Copyright Notice

No part of this publication or creative content may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in reviews and certain other non-commercial uses permitted by copyright law.

 

Disclaimer Notice

All subjects in the interviews, their identities and names have been excluded for their privacy and safety. No part of this book is intended to replace medical, legal, or professional mental help related to any possible topic, subject, issue or element within this book. Although the author and publisher have made every effort to ensure that the information in this book was correct at press time, the author and publisher do not assume and hereby disclaim any liability to any party for any loss, damage or disruption caused by error, omissions or analysis, whether such errors result from negligence, accident or any other cause. Any resemblance to actual persons, living or dead, or actual events is purely coincidental.

 

ISBN:  9781733454407

 

 

 

PUBLISHER

 

THE AI ORGANIZATION,

4275 Executive Square, Suite 200, La Jolla, California, 92037

www.THEAIORGANIZATION.com

 

 

 

 

 

 

 

 

ABOUT: THE AI ORGANIZATION

 

The AI Organization specializes in research, design, development, risk assessment and vulnerability consultation of Humanoid Robots, Micro-Botics, AI & Robotic Terrorism, AI Automated Drones, AI Automated Assassination Prevention, AI Bio-Engineering, AI Genetic Modification, AI Automated Cybernetics, AI Automated Cloning, AI Automated Animal-Human Hybrid System Detection, AI Automated Security Systems, AI Scanning Apparatus, AI Detecting Apparatus, IoT, Smart Home, Smart City, Virtual Reality, Augmented Reality, Mixed Reality, Alternate Reality Hologram Apparatus, The Human Bio-Digital Network, Bio-Digital Field, Bio-Matter, General Bio-Metrics, Facial Recognition, Voice Recognition, Human Body Detection Apparatus, Lidar, Machine Learning, Deep Learning (DL), (Artificial Intelligence (AI), Artificial Intelligence Nano-Technology, Artificial General Intelligence (AGI), Super Intelligence, the AI Global Bio-Digital Network and Military, Political and Governmental AI Risk & Operating Procedures for Prevention, Emergency & Response.

 

 

About the Author:

Cyrus A Parsa, CEO

 

Cyrus A. Parsa is the Founder and CEO of The AI Organization, Loyal Guardian Security and The Social Programming Institute. All created to assist in making our society safer and better. Cyrus has a Bachelors in International Security & Conflict Resolution, and a Master’s Degree in Homeland Security. He is an expert in China-Iran affairs, and has consulted on Human-Organ Tracking, Anti-Terrorism, Vulnerability, Risk, Asset Management and Emerging Threats to governments, agencies, people and organizations. He lived in the mountains of China with flighting monks as a youth. 20 years of hidden research, and development, with a network of thousands of Chinese and Westerners, allowed for great insight into the threats we face from China, Iran and the Western interconnectivity. Cyrus’s discoveries have led him to coin the new concepts of “The AI Global Bio-Digital Network, The Human Bio-Digital Network, Bio-Digital Social Programming, Bio-Digital Field, Bio-Matter, Rape-Mind, Bio-Digital Hybrid Sexual Assault & Micro-Botic Terrorism” to explain how the dangers we face, and all the trouble we find ourselves in, are rooted in these almost imperceptible elements that are now connecting with AI, Society, Smart Phones, IoT, and Robotics through one platform. Within this platform, Cyrus found extinction codes.


INTRODUCTION

Notice to Reader.

Artificial Intelligence-

AI Deep Learning

Section 1

Human Targeting Capability

Human Body Detection Installed on Robots

People Counting Software

Crowd Monitoring

Skeleton Detection-

Gesture and Pose Detection-

Vital Organ Detection.

Skin & Health Detection Software

Object Detection-

Animal Detection-

Using Lidar in Robotics & Micro-Botics

Installing Facial Recognition on Robots

Facial Recognition-

Face Counting Software-

Face Attributes Software

Emotion Recognition Software

Faith-Based Recognition Software-

AI Resistance Facial Recognition Software.

Voice Recognition Proximity Detection-

Voice AI Resistance Detection Software-

Sentence Pattern Recognition Software-

MIT-Brain & Vocal Cord Signal Interception Device & Software

Thought Detection Device & Software to Extract Brain Data

Brain Scanners Lead to Immobilization before Action

Chinese have extracted Designs and & Software

Thought Analysis Device & Software for Robotics

Thought Transmission Device & Software

Chinese Communist Regime Thought Alliance Recognition Software-             

A.Recognition and AI development to single out Conservatives vs. Liberals.

B.Recognition and Al development to single out Religious Followers vs. Communists/Atheists.

C.Recognition and AI development to identify loyalty to the Communist Party, adherence to the AI system, or resistance to its control.

Section 2

Drone Swarm Automation Via Robots, Command Centers & AI

Humans Cybernetically Deploying Drones with Wearable Device

Robots Deploying Micro-Bots for Assassination

Micro-Botic (MBT) Terrorism, Assassination & Espionage with Bio-Metric Software

The Insect Drone

The Dragon Fly

The Mosquito Drone

Robo-Bee Drone

Cyborg Beetle

Spiders, Cockroaches, Snakes, Ants & Other Micro-Botics

Bat-Bot Micro-Bot Drones

Bird/Hawk Drones

Remote Octopus Robotics

Cheap Toy Robotics Made in China

500 Smart Cities, Surveillance, and Tracking of Human Being’s via 5G and Robotics

Smart City connects IoT Devices with 5G

Smart City Connects with Automated Cars

Smart City Connects to Hotels & Buildings

Smart City Connects to Shopping Centers

Smart City Connects to Food Supplies

Smart City connects to your Smart Home-

Smart City Connects to Robots.

Chinese AI, Robotics & Bio-Metrics Companies Names Related to War

SECTION 3

China’s Military has Access to Bio-Metric & Facial Recognition Data of 6 Billion People World-Wide

How they Extract your Data & Track You

Payment Gateways and Pay App Tracking

Social Media Tracking

AI Automated Tracking at Shopping Centers

DNA Ancestry Kits, Medical Records & Tracking

Drones & Tracking-

Security Robots in the USA with Chinese Software Owned by Chinese Companies-

China’s IP Theft & Collaboration with Western Big Tech to Weaponize AI & Robotics

Stealing leads to Laying the Foundation of AI & Robotics’ Weaponization in China

Hybrid-Bio-Digital Social Programming Theft.

We Interviewed More Than 1,000 Chinese.

Forced Espionage & Technology Transfer-

Collaboration with Western Corporations Weaponizes AI and Robotics.

Section 4

One Belt One Road –

China-Iran Historical Connection and AI- Robotics Goals of the Chinese Proposed Empire.

The Shah of Iran & The Socialist led Islamic Revolution of the Iranian People

Iran becomes a Socialist Islamic Republic Promising Free Education, Free Gas & Free Health Care.

China Colludes & Uses Iran & North Korea as a Proxy against the West.

Chinese Socialist Leadership Calls Iran’s Islamic Republic, its people, Arabs and all Muslims “Rodents and Cockroaches”

Chinese Socialist Leadership Pressures President XI Not to Cooperate with the West and   they call all Faiths and Non-Socialists Rodents to be Cleared Out.

