtube.com/watch?v=DJoGm8c523M 
REALLY relevant parallels with copyright law and how computers ruin it, this is where your bio-API hacker exploits will ultimately go.

 
AI has also proved quite useful to thieves who don't care what encryption protection you think you have:
 
AI Helps Crack NIST-Recommended Post-Quantum Encryption Algorithm
https://www.securityweek.com/ai-helps-crack-a-nist-recommended-post-quantum-encryption-algorithm/

And the evil cavalcade of bio-weaponry technology continues rolling out in so many ways still.  Don't buy any of these fake cover stories about street lamp equipment defects.  These lamps are part of this system and they are popping up everywhere by design, not by accident.  They serve a specific function in all of this.
 
PURPLE LIGHTS ALL OVER TEXAS
https://www.bitchute.com/video/HZbFHBViNaQZ/?list=subscriptions
I mentioned one time I had to drive under two of these things on I-95 in a previous article.  They FRY you.  You can feel it, and they damage your eyesight.
 
And then there is this:
 
CELL PHONE TOWERS BLASTING OUT FREQUENCIES ALL OVER THE EAST COAST?

https://www.bitchute.com/video/qNLHrDmxbFTu/
 
This heat map shows the typical pattern of cell tower traffic ramping up throughout the day and tapering off at night, but when you eventually see it ramping up at night, THAT will be a sign of something very bad.  This technology makes people sick deliberately, and the paper I mentioned in the last post plainly discusses by way of multiple measurements how this effect is enhanced by darkness, so that is when they will use it, at night!

I hope this next bit makes you think twice before buying a fancy "smart" anything:
 
YOUR SMART TV IS WATCHING YOU
https://www.bitchute.com/video/J5JGKvEIU50m/
It's smart.  If you buy it, you ain't.
 
TIMELINE: COVID-19 VACCINES AND MYOCARDITIS
https://www.theepochtimes.com/health/timeline-covid-19-vaccines-and-myocarditis-5317985?utm_source=partner&utm_campaign=ZeroHedge&src_src=partner&src_cmp=ZeroHedge 
Is it sinking in yet?
 
The general public, the masses, generalizing, insist on looking up to their figures of authority for reliable information. They are deeply programmed that the truth must come from above, from someone in a position of power, because they've only assumed that authority would obviously know more than they could. After all, they are just a simple citizen, they say.
 
And they also wrongly assume that such authorities must always say the truth because they also assume that there is some kind of mechanism behind that would punish them if they didn't do so. And the worst of all assumptions is that those people in power have their best interests in mind.
 
They don't, and they have never had the best interests of the public in mind. They only have their own, in a heavily narcissistic way, and the interests of the people in power above them.
 
And the worst part of all this is that many people who are awake and conscious enough to know all this I just said still look up to official authority to make up their minds about whatever is happening near and far from them, also assuming that if they are not well informed, not knowing the latest news will affect their lives somehow.
 
To me, this is like having a gazelle mentality, always looking around for a dangerous predator. It is not necessary to be watching everything that is going on because if something is really important, you will know it anyway.
 
It is evident that, from a sheeple perspective, only stupid people—conspiracy theorists—question epistemic truth, as presumably defined by their narrow, authoritarian class. All such stupid people are unintelligent extremists who seek to destroy the social order they disingenuously call liberal democracy.
 
Anyone who uses the “conspiracy theory” label does so, not because they value the evidence, the facts or the dialectic, but because they will not countenance any challenge to their worldview or any dissent from their claimed authority.
 
The “conspiracy theory” charge is an authoritarian propaganda construct, intentionally created to censor legitimate, fact-based opinion.
 
It is time we stand up to the “epistemic authorities” and reject their elitist, authoritarian pretence of intellectual superiority.  It is time to insist that all evidence is discussed, that all the facts are established and reported to the public.
 
It is time to reject the state propagandist’s “conspiracy theory” canard.


This last thing is just a bit of humor that made me chuckle:
A 1953 NEWSPAPER STORY ABOUT THE FUTURE OF THE TELEPHONE - CHECK OUT THAT LAST PARAGRAPH
https://www.bitchute.com/video/nsoa1fHFJVRv/?list=subscriptions
I doubt anyone called this paper back then to complain about woke gay pride.  Those were the good old days.

Now, back to the journal paper…

​The next few sections clarify each of the items in Table 4 below:  (It is going to get pretty technical from here)
1) BIOFET BASED MOLECULAR RECIEVER
"Field-effect transistors (FETs) are a type of transistors that use an electric field to control the flow of current. FETs consist of three electrodes namely source, drain, and gate. In traditional FETs, voltage is applied to the gate electrode which in turn modulates the conductance between source and drain electrodes. The conductance is reflected as the voltage-current alteration in the output channel. FET based technology is now being utilized for affinity-based electrical sensing using nanomaterials (nanowires, nanotubes, and graphene) as transducer unit [30], [159]. FET transistors can be utilized for biosensing by replacing the gate electrode with a biofunctionalized surface called Biorecognition Unit (BU), for the detection of target molecules in the environment [79]"
 
So this is where they begin describing how nano-bio devices like biosensors are constructed, which helps you understand how they work, and once you know that you can begin to see where any given component has functional utility, what its specific capabilities and constraining limitations are.
 
"The BU contains receptors on the surface of the FET channel which binds ligands with intrinsic charges which result in accumulation depletion of carriers in the semiconductor channel, and hence modulation of conductance and current. The addition of BU in conventional FETs for molecular recognition makes them bio-inspired and is therefore called BioFETs. The bioFETs work on the principle of ligand-receptor pairing i.e., binding of a ligand (signaling molecule) to its receptor (receiving molecule) and to produce a response e.g., signal transmission. There a number of ligand-receptor pairs that can be used in modeling BU of bioFETS e.g., antibody-antigen, aptamer-natural ligand, natural receptor/ligand [160] depending upon the target molecule. Semiconductor materials like NW [161], single-walled carbon nanotubes(SWCNT) [162], graphene [163], molybdenum polymers(MoS2) [164] and organic nanomaterials like conducting polymers [165] can be used as transducer channel of bioFETs. Among NW materials, Silicon nanowire (SiNW) has been proven to be the best fit for bioFETs due to their low power consumption, high-speed sampling, high integration density, and high sensitivity [140], [166], [167]."
 
This is how a biosensor can detect the presence and specific amount of any given substance it is designed to detect and transmit information about.  Note that the materials that these biosensors are constructed with are also present in vaccine solutions, so everyone can stop asking the same questions over and over, like "why is that in there?" This is telling you why EVERYTHING in there is in there.  It does not matter whether or not anything is inherently harmful, since those responsible for making these vaccines and similar products are not at all concerned with your health.  They are all necessary precursors for the ongoing construction of synthetic nanobiological architecture. One of the main objectives of this covert global population experiment is to ascertain upper toxicity limits.  Another is to figure out what all can be done to a person  if they manage to avoid obvious exposures like vaccinations, but succumb to other basically unavoidable, therefore inevitable exposures.
 
" In this direction, Kuscu and Akan [78] have proposed SiNW bioFET based molecular antenna which receives information molecules as biochemical signals and converts them into equivalent electrical signals. The proposed model employs the theory of ligand-receptor binding and considers microfluidic advection-diffusion channel for the propagation of information ligands. The receiver model consists of three functional units. The Biorecognition Unit (BU) works as the interface for sensing the concentration of ligands. In the Transducer Unit (TU), ligand-receptor regulates the gate potential of the FET through the field effect resultant from their built-in current charges. The output unit shows the current flow as a result of the modulated gate potential. Moreover, an analysis and optimization framework has been presented by providing a closed-form expression for fundamental performance metrics, such as SNR and SEP. The proposed SiNW bioFET is capable of providing efficient in-device, label free and continuous processing of sensed molecules."
 
In other words, silicon nano-wire biosensors constantly communicate biometric telemetry to whatever collects it.

2) OPTICAL TO CHEMICAL BIOLOGICAL INTERFACE
"Grebenstein et al. [168] proposed a microscale modulator to transduce optical signals into chemical signals. The modulator is realized using synthetically engineered E.Coli bacteria that express protons into the environment upon stimulation from an external light source. Light-emitting diode (LED) of the modulator uses proton pump gloeorhodopsin (GR) to express light. The E.Coli bacteria change the pH level of their surrounding environment as a chemical reaction to an external light source. The proposed testbed achieves higher data rates on the order of 1 bit/min as opposed to previous proposals with data rates of 1 bit/hour."
 
Transducing optical signals into chemical signals:  Again this is the nuts and bolts of electronic drugging.  Optical signals are coming from one part of the nanobio system, like a cell full of Luciferase or a similarly enabled nanobot, and this light is interpreted as instructions for some other part, like a drug storage repository.
 
3) REDOX BASED CHEMICAL TO ELECTRICAL INTERFACE
"New research in biology has recommends the usage of redox as a global signaling modality. Authors in [169] have adopted an approach that is inspired by sonar, which access the redox information through collaborative electrochemical probing. Authors further utilize attuned electrical inputs that are coupled with diffusible redox mediators (electron shuttles) to access redox information in a local environment and generate complex but interpretable electrical output signatures. Redox (Oxidation-Reduction) reaction is also utilized for biochemical-electronic transduction mechanisms in a number of proposals [170]–[174]. A wet lab interface prototype has been proposed recently in [173] for transducing chemical signals into electrical signals by the virtue of redox modality. The interface prototype device consists of a dual film with inner film contains hydrogel-based film entrapping E.Coli bacteria and the outer film consists of a redox capacitor to amplify electrical signals. These cells are engineered as reporters, which respond to the presence of a certain molecule (signaling molecule AI-2) by converting the redox inactive substrate 4-Aminophenyl β-D-galactopyranoside (PAPG) molecules into redox-active p-aminophenol (PAP)."
 
Just more nuts and bolts ways of talking to your central nervous system.

 
4) FRET BASED UPLINK/DOWNLINK BIO CYBER INTERFACE FRET
"(Fluorescence Resonance Energy Transfer) mechanism has been adopted by Abd El-Atty et al. [175] to model uplink/downlink bio-cyber interface for the Internet of bio nano things. In FRET-based optical sensing, bio-cyber interface is designed for targeted drug delivery applications of IoBNT. The downlink of bio-cyber interface is designed by adopting spreading principals of SIR (Susceptible, Infected, Recovered) epidemic scheme and decode forward (DF) basis. Three types of nanomachines are used in the downlink model to realize the targeted drug delivery namely nanoreciever, nano transmitter (Infected) and nanorelay(Susceptible) according to SIR epidemic scheme. The recovered nanomachines are ones that have transmitted their exciton to the nano receiver. The uplink is designed by considering two types of nanomachines namely nanosensors and nanoactuators. Uplink signal notifies the medical server about successful drug delivery through bioluminescence reaction."
 
In other words, a way to rat you out as part of a target group, attack you, and report back to base a successful or unsuccessful exploit.
 
5) SECURITY CONCERNS IN BIOLOGICALLY INSPIRED BIO CYBER INTERFACE
"Currently the research bio cyber interface security is immature and there is a minimum published literature in this field. Reference [176] have presented the possibility of ML based adversarial attacks for biologically inspired bio cyber interface which are presented below. Details of possible generic attacks on bio cyber interfaces can be found in Section V-B."
 
Duh.  It should be unsurprising that nobody is funding much research on how to protect or defend you, because this is obviously all about creating biologically disruptive technology and NOT about limiting the extent of the destruction.


