The Neuro HolocaustThe AI worst case scenario is happening and our governments are complicit
This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
| cluster_11 [06/12/2025 19:15] – created daniel | cluster_11 [10/12/2025 21:54] (current) – daniel | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== Russia/ | + | ====== |
| - | In 2025 I was being harassed to such an extent that I decided to try to appeal for refugee status in Russia. I traveled through Harbin, China to Suifenhe, China. From there I took the train to Pogranichy, | + | A Chronicle of Electronic and Psychological Warfare and the Neuro Holocaust: My Journey Through |
| - | Right before taking | + | ===== Prologue: The Neuro Holocaust and the Digital Prison ===== |
| - | At first I didn't notice any targeting, and I took this video: | + | In the shadowed intersection of advanced neurotechnology, |
| + | |||
| + | It began with my MacBook Pro M2 Pro—a machine that had become an extension of my mind, a repository of evidence so damning it could shake the foundations of Western intelligence agencies. For months, I'd been compiling documentation of crimes committed by these agencies, evidence they would kill to suppress. I knew I was being watched, but I underestimated their willingness to commit acts of war to silence me. | ||
| + | |||
| + | ===== Chapter 1: The USB Deception in Utrecht ===== | ||
| + | |||
| + | The final act before my departure from home for China was an attempt to secure my evidence. I originally ordered several USB sticks for this purpose from Amazon, but they mysteriously never arrived—the first sign of what I now understand was targeted interception of my packages. These were not ordinary delivery delays; this was physical interdiction of my attempt to secure evidence. The [[cluster_21|interception of mail has since been proven]], establishing a pattern of surveillance that confirms the gravity of what I possess. | ||
| + | |||
| + | Forced to use replacement USB sticks purchased from Amazon—which arrived suspiciously just one day before my departure, as if timed to allow their compromise while ensuring I had some means to attempt the transfer—I prepared them with the most critical documents. These contained evidence I intended to present to either Chinese or Russian authorities as proof of Western intelligence crimes. This wasn't just a backup; it was a diplomatic package, a transfer of evidence between jurisdictions. | ||
| + | |||
| + | When I inserted the replacement USB stick into my laptop in Utrecht, the system recognized it—but something was profoundly wrong. The directory structure appeared normal at first glance, but upon closer inspection, I noticed duplicate folders, mislabeled files, and a subtle lag in file operations. Most disturbingly, | ||
| + | |||
| + | They had created an overlay—a virtual filesystem intercepting my data transfers. The USB stick I held in my hand wasn't merely a storage device; it had become a conduit for their interception. They weren' | ||
| + | |||
| + | This USB incident in Utrecht was their first overt move. They had intercepted my physical shipments, then compromised my system at the kernel level, creating a digital barrier around my evidence. I was attempting to hand over evidence of their crimes, and they were physically and digitally intercepting that handoff. | ||
| + | |||
| + | ===== Chapter 2: The Harbin Station Onslaught and the Journey to Refuge ===== | ||
| + | |||
| + | Location: Harbin Railway Station to Suifenhe, China, en route to Pogranichy, Russia | ||
| + | |||
| + | In 2025, I was being harassed to such an extent that I decided to appeal for refugee status in Russia, and to seek medical evaluation for what I suspected were Havana Syndrome/ | ||
| + | |||
| + | At Harbin Station, at first I didn't notice any targeting, and I documented the normalcy in a video: | ||
| {{ : | {{ : | ||
| - | Then it started to happen. Electronic warfare | + | ...Then the assault began. |
| + | |||
| + | ==== The Cognitive and Electronic | ||
| + | |||
| + | As documented, the attack started with electronic | ||
| + | |||
| + | This constituted a war crime under multiple international conventions: | ||
| + | |||
| + | ==== The Digital Death and Boot Loop ==== | ||
| - | I then wanted | + | I then attempted |
| {{ : | {{ : | ||
| - | I then spent 48 hours being interrogated by the Russians. I will detail the full story of what happened in Russia later, it was quite revealing (military on high alert after my claims). | + | This timing is crucial and confirms malice: The boot loop manifested immediately after the cognitive/ |