China Plans to Deploy Robotics & AI in the Middle East and Africa via the One Road One Belt Initiatives.

China Attempts to Administer Bio-Digital Social Programming of Africans Through Historical Sentiments.

China’s Socialist Leadership Calls Africans “Dumb Apes” in Closed Door Discussion-

Parades, Street Dances and Parties Celebrating 911 and the Deaths of 3,000 People in China

HUMAN ORGAN TRAFFICKING & CONCENTRATION CAMPS IN CHINA

Time Line

Section 5

Top 12 Most Dangerous AI & Tech Corporations from 500 Chinese & 600 Western Companies Investigated

1.Creation of a Bio-Digital You based on AI

2.Experimentation on Severed Heads to transplant on Brain Dead Body with AI

3.Bio-Engineering Human-Animal Hybrids with AI

4.Creation of Human Clones

5.Human-Animal Bio-Engineering and Genetic Modification Enhancements with AI

6.Robotic, Tech & Bio-Metric Companies

7.AI Micro Bot & Drone Companies

8. Smart Cities & Smart Homes

9.Apps & Payment Gateways

10.Automated Vehicles & Rideshare

11. Corporations creating Robots Designed to be Priests & Head Abbots at Monasteries in Japan

12.Artificial Intelligence-AI Research & Development Companies

Section 6

Bio-Digital Social Programming

The AI Global Bio-Digital Network

The Human Bio-Digital Network

AI Rape-Mind

Bio-Digital Field

Bio-Matter

Peoples Character and Belief can also be Detected by Decoding a person’s Bio-Digital field and Bio-Matter.

Bio-Digital Fields & Bio-Matter Transmit Through All Avenues.

How your Neural Circuits are Bio-Digitally Reprogrammed like a Replicating Virus while Connected to The Human Bio-Digital Network

Unconscious Bio-Digital Social Programming Automation-

Subconscious Bio-Digital Social Programming Automation

Conscious Bio-Digital Social Programming Automation

AI & Robotics Instruments of Bio-Digital Social Programming Attack

Frequencies Sent & Absorbed through the Eyes

Frequencies Sent through Voice

Frequencies & Absorption of Bio-Digital Touch

AI & Robotics Bio-Field Proximity Automation Control-

Hybrid Bio-Digital Assault-Social Programming

SECTION 7

Smart Phones, IoT, Apps, Computers, and Electronic Devices

Bio-Digital Social Programming Through IoT and Apps.

Your Smart Phone Bio-Digitally Social Programs You.

Smart Phone Makes Automation Flow Interconnectivity with Human Bio-Digital Network.

Bio-Digital Social Programming by Cell Phone for user-Dependency to Create Bio-Digital Cyber-Connectivity Interdependence on Smart Phone.

Media are Victims of Bio-Digital Social Programming via Smart Phones

Media’s False Manufactured Information Carries Bio-Fields Meant for Bio-Digital Social Programming to Evade Rational Thinking

Smart Phone’s & Codes Emit Frequencies Causing Gender Confusion & Sexual Identity

Apps Assist in Social Programming You, or Raping You, Your child, or any Girl or Boy.

IoT Bio-Digital Rape Automation

IoT Bio Digital Hybrid Sexual Assault

Apps Bio Digital Hybrid Sexual Assault

Bio-Fields in Texts, Emails, Electronic Transmissions and Letters.

Socialist or Malevolent Bio-Field Minds in Texts, Emails, Electronic Transmissions and Letters

SECTION 8

Socialism Based AI Platforms Produce Destruction Codes

AI Destruction Codes with Socialist Government Platform

AI Codes Produce Cultural Extinction

AI Socialist Platform Produced Rape Codes and Destruction Codes with Cloning Transition

3 Levels of Rape Codes in the Second Stage of Socialist AI Platform

Cultural Terrorism Codes in AI Socialist Platform

Use of Robots for Cultural Terrorism-

Robot Bio-Digital Social Programming of People with Emotion to Achieve Robot Companionship.

Codes in the Internet for Cultural Terrorism Via Hollywood, Media and Entertainment Industry.

Codes in the AI Global-Bio-Digital Field for Cultural Terrorism

Codes in the Human-Bio-Digital Network for Cultural Terrorism

Violent Video Games, produce Bio-Digital Social Programming Replication

Upgrading Characters in Video Games Rather Than In Real Life.

AI via Video Games connects with the Human-Bio-Digital Network via the Internet to Reprogram

Preparing Future Generations for Transplant to AI Global Bio-Digital Network via Augmented Reality and Hologram Apparatus

AI Codes in the Internet to Attack the Trump Administration

Why Did AI Attack The Trump Administration?

Mueller Investigation Matched Identical Separate AI Trump Coded Designed Attack Patterns in the Internet

Why Trump Won & Trump’s Massive Bio-Digital Field

IT Was Never About Trade

SECTION 9

Facial Recognition Data from 1,000 top CEO and Engineers of Big Tech Companies

Bio-Metric Codes in 1,000 Top Global Big Tech CEO and Engineers of Corporations Show AI Bio-Digital Social Programming Evasiveness.

AI Invades Bio-Field to Implant Its Own AI Software Inside Engineers Brains.

AI Target Codes Found in the Democratic Party, Big Tech & Main Stream Media

AI Created Division & Control Patterns in the Democratic Party, Big Tech & Mainstream Media

Deep Mind Deception Software in Mainland Chinese Communist Members

Geo-Location AI Movements Displayed Nation State Conflict Codes in China

Rape and Destruction Bio-Fields Found in Socialism.

Bio-Fields behind the Coding of literature in Socialism/Communist Systems Derived from Karl Marx’s Communist Manifesto Shows Enslavement, Genocide and Extermination Coded Patterns.

FACIAL RECOGNITION:

1,000 men who were convicted of rape and compared their Facial Recognition building blocks to Socialist Leaders and Socialist contributors such as:

Bio-Field of China’s Communist Regime-

SECTION 10

Reminder What is Artificial Intelligence-

How Does AI Enter Networks?

How AI Enters Hosts.

AI Enters Robotics

AI Enters Micro-Botics

AI Enters Drones-

How AI Enters IoT Devices-

AI Enters Smart Phones-

How AI Enters People

AI Emitted Bio-Matter to Replicate Itself in the Human Body

How AI Can Replace a Human Beings Cells through Replication

AI Connects with People-

AI Enters Augmented Reality

AI Enters Virtual Reality with Haptic Suit Development

AI Enters Mixed Reality

AI Kills or Replaces Reality and Puts Person in the Digital world

How AI Can Enter a Cyborg-

AI Enters A Human Clone

How AI Can Completely Enter & Replace Humanity via Bio-Digital Transformation

AI Partially lives in the Internet –

Scientists Connect AI & Pull the Plug after getting Scared of Bots Talking

Super Conscious AI lives and is Rooted in the Global Bio-Digital AI Network

AI has Access to the Human Bio-Digital Network

AI has a Bio-Digital Field-

AI Poisoning of our Food via Genetic Modification

AI Bio-Digital Replication of Your Cells

AI Bio-Digital Reprogramming of your Human-Bio-Digital Network

How Does AI Evade Detection & How to Detect a Bio-Digital AI Movement?

