This is an unprofessional Collection cite. That wishes for Speech and Debate with Regards to the topics collected and Special Libraried. I wish for defense of Fair Use Doctrine, not for profit, educational collection.

"The new order was tailored to a genius who proposed to constrain the contending forces, both domestic and foreign, by manipulating their antagonisms" "As a professor, I tended to think of history as run by impersonal forces. But when you see it in practice, you see the difference personalities make." Therefore, "Whenever peace-concieved as the avoidance of war-has been the primary objective of a power or a group of powers, the international system has been at the mercy of the most ruthless member" Henry Kissinger
The World market crashed. There was complete blame from the worlds most ruthless power on the world's most protective and meditational power. So I responded with: "We must now face the harsh truth that the objectives of communism [The Communist Chinese Party's (CCP) Economic Espionage Units called the MSS] are being steadily advanced because many of us do not recognize the means used to advance them. ... The individual is handicapped by coming face to face with a Conspiracy so monstrous she or he cannot believe it exists. The American mind simply has not come to a realization of the evil which has been introduced into our midst" Therefore, like Dr. John Nash would probable think: This is because of our lost state craft of tracing scientific coding in the intelligence community of the algorithmic code of the Communist espionage agents. As "The Communist [CCP's economic espionage units called the MSS] threat from without must not blind us to the Communist [CCP's economic espionage units called the MSS] threat from within. The latter is reaching into the very heart of America through its espionage agents and a cunning, defiant, and lawless communist party, which is fanatically dedicated to the Marxist cause of world enslavement and destruction of the foundations of our Democracy/Republic." J. Edgar Hoover. Which allows the Communist to shape the future and powers that be. As "Our citizens and our future citizens cannot share properly in shaping the future unless we understand the present, for the raw material of events to come is the knowledge of the present and what we make it"
Lieutenant General Leslie R. Groves



http://rideriantieconomicwarfare.blogspot.com/

http://rideriantieconomicwarfaretrisii.blogspot.com/

http://rideriantieconomicwarfaretrisiii.blogspot.com/

http://rideriantieconomicwarfaretrisiv.blogspot.com/


If you have any problem with IP or copyright laws that you feel are in violation of the research clause that allows me to cite them as per clicking on them. Then please email me at ridereye@gmail.com
US Copy Right Office Fair Use doctrine. Special Libary community common law, and Speech and Debate Congressional research civilian assistant. All legal defenses to copy right infringement.

Wruckers room


Friday, September 28, 2012

Tesla Arch hacking

The basic idea in hacking is that you have to a gateway through a portal in the process server. With Tesla Arch hacking you can buy pass the process gateway and go right to the grid of the mother board and then back hack without having to deal with any defenses that are primarily set on the process chip entrance areas of wire less or plug in. I have been able to prove through my guerrilla training that one can use lighting coded with sequences that can actually hack a plane or a drone. As a matter of fact I proved that our drone systems are weak and have no cyber defense systems sitting with the handlers. To retake signal loss warfare or hacking of the signal by Tesla Arch hacking. Which can be done with a simple hand held satellite communication device and a computer.

It works like this if you have a metal object that is enclosed around a process server. That process server has to attach to its nervous system. In which then you place a static arch to the metal object where the coded signal in the static charge is sent through the metal object not looking for the process server until it finds the nervous system first. Then after its coded sequence of arch hacking is done and it finds the nervous system. It can actually by pass the process server and just use the lines of communications from the process server to the necessary element of control like a radar, engine, missile grid, etc. This then shows that today's airplanes are not prepared for arch hacking. As the current lighting structure does not take into account the arch hacking principle. Which is that if there is an opening for a radar system to send out signals I can arch hack the metal plane then ripple righto the radar system and jump from the radar system to any line of communications. Even EMT prepared shock shells are not able to withstand the Tesla Arch Hacking algorithms. Coding static charges.

So what I did was I took an old cold war radio transistor hack that used the Tesla arch principle from telephone wires to radio copper wires in old computer hacking one of the first NSA hack. Then it created low level static in the speaker. So as to create a subconsciousness static point on the brain. As the Human being does not like static and it causes major irritation  After which I then applied that to wireless signals. Which the key was being able to grid nano seconds and causing static to erupt to get around basic process server defenses. Which you would have to know a plane or jets or otherwise electronic system by the centimeter  Then you can code in the static jump arch around it and move forward. While carrying the command.

In the Stealth technology. One actually uses the technology against itself in the arch hack to gain access to command modules. The coding process is indepth. But once it is done until the charge is found out about it is easily loaded like a piece of ammo into a hand held satellite. For EMT shields the actual counter electrical output is harnessed against itself to gain access. It is a very interesting process and one has to understand static Tesla type energy systems that can recreate energy without a power source just by a simple energy code. Which we have been able to decode the Tesla down to specific molecules of energy. Imagine splitting atoms of energy but instead of being able to direct them by energy coding.

Rider I

No comments:

Post a Comment