6) MACHINE LEARNING ADVERSARIAL ATTACKS
In the case of bio-luminescent or thermal signaling based bio cyber interface adversaries might launch an attack by manipulating the internet-enabled parameters. By manipulating the parameters, attackers can cause inappropriate amount of drug release, initiate self-annihilation of drug molecules and modify monitoring information provide by bio chemical processes. In redox based bio cyber interfaces, changing the input electrical signal can lead the capacitor charging and unwanted redox activity such as activating/deactivating the redox substrate to affect enzyme production. Bio FETs work on the principals of ligand binding through charging of electrodes. The attacker can launch sentry attack to repel required ligands or black hole attack to attract unwanted ligands to bind to the receptor to affect the current control. The changes in external current control can cause the Bio FET based bio cyber interface to exhibit unwanted behavior.
 
This describes how an AI can be used to conduct" Kill-Box Ops" that can target and kill you, and it explains how it would accomplish that.
 
Countermeasures
"The attacks related to biologically inspired bio cyber interfaces can be categorized as ML-adversarial attacks. Possible countermeasures to ML adversarial attacks are [42] Data sanitization: This process refers to pre-processing, validating all the input data, and rejecting the harmful samples. Adversarial training: Inclusion of adversary information in the training samples to recognize attack vector. Defence distillation: Creating secondary ML model with less sensitivity and more general results. Differential privacy: A cryptographic mechanism of adding noise to susceptible features of data. Hormonic encryption. A cryptographic mechanism to perform computations over ciphered data to generate encrypted result."
 
None of the countermeasures mentioned above are really useful or available techniques for use by people like you and I, but there are others, so we'll get to them, just hang in there.

 
D. SUMMARY OF BIO CYBER INTERFACE CLASSIFICATION
"It is obvious from the above-mentioned literature that there are a lot of possibilities for designing a bio-cyber interface. The design model of the bio-cyber interface primarily depends on the application scenario. For example, a bio-cyber interface design and components for sensing applications will be different from drug delivery applications. Our take on the choice of bio-cyber interface option goes in the favor of bio-inspired interfaces. The reason being biocompatible in nature and the research in these interfaces in line with the direction of IoBNT. Extensive in-vitro and wet-lab experiments are required to validate the theoretical proposals for the bio-cyber interface."
 
Now maybe you have an answer to certain questions, like "Why are there still people still pushing vaccines on the public?" or "Why vaccinate the entire world?".  It is because, clearly, to a small group of psychotic, impossibly rich globalists, we are all just lab rats.  And because they refuse to stop experimenting on us, they have left us with very few alternative ways of dealing with the problems they have created.

There is no other way to put this:

WE HAVE TO HANG THEM ALL BEFORE THEY SUCCEED IN KILLING US.


V. SECURITY IN IoBNT
"The advent of skin implanted bio-electronics and the IoBNT paradigm will not only open up a plethora of novel biomedical applications but also its wireless connection capability will enable the adversaries to utilize it malevolently. Connecting the intra-body biological environment with the cyber domain through bio-electronic devices will provide the attackers with an apparent opportunity to devise new terrorist mechanisms to harm the patient remotely. Maliciously accessing the human body through the internet to steal personal information or to create new types of diseases by malevolent programming of bio-electronic devices and intra-body nanonetworks is termed as bio-cyber terrorism [25]. Bio-cyber terrorism can take advantage of wirelessly accessing the human body to launch fatal and life-threatening attacks from a remote site. Therefore security features have to be embedded either in a separate component of the bio-electronic device, which may enlarge the size of the device or might be infeasible in some applications. Another possibility is to delegate security services to external devices in close proximity with sophisticated resources as compared to bioelectronics devices. For example, in a similar field of IMD (Implantable Medical Device), some researchers propose to assign security functionality to an external device like Cloaker or MedMon [177]. Nonetheless, the bio-electronic device must execute a lightweight authentication mechanism at least once to establish a secure connection with external devices. Bio-electronic devices will also be linked to a gateway device (such as a smartphone) to send and receive information from the healthcare practitioner. Because of the technological differences, this section discusses the security needs for nanonetworks and bio-cyber interfaces separately. The security goals, regardless of the underlying technological variations, remain the same. The STRIDE threat approach can be used to model security threats against IoBNT. STRIDE is the acronym for Spoofing, Tampering, Repudiation, and Information Disclosure, Denial of Service and Elevation of privilege. These six categories present a broad classification of threats and can be further divided into other related threats. Each threat category is related to a security goal: Spoofing-Authentication, Tampering-Integrity, Repudiation, Non-Repudiation, Information Disclosure, Confidentiality, Denial of Service- Availability, and Elevation of privileges-Authorization [178], which is presented in Table. 5."
 
So above you have both the justification for "Hangin Em High" and some thoughts on potential electronic anti bio-hacking gizmos and how such devices might work.  However, I would not hold my breath waiting for the same people who are writing this paper to build such devices, or make them available to you.

Authentication (Au):
"Authentication ensures that the identity of each communicating party is established before executing any operation. Moreover, authentication also ensures that the data is coming from the authorized source and unauthorized users cannot access or modify the data. Authentication needs to be done on users as well as a message [29], [179]. Integrity (I): Integrity ensures that the message exchanged between legitimate entities is not tampered or modified by unauthorized entities.
 
Non- Repudiation (NR):
In the traditional networking paradigm, all the communication transactions are logged to track the network anomalies and gain the attacker’s profile in case the attacker tries to misuse his/her privileges. Nonrepudiation can be violated if the attacker gets access to the logs and delete the records to remove traces.
 
Confidentiality (C):
Confidentiality ensures that the attacker should not learn the content of the message exchanged between the sender and receiver. The data must only be accessible to authorized personnel upon authentication through some mechanism priory.
 
Availability (A):
This goal ensures that the services and communication of the device are always available on request.
 
Authorization (Auth):
Authorization property ensures that only those entities can execute a specific operation that has privileges to order it. Authorization requires that an entity must have been authenticated previously through the regular login (ID, password) procedure to establish the identification."
 
The various methods described above are pretty self explanatory, so I won't comment on them.  They all basically depend on you having access to information you don't have access to, and even if you did you could not be certain it was accurate or complete, so this is a good example of criminal evasive behavior. 
 
i.e. Showing concern for a critical aspect of this kind of R&D while at the same time doing nothing of any significance in that area.

 --------- Next Up in Part  Six  ---------

A. ATTACK TYPES IN NANONETWORKS
This section presents the possible attacks and existing proposals related to the nanonetworks. A summarization of security proposals for nanonetworks is presented in Table 6.

Everyone is emailing me about the next section and when it will be posted.  If I am a little slow completing the dissection and translation of this paper I apologize.  Please be patient with me, I promised I would so its all forthcoming.  The reason for that is I have come into possession of so much additional and even more informative and incriminating documentation that it has become an intimidating pile. 
 
I am cramming and compiling information at ridiculous pace. 
 
Several people have asked me why I don't do a presentation for MD4CE or some similar presentation on a show like SGT or Stew Peters on all of this.  Frankly, it is because right now its hard, even for me, to convey a lot of this verbally or on the fly as I (somewhat embarrassingly) learned  during a recent phone call with Albert Benevedes.  (The impressive creator behind the  WelcometheEagle88 channel on Bitchute.)  I found myself struggling at times to answer some of his questions because I was taking the call from the road.  Anyway, that is why I probably won't do any media appearances on the Bio-API topic until I feel like I can do a better job of that.
 
Right now, I need lots of notes to properly answer most common questions, but I do have all of that.  What slows me and others down is all the erudite jargon and dual-purpose code speak.   There is so much new vocabulary here one needs to become fluent with, and all of that needs to be translated into plain English to make it understandable for lay people.
 
I have to make people aware of a lot of what is currently in my research pile, because it contains a lot of necessary context for what it otherwise very dry academic literature.  I am also trying to compose and collect various visual aids that help break everything down simply. 
 
Like I said before, the learning curve on this stuff is Mount Everest.  Nobody is going to get it unless I educate them along the way, so if you feel a bit lost, just hang in there and do the best you can for now.  The material I will release very soon, probably before I finish up with this paper, will be very helpful.
 
-John


If you are just finding my blog please be sure to also check out two other contributions I made:
HOW TO REVERSE VACCINE INJURIES:

http://estateartistry.com/blog/reversing-vaccine-injuries
CANCER CURE:
http://estateartistry.com/blog/cure-your-cancer-by-christmas
]]>
<![CDATA[Now Do You Believe Me?]]>Mon, 23 Oct 2023 09:47:12 GMThttp://estateartistry.com/blog/now-do-you-believe-meI realize most of my readers are expecting the next installment of "Exposing the Bio-API".  It's coming.  I expected to have that done by now, but after posting part four I also began reading some of the other documentation I have been collecting, and there is a lot of that.  Part of the reason has to do with making sure I do not make any mistakes as I decode the language used in that systematic review paper the series is based on, but also because I have found a few more recent papers, so I am trying to confirm what might sound like forward looking predictions I sometimes make about statements in a two year old document. 
 
My intent is to tell you where I KNOW their plan is going, not to speculate generally on where I think it can go.  But it really does not matter if I am a palm reader or the Oracle of Delphi, because if I can think of an evil use, you can bet your last dime they most certainly can as well, and typically, everything that is possible to do eventually does become part of this system as an additional capability. 
 
Most "normies" scoff at the entire concept, thinking it to be too far out to believe, you just can't convince them, (no clue why) that with enough of an army working on a thing, the "impossible" frequently becomes possible faster than the same people realize.  It sucks to know this kind of stuff.
 
Because nobody really wants, or welcomes, an idea taking up residence in their head like; "I am the bio weapon."
 
But I won't convince anyone that’s even possible without solid proof.  I have to have that, because its going to be far too easy to dismiss me personally.  The reasons people come up with are endless, because this stuff is so ugly.  

I'm Sorry.  It Is TRUE.  You ARE! 
And Here Is All The Proof You Need.

source: American Journal of Bioinformatics Research 2021, 11(1): 1-31
DOI: 10.5923/j.bioinformatics.20211101.0
Even I don't want it to be true, and please believe me when I tell you that.  I tried very hard to find a reason to dismiss this paper myself.  As I read through this I thought of plenty of reasons too, but before I share them, please download and read this document yourself by clicking here:
DOI: 10.5923/j.bioinformatics.20211101.0
My first thought was it was a fake journal paper.  I read a lot of peer reviewed literature, even stuff currently under review.  One thing you notice about good research is you rarely see authors submit a paper they care about without having someone proofread it for typos, grammar, proper formatting, etc.  This paper is badly written, so I saw a red flag there.
 
It is full of broken English, typos, the same text appears repeatedly in different sections.  Its like someone assembled it by clipping paragraphs from multiple other sources and hastily assembled this thing.  So immediately I suspected maybe the journal wasn’t real, or wasn't credible, or maybe the document number was fake, or the authors were not credible experts, or real people I could look up, so I began vetting all of that.  Here's what I found:
 
The journal is a real journal.  It appears to be legit and venerable, but even with the most respected journals, like JAMA, there is always a possibility of some kind of "pay to publish" thing going on.  We saw that over and over again during the pandemic scare.  If anyone knows of anything like that going on with this one please tell me.  I don't see any of that.
 