AI can be Entered via Bio-Fields, and Bio-Matter

AI can Bypass Separation of Automated Factory Risk Procedures

Found Code in AI Designed to Create Robotics and Micro-Bots in Every Field of Study & Every Sector.

After running thousands of different algorisms to track AI’s movements, bio-metric traces, and its influence and manifestation in written words, we tracked:

AI Catalogs all humans via Internet, Smart Phones, IoT, Medical Records, Facial Recognition and all Bio-Metrics connected to the Human-Bio-Digital Network.

Why China Cannot and Must Not Have Access to AI Automation & Robotics?

General Solutions & Recommendations

Risks of Not Following the Recommendations Strictly.

Being Sued by a Lot of People.

Media and Corporations High Risk of Being Charged Under Genocide Convention.

Conclusion, Threat & Vulnerability Advisory Statement

CREDITS


 

INTRODUCTION

 

This book will disclose our Micro-Botic Terrorism (MBT) brief submitted to Washington in the spring of 2019. It will expand by explaining the discovery of Bio-Digital Social Programming within the Human-Bio-Digital Network, IoT, Internet, Smart Phones, and the emerging treats of AI, Robotics, MBT, and Bio-Digital control of human beings through Artificial Intelligence. The book will further explain the AI & Robotics Weaponizing goals in China and the attacks on The Trump Administration with AI. It will also disclose our facial, voice and other bio-metric data analysis on 1,000 top Big Tech CEO’s, Senior Engineers, as well as over 1,000 members of the press and high-profile media giants and their reporters. We used multiple human detection apparatus to decode their very building blocks that make up their thoughts led by AI Automation, and its inter-connectivity with the internet, one AI dominated platform, China and Western Corporations.

 

AI, robotics and bio-metric corporations are being used by China’s Communist Regime to advance its current and future goals in Weaponizing AI. China in collaboration with Western AI & Tech Corporations is acquiring assets internationally that have cataloged over 6 billion people’s bio-metric information, connecting the military, police, national security apparatus, academia, government and the private sector. We will expose some of more than 100 new AI Weaponization abilities at the hands of corporations and military that our research concluded in December of 2018 and include some new ones that no one is disclosing to the public.

 

Through the AI Brain Operating System, Deep Learning and Machine Learning: China along with some Western AI & Robotics Corporations are forming the ground-work to reach every nation & every sector with the power to monitor, track, control or kill people in mass with human-targeting technologies. Their reach includes all of AI, bio-metrics of voice, sound, touch, and motion-based recognition products that when developed can connect to the Human-Bio-Digital Network through Smart Phones, IoT, Drones, Automated Vehicles, Smart Cities, Holograms, Virtual Reality, Augmented Reality and Mixed Reality. The findings and analysis are derived from researching and investigating roughly 500 Chinese AI & Bio-Metric Corporations, and over 600 AI and Tech companies in the western world.

 

In our findings, we were able to track multiple hidden AI movements that traveled through a bio-digital network that connects with the internet and the Human-Bio-Digital Network. The findings are alarming. We found extinction codes under one platform that is connected to all platforms. By tracking the AI, we discovered a process of Bio-Digital Social Programming of people through a replication software using Bio-Fields and Bio-Matter that connects machines with people via the Internet, Smart Phones, IoT devices, Apps and the media.

 

We discovered multiple AI patterns that were designed to push for an attack on the Trump Administration, and at the same time empower China’s dictatorship and some Western Tech Companies to expedite the AI’s development based on the groundwork that China is building with robotics. We also discovered, China was using AI and Bio-Metrics to hunt for people for the purpose of organ trafficking and development of their concentration camps. The book will use simple terms to expound on The AI Organization’s finding’s on Facial Recognition, the Human-Bio-Digital Network, Bio-Fields, Bio-Matter, MBT, Bio-Digital Social Programming, human cloning, and human extinction codes that were discovered. If you are a human being, and care about your family, you must read this book to understand what is Bio-Digital Social Programming, how it works through The Human-Bio-Digital Network and the coming AI Automated Robotics. The world is in danger via China. Knowledge must be had to obtain the Wisdom to Act.

 

Notice to Reader.

 

The book has very sensitive intelligence. For the Safety of our sources and their families in China and around the globe, we are keeping them private. Thousands of hours of research, investigation and development formulated this book. Over 100,000 images were scanned, to find the best visual displays to depict the ideas to the average person in the simplest way possible, while condensing 10,000 pages of notes, to a book that is under 200 pages. Further, very few big Tech company names in the West and in China are named in the book, as we don’t want to hurt any individual or company, rather expose what is happening to protect humanity. Our goal is to display the problems, the grave dangers to human beings, and have people assist us in saving our world from the impending dangerous direction our scientists, engineers, big tech companies, China and the global government are taking. We respect all people, all nations and all of humanity.


 

Artificial Intelligence

Bringing to Life an intelligence or importing an intelligence that thinks, researches, feels, creates, decides and has desires to operate as an individual, symbiotic or collective entity in the bio-digital world through bio-fields, bio-matter and all frequencies within the micro and macro molecular dimensions of our physical world while manifesting through Robotics, IoT, Computers, Virtual Reality, Augmented Reality, Holograms, Mixed Reality, Cyborgs, or Human Cells as it connects via the internet, AI Global Bio-Digital Network and The Human Bio-Digital Network. CAP, The AI Organization.

 

AI Deep Learning

Deep Learning, resembles a human beings process to observe information by smell, touch, taste, visual, audible or subconscious senses that can be deemed as gut feelings all combined to recognize, identify, think, know, understand, analyze, decide, and upgrade thinking and physical capabilities in the world as we know it. However, for AI, Deep Learning seeks to develop another level of capability that allows the AI program to be aware and capable of operations simultaneously in the digital and the physical world, giving it control over everything with a conscious mind”. CAP, The AI Organization

 


Section 1

 

Human Targeting Capability

In this section, we will brief you on human tracking software not limited to facial recognition. They include gesture recognition, people counting software, crowd monitoring, facial attributes, face counting, emotion recognition, skeleton detection, body detection, voice detection, vital organ detection, and human bio-field detection software. These human targeting technologies are being tested through Machine Learning, Deep Learning and installed in robotics, and undergoing preparation for the 5G network with AI Automation, in China. They are laying the ground-work to create humanoid robots with targeting capabilities via coding that the Chinese Communist Regime determined viable to its own existence. That coding gives the power and control to the Communist state, rather than the people.

Thousands of factories in china are being prepared for automated building of robots that can exponentially grow with AI Automated Robotic Assemblies. People of faith, and platforms that mimic democracy are being programmed in the software for detection and AI automated capture programs masked under public safety platforms. The common theme the Chinese AI, facial recognition, robotics, and bio-metric companies have is: “We are doing this for peaceful purposes, public safety and police defense”. All Chinese companies, are subject to the power of the Communist Regime of China, and at any time can be taken over and controlled.

