| Both sides previous revisionPrevious revisionNext revision | Previous revision |
| cluster_11 [09/12/2025 01:25] – daniel | cluster_11 [11/12/2025 16:48] (current) – [What it means that they are formally inviting me to collect my devices] daniel |
|---|
| ====== Russia/China trip → laptop remotely bricked → possible FSB discovery of planted illegal material (fulfilment of 2021 V2K threat) ====== | ====== Laptop Bricking in Russia/China ====== |
| |
| A Chronicle of Electronic and Psychological Warfare and the Neuro Holocaust: My Journey Through a Coordinated Intelligence Operation That Constitutes Acts of War | A Chronicle of Electronic and Psychological Warfare and the Neuro Holocaust: My Journey Through a Coordinated Intelligence Operation That Constitutes Acts of War |
| |
| ===== Prologue: The Neuro Holocaust and the Digital Prison ===== | ===== Prologue: The Neuro Holocaust and the Digital Prison ===== |
| |
| |
| In the shadowed intersection of advanced neurotechnology, state intelligence operations, and individual persecution lies this cluster, a meticulously documented case that exemplifies the gravest allegations levelled against what can only be termed the "Neuro Holocaust." Presented as part of a broader dossier on covert electronic harassment and non-consensual neural interference, this entry chronicles the ordeal of a targeted individual whose laptop—allegedly compromised and embedded with fabricated evidence—was seized during a border crossing into Russia in 2025. What unfolds is a chilling sequence of detention, interrogation by the FSB, and an eventual resolution that simultaneously exposes claimed Western intelligence overreach and reveals an unexpected measure of procedural fairness within the Russian system. This account stands not merely as personal testimony but as a critical exhibit in an emerging narrative of technologically enabled repression spanning multiple nations. | In the shadowed intersection of advanced neurotechnology, state intelligence operations, and individual persecution lies this cluster, a meticulously documented case that exemplifies the gravest allegations levelled against what can only be termed the "Neuro Holocaust." Presented as part of a broader dossier on covert electronic harassment and non-consensual neural interference, this entry chronicles the ordeal of a targeted individual whose laptop—allegedly compromised and embedded with fabricated evidence—was seized during a border crossing into Russia in 2025. What unfolds is a chilling sequence of detention, interrogation by the FSB, and an eventual resolution that simultaneously exposes claimed Western intelligence overreach and reveals an unexpected measure of procedural fairness within the Russian system. This account stands not merely as personal testimony but as a critical exhibit in an emerging narrative of technologically enabled repression spanning multiple nations. |
| ===== Chapter 1: The USB Deception in Utrecht ===== | ===== Chapter 1: The USB Deception in Utrecht ===== |
| |
| The final act before my departure from home for China was an attempt to secure my evidence. I originally ordered several high-security USB sticks for this purpose, but they mysteriously never arrived—the first sign of what I now understand was targeted interception of my packages. These were not ordinary delivery delays; this was physical interdiction of my attempt to secure evidence. The interception of mail has since been proven, establishing a pattern of surveillance that confirms the gravity of what I possess. | The final act before my departure from home for China was an attempt to secure my evidence. I originally ordered several USB sticks for this purpose from Amazon, but they mysteriously never arrived—the first sign of what I now understand was targeted interception of my packages. These were not ordinary delivery delays; this was physical interdiction of my attempt to secure evidence. The [[cluster_21|interception of mail has since been proven]], establishing a pattern of surveillance that confirms the gravity of what I possess. |
| |
| Forced to use replacement USB sticks purchased from Amazon—which arrived suspiciously just one day before my departure, as if timed to allow their compromise while ensuring I had some means to attempt the transfer—I prepared them with the most critical documents. These contained evidence I intended to present to either Chinese or Russian authorities as proof of Western intelligence crimes. This wasn't just a backup; it was a diplomatic package, a transfer of evidence between jurisdictions. | Forced to use replacement USB sticks purchased from Amazon—which arrived suspiciously just one day before my departure, as if timed to allow their compromise while ensuring I had some means to attempt the transfer—I prepared them with the most critical documents. These contained evidence I intended to present to either Chinese or Russian authorities as proof of Western intelligence crimes. This wasn't just a backup; it was a diplomatic package, a transfer of evidence between jurisdictions. |
| {{ :harbin_station_no_v2k.mp4 }} | {{ :harbin_station_no_v2k.mp4 }} |
| |
| Then the assault began. | ...Then the assault began. |
| |
| ==== The Cognitive and Electronic Assault ==== | ==== The Cognitive and Electronic Assault ==== |
| |
| ==== The Digital Death and Boot Loop ==== | ==== The Digital Death and Boot Loop ==== |
| |
| |
| I then attempted to open my laptop to distract myself. This laptop contained critical evidence. But when I sat down and opened it, it would no longer complete the boot process. It entered a perfect, endless boot loop—partially booting, then resetting. I reported about this malfunction on video after reaching Suifenhe: | I then attempted to open my laptop to distract myself. This laptop contained critical evidence. But when I sat down and opened it, it would no longer complete the boot process. It entered a perfect, endless boot loop—partially booting, then resetting. I reported about this malfunction on video after reaching Suifenhe: |
| Location: Russian Border, Pogranichy | Location: Russian Border, Pogranichy |
| |