  • The paper is real.
  • The document number is authentic.
  • It is actually in this journal.
  • It is currently behind a pay wall and the cost to get it is $299.00
  • The authors are real and I looked them all up.
  • Most of them have published other related papers so they are publishing within their field of expertise.
  • They all appear to be alive, with active profiles and resumes and they appear to be who they purport to be.
 
Authors are credited in the order of their contribution to the paper so the first guy named is the biggest contributor.  Whenever you see a lot of authors on a thing the last guy named had the least to do with it.  He may even be a student whose only involvement was to help out in some way.  Everyone in academia wants to be published, it’s a big deal to them.  Sometimes people are named as a professional courtesy or favor.
 
This paper has 13 authors, which is a lot, but I looked them all up.  The first five listed are important and have very well established careers.  The rest less so, but together, if you look at what all their current jobs are, this adds a lot of credibility to the information provided.  You see experts in all the right places.  It appears the thing that connects them all is some time spent in connection with Northwestern University in Bangladesh.  Looking at the top five we have;

Md. Rahimulla Miah
https://loop.frontiersin.org/people/1376147/overview
Department of Information Technology in Health and Research Associate, Northeast Medical Pvt. Limited, Sylhet, Bangladesh and Former PhD Student, IBEC, University Malaysia Sarawak (UNIMAS), Kota Samarahan, Sarawak, Malaysia  Expert of sensor technology in health with 20 years of career experience in teaching on bio-sensor networks and informatics. North East Medical College Sylhet, Bangladesh
 
AAM Sahzzadur Rahman
https://search.brave.com/search?q=AAM+Shazzadur+Rahman&source=desktop 
Department of Medicine, Northeast Medical College, Sylhet, Bangladesh
Associate Professor of Medicine - ‪‪Cited by 160 - ‪Clinical Medicine - ‪Tropical and Infectious diseases

 
Md. Shahariar Khan
https://www.nemc.edu.bd/our_team/dr-md-shahariar-khan-2/
Assistant Professor  Paediatric  Cardiology  Northeast Medical College
Impact of Sensor Networks towards Individuals Augmenting Causes of Diabetes.
Journal of Endocrinology Research, 3(1), 1-20.  2021
Processed Radio Frequency towards Pancreas Enhancing the Deadly Diabetes Worldwide.
Journal of Endocrinology Research, 3(1), 1-20.  2021

 
Mohammed Abdul Hannan
https://scholar.google.com.sg/citations?user=H1aGKLQAAAAJ&hl=en
Lecturer at University of British Columbia, Adjunct Faculty at Newcastle University
Verified email at mail.ubc.ca
Neural network based prediction of stable equivalent series resistance in voltage regulator characterization
MHM Zaman, MM Mustafa, MA Hannan, A Hussain
Bulletin of Electrical Engineering and Informatics 7 (1), 134-142

 
Md. Sabbir Hossain 
https://orcid.org/0000-0003-1065-2056
B.Sc in Biotechnology and Genetic Engineering (Biotechnology and Genetic Engineering)
Bangladesh Jute Research Institute: Dhaka, BD
2013-12-01 to present | Biotechnologist (Basic and Applied Research on Jute)


So why is this paper so messy?  There has to be a reason for it, but I can only speculate about what it is so I won't waste tons of time doing that.  I just can't help but wonder if maybe it was presented this way deliberately, in a way that would not attract the same attention as a properly written paper, but just to get something out there on the record, like a shrewd whistleblower might do.
 
I realize that works both ways and you see it done with propaganda as well, but the important thing here is the information.  Propaganda is easy to spot.  It hangs out there unsupportable by anything other than similar propaganda.  That’s not what this is.  Everything in this paper fits with everything else I have seen and read, it was just shocking to me, to see anyone speak so plainly and bluntly, and also to hear that from a guy who actually understands and actively works as a teacher in this field.  I believe Rahimulla Miah at least, figured out what's really going on and he is, understandably, really freaked out about it.
 
I have been known to say repeatedly in the past that fear has many uses.  I have told people not to believe everything the enemy would have you believe, and not to fear the enemy because you think him to be invincible or because he claims to have something so scary at his disposal that all is lost. 
 
The enemy knows that your fear of what he may have has just as much utility in war what he does have. 
 
An example that proves this is the current state of public debate about what the vaccines are potentially doing to human genetics.  I hear learned people sounding alarms constantly about vaccines causing irreversible genetic damage that is existentially dooming us all. 
 
I don't subscribe to that idea, nor do I even think such a thing is even possible.  Nature always prevails and finds a way forward.  The people funding and coordinating all the research being done in nano-biotech believe human science has surpassed their creator, and that they have embarrassed him with their creativity.  They won't put it in those terms exactly, but regardless of whether or not they realize this or state it explicitly, it is what they believe.

The existence of weaponized bio-nano technology is NOT a bluff. 
They have it.
 

Much of what they claim they can do with it is NOT a bluff. 
I tend not to concern myself as much with finding where
​the actual line is between truth and fiction,
because the capabilities they have already demonstrated they have
are horrifying enough.

 
Their willingness to actually use it is NOT a bluff.  
I can produce example after example of them using it.

​I know what they hope to achieve with this, and I can see a way to do that, but I also see plenty of ways we can disrupt the timeline they are on.  As with any complex plan, this one is being done in stages. The only way this plan of theirs works is if each major contributory objective succeeds on schedule and without a hitch, but pulling off something of this magnitude is a tall order, even for them.  I have to believe we can foul that up, or I may as well kill myself now. 
 
I don't know about you, but suicide is NOT how I roll.  If you feel like me, BE LIKE ME, because I need your help.  One guy shouting from a rooftop isn't going to be enough to derail this.  No matter how outrageous this plan looks to you, don't underestimate these people.  Winning is not a matter of resources, it is a matter of numbers.  If we lose the one advantage we have, they win. 
 
I realize material like this is a LOT to swallow, but man up and believe in your ability to understand it no matter how far over your head it first appears to be.  Like it or not, accept it or not, believe it or not;  you do have skin in the game here.


The pandemic crisis was the culmination of an immensely ambitious plan and it was the first time many of us began to realize that it was big enough to affect every living person on Earth.  The simple truth is that an impossibly narcissistic, over-the-top psychotic goal has been in motion for over a hundred years, and the bad guys are still trying to keep you guessing about what that is.

They have been pretty good at that thus far, I have to admit.  And they have been using all kinds of other smaller contributory agendas that serve different functions to keep us all off balance and looking the wrong way as each one we take our eye off of advances, inexorably ahead.  Each one has a proper place on the grand strategy board.  Some agendas function as building blocks, others are preparatory steps, some are promotional or preemptive strategies. 

We all want to know what to do, but knowing what the right move is requires being able to see enough of the chessboard that you can choose to occupy a space AHEAD of where they are at any given time on the master timeline.  I think about this by assuming the best version of the enemies mindset I can muster and I try my best to maintain that when making my own decisions.

I put on my "Dr. Evil hat" and ask myself questions like: What would it be necessary to do to ensure that I was always advancing that master plan?  How would I keep pivoting as people get wise to one thing after another?  I look to history for possibilities since there is a clear pattern I can always see repeating.  These guys are not all that smart, and they never deviate from the usual boiler plate cons.  They just dress them up differently.

I now see what I believe is the master plan.  I have felt certain of this before and been wrong.  We all have.  But this time I really doubt there is anything bigger than installing everyone on Earth with nefarious wetware.  I can establish a pretty firm date as to when this scheme was hatched, which was 1922. 
There were a bunch of scientific discoveries that happened in the early 1920's that seeded the bio-nanotech pipe dream.  That’s a long time in the making, but also about the time they had just wrapped up the last big global glitter bomb and were looking for some way to top a series of events they had just cemented into motion that would begin with the stock market crash of 1929 and end with WWII. 

It was obvious this effort would require a lot of manpower, but also a tremendous amount of money to pay all the people they would need to bring this into reality.  So they siphoned and stole that money from everywhere imaginable, right down to the change in your couch cushions before they simply began printing cash wholesale. 

The only other priority while this was going on would be to earmark some of that capital to misdirect everyone making a career in the hard sciences by funding impossible bullshit, so none of them could progress in any area that could, or would, interfere with this plan.

(Today that effort has created new AI problems to overcome that may never be possible to control, not that it is of any importance to them to do so given the over-arching depopulation motives they have.)

The nuts and bolts were all fleshed out in compartments they created simultaneously along the way.  These functioned as silos of intelligence that would provide all the puzzle pieces for the "remotely controlled slave race" they believed was possible to engineer, and they quashed anyone that proved anything "inconvenient" if they were outside of these strictly controlled niche pursuits. 

Before this, the field of medicine had very little in common with computer science and cyber security.  There is very little crossover beyond the obvious.  They even cite this as a current obstacle to further progress on aligning AI with good patient care, lamenting the lack of interdisciplinary human capital available for hire.  They even whine in these policy documents I have about doctors and computer wonks being socially incompatible!  Today this same separation works in their favor, because  the doctors never think to look for any answers in the server rooms the hackers dwell in.

Over the next hundred years, Big Pharma created enough sickness to provide the excuse they needed to earn and burn mountains of cash making the kinds of covert advances in synthetic biology that they would need and justified that work in the usual manner; "for your benefit". 
 
Computing power, databases, and internet capabilities grew until the basic requirements needed for IoBNT were met.  Combining IoBNT with wireless tech, which they pushed until it became the fashion crazed addiction it is today, resulted in a new threat being born.  We need some new terms to distinguish these threats from the ones they use in their propaganda.  The new danger is NOT synthetic viruses created and leaked from bioweapons laboratories. 
We need to call this what it is. 

The new threat is coming from weaponized "electronic pathogens".

 
The gross architecture provided by wireless cellular networks gave them their first real capabilities, which they began to salivate over in 1995.  By 2005 they were actively testing on humans.  Their early successes emboldened them even more. Seeing this as a return on their investment the next question was:
By 2012 these experiments began to scale up to include entire populations through the use of geoengineering programs and controlled mass food production, and we saw this when GMO's first appeared.  Only nobody knew then, or even now, that those early forays into how one creates GMO plants were the entry point for nanotech to begin poisoning the entire food chain.

All during the last century, as time passed, they financed as much fake literature as they could write that encouraged a superstitious belief in vaccines, [again] and they normalized that.  This is why the work of Louis Pasteur had to be medical cannon, and why the work of Antoine Bechamp and Charles Richet had to be forgotten.  My first book was crushed out for this reason.  It was all about Charles Richet and what he taught us pulled the rug out right out from under vaccine proponents.  Believe me, it was getting looked at very seriously by way too many people globally, and that hurt the plan and could not be allowed. 

That was my first clue, and the thing that kicked off everything I would eventually do afterwards.

Then, in 2020, we had the full blown pandemic hoax, the holy covid water, and everything that followed.  Big move.  Successful move.  My second book probably helped their plan, because it included a vax injury protocol I created that was based on their shit literature that they knew would not work, so they let me run with that one.  Why not, right?  Eventually the same advice would even be parroted by credentialed doctors and nobody called them on it.  Nobody but me.  Because I tested that advice myself.  When it didn't work I found where I went wrong and eventually came up with something better, something I then proved worked.  But, unsurprisingly, that is something I can't convince any credentialed doctors to take seriously.