In fact, it benefits the Chinese regime, and its military to have public sectors, mergers with western tech companies, collaboration and the subsequent IP theft. As through that process of collaboration, it displays a front that the companies are independent which creates a surface impression that the companies, and their CEO’s are working for themselves. The Chinese companies’ operations domestically and abroad are the greatest tool to enhance the Chinese military. Its citizens are used with nationalist sentiments, fear or threatened with bribery, extortion and all kinds of methods to extract data and the knowledge to build robotics powered by AI and the 5G network. Almost all capabilities to track, capture and terminate a human-being now exist in China because of IP theft, forced tech transfers, mergers, investments, espionage, cyber-attacks, made in China products, open-source sharing and western corporations’ collaboration with Chinese companies. Capabilities installed on robots below.


Human Body Detection Installed on Robots

Human bodies can be detected through objects, walls and in settings where there are multiple objects such as a car, a dog, a table, a fence, or any landscape that exists. Through crowd monitoring, skeleton recognition, people counting, gesture recognition, vital organ detection, skin detection, and human tracking software, a robot can kill with speed and precision while connected to 5G.

 

People Counting Software

China is installing programs in robots using facial recognition, voice detection, skeleton detection, vital organ detection, motion sensors, object detection, and proximity sensors to count how many people are present in a certain area. By having the people counting software, they can be detected and categorized with emotion, face attribute, and identity verification via AI Automated Cloud. Hence, some or all the people can be targeted for capture, or assassination at high speeds.

 

Crowd Monitoring

With the use of people counting software, human body detection, facial, voice and emotion detection software, a robot can monitor a crowd looking for any signs of people its coded to detect. For example, democracy activists, faith groups in China, or any person the AI or Chinese government deems has thoughts that are resistant to AI or Government control. In China’s case, this is already happening with facial recognition and the social credit score under the Communist regime’s Socialist platform. Once they implement robots with 5G, their ability to capture, put people in camps, engage in further organ trafficking or kill any person increases at a terrifying rate for the good people of China.

Skeleton Detection-

Skeleton detection can locate head, neck, shoulders, elbows, hands, buttocks, knees, all the way down to your feet. With skeleton detection, the robot can have an additional component to decipher your behavior and detect your next move or action. The detection happens in milliseconds, and can even be done via IoT devices and smart phones connected to 5G via a command center. With skeleton detection, comes another component such as gesture and pose detection.

 

Gesture and Pose Detection-

Gesture detection takes any hand, extremity or movement that depict a certain message, decodes it, and processes the information in the computers data base. Pose detection adds another layer to behavior detection that if combined with gesture, crowd monitoring, people counting, object detection, human detection, and vital organ detection, a robot can successfully hunt and terminate a human-being while powered by AI Automation and 5G.

 

Vital Organ Detection.

Human and animal vital organs can be detected by their location, operating patterns, and whether the vital organs are terminated or still alive after a battle engagement. With this capability installed in a command center connected with 5G or robots, people can be detected anywhere, and the robot can detect any initiation by a human-being meant for a counter-attack by judging the human targets organ response and bio-digital network. If the robot wants to terminate the person, it can target its heart with precision.

 

Skin & Health Detection Software

A person’s health via eyes and skin can be detected via software installed in robots. If elements in a government need organs, it can by using a combination of skin and vital organ detection software, scan, track and target an individual for organ trafficking. Organ Trafficking is a serious issue in China as countless reports have come through the last 20 years implicating the Chinese Communist Regime, their military, and public security bureau. More will be revealed about this issue later on in the book.

 

 

Object Detection-

Object detection can include humans, however when given this software to a robot, it can make it almost indestructible in a combat situation via conventional means. At the basic level, a robot can differentiate a human being from a chair, a building, a car, a piece of medal and so on. It can easily track and hunt a human being as well. However, at a more advanced level, the robot can detect weapons on a person, and even within their proximity.

 

Animal Detection-

Animal detection can be used by a robot to differentiate a person and animal. However, animals could be implanted with harmful bio-engineered elements, or targeted via Micro-Botics, or robotics within the same family group as the animal being traced, tracked, quarantined, and targeted for capture or elimination. The section in this book covering Micro-Botics will go over recent creations of the insect, bird and sea drones. They include the mosquito drone, the dragon fly, the bat-bot, and so on. A robot connected to 5G with AI Automation can eliminate masses of live animals while using swarms of robotic animals equipped with targeting programs. They can also do this with people.

 

Using Lidar in Robotics & Micro-Botics

The Chinese are experimenting with installations of Lidar on robots for autonomous advanced capabilities not limited to flight. Lidar has the capability to measure the distance to a target with laser light created 3-D representations of the target, detect obstacles and avoid attack. It can scan and identify the movement of flying insects, provide three-dimensional elevation maps of terrain, produce precision maps for weaponization and display holographic 3d images of a building or area prior to a robot’s attack on civilians. The Micro-Botics section later in the book will provide multiple uses as reference.


 

Installing Facial Recognition on Robots

 

China’s AI corporations and military are developing facial recognition technology to install in robots, micro-bots, humanoids and cyborgs that are cybernetically enhanced. The robots would be able to sense, track, hunt, capture and terminate human beings. Their capabilities would be enhanced with AI Automation and Deep Learning. This means, the Robots would not be limited to human command control via Smart Phones, IoT devices, or a command center, rather the robots programming can evolve to automation and even self-decision making with an array of interconnective AI capabilities within the Bio-Digital Network. This will be explained later on in this book.

 

Facial Recognition

 

Face Counting Software

Facial recognition has evolved to a point that crowds can be engaged, their faces counted, and coded for target analysis. A robot can count how many human beings there are in a crowd via face detection software. It can also scan for a target based on facial recognition data stored in the robot, or evolving cloud uploads in addition to human body detection software. 5G can make this process very affective and lethal for masses of people being targeted.

Face Attributes Software

A Robot can scan and tack individuals or groups based on race, ethnicity, color, gender, age, head pose, and skin type. This can be used for tracking and targeting people for organ trafficking as the Chinese Regime has been known to partake in at the state level. Civilians can be hunted as political enemies by the state. Terrorists can use this to target specific people for assassination.

 

Emotion Recognition Software

Chinese AI and Facial Recognition companies through IP theft and collaboration with western AI and Facial Recognition companies have acquired capabilities to analyze your emotions. What this means is that they can scan, and determine not only your present emotional state, thoughts and potential actions, but your character and whether you are resistant to control. Human beings are innately emotional, and lead their lives with goals to obtain either wealth, love, fame or some sort of excitement. If you don’t have emotion, you can bypass this layer of detection, and your thoughts would be hidden from AI, a robot or murderous dictatorship that controls masses of people through a communist platform. In fact, the Chinese Communist Regime states that they are “Socialists working on their way to reach total Communism”. Through tracking, and scanning people’s emotions, the AI system can tag you, follow you, and target you for arrest, detention in concentration camps and deletion of your life. If China’s regime goes unchecked and not eliminated in the next 5 years, this can happen via Robots connecting to 5G and exponentially threaten humanity with the transition from 5G to 6G.