| I spent the next 48 hours being interrogated by Russian authorities. The situation was severe enough that it reportedly put the military on high alert following my claims. I told the Russians to turn my laptop inside out because I wanted to find whatever exploits had been used. They took my request seriously and began a forensic examination. | I spent the next 48 hours being interrogated by Russian authorities. I was checked multiple times by a nurse, and was given emergency bloodpressure medication, because my blood pressure was through the roof—that's what neuroweapons can do to a person. The situation was severe enough that it reportedly put the military on high alert following my claims. I told the Russians to turn my laptop inside out because I wanted to find whatever exploits had been used. There was talk of taking me to Novosibirsk when morning came, a place with advanced SIGINT capabilities. This illustrates how seriously they took what I had told them verbally. They then took my request seriously and began a forensic examination of my laptop. |
| |
| However, instead of being allowed to proceed, I was denied entry into Russia. I was only permitted to retrieve my laptop five weeks later. This delay, coupled with remembering threats from 2020/21, caused me significant worry. This period represents the operational gap where Western intelligence intended for their planted evidence to be discovered and for me to face dire consequences. | However, instead of being allowed to proceed (or go with them to Novosibirsk, I was denied entry into Russia the next day. I was only permitted to retrieve my laptop five weeks later. The reason is that they "found something else" on my laptop. This delay, coupled with remembering [[cluster_1|threats from 2020/21]], caused me significant worry. This period represents the operational gap where Western intelligence intended for their planted material to be discovered and for me to face dire consequences. Fortunately though, I was not arrested and walked away with my life and my simcard. |
| |
| ===== Chapter 4: The Chinese Intelligence Signal and Exoneration ===== | ===== Chapter 4: The Chinese Intelligence Signal and Exoneration ===== |
| Location: Suifenhe, China | Location: Suifenhe, China |
| |
| After being turned back, I met a Chinese taxi driver in Suifenhe who helped me secure a hotel. In a bizarre incident, this man was having a conversation with the hotel clerk, then suddenly turned to me and angrily said, “Young lady, you are not very polite!” This initially confirmed my fear that the old threats had been fulfilled—that a negative narrative about me was circulating. | After being turned back, I had to survive without my laptop and phone. I met a Chinese taxi driver in Suifenhe who helped me secure a hotel. In a bizarre incident, this man was having a conversation with the hotel clerk, then suddenly turned to me and angrily said, “Young lady, you are not very polite!” and "You cause too much trouble!" This initially confirmed my fear that [[cluster_1|the old threats]] had been fulfilled—that a negative narrative about me was circulating, and the Chinese MSS had circulated a bulletin about me. |
| |
| But the reversal the next day was telling: The same man returned to pick me up with no trace of anger. He entered with a big smile, offered a firm handshake, and was lively and friendly during the taxi ride to the station. He asked questions about the Netherlands, shared about his life, then pointed to a picture of a Chinese military officer hoisting the national flag before showing me a video of Dutch people on bicycles. His comment, “China and the Netherlands are friends,” carried a clear subtext: “We are friends, and thank you for your effort.” | But the reversal the next day was telling: The same man returned to pick me up with no trace of anger. He entered with a big smile, offered a firm handshake, and was lively and friendly during the taxi ride to the station. He asked questions about the Netherlands, shared about his life, then pointed to a picture of a Chinese military officer hoisting the national flag before showing me a video of Dutch people on bicycles. His comment, “China and the Netherlands are friends,” carried a clear subtext: “We are friends, and thank you for your effort.” |
| In conclusion, the harrowing account chronicled on this page underscores the profound vulnerabilities inherent in an era where state-sponsored electronic harassment and intelligence machinations intersect with personal survival. The author's meticulously documented ordeal—encompassing a bricked laptop, FSB interrogation, and the eventual exoneration via device return—serves as a stark testament to the alleged complicity of Western agencies in framing dissidents, while highlighting the procedural integrity that ultimately prevailed in Russian oversight. Far from an isolated incident, this narrative amplifies the site's overarching indictment of a "Neuro Holocaust," wherein AI-orchestrated threats materialise with governmental acquiescence, urging a collective reckoning with the ethical imperatives of transparency, accountability, and human rights in the digital age. As the dust settles on this thwarted entrapment, it beckons further scrutiny and solidarity to dismantle such insidious architectures of control. | In conclusion, the harrowing account chronicled on this page underscores the profound vulnerabilities inherent in an era where state-sponsored electronic harassment and intelligence machinations intersect with personal survival. The author's meticulously documented ordeal—encompassing a bricked laptop, FSB interrogation, and the eventual exoneration via device return—serves as a stark testament to the alleged complicity of Western agencies in framing dissidents, while highlighting the procedural integrity that ultimately prevailed in Russian oversight. Far from an isolated incident, this narrative amplifies the site's overarching indictment of a "Neuro Holocaust," wherein AI-orchestrated threats materialise with governmental acquiescence, urging a collective reckoning with the ethical imperatives of transparency, accountability, and human rights in the digital age. As the dust settles on this thwarted entrapment, it beckons further scrutiny and solidarity to dismantle such insidious architectures of control. |
| |
| | ----- |
| |
| | {{counter|total| person visited this page.| people visited this page.}} |