And now that I have been doing this deep dive into the research and development timeline of IoNT, which became IoBNT , everything is coming together to form a very clear picture.
​You see, with the decision to force-inject everyone with what they knew would cause massive death, because the method of transhumanizing people is toxic to them.  By ignoring that they created a problem that they knew would start a clock ticking, and they knew how long they had and approximately when it would run out.  Vaccines could be marketed to people like a gift from God for a short time, but only until huge numbers of vaccine injury victims began meeting God in person in greater numbers than they could hide.

Somebody wisely foresaw that vaccine "hesitancy" was bound to turn into vaccine "hell no", so they knew damn well they could never actually vaccinate everyone, and before they hit this wall they would need to have  lots of other ways to dose people without their knowledge standing by, ready and waiting.  They know mainlining this poison is the next best thing to a nasopharyngeal administration vector, so adulterating medical injectables, annual flu shots and covid tests were a no-brainer but, to get everyone they would need to poison them every possible way there was to do that, so no matter where a person went or whatever they did, they were completely surrounded by traps, and almost everything on the planet being manufactured by their own "stakeholders" it was so easy to do that they simply poisoned everything with nano graphene!

They have by now, most certainly managed to nano-install every last person they could in some way.  Nobody can really tell you what is safe and what's is not anymore.  It’s a total crapshoot.

If you ate food, it would be full of nanotech, if you drank any water from the secondary water supply, it would be poisoned with nanotech.  If you if you lived in the wilderness smart dust would rain down on you.  If you hunted for food, the animals would already have been eating the nano-shit accumulating on the forest floor for decades.  If you bought it from the store all the meat would come from vaccinated livestock, everything else would be fake or over processed junk food.  If you got sick from that or for any other reason you would go see a rube doctor who would poison you some more.  If you have teeth, just fluorinating all the water would ensure that sooner or later you would end up in a dentist chair getting vaxxed with adulterated painkillers.  They left no stone unturned in an attempt to leave you without anywhere to escape this inevitable fate.

But covid, glorious covid was special.  It would be both a magic bullet and a "catch-all", "invented" long ago, even patented, ahead of it "leaking" in 2019, and that would take the blame for the radiation sickness that would result from firing up every wireless thing they invented.  It is the emissions they produce that has been an ever increasing a threat to health from the invention of the telegraph, to the advances in military radar at the end of WWI, to the very first AT&T brick phone, until the present day, where now we find ourselves all literally trapped in an active planet-sized microwave oven, forever blazing on high.

If Hell actually is empty, that is only because it is much warmer up here now!
]]>
<![CDATA[Exposing the Bio-API - Part Four]]>Sun, 15 Oct 2023 18:30:19 GMThttp://estateartistry.com/blog/exposing-the-bio-api-part-fourAs I continue working my way through this IEEE paper, please keep a couple things in mind:
 
1. This documentation is a couple years old, and some of the technology it discusses is even older.  
2. Much of the text I pull out in Part Four sounds like it is talking about wearables like patches and consentual internal medical implants and external monitoring devices, and while such devices are discussed at length the kicker here that is so cleverly understated that you might easily miss it, is he fact that every one of these macro-scale medical devices has a NANO technological counterpart.  This paper is all about nanotechnology.  Everything else is fluff.

​3. All throughout the excerpts that follow you need to tune out all the filler that provides the motivations and justifications for advancing this research and development work and simply recognize and accept that all of that only sounds good, that none of it is really needed, and that it is all an EXCUSE that only makes any sense in the context of a global fear frenzy that has been manufactured out of nothing -- to provide a reason to do this at all.

4. Keep in mind that this nanotech is nefarious SPYWARE, fraudulently necessitated by the faux threat of pandemic health emergencies.   That "bio-security" is a monumental ruse.
And most importantly, understand that the technology being discussed and reviewed is NOT intended solely for use by doctors to help them provide better care for specific patients with specific ailments.  In other words, we are not talking about new advancements that add to a physicians tool bag, that have become available to them for use on a case by case basis, to help them overcome difficult circumstances in certain situations, or as they see fit.  This monitoring in being accomplished by "wet-ware" that has been installed in everyone, including you and I, and despite the many serious health problems associated with its use, this installation was done WITHOUT YOUR KNOWLEDGE OR CONSENT!

5. In the mad bio-security world that is driven by a fear of invisible pathogens, whatever their origin is said to be, it is now possible to conjure "evidence" that YOU are a potential threat, and this is what is so dangerous about all of this.  Eliminating that threat, even if it means eliminating you, is going to be seen as OK if whatever health problem they can point to can be used to single you out as some sort of threat or risk.  Everything is on the table as a means to contain what will be framed as protecting "the greater at-risk population."

Everyone adding to the noise around vaccines and biological weapons is having the wrong discussion. None of them are talking about the actual weapon here, which has already been deployed in everyone whether they managed to escape being vaccinated or not.  Its true, the vaccines are harmful, and this is why, but its not just about toxic poisons, it is why those toxic poisons were introduced to begin with.
 
Recall back to that farce of a human trial Pfizer pretended to do before releasing their vaccines on everyone. Remember that they were "experimental" and that there were specific endpoints stated in the vaccine documentation Pfizer provided. Nobody argues this now, that there was an experiment going on, but what was it?
 
That is where everyone screaming about vaccines kind of dropped the ball. It was assumed the experiment had to do with how humans handled the vaccine. And to some extent it was, but really it was about how the vaccine changed them, trans-humanized them. Really, it was about what could be done with those people if they survived being poisoned, and that is what this documentation discusses rather openly if you properly understand what you are reading. And there is a huge mountain of documentation proving this at the IEEE, a place very few people thought to look.
 
Still some people simply looking at blood samples with a simple microscope are beginning to surmise some of this.

 
DR. ANA MIHALCEA - THEY HAVE PUT ARTIFICIAL LIFE INSIDE OF THREE BILLION PEOPLE...
https://www.bitchute.com/video/qsw9ThL5fbrc/
 
Myocarditis is just the tip of the iceberg. HERE IS THE REST OF IT!
 
Picking up where we left off with Table 2:

a: BLUETOOTH LOW ENERGY (LE) COMMUNICATION
 
"Bluetooth (LE) Low Energy technology was introduced to wirelessly connect small low power devices to mobile terminals. This technology is ideal to be integrated with implants for healthcare applications as it supports ultra-low power consumption [102]. It contains tiny Bluetooth radio to actively send and receive messages from nearby smartphone devices. The transmission range of Bluetooth LE is up to 10 m, the data rate is 1 Mbps and the frequency band is 2.4 GHz ISM [103]. Pairing time with other devices is in milliseconds, which is appropriate for alarm and emergency conditions in healthcare applications [104]."
 
b: ZIGBEE
 
"ZigBee has an active transmitter able to communicate with mobile devices over a distance of 10-100 m. Zigbee is considered the most cost-effective technology due to its low power and low data rates. ZigBee can operate on three ISM bands with data rates from 20 Kbps to 250 Kbps [104]. Although ZigBee provides a large transmission range, it is not a good candidate for continuous health monitoring applications due to its low data rates [101]."
 
 If Zigbee is not a good candidate for continuous health monitoring applications that begs the unanswered question of what it IS good for.  That is what I want to know.  It sounds to me as if this would useful when you want to trigger some kind of nano-system event at a distance.

c: IEEE 802.15.6 STANDARD
"The rapid popularity of Wireless Body Area Networks (WBANs) and Consumer Electronics called for a standard communication medium to address the special needs of the WBANs such as low power, low cost, low complexity, high throughput and short-range wireless communication in and around the human body. IEEE standards association established the IEEE 802.15 Task Group 6 for the standardization of WBAN [105], [106]. It quotes: ‘‘The IEEE 802.15 Task Group 6 (BAN) is developing a communication standard optimized for low power devices and operation on, in or around the human body (but not limited to humans) to serve a variety of applications including medical, consumer electronics personal entertainment and other IEEE 802.15 WPAN Task Group 6 Body Area Networks. 2011]. IEEE.802.15.6 has different frequency bands in different countries ranging from 16- 27 MHz [107]. "
 
Were you aware WBAN's were so popular?  I wasn't.  If it is that popular don't you wonder why this vocabulary isn't more common?  Maybe its because the idea of " high throughput and short-range wireless communication in and around the human body" isn't exactly advertised.
 
"Medical Implant Communications Service (MICS) band is a licensed band used for implant communication and has the same frequency range (402-405 MHz) in most of the countries [105]. MICS band is suitable to be integrated for bio-cyber interface as it defines protocols that are compatible with system requirements of bio-cyber interface."
 
The key word here is "integrated".

 
"IEEE.802.15.6 can operate within a transmission range of 3 m with data rates up to 10 Mbps [108]. IEEE.802.15.6 has also been recognized to be used as a standard for Human Body Communication (HBC). HBC uses the human body as signal propagation medium, therefore certain concerns must be taken into account such as increased mobility of the patient, lower power consumption, small battery size yet life to span around a time several months, and management to aggregate burst data in presence of continuous triggers from physiological data. Considering these HBC concerns [109] proposed a medium access method for statistical frame-based time division multiple access (S-TDMA) protocol that demonstrates lower data latency, lower power consumption, and higher transmission efficiency."
 
And here we have been encouraged to believe "shedding" was a thing.  Wake up.  People are not shedding anything physical, they are electronically TRANSMITTING!


d: NEAR FIELD TECHNOLOGY (NFC)
 
"NFC is a passive communication designed to operate in the ultra-low transmission range of up to 20 cm. NFC technology contains NFC tag similar to the RFID tag, which is powered by a readout device. Communication in NFC requires devices to touch each other or be in close vicinity to each other. Smartphone transmits power wirelessly to resonant circuits through inductive coupling which turns ‘‘ON’’ the NFC tag. Once the transmission session is complete, the tag is marked as ‘‘OFF’’ and becomes unreadable [110]. This technology is ideal for implantable devices with a low power source as the communication is powered by the reader device (in our case smartphone). Ultra-Low transmission range in NFC is not a drawback, rather it is a strength as it provides rapid connection [101]."
 
Here you have a reference to a situation in which a healthcare provider uses a smartphone or similar device to "read" biometric telemetry off of some sort of medical implant, of course the implant in this case goes unidentified, leading you to maybe envision a doctor collecting data from a pacemaker or something.

 
e: RFID (ISO/IEC 18000-6)
 
"RFID is a passive wireless technology that consists of a transponder (tag) to be read by an RFID reader. RFID based implants are feasible in situations where battery supply is a major issue [101]. Entire transmission in passive RFID systems is powered by the reader side [111], which in our case can be RFID reader enabled smartphone devices. The read range of RFID is 1- 100 m with the data rate of 10- 100Kbps [104]. Battery-powered RFIDs with active radio transmitters are available which comes with a high cost yet low data rates."
 
Think about this.  They are not talking about an anti-theft sticker on some retail product.  If the RFID implant is a nanoscale device floating around in your bloodstream, then whatever it says about you can be read by a reader device from as far as three football fields away.

C. POWER SUPPLY
 
"Bio cyber interfaces need a continuous power supply for data collection, processing, and transmission. The battery is mass vise the largest unit in the bio-cyber interface and other body implants. Although considerable progress has been done in lithium rechargeable batteries, yet they cannot keep pace with the novel technology requirements and size constraints. Miniaturization of a battery source, energy harvesting methods based on human body movements, and wireless battery recharge techniques have been explored by researchers of MIT for implants in Wireless Body Area Networks (WBANs).
 