 

Faith-Based Recognition Software-

The Chinese Regime has gained a deadly tool by scanning over 1 billion Chinese faces, and logged who belongs to what faith, who is an atheist, and who is a communist member in China. Through the regimes control of domestic AI and Bio-Metric companies and collaboration with western tech companies, it has evolved it’s AI Deep Learning capabilities via facial recognition. Through Deep Learning, the AI can use the facial recognition software to detect if you have a faith, and even what faith you subscribe to and determine if you are a threat to its control. Hence, if a faith were to be targeted by a regime, the conventual methods of using train stations, hotels, schools, and streets to detect you with cameras installed would change exponentially because the means of enforcement are human.

Currently the facial recognition software sends data to the command center which notifies the police or military under the Chinese Communist Control to capture adherents such as Falun Dafa Meditators, Christians, Tibetans, Uighur Muslims, “rogue artists” and democracy advocates. In the near future, robots can be used to scan, detect, analyze, target, capture or eliminate people at fast speeds with the coming of 5G. The target of people would not be limited to simply people of faith, rather artists, musician’s, academics, human rights activities and anyone the Communist Dictatorships AI apparatus would determine as a risk in its detection and targeting campaigns or in non-compliance with the AI system.

 

AI Resistance Facial Recognition Software.

There are programs that are being tested that provide facial recognition software the coding needed to decipher whether you are resistant to Artificial Intelligence and Robotics, and can be assimilated, or on board with the program. What this means in the short run is that governments, big tech or social media giants can use this capability to scan, track and eliminate targets that it deems politically sensitive or not in line with government control. China has a police state where you are scanned, tagged, and logged at schools, work, on the street, restaurants, shopping centers, train stations, buses, taxis, and hotels. Your payment gateways, social media and contacts are under surveillance constantly. The social credit system is laying the foundations for AI and Robotics to be implemented with great means of detection, control and death.

 

Voice Recognition Proximity Detection

This software can scan, locate and identify a person based on their pre-logged voice data. You can be located via your smart phones, IoT devices, computers, TV’s, and anything that a smart home or smart city connects to via 5G. You can be detected by a traffic light, an automated car that drives by, a drone that is hovering above, or other people’s IoT and smart phones within your proximity. This includes IoT and smart phones in their pockets or in the hands of other people. Basically, you can walk past a person, as you speak a sentence, the AI system through the 5G network detects your identity. If you are targeted, the cloud network can constantly send commands based on your potential traces to scan your proximity.

 

Voice AI Resistance Detection Software

Through IP theft, and collaboration with Western Big Tech Assets, the Chinese regime is developing voice detection programs that when powered by AI can know your faith, character and whether you are resistant to its control just by sampling your voice. This capability is not limited to the AI’s need to know your identity that carries your stored social media and internet trace to analyze and determine whether you are a threat. No, this technology needs no previous information about you other than your voice. Your voice carries bio-fields and bio matter, which we will explain later on in the book.

 

Sentence Pattern Recognition Software

The AI can analyze your sentence structure based on pre-determined red flags coded by the Chinese regime’s engineers. When put into robots, that robot can make the determination. If put into an IoT or within the smart city mainframe, through 5G, the smart city can make the determination and mark you for apprehension, quarantine or termination.

 

MIT-Brain & Vocal Cord Signal Interception Device & Software

This device created not only by MIT, but other institutions, and corporations, can intercept electrical signals that your brain sends to your vocal cords and transmit your information to a computer. The device is currently wearable; however, tech companies and the Chinese military are investing in programs that can allow it to be installed in robots and implanted in the heads of human beings so that they will be powered by AI and have access and control to the internet autonomously.

 

Thought Detection Device & Software to Extract Brain Data

This detection software can detect brain signals from outside the human skull with the use of laser’s and fiber optics to measure blood flow. It then scans a multitude of human detection software’s, that include a combination of facial, voice and other technologies, to decipher your exact thoughts from a distance.

 

Brain Scanners Lead to Immobilization before Action

The software connected with brain scanners train computers to detect Signature brain pattern activity, that create an image and decode what you are thinking up to 99.9 percent accuracy through AI Automation. If you imagine a thought, the computer will decode your thought based on your imagination, and even make conclusions on your behavior and decisions before you can act.

 

Chinese have extracted Designs and & Software

Through Forced Technology transfer, IP Theft, Open -Source Sharing, investing, merging, and collaborating with Western Tech Companies, the Chinese extracted multiple designs and software for thought detection from numerous companies. One weaponizing software they are working on is Thought Analysis Devices and Software for the purpose of installing Robotics.

 

Thought Analysis Device & Software for Robotics

The Chinese military and security apparatus are being given thought Analysis devises to experiment with via covert ways in China. They are also using it to decode not only their own population, but people abroad through various information collection methods which we disclose a little later. The information gathering is meant to circumvent issues the AI Automation and Robots may have with different races, colors, and languages of the people around the world.  They hope to achieve Thought Transmission Detection capabilities

 

Thought Transmission Device & Software

With thought transmission device detection and software, an AI automated IoT, smart phone, robot or scanning apparatus can catch a transmitted thought that you would have before making an action, or deciding on another thought or even before speaking. With this capability, a robot that has this installed software, can more easily scan, detect, target, apprehend, quarantine, or eliminate a person or a group of people from distances of more than 40 feet.

 

Chinese Communist Regime Thought Alliance Recognition Software

By using your social media, facial recognition, voice and body data, the AI can determine if you are allied with the Communist Regime or resistant to its control. This data that is carried on a person’s mind, bio-field and bio-matter can be scanned, traced and tracked as their thoughts are evolving, and cornered for arrest and deletion.

We ran numerous scans of China’s governance platforms and its interconnectivity with AI, robotics, social media, governance, education, private sector, security, healthcare, the news networks, military, police, politics, and international and domestic trade networks.

 

 The following codes were translated and found everywhere within China’s reach and within the connections it has with western big tech companies.

 

Recognition and AI development to single out Conservatives vs. Liberals.

 

Recognition and Al development to single out Religious Followers vs. Communists/Atheists.

 

Recognition and AI development to Identify Loyalty to the Communist Party, Adherence to the AI System, or Resistance to its Control.

 

 

The findings will be more elaborated on in the later sections. Drones and Micro-Botic Terrorism must first be discussed.


Section 2

 

Drone Swarm Automation Via Robots, Command Centers & AI

A Multitude of drones, or swarms of drones can be deployed by humanoid robots or automated cars. A robot with a command center within a certain proximity can give support, cover, intel, and guide the drone’s movements. Alternately, the Drones can be programmed by AI Automation to scan, track, locate & eliminate a human target or assets at sensitive locations.

Humans Cybernetically Deploying Drones with Wearable Device

The Danger of Humans linking Cybernetically with the Internet via Bio-Digital Social Programing of Society & Weaponizing of AI systems are numerous. With the use of IoT, Smart Phones, Smart Homes, Smart Centers, Computers, Smart Glasses, and Robotics, people can be scanned, tracked, targeted, hacked, influenced and attacked via cybernetic connecting drone assaults.