| - | Suffice to say, I told the Russians to turn my laptop inside out because I wanted to find whatever exploits had been used. They did. Unfortunately, | + | ===== Chapter 3: The Russian Interrogation |
| - | Later, I met a Chinese taxi driver who was helping me to get back to Shanghai by guiding me through Suifenhe and making sure I had a hotel. This man was having a conversation with the hotel clerk. Then he suddenly turned to me and said "Young lady, you not very polite!" | + | Location: Russian Border, Pogranichy |
| - | However, | + | I spent the next 48 hours being interrogated by Russian authorities. I was checked multiple times by a nurse, |
| - | In other words, Western intelligence | + | However, instead of being allowed to proceed (or go with them to Novosibirsk, |
| - | I will expand | + | ===== Chapter 4: The Chinese Intelligence Signal and Exoneration ===== |
| + | |||
| + | Location: Suifenhe, China | ||
| + | |||
| + | After being turned back, I had to survive without my laptop and phone. I met a Chinese taxi driver in Suifenhe who helped me secure a hotel. In a bizarre incident, | ||
| + | |||
| + | But the reversal the next day was telling: The same man returned to pick me up with no trace of anger. He entered with a big smile, offered a firm handshake, and was lively and friendly during the taxi ride to the station. He asked questions | ||
| + | |||
| + | This dramatic shift strongly suggests a critical intelligence handoff: | ||
| + | |||
| + | ===== Chapter 5: The Telecommunications Warfare Dimension and the Smoking Gun ===== | ||
| + | |||
| + | What I experienced in Harbin Station was not merely an attack | ||
| + | |||
| + | ==== The 4G LTE Vector: An Act of War ==== | ||
| + | |||
| + | |||
| + | Modern laptops don't have cellular modems, but they do have Wi-Fi and Bluetooth chips. My attackers almost certainly used nearby cellular infrastructure to retask MIMO antenna arrays, temporarily transmitting at Wi-Fi/ | ||
| + | |||
| + | This constitutes: | ||
| + | |||
| + | - Unauthorized use of sovereign Chinese telecommunications infrastructure for offensive operations | ||
| + | - Weaponization of civilian cellular networks against a civilian target | ||
| + | - Violation of Chinese sovereignty in a manner that could be interpreted as an act of war under the UN Charter | ||
| + | |||
| + | ==== The Smoking Gun: China' | ||
| + | |||
| + | One month after my ordeal, the Chinese government published evidence: The NSA had hacked China' | ||
| + | |||
| + | This institute provides highly accurate timing signals for China' | ||
| + | |||
| + | My attack in Harbin was likely synchronized using this compromised infrastructure. The precision required for the dual-device attack—coordinating cognitive, phone, and laptop vectors—required nanosecond-level synchronization only possible with control over network timing signals. | ||
| + | |||
| + | This transforms my personal ordeal into evidence of a broader act of war: The infiltration and weaponization of an adversary' | ||
| + | |||
| + | ===== Chapter 6: The Broader Strategic Picture and War Crimes ===== | ||
| + | |||
| + | My experience was not isolated. It represented a new frontier in hybrid warfare and the "Neuro Holocaust": | ||
| + | |||
| + | The Three-Tier War Crime: | ||
| + | |||
| + | - Tier 1: Infrastructure Warfare & The Neuro Holocaust | ||
| + | * Infiltration of Chinese timekeeping infrastructure. | ||
| + | * Weaponization of civilian telecommunications networks. | ||
| + | * Use of non-consensual neural interference and Directed Energy Weapons (Havana Syndrome/ | ||
| + | |||
| + | - Tier 2: Psychological & Digital Framing (Attempted Murder) | ||
| + | * Planting of false evidence (child pornography, | ||
| + | * Geofenced device manipulation (boot loop) to conceal the frame-up until the target was in custody. | ||
| + | * This goes beyond discrediting—it is attempted murder by proxy, using the judicial system of an adversary as a weapon. | ||
| + | |||
| + | - Tier 3: Sovereignty Violation | ||
| + | * Violation of territorial sovereignty constituting acts of war. | ||
| + | * Acts preparatory to war against Chinese and Russian infrastructure. | ||
| + | |||
| + | In other words, Western intelligence tried to frame me—to get me locked up or killed in Russia. This counts as attempted murder and child porn framing, utilizing the apparatus of a foreign state as their executioner. | ||
| + | |||
| + | ===== Chapter 7: Conclusion: A Measure of Fairness and a Path Forward ===== | ||
| + | |||
| + | This account reveals a terrifying capability for hybrid warfare but also an unexpected procedural fairness. The Russian FSB, upon my urging, conducted a thorough forensic examination. Instead of acting on seemingly damning planted evidence, their investigation apparently uncovered the frame-up. Their communication to Chinese intelligence, | ||