Don't think in terms of actual batteries, think in terms of nano-crystalline particles that run on a piezoelectric effect that can be harvested from any number of sources, including the ambient wireless radiation soup we all walk around completely immersed in.  In the next paragraph some examples of those sources of energy are given.
 

"Evanescent waves have been considered in [112] to wirelessly power the electronic devices over a short distance. Other efforts include solar rechargeable batteries [113], piezoelectric nanogenerators [114], micro-supercapacitors [115] and endocochlear potential-based bio batteries [116]. Implantable devices in IoBNT need a continuous power supply and prolong battery life, for this purpose mechanism has been investigated to scavenge power supply from the epidermal layer of the wearer [116]. These energy scavenging batteries are called biofuel cells (BFC), which convert chemical energy into electrical energy through biocatalytic reactions [117]–[119]. Researchers from the University of California San Diego have demonstrated an epidermal BFC [120] to scavenge continuous energy from human perspiration. Lactate is used as biofuel as it is present in human sweat in an abundant amount [120]. Similarly, energy scavenging techniques from the human body can be adapted for power supply in the bio-cyber interface. A detailed energy model for nanoscale devices has been demonstrated in [121] which discusses the power consumption of each component in the nanonetwork."
 
This next section draws our mind back to the idea of "smart stickers" and the like, some of which also come with toxicity problems.  Compared to the nanotech that accomplishes similar functions anything involving a sticker you have to glue on somehow is stone-age tech by comparison.

D. ADHESION SYSTEM
 
"This section briefly discusses the patch material, as biocyber interface is envisioned to be a wearable/stick-able bio-electronic device. The adhesive material for the patch is under high interdisciplinary research investigation as human skin is extraordinarily stretchable ( > 100% where  is the strain), highly rough (superlative height 40 µm), and generally covered with sweat and hairs [122]. Hence, delivering adequate adhesion of skin patches against human skin persists to be a challenging task. Adhesion materials should be carefully chosen to prevent issues like cytotoxicity (i.e., condition of being toxic), skin contamination, damages, risks of infection, and loss of wet adhesion make them less effective. Adhesion materials using electronic materials are extensively reviewed in [35] and bio-inspired approaches for adhesion like gecko-/beetle-inspired mushroom-shaped architectures, endoparasite-like microneedles, octopus inspired suction cups and slug-like adhesive with energy dissipation layer, has been keenly investigated in [122]. Special measures should be taken into account while selecting the adhesive material to prevent data loss and wireless connection due to strain and physical pressure on the patch while patient movement, wrinkling of skin or other factors."
 
And here is where they finally reveal where they are with all of this:

E. SUMMARY OF BIO CYBER INTERFACE
 
"There exist a few proposals in the literature that present interface either using nano EM or MC communication. In the nano EM domain [123] have proposed an architecture of nanonetworks-based Coronary Heart Disease (CHD) monitoring system. The proposed model consists of nanomacro interface (NM) and nanodevice-embedded Drug Eluting Stents (DESs), termed as nanoDESs. The algorithm exploits the periodic change in mean distance between a nanoDES, inserted inside the affected coronary artery, and the NM, fitted in the intercostal space of the rib cage of a patient suffering from a CHD utilizing THz band.
 
"Another paper proposes a straight forward communication scheme utilizing the TeraHertz Band. The architecture consists of nano nodes and nano router, deployed in the dorsum of the human hand. Nano nodes circulate in the blood vessel for the collection of medical data and transmit the aggregated data to the nano router. Nanorouter then transmits the data to BAN (Body Area Network) device through THz band communication, which is then relayed to the Internet."
 
"Some theoretical models have adopted MC paradigm for the design of bio-cyber interface device. For example, authors in [64] have conducted a wet-lab experiment by utilizing artificially synthesized materials as an interface between the biological and electrical world. The proposal employs optical sensitive molecules(pH rodo molecules) that activate upon expression of fluorescence through fluorescent microscopy."
 
These are NOT theoretical models anymore!  "Wet-lab" experiments are in vivo experiments involving people…

"The above-mentioned proposals that utilize nano nodes and nanoDES in THz communication, may not be biocompatible due to the non-biological nature of these devices. Secondly, the use of external devices like a fluorescent microscope can also cause mobility issues for the patient, which negates the whole notion of IoBNT."
 
…and they admit the fact that such techniques "may not be biocompatible", a euphemism for HARMFUL.
 
 
"A novel hybrid approach is presented [30], which suggests utilizing MC based communication inside the human body for its biocompatible and noninvasive properties. The MC can communicate with graphene-based nanosensor, implanted over the human body for communication with external devices. The nano micro interface will, therefore, consist of a THz based antenna and micro/macro antenna. The idea is to limit the non-bio devices inside the human body and to read the intra-body parameters efficiently outside the body"
 
And finally they spill the important bit about all this being done with "graphene-based nano-sensors".

Page 13 contains, in my opinion, more distracting filler text that pertains mostly to more conventional and familiar external monitoring techniques such as electronic tattoos and transdermal patches.  I will skip over that to keep the focus on where this is leading.
 
"Traditional methods of drug delivery through oral intake of medicine and via injections are now quickly being replaced by transdermal drug delivery patches."
 
"Fourth-generation transdermal drug delivery systems [133] are now capable to release controlled amounts of the drug upon receiving commands wirelessly through the internet."

 
1) SECURITY CONCERNS IN ELECTRONIC TATTOOS AND TRANS DERMAL PATCHES
 
"Electronic tattoos and transdermal patches can be exposed to security threats as they are continuously connected with the wireless technology. The following are some of the threats that electronic tattoos and transdermal patches may encounter."
 
a: WIRELESS COMMUNICATION RISKS
 
"Electronic tattoos and transdermal patches need continuous wireless network supply in order to receive and send information to the healthcare provider. Mainly the electronic tattoos are connected with a gateway device (smart phone) that relays the information over the internet. In the currently published literature for electronic tattoos, it is noticed that most of the proposals have used Bluetooth or BLE as communication mechanisms between electronic tattoo and gateway device. Bluetooth technology works within close proximity and is considered safe as attacker must be present within the patient’s vicinity to launch an attack. However, Bluetooth version 5.0 has a transmission range of up to 400m moreover, the range can be magnified up to a mile through omni directional antennas.

Did you catch that?  You can be surreptitiously drugged from a mile away by a cell tower!
 

Researchers from Singapore University of Technology and design have discovered 12 different Bluetooth bugs which can affect 450 type of IoT devices including implantable medical devices. Moreover, the security flaw named ‘‘SweynTooth’’ associated with BLE can crash the device, deadlock the device or bypass security to access device functionality.
 
What if the "device" they mention is not some kind of smart Band-Aid, but YOU?
 

Another critical threat to Bluetooth technology is Blueborne attack. In this attack, hackers infect the devices with malwares and gains access to the device to execute malicious operations [134]."
 
And there it is, the nugget of truth at the heart of this discussion:  We are left to wonder who the hackers are in this case, but does that really matter if the whole point is to create a situation in which any human being can be covertly attacked by anyone with a motive and access to their unsecured biology?
 
b: PHYSICAL HARM
 
"The electronic tattoos currently manufactured are tested rigorously to withstand mechanical deformation caused by external strain. However, in cases of long term use and extreme physical stress conditions, the device abilities might be degraded and cause unwanted behavior. The bio-electronic devices which are presently designed in the form of electronic tattoo and implantable patches that do not require any surgical procedures to affix on the human body. Non-medical professionals can apply these devices easily on human skin like stickers. This non-surgical relaxation can be exploited by local attackers to replace the bio-electronic device with an illegitimate device on an unconscious patient. The illegitimate device now becomes part of the communication and can launch several passive and active attacks like eavesdropping, replay attack, and data modification, etc."
 
I personally find it interesting that the example given involves attacking an unconscious patient.  It reminds me of those people who were given covid shots against their express wishes by members of the Cult of Covid in all kinds of hospital settings whenever they were exposed and vulnerable.
 
Countermeasures:
"Some of the possible countermeasures for above mentioned attacks are Tamper-proofing and self destruction: Use of tamper proof package for sensing devices and enable self destruction mode upon countering an intruder attack. Minimize information leakage: Protective measures like generating artificial noise, shielding and adding randomized delay can be taken to minimize information leakage. [135] Run-time attestation: Generation of proof about updation of firmware by a remote entity. [135]."
 
These all sound like weak attempts to create some pretense of responsibly addressing what they see as security gaps that completely ignores the fact they are associated with nanotech that should not even be there in the first place.  However, mentioning disruptive effects that can be caused by generating artificial noise, shielding and adding randomized delay might be important clues if someone was looking for a way to defeat the operability of these systems.

B. RFID TAG SENSORS AS BIO-ELECTRONIC DEVICE

 
Skipping through this…  Remember what I said at the beginning, about every macro-scale tag or tool having a nano-scale duplicate.
 
"The role of RFID sensors in envisioned healthcare applications IoBNT is promising due to their easy integration with implanted interfaces for communication with the Internet."
 
"RFID is a wireless technology that utilizes RF signals to identify objects with RFID tags. RFID system has two components: a tag which is a microchip to store electronic information and radio antenna to receive signals."
 
"Passive RFID tags are ideal for IoBNT applications…"
 

"RFID technology can be used as sensors [148], for sensing applications of IoBNT and can be used as a bio-electronic interface on its own. RFID antennas that are sensitive to environmental changes like gas [149], moisture [150] and temperature [151], have already been developed."
 
"The sensing capabilities of the RFID system can be exploited to measure the chemical and biological values of the human body. 13.56 MHz) or ultrahigh-frequency (UHF, 400 MHz) bands, has proven adequate in powering the adaptive threshold rectifier. The HF band is for patch sensors, whereas the UHF band supports’ implantable sensors [30]."
 

"The envisioned Bio-electronic interface with RFID enabled technology is likely to have the following components to be operational in the IoBNT domain. RFID sensor tags that contain chemically coated thin- film resonant sensing antenna for sensing target chemical substances in the environment. Recent RFID tags are thin and flexible, allowing them to be embedded easily in the human body for health monitoring purposes [37]."
 
"Novel methods for the fabrication of electronic devices through inkjet printing are getting research attention in Consumer Electronics (CE). Nanomaterials like graphene, carbon nanotubes, silver, gold and copper nanoparticles, conductive polymer and their based materials are used as inkjet ink to print electronic devices."

Remember the guy I mentioned previously who made a working AM/FM radio out of a single carbon nanotube? https://www.sciencedaily.com/releases/2007/10/071031135307.htm
 
"A comprehensive review of inkjet-printed nano-material based flexible radio frequency identification (RFID) tag sensors for the Internet of nano things has been presented in [38]."
 
You know when you go into some hospital for a routine screening and they give you some dye in a cup and tell you to drink it?  Yeah.  Just imagine what all could potentially be in that.
 
Now watch the utterly absurd length they will go to, to come up with bullshit uses for this tech.  It seems like they will say anything to sell it.
 
"Another smart health proposal using RFID technology has been presented in [62], where a smart bandage manages chronic wounds by wirelessly transmitting wound pH status to an external readout unit in the smartphone, using radiofrequency identification (RFID). This is a lightweight, noninvasive bandage proposal that saves the patient from regular hospital visits for dressing change."
 
Are we really "saving the patient" here?  Or are we just taking humans out of healthcare and eliminating personal care by eliminating nursing?