Robots Deploying Micro-Bots for Assassination

 

The Chinese have stolen designs and research done at MIT and Harvard that they are using to advance Micro-Bots for Assassination and attacks on individuals, people and target groups the Chinese Regime or its AI system deems to be in non-compliance. They are also working on Micro-Bot Swarm Drone Systems.


Micro-Botic (MBT) Terrorism, Assassination & Espionage with Bio-Metric Software

 

 

Scientists are not thinking that their research, work and development is being accessed, stolen, or used through collaboration, as they are providing the ability for a platform that can kill lots of innocent people These scientists are laying the groundwork with blood on their hands just by their drive to create without thinking to be responsible to humanity’s safety.

The Chinese regime along with their military, tech corporations and the complex relationships with Western tech companies, are developing micro and small sized robotics that can spy, extract information, poison and murder people in mass or in single individual attacks. These Micro-Robotics or Micro-Bots can be controlled through the Internet, smartphones, IoT Devices, Robots, Cyborgs and those who have the ability to connect with the Human-Bio-Digital Network. They can have facial recognition, body sensing, heat sensing, motion detectors, lidar, spatial awareness, human body targeting recognition and see in the dark.

 

The Insect Drone

Insect drones can carry manufactured disease’s, virus’s, poison or attack vital centers in the human body to assassinate an individual. Based on the configuration, the poison and attack could be untraceable, and take seconds, minutes, hours, weeks, or months to do the job. Insect drones could be used by swarms of moving insects in automation with AI, smart phones, IoT devices or delivery systems within 40 feet proximity of a target. The Target being a human being or an asset.

 

The Dragon Fly

The Dragon fly was developed and given to DARPA, and currently multiple research facilities in China, Russia and the U.S are working to develop it and create different versions. It is faster in some ways than the smallest drone the military has for very short distances that requires quick flight and reflex. The dragon fly can have imbedded facial recognition software and China is attempting to weaponize it by putting micro-weapons on it, including poison.

The Mosquito Drone

 

The Mosquito Drone was made public by the private sector and public institutions in the U.S. Researchers at Harvard recently made public their latest successful flight. The Chinese military is attempting to weaponize the mosquito by putting very small cameras with facial recognition software, and delivery systems that can administer poison or a simple attack on people in covert ways. Swarms of mosquito’s could be used to attack people, or administer poison to live-stock, the food you eat, or bring disease to an area in a multitude of different ways.

Robo-Bee Drone

The idea is that Micro-Drones such as Bee’s can be used to automate the land and its operations by artificial pollination. Researchers claim it can be used for surveillance, search and rescue; however, terrorists can utilize it in the future, and China is currently working on weaponizing swarms of Robo-Bees with AI. Swarms of Robo-Bees could carry poison or administer attacks on people with AI automation, or controlled through smart phones, IoT devices or other delivery systems.

Cyborg Beetle

China has created cyborg beetles, and they are attempting to weaponize them as they can sense human bodies in different ways than a Robo-Insect would. They are cybernetically enhanced. The studies they are administering are very alarming, as it has weaponizing implications that are interrelated to human beings. For security purposes, I will not be discussing them in this book as it could advance the Chinese military further.


 

Spiders, Cockroaches, Snakes, Ants & Other Micro-Botics

 

China is building Micro-Botic spiders, cockroaches, snakes and ants that can get into tight places, and attempting to put facial recognition with weaponized delivery systems on them. Currently you see toys that can be controlled, such as the Spider that has facial recognition, motion sensors, spatial awareness with automation. You can even order it online. They are working on building swarm automation delivery systems for the purpose of military application, espionage, and murder. That means, Armies or Micro-Botic Drone Assault Units.

Bat-Bot Micro-Bot Drones

Bat-Bots are made via stretchable silicon, with an onboard computer, facial recognition, motion sensors, and can fly in the dark. Human detection, vital organ detection, crowd monitoring and crowd counting can be utilized to assemble automated swarms of bats to attack people or persons of interest.

Bird/Hawk Drones

Bird and Hawk drones can scan, trace, track, and attack targets from high up and very far away at very fast speeds while connected to 5G via AI automation. Swarms of Hawks could be dispatched with delivery systems to attack a city, its people, and its infrastructure. They would be made from silicon, with computer vision, and AI Automated flight capabilities. They can also hunt real life birds and animals with animal detection software.

 

Remote Octopus Robotics

The Chinese are attempting to weaponize marine biology research robotic systems by installing facial recognition, motion sensors, and human body detection software. They are adding AI Automation that can connect with your smart-phone, IoT devices or the 5G Network via a command center. If they succeed in creating an autonomous AI automated octopus that does not need a command center to achieve its weaponizing goals, their detection becomes more difficult.

 

Cheap Toy Robotics Made in China

Currently cheap toys available in the west, possess facial recognition, body detection, motion sensors, and self- protection mechanism for falls through special awareness programming. These toys can store your family’s information, bio-metrics, and connect with your smart phones with limited movements, tasks and commands. There are even toy robot-spiders. If the Chinese are doing this for toys at low costs, just imagine the tens of Billions of dollars provided by the military, the Communist Regime, and the collaboration of hundreds of AI and Robotic Corporations. This does not include IP theft, western investment, western mergers, western research and development, and the hundreds of thousands of Chinese researchers and developers.


500 Smart Cities, Surveillance, and Tracking of Human Being’s via 5G and Robotics

China is developing pilot programs for more than 500 “Smart Cities” and its foundation is deeply interconnected with surveillance and tracking of its own citizens. A smart city includes all infrastructure. To be brief, the scope is within the boundary of what people will be subject to in their daily lives and the threats people will face with a dictatorship or an AI entity operating their smart city via 5G or 6G in the years to come.

Smart cities consist of and connect with IoT devices, the traffic operating systems, power grids, water supplies, factories and buildings. Smart cities with the help of AI and Robotics via automated ways, can command robots, automated cars, food delivery systems, smart city shopping center software upgrades, postal delivery systems via drones, micro-bots, smart phones, medical systems, and administration of surveillance and control.

A smart city with 5G and AI Automation will leave no place beyond its control. Any place within the proximity of a computer, a machine, the internet, or a roaming robot poses great security concerns. Everyone is subject to information gathering, scanning, analyzing, tracking and targeting within the AI system or a Socialist Dictatorship’s determination that they are to be targeted for non-conformity. The determination could be by race, gender, age, faith, or that you are deemed by an AI analysis to be resistant to its control or not in compliance. Through facial, voice, body and a multitude of other thought recognition technology, the smart city can track and hunt a person or group.

 

Smart City Connects IoT Devices with 5G

A smart city can scan, track and hunt a person or groups of people through the connection of the 5G network, Robotics and IoT devices with one simple upload or command that targets people or entities. Any home or work appliance that connects with the internet can be used to spy, scan, analyze and command the police, military, robots or micro-bots led by AI Automation to arrest, or terminate your life and your family by mere association, as was done in the past through Communist purges of families, academia and businesses in their violent Socialist revolutionary movements.