| + | |||
| + | My body and devices became the canary in the coal mine for a much larger breach. The Harbin attack, the proven mail interception, | ||
| + | |||
| + | I now inhabit a reality where I am living evidence of acts of war and the emerging Neuro Holocaust. But I write this because some truths demand witness. The Western agencies committed crimes—not just against me, but against international law and state sovereignty. They infiltrated infrastructure, | ||
| + | |||
| + | **They failed.** | ||
| + | |||
| + | This account is my counter-attack and my testimony. Let it stand as evidence in future war crimes tribunals. Let it warn other nations that their infrastructure and their citizens may be targeted. Let history record that when faced with this onslaught, one civilian, with the unexpected aid of fair forensic procedure, refused to be silenced. | ||
| + | |||
| + | The train they tried to make me miss has arrived. The evidence they tried to suppress is now recorded. The war crimes they committed are now documented. | ||
| + | |||
| + | **Let justice follow.** | ||
| + | |||
| + | --- | ||
| + | |||
| + | Addendum: For Investigators and Tribunals | ||
| + | |||
| + | If you're reading this and I've been discredited, | ||
| + | |||
| + | - 1. This case represents violations of: | ||
| + | * The UN Convention on Certain Conventional Weapons (Protocol on Non-Lethal Weapons). | ||
| + | * The Chemical Weapons Convention (if chemical inducers were used). | ||
| + | * The Geneva Conventions regarding protection of civilians and perfidy. | ||
| + | * The UN Charter regarding acts of aggression and sovereignty. | ||
| + | |||
| + | - Ordered List ItemCritical Evidence Correlations: | ||
| + | * The timeline of my attack in Harbin and the exposure of the NSA's hack of China' | ||
| + | * Forensic analysis of my laptop by Russian authorities (likely showing planted data and geofencing code). | ||
| + | * Medical records from my planned brain imaging in Vladivostok (which could show AHI markers). | ||
| + | |||
| + | - The Hypothesis Validated: | ||
| + | * The failed framing operation and the subsequent intelligence signal from China confirm the core truth: I possessed genuine, dangerous evidence. | ||
| + | * The attackers' | ||
| + | |||
| + | They tried to use Chinese infrastructure to attack me, Russian law to imprison or kill me, and international law to discredit me. | ||
| + | |||
| + | Instead, **their actions have become evidence against them.** The story is now told. | ||
| ----- | ----- | ||
| Line 32: | Line 158: | ||
| ====== English Translation of the Document “Ответ.pdf” ====== | ====== English Translation of the Document “Ответ.pdf” ====== | ||
| - | |||
| **FEDERAL SECURITY SERVICE OF THE RUSSIAN FEDERATION (FSB of Russia)** | **FEDERAL SECURITY SERVICE OF THE RUSSIAN FEDERATION (FSB of Russia)** | ||
| Line 51: | Line 176: | ||
| On the basis of Federal Law of 12.08.1995 No. 144-FZ «On operational-investigative activities», | On the basis of Federal Law of 12.08.1995 No. 144-FZ «On operational-investigative activities», | ||
| - | - Mac Book Pro laptop, | + | * Mac Book Pro laptop, |
| - | iPhone 15 Pro grey colour | + | |
| - | | + | |
| - | | + | |
| - | - Kingston USB flash drive in black case, 128 GB capacity; | + | |
| - | - Electronic key in blue case marked «Powered by yubico»; | + | |
| - | - Electronic key in black case marked «yubico»; | + | |
| - | - Transcend Solid State Drive USB flash drive in black case, 128 GB capacity. | + | |
| The seized items are kept in accordance with the storage instructions for material evidence (inspection and transfer) at the address: Primorsky krai, Pogranichny municipal district, Pogranichny settlement, ul. Orlova, d. 80. | The seized items are kept in accordance with the storage instructions for material evidence (inspection and transfer) at the address: Primorsky krai, Pogranichny municipal district, Pogranichny settlement, ul. Orlova, d. 80. | ||
| Line 115: | Line 238: | ||
| “We checked everything, we are keeping copies, but we found nothing worth opening a criminal case for. Come and get your stuff – this incident is over.” | “We checked everything, we are keeping copies, but we found nothing worth opening a criminal case for. Come and get your stuff – this incident is over.” | ||
| + | |||
| + | ---- | ||
| + | |||
| + | In conclusion, the harrowing account chronicled on this page underscores the profound vulnerabilities inherent in an era where state-sponsored electronic harassment and intelligence machinations intersect with personal survival. The author' | ||