 
1) SECURITY CONCERNS IN RFID BASED BIO CYBER INTERFACE
 
"RFID tags, when used with interconnected devices in environments like IoT and IoBNT can be easily compromised by attackers. Following are a few possible security threats that must be considered when using RFID based technology as bio cyber interfacing option [135]. "
 
Duh.

Welcome to the Brave New World,
where everything that can go wrong with your computer
can now go wrong with YOU! 
Aren't you glad someone asked you if you wanted this
before force migrating you into accepting this "upgrade"
to the latest and greatest nano biological system architecture?

 
Remember the "Blue Screen of Death"?
"The device has the wireless capability to be turned on wirelessly and it disappears once it has performed the required task, thus eliminating… "
[THE EVIDENCE]

Part Five coming soon…
 



If you are just finding my blog please be sure to also check out two other contributions I made:
HOW TO REVERSE VACCINE INJURIES:

http://estateartistry.com/blog/reversing-vaccine-injuries
CANCER CURE:
http://estateartistry.com/blog/cure-your-cancer-by-christmas

]]>
<![CDATA[Exposing the Bio-API - Part Three]]>Thu, 12 Oct 2023 03:06:15 GMThttp://estateartistry.com/blog/exposing-the-bio-api-part-threeToday I am going to begin going over some basic components of a system that is INSIDE YOU.  This is not the end of it, its not all of it.  These are the BASICS.  Folks, the learning curve on this is literally Mount Everest and I am nowhere near even the first base camp. 
 
Some guy recently left a comment on a thread I shared some links on comparing me to Ed Snowden.  I laughed out loud when I saw that.  I mean, thanks, whoever you are, but I'd rather not have anyone thinking I deserve that much respect. 
 
I spent 20+ years in high tech startup environments, always swimming in a shark pit on the bleeding edge of things with some product or another where 20-30 million bucks was a typical net return or total loss, and there just came a point after which I said "Nope, that’s enough for me.  From here on out I am just gonna polish the shiny black box with the rest of the senior citizens." 
 
So I am not enjoying being yanked out of early retirement to back track through all this technobabble again, and Ed Snowden I am most definitely not, but even back then my role was more of a visionary than a nuts and bolts guy, and that’s the kind of mentality one needs to grasp this sort of concept. 
 
It's not "what you can do" as much as "what you can do IF…" 
 
The danger I clearly see here is too many uber wealthy, psychopathic eugenists thinking in those terms, all of whom have been investing their billions equally in both building out this technology AND hiding it.  And what a brilliant job they have done at both! 
 
This is the only conversation topic that is relevant today.  Everything else is a misdirection, with the debates surrounding all of that providing cover for this core project.  100 YEARS in the making!  The level of swarm collusion this took is impressive to me.  These people are Nth level dangerous, and they have nearly succeeded in what they have been trying to do.  This is the end game we are in now.  If this is not exposed and the criminal motives driving it acknowledged, we are all toast.  They can start turning us off at will now. 
 
This is just another proof of concept type field test:
https://www.youtube.com/watch?v=oph-IGQJXac They dropped people on the street in Wuhan with this, suffocated fans at a Travis Scott event in Texas, and walked people off the roof of sky scrapers in downtown Singapore during covid lockdowns like remote control lemmings.  Every time you see a "spinner" drop dead there is a guy somewhere doing a demonstration for some other guy he is blackmailing. 
 
Nah, we are well beyond the experimental stage here.  We need people that are a lot better than I am digging into the available material, so please help me get this overview into the hands of such people.  There is very little time left.

III. A DETAILED DESIGN OF POTENTIAL BIO CYBER INTERFACE DEVICE
" Bio-cyber interface is the hybrid and most sophisticated device, that is capable of communicating between nanoscale and microscale devices [22], [25], [44]. This device receives aggregated data from nanonetwork, processes nanoscale data in its transduction unit to convert it into a format suitable for the conventional network (e-g Internet) and sends it microscale devices. The components of envisioned bio-cyber interface are described in detail below:"
So basically, this is the name given to the mediating device mentioned earlier.  It is how the commands given by the medical server communicates with the intra-body nano network.
 
1) ELECTROMAGNETIC TO BIOCHEMICAL SIGNAL CONVERSION UNIT
 
"Electro – Bio Transduction Unit converts the electrical signals, received from external devices into biochemical signals, and transmits them to intra-body nanonetwork for further processing. This unit consists of a decoder, a drug storage unit, an external physical effect source, and an injection chamber. The decoder receives the signal transmitted from an external device and derives logic gates. The logic gates are binary commands that produce some physical effect in the environment like thermal, optical or magnetic radio-frequency (RF) signals. The physical effect source (thermal, optical or magnetic field) placed around the drug storage unit, stimulates the nanomachines to release their content in response to external changes in the environment. The injection chamber injects the released molecules into the blood vessel network."
 
 Here the "environment" being referenced is the one inside your body, so the triggering stimulus for this internal nano-system to do something can be initiated with heat, light or RF frequency signals, and since this system includes a drug storage area, whatever that contains can be released into your bloodstream on demand.
 
All throughout the various literature I have been reading the last three years one thing that kept popping up as a recurring theme was mental health and there were endless opinion pieces about how to deal with people who are tagged with some mental health diagnosis, more troubling than that was how psychiatrics was being used to herd people into various groups that courts were deciding had to be forcefully administered some sort of treatment that ran the gambit from re-education classes to mandatory medications.  Imagine how this capability streamlines all of that.
 
"The drug storage compartment of the bio-cyber interface contains nanomachines that are fabricated with materials sensitive to external physical effects like changes in light, temperature, pH or enzymes [65]. The injected nanomachines traverse the blood vessel network and are anchored at the targeted site due to high affinity. The nanomachines are equipped with ligands (i.e., signaling molecules in the MC channel) that bind to reciprocal receptors (i.e., receiving molecule) and are only expressed at the targeted site [63]. The process of electromagnetic to bio chemical signal conversion is depicted in Fig 5 [63]. Bio and non-bio materials can be used to engineer nanomachine, like liposomes that are drug nanocarriers fabricated with a coating that is sensitive to external environmental factors [64]."

​This paragraph simply explains how this is achieved mechanically, but what it makes me think about are what people have been calling "spike proteins" and how these things attach to a vessel and cause blockages because platelets would get hung up on them.  Here it seems these objects have been something else all along.
 
"Photosensitive materials release encapsulated molecules when stimulated by light at certain wavelength emitted from an external laser source [66]. The process of photoisomerization destabilizes the bilayer membrane of liposome upon light illumination and allows the release of photoresponsive molecules. For example, caged compounds release molecules by bond breaking [67] and gold nanorods generate heat as a response to their conformational change [63], [68]. Temperature-sensitive materials release their contents upon a nonlinear sharp change in temperature of the environment such as temperature-sensitive liposomes [69], [70] and dendrimers [71]. Such a sharp change in temperature triggers the thermo-responsive liposomes to release encapsulated molecules in the environment. Thermoresponsive liposomes should ideally maintain their load at body temperature (37◦C) and deliver the encapsulated drug only upon an increase intra-body temperature [63]."
 
So hit you with a laser, something happens, raise your body temperature, something happens.  "Caged compounds" stand waiting for orders.  I don't like where this is going, do you?

"Magnetic particles release their contents in response to magnetic radio-frequency signals generated by an external source."
 
And then additional examples of the nuts and bolts of this process are given.

 
In case you missed it, that was an example of how you give someone diabetes or take it away.
 
2) BIOCHEMICAL TO ELECTROMAGNETIC SIGNAL CONVERSION UNIT
 
 This is how information travels in the opposite direction, from your body to the medical server.
 
" The bio electro transduction unit detects the concentration of received molecules and converts the molecular signals into electrical form. According to [63], this unit employs a cell structure to be used as a bioluminescence bioreporter. The bioreporter works on the principle bioluminescence reaction that produces a reporter protein upon excitation from an analyte."
 
 An analyte is a part of the nano-biosensor used to "report" on you.

Some familiar terms here, like Luciferin and Luciferase, which we have heard beside other familiar terms like quantum dots.  Fluorescence molecules and luminescent materials.  Like the stuff that gives covid vaccine vial solutions that eerie bluish glow first pointed out by a Pfizer plant worker in charge of quality control who was dismissed and sued for doing her job a little too well?
"like carbon and graphene"!  I think I've heard enough, how about you?
 
B. COMMUNICATION UNIT
 
"
The connection of the human body with the Internet is the basic notion behind the IoBNT paradigm. bio-cyber interface can be used as a module for connecting the human body to the Internet. bio-cyber interface must possess the capability to wirelessly transmit the aggregated intra-body data to the healthcare provider. Bio cyber interface is responsible for communication with the intra body nano networks as well as with the internet. Therefore, it must contain two communication units i.e., one for intra body communication and one for external communication with the internet."

​There's your 6G frequency applications.


​So information travels around inside the body via "an aqueous medium that allows the flow of molecules towards the destination"  (i.e. blood) or by zipping around with "molecular motors".

 
 
[19] L. Felicetti, M. Femminella, G. Reali, T. Nakano, and A. V. Vasilakos, ‘‘TCP-like molecular communications,’’ IEEE J. Sel. Areas Commun., vol. 32, no. 12, pp. 2354–2367, Dec. 2014.
On and on this goes. 

It's all about drugging you against your will by slipping you electronic mickeys!

" most of the work in nanocommunication and IoBNT domain is dominated by MC."
Again with the graphene and carbon nanotubes.  I mentioned in a previous article a story about the guy that created a working AM/FM radio from a single carbon nanotube to illustrate what could be done with this material, so these are functional antennae arrays that people have growing all over, and spreading throughout their body.  And don't miss the active denial that this is harmful when they say:
 
"The THz spectrum is less vulnerable to propagation effects such as scattering, which makes it ideal for intrabody communication due to its safety for biological tissue i.e., non ionization"
 
The only thing they like here is "less vulnerable to scattering".  Non ionizing has nothing to do with this being harmless.  It is the constant modulation and phase shifting of these frequencies that causes harm.  This is how you keep signals separated so commands sent to your nano network of cooties don't interfere with commands sent to mine and it produces an effect like an EMF jackhammer that is breaking everything it touches.


You hear that?  "researchers in the field of chemical engineering have been working on wireless chemical sensors (WCS) for more than a decade now"  THIS IS OLD!  And what they can do with it couldn't be more clearly stated.
 
Here's all the specifics:

That’s enough for Part Three.
Part Four will cover each of these technologies, explain where the power this system runs on comes from, and summarize the entire section.

 
If you are just finding my blog please be sure to also check out two other contributions I made:
HOW TO REVERSE VACCINE INJURIES:

http://estateartistry.com/blog/reversing-vaccine-injuries
CANCER CURE:
http://estateartistry.com/blog/cure-your-cancer-by-christmas

]]>
<![CDATA[Exposing the Bio-API - Part Two:]]>Mon, 09 Oct 2023 22:06:41 GMThttp://estateartistry.com/blog/exposing-the-bio-api-part-twoBefore we get started, let's play a little game of "Could it be"
 
This is not a game in which we express our opinion, parrot things we have heard in an authoritative way, claim or dispute facts, or debunk lies.  This is going to involve using your imagination, and that’s all.
 
I'm going to ask a question I would simply like you to think about as we continue learning about the level of technological sophistication that has been achieved in the bio-nano world and explore how it functions.