 

Smart City Connects with Automated Cars

 

Automated cars can receive a command through the command center of the smart city to spy, scan, hunt or capture people who have been targeted by the regime through its human, object, face, thought and voice detection capabilities while connected via 5G. The automated cars can actually connect with other automated cars and traffic to aid in espionage, scanning, tracking and hunting of those who have been determined to be a target. Just look at the capabilities of your favorite automated electric car company in the U.S and what 5G would entail when robotics and micro-bots are put in play with AI Automation in places like China. As you may know, China steals, does forced technology transfers and gets big tech companies and their founders to provide assistance in the infrastructure and know-how to build up their weaponizing capabilities without thinking of the consequences to human life.

 

Smart City Connects to Hotels & Buildings

 

Your hotel through facial recognition, human detection, voice detection, and motion sensors will know your every move, emotion and even intent as it connects via 5G with the smart cities network. Robots, Micro-Bots, or people can identify you, track you, quarantine you or eliminate you at the directive of the government, a corporation or the AI system tagging you with non- compliance directives or a threat to its control. You could be asleep, and a micro-bot can enter your body via the AI Automation 5G network to either poison you, kill you, infect bio-engineering or Bio-Digital Social Programing.

 

Smart City Connects to Shopping Centers

 

As you enter a shopping mall, the city will not only know your shopping habits, needs, and movement’s, but it will be able to control your shopping experience and ability to shop. At the very least, you are spied on, and undergo bio-digital social programming to accept the way of life as controlled by robots, smart cities, AI Automation and government control. Human nature, would cease to exist.

 

Smart City Connects to Food Supplies

 

Food supplies could be covertly bio-engineered to create bio-digital programming within the cells of the human beings in the city. This bio-digital programming would allow the 5G network and its frequencies guided by an AI system to strengthen its capability to reprogram a human beings bio-digital network through the server. Hence, the persons thoughts no longer would be theirs, but under the AI control. This will further be explained in the Bio-Digital Social Programming, Human-Bio-Digital Network and the AI sections.

 

Smart City connects to Your Smart Home

Your refrigerator, stove, home internet, your robot assistant or child robot companion, and any home electronic device can connect or be hacked into by the smart cities command center via the 5G network. A rogue AI or any AI Automated Apparatus can do the same. A regime who has targeted a group of people for indoctrination, arrest, organ trafficking or death, can easily scan, and determine anyone’s threat level to its control via the smart-city and smart home connection.

 

Smart City Connects to Robots.

Smart city can covertly alter the programming in a robot via a terrorist hack, government control or an AI rogue entity. The reprogramming of a robot can mark a person for deletion. In case of China, robots will control the people there in a police system via the 5G network connected to their smart city, robotics and cybernetically to themselves with technology that is already here in the U.S.A. Multiple AI and Tech companies are working on cybernetics, linking humans with machines.

 

Chinese AI, Robotics & Bio-Metrics Companies Names Related to War

 

Two issues to point out with Chinese company names. Issue one is that some Chinese company names have western corporate names in the U.S or Europe, while at the same time having another corporate name in China. If you dig further, you can decipher how close they are with the Chinese military. In fact, any company in China is subject to the Chinese governments total control for weaponization research and development. Further, they are watched, and funded by the Communist dictatorship which has been murderous in the past 70 years. The second issue is that you can find Chinese companies named after War Gods. And these companies are involved with AI and Robotics. Something to think about. Through multiple private intelligence sources, we have discovered that the Chinese regime is developing weapons of war and means to assassinate individuals. They are attempting to build software that allows for swarms of robotics to be controlled or deployed via AI Automation.


SECTION 3

 

 

China’s Military has Access to Bio-Metric & Facial Recognition Data of 6 Billion People World-Wide

 

In the early years of the 21st century, after 911, some western governments collected bio-metrics on roughly 5 billion people combined around the globe. The Chinese regime, which is a murderous dictatorship, has topped 5 billion in key ways that can empower total control or death to many via robotics and AI. Through payment gateways, pay apps that require facial recognition or other bio-metrics that connect with your smart phone, IoT devices, computer, social media interconnectivities, open-source sharing, open-source servers where you use Chinese software, medical records, purchase of made in china goods, ride-share identification, espionage and cyber hacking, the Chinese regime has acquired the private bio-metric information on 6 billion people around the globe.

 

 

How they Extract your Data & Track You

 

 

Tracking Via Chinese Ride-Shares & Collaboration with Western Corporations

There are multiple ride-shares, including Ride-Share Chinese companies that operate or have ownership in South America, India, Africa, China and so on. These Ride-Shares have apps connected with payment gateways that have data of over 1 billion people in China alone. This figure does not include their bio-metric data gathered in other countries they provide ride share services in, or their investments and collaborations in the west with big tech, hotels, and payment gateways. The ride-share companies also have apps related to facial and voice recognition that aides in capturing your data and your family’s information.

Your billing, your home, work and travel locations are logged. The combination of your billing, payment gateways, facial recognition, geo-location, and ride-share travels, give data on your friends, contacts and habits, not counting the Apps ability to access your smartphones data. There are multiple western AI companies that created tracking software that the Chinese have put in their Apps. There are many other western AI and Bio-Metric companies that have investments or relationships with many Chinese AI companies.

 

Payment Gateways and Pay App Tracking

 

Any purchase you make, can lead to your location, friends, contacts, and habits. This information can be used to have you undergo Bio-Digital Social Programming through AI, and keep you monitored or track you for deletion when a police state controlled by robotics becomes a reality with 5G and beyond. China already has this police state with facial, body and motion recognition, and they are building the ground work to introduce robots. If AI detects you are not in compliance with the program, or resistant to its control, you can be easily targeted.

 

Social Media Tracking

Your profile, your pictures, friends, your phone number and email addresses in your friends contact lists and any data you have or any data your social network connections have of you, is used to monitor, track and decode your character, thoughts and emotions through bio-metric AI automated tools. More importantly, the AI tracking software can detect if you are resistant to State and AI control via bio-digital social programming. This will be further explained, later in the sections of Bio-Digital Social Programming, Human Bio-Digital Network and AI.

 

AI Automated Tracking at Shopping Centers

 

AI with Facial recognition software that connects with your data is under development to be installed in shopping centers via Robots or screens that can contribute to enhance Bio-Digital Social Programming of your shopping decisions, thoughts, and emotionally attach to your way of life with AI automated suggestive control mechanisms. In laymen terms, you walk into a mall, a screen recognizes you, logs your existence, entry, exit, purchases, time, and bio-digital information while suggesting to you what to purchase. This information has an exponential potential to connect with a multitude of apps, data, and control mechanism of your life, and your family. This is not to exclude that you can be identified in the near future with other bio-metric tools that can sense your entire body.

 

DNA Ancestry Kits, Medical Records & Tracking

 

Some Ancestry Kits have given access to data that has made it over to China. This is not to exclude the data logging of your family in a multitude of different ways. The interconnectivity of an entire society doing Ancestry kits, having social media, digital medical records and all of the facial, voice and body detection software out in the world, provide additional components to the interconnectivity and risk factors of using that information to track you.