 
Could it be, that the reason modern medicine is failing us so miserably, is due to the fact that very little is actually true in this field?  Could it be that a "doctor" is a person who possesses what amounts to a photographic memory of the pages of a fictional novel?  Could is be that a "medical specialist" is another kind of expert that can tell you unwritten back story about people, places and things that appear in the story?  Could it be, that a "medical researchers" area of expertise has to do with things like the type of ink that was used to print the manuscript, where the printed paper came from, how it was made, and so on?
 
Could it, in fact, be that everything that is done in the field of medicine is not at all what we have been told it is, but instead, is a field of science that has been cleverly created and supported, that has grown into what it is today over the last century or so, simply to provide us with a seemingly credible group of people whose only real purpose has been; to create plausible, authoritative explanations that someone somewhere knew would be needed, to divert attention away from the real effects of something these same hidden hands were covertly doing?  A ruse that would require someone else we would believe, like an approved and accredited doctor, that we would either go to ourselves or be directed to go to for such answers, who would tell us whatever we needed to hear so we would not go looking for other reasons to explain what was making us sick this whole time?

 
I throw this out only because these are the questions that run through my own head after everything I have learned trying to answer both patient and doctor type questions.  I have found the doctors unable to even agree with each other, let alone explain anything to my satisfaction.  Finding answers has been left up to me.
 
I heard James Rogowski share a beautiful analogy he came up with the other day to illustrate what goes on when you consult a doctor about a health matter.  James compared that to having a problem with your car that you are alerted to by an idiot light on the dashboard.  In this case, it was the low oil light. 
 
You bring your car to a mechanic, who will serve as the "car doctor" in this analogy.  His advice to you however, is NOT to add more oil, although he will make a pretense of checking around for leaks, and this is time he will bill you for. 
 
Instead of addressing the problem of not having enough oil in the engine, and solving it by adding more, he diagnoses the problem as "annoying light syndrome" and advises you to remove the bulb.  If you don't agree with this you may see another "auto-doc" [pun intended] who denigrates the first guy in some way.  "Oh you don't need all that" he tells you.  "Just place this tape over the over the annoying light." he says, before sending you on your way with a note for the guy at the auto parts counter.
 
Unfortunately for you, just like a poor auto mechanic, modern medicine does not concern itself with any sort of healing.  It is in the business of disease management, so they don't cure diseases.  They only mask the symptoms of any affliction in a way that creates more, so sadly, this analogy is quite accurate.

Resuming now with the IEEE paper:
Notice under the heading of "Security in IoBNT some of the exploits that will be discussed, and the  vulnerabilities that make these exploits possible to execute on both nano-networks and on the biocyber interface itself.  Things like "eavesdropping, spoofing, and replay".  We will look at those closely.
That detection capability, all by itself is extraordinary.  The measurement of most toxins is done in parts per million (PPM).

So we have two categories, electronic and biological and each is a self contained unit.  The electronic variety utilizes carbon nanotubes and graphene nano ribbons.  These are the hairball like structures everyone with a microscope is seeing in both vaccine solutions and in blood samples, particularly clots and masses that have been extracted from the living and the dead.

So here they tell us some of this is large enough to be seen with an optical microscope, so these are the curious objects the people who examine samples are finding in their own labs.  Notice also how a cell phone acts as a "gateway device", spying on whatever your biosensory network is reporting and making that data available to a terminal with a human operator.
Setting aside the fact that it is this communication that causes a myriad of health issues that may force you into a medical situation where the ability to survey this data non-invasively is the main "advantage" driving this research , there is an obvious underlying ethical problem with all of this.  First of all, you never agreed to have this technology installed inside your body.  Second it creates the problems it seeks to address.  So what then is the point of this if the stated reason for doing it is to advance and improve medical treatments for conditions that would not exist were it not for this, and lets properly call it what it is, INVASIVE technology?
 
Exactly.  That’s not the reason.  However that is both the justification and the noble sounding excuse that is used to enlist the people that create this stuff, and if objections are raised it leads to a defense that all of this is being done as a benefit to you.  They are getting away with this precisely because the dangers of it are completely ignored and dismissed.  Nobody working on this is allowed to say this tech is harmful.
 

"The material used to compose nano devices can be only biological [60] (proteins, DNA sequences, lipids, biological cell) or they can be synthesized with non-biological materials such as magnetic particles and gold nanorods. There are a number of naturally occurring nano devices e-g protein motors that bind certain types of molecule on cargo transport them through filaments and unbind them at destination, liposomes capable of storing and releasing certain types of molecules, biological cells coated with non-biological material for non-cell native functions(e-g absorbing mercury). An envisioned bio-nano thing is presented in Figure 4."
 
Non-native functions like absorbing mercury?!?  Someone please explain why this is an "upgrade" to my physiology.  Oh wait, I get it.  Can't have mercury laden vaccines killing you off before the experiment is over.
 
Where have you heard these terms before?  How about lipid nanoparticles envelopes that conceal mRNA sequences that cause your body to manufacture spike proteins?  That was part of the explanation Moderna gave us for how its amazing vaccine platform supposedly worked.  Forget that they were fighting covid, which is the result of radiation poisoning you get from all this EMF tech chatter.  

" biological cells coated with non-biological material "  There is your polyethylene glycol (PEG) coating that encapsulates the lipid nanoparticle envelopes.

So ask yourself, those of you who believe in vaccines and covid viruses, was all of that bullshit?  I think we can now lay all of that nonsense to rest.

 Now look at the diagram above and think back to images Dr. David Nixon published:

Do you see the biosensor?  How about the graphene carbon nanotube wiring them together?  Ya.  SUCK IT Peter McCullough!  There's your stupid covid virus right there.  And these things do move about on a slide.  Do you see the little locomotion jet in the previous diagram?  Or am I the only one with eyes.
You get these thing inside you by eating them in foods (like magnetic meat) or by injecting them (like inside a vaccine).  And they…
 
"can easily be placed in hard-to-access areas (e.g., deep inside tissue) and perform therapeutic operations."

 
Coincidentally, they can also perform DESTRUCTIVE operations!
There's your radio, encoding and decoding messages.

Still want the latest iPhone?  How about all you guys chasing Bluetooth signals in people?  Are you getting the picture now?
This is the place where all the data on you will be warehoused that all the criminals will get into eventually  so they can steal it and sell it to each other.  And by criminals I am talking about the government that financed all of this to give them a way to kill you that you would never see coming, and without you ever knowing it was them doing it.

Everybody working on these projects needs to stop immediately!
 
You are not helping people. 
You are not a champion of the human race
that is working to eliminate illness.
There is no need to monitor health
or warn people about health issues.
You are not enabling early treatment options
or detecting super-cooties
or any of that.

 
YOU ARE EVIL!

PART THREE of this series will pick up with a detailed design of a bio cyber interface device.
 
If you are just finding my blog please be sure to also check out two other contributions I made:
HOW TO REVERSE VACCINE INJURIES:

http://estateartistry.com/blog/reversing-vaccine-injuries
CANCER CURE:
http://estateartistry.com/blog/cure-your-cancer-by-christmas
]]>
<![CDATA[Exposing the Bio-API - Part One]]>Sat, 07 Oct 2023 18:23:02 GMThttp://estateartistry.com/blog/exposing-the-bio-api-part-oneThis post is part one of a series in which I will expose and demystify our common enemies greatest weapon, something they have been quietly building since 1922!
 
While this information may sound rather scary it is not my intent to scare anyone with it.  Please, don't share it in such a way that frightens anyone else.  We have all collectively done quite enough of that. 
 
I believe it is more scary to be in the dark about why the things we see happening all around us are happening at all.  I am doing this to empower you, by showing you how these magic tricks are being done.  That is how you need to present the material to others.  It is OK to get angry about this.  It is not OK to condone or allow it, or worse, pretend it is not real.
 
Let's get started.  This will be:


A Systematic Review of Bio-Cyber Interface Technologies
and Security Issues for Internet of Bio-Nano Things


IEEE - Received April 26, 2021, accepted June 21, 2021, date of publication June 29, 2021, date of current version July 7, 2021. Digital Object Identifier 10.1109/ACCESS.2021.3093442
 
Not everyone will immediately recognize how valuable this information is, but that's ok, because I am going to take you on a walk through of it paragraph by paragraph, all 38 pages of it.  It is critical you take this slow to understand, and not misread or misinterpret anything in this paper. 
 
Every scientific field has its own technical jargon, but this one is special.  Whether or not you realize it this is a black projects operations manual.  There are a number of terms that function as code words because they have dual use meanings, just like the legalese in contract language.  There is the explanation you think you understand and then there is the application reference.  This technique results in a kind of obfuscatory steganography that allows the bad actors, who purposefully fund this work, to conduct a fully compartmentalized operation like this one right out in the open, and leave the evidence of what they are doing hidden in plain view.
 
When we are done with this you will have the keys to their kingdom, I promise you that, so save a copy of this post and any others that follow, in case I get droned for doing this.  Everyone is worried about nano-tech, vaccine time bombs, transhumanization, biowarfare and genetic tinkering.  Like anything, all that  can and is being used against you, but it can all be defeated, defused, removed, and reversed.  I am going to show you how the weapons work, and how to destroy them.
 
The first thing to notice is the date of this document, which is July 7th 2021.  It is two years old and there may be more recent updates.  I did a little digging on IEEE Access, which is where the IEEE archives research and policy papers, but to read most of what is there you need an IEEE member log in credential.  Obviously, I don't have one, so I can only access the papers that are currently under peer review and of those, certain ones are featured and  presented in their entirety.
 
I can access a list of  all archived material and run searches, but I cannot open the documents without a login.  Even so, if you simply search the title of this paper (I did that in Brave browser) it will pop up at the top along with lots of other returns which have links to all sorts of related whitepapers, so anyone can dig up proof of what I am talking about.  I am picking this one apart for you so you don't misunderstand it and maybe help you become familiar with the lingo and what these terms actually mean.
 
As you will see, research of this type is done under the auspices of advancing medical healthcare technology but it is explained largely in information technology and cyber security terms.  The veiled language allows authors to openly share details about covert technology and all its nefarious uses without being overtly obvious that is what they are doing.
 
I will begin with a review of the abstract.
Right off the bat there are some admissions:
 
We are discussing "tools that can be used to control, reuse, modify, and re-engineer cells’ structure, as well as enabling engineers to effectively use biological cells as programmable substrates…"
 
They are talking about using the body as a read/write storage medium.
 
"…to realize Bio-NanoThings (biological embedded computing devices)."
 
This term encompasses a lot of different components that include nano biosensors.
 
"concealable devices that can be used for in-vivo applications such as intra-body sensing and actuation networks, where the use of artificial devices can be detrimental."
 
Here we see the admission that these are spying devices placed inside the body, that form networks that can be "actuated", and that they can be used to cause harm.
 
"Such (nano-scale) devices can be used in various healthcare settings such as continuous health monitoring, targeted drug delivery, and nano-surgeries."
 
Here you see three of the code words that define areas in which this technology will be promoted as amazing advances in science, justified as beneficial tools used for patient care.  This is how the people working to design and develop this tech troll for the funding that supports their work, and they will take money from any source they can obtain it from.
 
"These services can also be grouped to form a collaborative network (i.e., nanonetwork), whose performance can potentially be improved when connected to higher bandwidth external networks such as the Internet, say via 5G. "
 
5G is a giant nothing burger.  The communications platform being discussed is properly labeled elsewhere as 6G and 7G.  If operates in the THz bandwidth and creates both the medium used by nano-hardware and the bridges that convert and connect the nano-sized world to the micro-sized world.
 
Here, the nanonetwork they are referring to is known as the PBAN, or personal body area network.  This is one tier on a multi-tiered system of networks that collect and parse information about the state of the body.  This includes metrics like heart rate, blood pressure, glucose levels, temperature, etc.  This is a lengthy list as you will soon see.
 
"However, to realize the IoBNT paradigm, it is also important to seamlessly connect the biological environment with the technological landscape by having a dynamic interface design to convert biochemical signals from the human body into an equivalent electromagnetic signal (and vice versa)."
 
IoBNT stands for "internet of biological nanotechnology" and the paradigm mentioned is this idea of creating a computerized system that uses human being as nodes in a biological mesh network.  To operate this system you need a terminal, that is the dynamic interface design.  This is a software that allows a person to manipulate settings that influence or controls a body, or group of bodies that have this nanonetwork installed in them, and that this terminal is connected to, and it does this by disrupting key bodily processes. 
 
This system communicates using electronic signals.  That is the "technological landscape", so this tells you there is a two way communication going on, and that the body acts as both transmitter and receiver, and that the messages are encoded and decoded as EMF waves.
 
Using the body in this way exposes it to harmful radiation that causes symptoms that have been disguised and diagnosed as the fictitious illness we call covid.  But that is not the only illness they can inflict.  The covid diagnosis was invented simply to provide another explanation  for the symptoms of radiation sickness, which are an exact match, or vaccine injury which can include almost anything else.  As far as radiation exposure goes, installing this nanotech carries the same risks that implanting your cell phone inside your body would, but even worse is the fact that with this nano-gear installed, your body becomes a device an operator can log into and interact with by using a control software which resembles a developers application programming interface.
 
"This, unfortunately, risks the exposure of internal biological mechanisms to cyber-based sensing and medical actuation, with potential security and privacy implications."
 
Ya think?  So there are risks involved they readily admit.  They admit it is harmful to the body, that changes can be "actuated" and like anything else in the digital computing space you can now be hacked by anyone who manages to obtain access to the data center or cloud that hosts you health data, and they can then use your stolen biological information to create exploits.  This is what this system was designed to enable, and the term "exploit" is specifically used over and over throughout this document. 
 
This is a system built by hackers, for hackers.
 
"This paper comprehensively reviews bio-cyber interface for IoBNT architecture, focusing on bio-cyber interfacing options for IoBNT like biologically inspired bio-electronic devices, RFID enabled implantable chips, and electronic tattoos."
 
This is the hackers toolbox and all the tools at their disposal.
 
"This study also identifies known and potential security and privacy vulnerabilities and mitigation strategies for consideration in future IoBNT designs and implementations."
 
We will tell hackers where the vulnerabilities are so they can exploit them, and various ways the system can be compromised such that their efforts can be impeded.  Mitigation strategies are where ways to mute or destroy nano tech is discussed, along with counter measures hackers might employ and how to implement them.
If you want to pull additional documents on any of the areas this paper covers these are the terms you enter into the IEEE archives search function.  As I said previously, you will need a member log in credential to read most everything stored there, but there are other platforms some of these documents make their way to, like Google Scholar and ResearchGate, so if you just search on the title, sometimes you get lucky.
 
I. INTRODUCTION
"With recent pandemics and the associated lockdown regime, there has been renewed, if not accelerated, interest, in exploring electronic and remote delivery of healthcare services. One of the recent trends is in the Internet of Bio-Nano Things (IoBNT) systems, which comprise biological nanonetworks that sense biological and chemical changes in the environment (i.e., human body) and send the collected data over the Internet to data centers for further processing."
 
This refers to the bad guys here wanting telemedicine to replace standard healthcare along with providing that care via internet.  This new system of "McHealthcare" will eliminate the need for a doctor to be personally involved and enforce a rules based medical system governed by pre-programmed procedural protocols. 
 
Imagine a dystopian future scenario in which you are told a new pandemic has begun and the danger here is a virus or other contagious disease that is so dangerous you cannot risk infecting a doctor with it, so you will be directed to a kiosk or whatever to receive whatever care you require.  This technology is a requirement of biological security and preparedness measures.
 
" These nanonetworks can also perform medical actuation from the commands sent remotely by the relevant healthcare providers. Typically, biological nanonetworks consist of nanosized computing devices (also referred to as ’Bio-Nano Things’), which work collaboratively to achieve sensing and actuation tasks within the deployed environment [1]–[8]."
 
This is your "remote control".
 
" Supported tasks include targeted drug delivery (TDD), continuous health monitoring, tissue engineering, and tumor detection [9]–[16]. Conventional wireless communication technologies are generally not suitable to support communications within the nanonetworks due to limitations in transceiver size, computation capability, and propagation channel of the bio-nano things. This necessitates the design of novel communication technologies for these nanonetworks [17], [18], and examples include molecular communication (MC) [19], [20], nano electromagnetic (EM) communication at Tera Hz band, acoustic and nanomechanical communication [21], [22]."
 
We can drug you, spy on you, collect personal health data, genetically modify you, and detect the tumors you develop as a result of us constantly exposing you to the radiation this harmful non-consentual installation generates INSIDE your body as it talks to other external parts of this system.
The minute size of nanodevices makes them resource-constrained and unable to communicate directly with macro-scale devices. To achieve this objective a hybrid device needs to be incorporated within IoBNT architecture.  They commonly refer to this as the bio cyber interface which can provide a seamless interface to the biological world inside the human body and the cyber world of the Internet. 
 
For the last couple years, this is what I have been referring to as the Bio-API, but up until recently I really didn't have a very good understanding of what was involved or how it worked.  When I would see scientists like Dr. David Nixon show what he saw through his microscope when examining vaccine solutions, or look at the debris in live blood analysis done by Dr. Anna Mihalcea, I saw what I was certain were the components of this system, but without a guide like this one, I was unable to identify what component they were looking at, or what purpose it served.
 
Knowing what kind of components are needed helps a great deal, and some of them have unique shapes and properties, like an ability to give off light.  Knowing what the various types of luminescence are helps to identify some of these bits, whose functions are described in this paper.
Second skins include various types of materials that can be used to make "smart" clothing.
 
The term "bio driver" is explained better in another paper I have this way:
The properties of recently studied nanomaterials, such as graphene, have inspired the concept of Internet of NanoThings (IoNT).  Graphene is now everywhere and it is showing up more and more in the foods you eat.  I have warning people about the magnetic meat being sold by large grocery chains, telling them not to eat it.  Now maybe you understand why. 
 
The funny thing about graphene is what happens when it comes into contact with living tissues.  It becomes paramagnetic and electrically conducive.  This is what they are referring to when they say "materials characterized by electromagnetic properties"  These are the very same properties that make the interconnection of nanoscale devices possible. Despite being an enabler for many applications, the artificial nature of IoNT devices is detrimental where the deployment of NanoThings result in negative effects on health.
 
Graphene has been found in covid vaccines.  Just as it is in humans, graphene is introduced into livestock by way of mandatory livestock vaccination programs that are required by the FDA.  Cows and chickens get covid shots too now.  Graphene is now in all vaccine formulations and most mass produced medical injectables. 
 
But when I raise what have become well-known heath concerns to grocery chain store managers, one thing they do is show me an FDA certification that ensures that the meat is safe for human consumption.  With this assurance they feel comfortable selling it and they assume that this approval provides them with protection against any liability if it harms you in any way. 
 
My response to a piece of paper written by a captured federal agency is: 
"I don't care what criminal wrote this, I am not going to allow you to sell me and my family poison food products!"   Informing them that graphene and its derivatives, like reduced graphene oxide, are toxic industrial chemicals, and showing them easily obtainable proof establishing that fact, puts them on notice that they cannot hide behind the FDA.
 
…But I digress.
 
Lets listen to these fools discuss how IoBNT can be misused.
Notice how the need for cyber security is acknowledged, along with a less than encouraging outlook on being able to overcome associated security challenges.  I'm not going to sugar coat this.  Enabling bioterrorism was the reason for creating this system, and is currently, the ONLY way this technology is primarily being utilized today!  The only reason for even building any security into this mess is to make it possible to limit user access to it by requiring them to rent that access with a limited subscription fee, or buy it with a software license.
 
This is a pay to play, for profit industry.  For a few bucks they are selling the ability to hack into your body.  And because misusing this technology includes inducing lethal effects, this is literally a license to kill.
 
Did anyone else out there ever look at the name "Pfizer/BioNTech and think to themselves, "Gee, that is a funny sort of company name."?  

​Well, read it again this way:  Pfizer: BIO-NANO TECHNOLOGY DIVISION!
 
From here the paper goes on to compare the information presented with articles and surveys published by other authors.  Take note of how this document differs.
In other words, that particular survey they name, and the other literature they refer to, won't help you understand the bio cyber interface and what it's more important bits and parts do, but this paper will.
 
Still, some of these other citations look very interesting to me.  Like this one:


[41] P. K. D. Pramanik, A. Solanki, A. Debnath, A. Nayyar, S. El-Sappagh, and K.-S. Kwak, ‘‘Advancing modern healthcare with nanotechnology, nanobiosensors, and Internet of nano things: Taxonomies, applications,
architecture, and challenges,’’ IEEE Access, vol. 8, pp. 65230–65266, 2020.
 
This discussion of other related papers goes on at some length.  Another survey paper in the citations presents state-of-the-art in security and safety issues of the Brain Computer Interaction.
 
"This work thoroughly identifies some novel cyberattacks, their impact on security and safety and their countermeasures.  Some of the attacks like misleading stimuli are strictly related to BCI as it indicates alteration of the nuerosignals generated by the patient."
 
They are talking about messing with your mind in ways that involve changing the way you perceive reality and how you distinguish between what is real and what is not.  We already know from the testimony of scores of targeted individuals that have been covertly used as experimental lab rats what sort of tortures can be created with this capability. 
 
And then there is this troubling admission by the authors of this document:
These researchers are not getting paid to secure you,
they are getting paid to provide access to you!


​This introductory section concludes with some advice on where to look for related documentation by providing key search terms to enter when perusing journals that cover the topics they specifically name: 
I want to keep this expose digestible for laypeople so I will limit each post to about ten or so pages in length and get as far as I can in each post, but the series will  cover the entire document.  Now you have it as well, so you can follow along with me as I go.
 
This concludes PART ONE.  I will continue to dissect the content of this and other material which will expose the current level of sophistication involved with this technology, what can and is being done with it, and how it has fooled the entire world into believing in pandemics, and viral contagions, all for the purpose of terrorizing us into willingly surrendering our freedom, and to force us into slavery under the control of a global technocratic police state.
Unbeknownst to you, these weapons of biological electronic warfare have been perfected and unleashed upon us all, and today your own body is being used against you.  This is an unconscionable evil that that has been released, and it must be exposed, its development halted, its use outlawed and prosecuted, and everything related to it destroyed.

Part Two of this series will pick up where this article left off,
starting with a breakdown of the "Internet of Bio Nano Things"
System Architecture.


If you are just finding my blog please be sure to also check out two other contributions I made:
HOW TO REVERSE VACCINE INJURIES:
http://estateartistry.com/blog/reversing-vaccine-injuries
CANCER CURE:
http://estateartistry.com/blog/cure-your-cancer-by-christmas
]]>