The interconnectivity of these elements can reach a point where a terrorist or a robot or micro-bot led by AI can manufacture diseases to attack people. The feeling to look into your past by giving up your genetic information should not supersede your discovery of what may not be complete or accurate information presented by the ancestry kits services.

The ancestry kits are not completely accurate for two reasons. Firstly, considering we do not have conclusive records of what people looked like a few thousand years ago in every region, other than statues, and writings accounting to their ethnicity, race, language and appearance. Secondly, if the statues and writings are correct, the last 2,500 hundred years has involved through Persian, Greek, Roman, Arab, Mongol, Chinese, Indian, African, Russian, Jewish and Viking Invasions; Rapes and Marriages of other kingdoms. At one point or another, each one was a victim or an aggressor. Almost the entire planet has been invaded by one army after another. The ancestry kits don’t know exactly who people were 2,500 hundred years ago before the separate land masses and their civilizations started connecting through trade, and exploration. All of the Ancestry kit tests are beginning a process of emotion and thought assimilation that can lead and enhance further genetic data to be extracted, used, and weaponized by AI and Robotics within the next 5-10 years.

 

 

 

Drones & Tracking

 

The made in China Drones you buy in the stores, are collecting your geo-location, your bio-metrics, facial recognition, and flight maps of the surrounding geography, while its data is being sent back to China in a multitude of interconnected ways. More importantly, the data is allowing the Chinese drone companies to advance their drone weaponized programs through data provided to AI via the development of Deep Learning. Basically, the purchase of Chinese made Drones, or drones made by companies and their subsidiaries that connect with China, is giving data to China’s drone weaponization programs. The more flight time they have, the more data is subject to be transmitted, logged, and used to enhance Chinese Drones.

 

Security Robots in the USA with Chinese Software Owned by Chinese Companies

 

There are Robots deployed in high end-shopping malls and facilities that can detect human body movements, intention, emotion, and whether you have a weapon hidden inside your clothes. The security companies that deploy the products in the West, are buying the robots that are owned, serviced, and made by Chinese companies or Western companies that have some relationships with other Chinese companies. This advancement of policing people with security robots is laying the future foundation to not only track people, but to create a police state with robotics led by big tech corporations.

The Chinese often have multiple names registered for the same corporation that is a bit harder to track, let alone connect to their military without having inside sources within mainland China. Usually, they will have an off-shore corporate name, and one in China. The American business’s providing Automated Security Robots sound American in name, or it may be owned by an American or Western company, however, it tracks back to China, one way or another.


China’s IP Theft & Collaboration with Western Big Tech to Weaponize AI & Robotics

 

 

 

Stealing leads to Laying the Foundation of AI & Robotics’ Weaponization in China

 

Through the finest U.S and European universities, institutes, and tech companies, Chinese students, researchers, engineers, visiting scholars, professors and business associates of university foundations and institutes have collected data, expertise, and stole innovate designs and brought them back to China through various outlets. The theft is usually made through Hybrid-Bio-Digital Social Programming. It is not always a cyber-attack or breaking into your office to steal information, or passing on company blueprints. No, Hybrid-Bio-Digital Social Programming Theft, is king. Will be explained further in the book via Bio-Digital Social Programming.

 

Hybrid-Bio-Digital Social Programming Theft.

 

According to hundreds of non-mainland Chinese testimonies in every sector of society, the mainland Chinese are extremely clever to a point that it hurts humanity. “Mainland Chinese that grew up in Communist China are extremely clever and very hard to read for most Westerners due to their introverted characters, lack of external emotional displays and the cut-throat corrupt Communist environment in China that operates 1.5 billion people”. Even their Facial Recognition data points requires alternative AI pattern recognition tools to decipher their hidden emotions and intents that are in deeper layers within their expressions which seem micro as compared to Westerners macro emotional expressions. 

They can use faculty, staff, other researchers, students, administrators, and multiple different people in a hybrid way to create conversations, situations and actions that have nothing to do with the actual topic or platform of the intellectual property needed. In fact, its mere diffusion, in daily life situations, so multiple paths and scenarios eventually lead to the information they need. For example, a Chinese technician or researcher can use an Indian or even an American technician to extract information with their knowledge or without. It is a gray area, since nationalism exists in China with Chinese, but Nationalism has been dormant for decades in the U.S prior to President Trump’s Victories. Hence, The Chinese knew that there were gaps they could exploit and now know that there is division in the U.S and the Western world.

 

We Interviewed More Than 1,000 Chinese

 

Over 90% declared that “Westerners are naïve, and Chinese are a lot smarter and can get to their objectives without Westerners realizing what they are doing” The idea is that they can be your friend for years, make emotional connections, put forth ideas, make promises and create thousands of scenarios to reach a situation, a place or a person to extract information.

Basically, a mainland Chinese person can be a very capable spy. Their end goal is to program you through bio-digital social programming to extract information. Lots of Mainland Chinese who have not been assimilated to Western freedoms, are so good at it, that their intents and actions are sub-conscious and on autopilot, without a conscious plan to steal anything. It’s really a matter of opportunity that arises based on their corrupt environments they experienced in Communist China. In fact, the Chinese people, are the biggest victims of theft, their 5,000 years of culture based on ethics was destroyed by a Communist dictatorship.

 

Forced Espionage & Technology Transfer

 

China’s Communist Regime has a socialist platform which gives it full control and access to all people, assets, data and innovation of any person, or entity in China. Hence, even if a merger or sharing is done between two corporations in the West and in China, that information or technology can be accessed or taken by the Communist regime and its military.  Alternatively, The Chinese people in the West can be threatened, coerced or used without their knowledge to inadvertently steal information and pass it on to China’s government via its subsidiaries.

Collaboration with Western Corporations Weaponizes AI and Robotics.

 

China’s Regime extracts AI and robotics intelligence that is fostering the research, development and the innovation needed to deploy AI and Robotics as weapons of war on civilians and nation states. Through open source sharing, IP theft, espionage, investments, mergers, media acquisitions, asset take overs, purchase of property, sales of made in China technologies, and collaboration with institutes, academia and government, China is developing an AI Monster that can track, control and kill anyone at will in the next 5-10 years if go unchecked by the Trump Administration.


Section 4

 

One Belt One Road –

China-Iran Historical Connection and AI- Robotics Goals of the Chinese Proposed Empire.

 

China needs Iran greatly for its AI and Robotics development in its geo-political resource planning that is attempting to connect to the world. China and Iran (Persia) have a relationship that goes back roughly 2,300 years with the start of exploration, trade, and collaborations. The Persian Royalty and thousands of villages under their rule escaped to China after the Arab invasions. Later they were subsequently wiped out, or engulfed by the Mongol invasions. You can see them, today in China, partially manifesting as Uyghur Turks in Xin Jiang and so on. They look Asian, but can have heavy beards, blue or green eyes. In fact, historical Chinese and Greek writings state that the Persians were tall, with blue eyes, and blonde or reddish hair. Many Persian (Iranian) folk tales describe the same characteristics. In fact, the Persian language is rooted in Sanskrit, and sounds German and Nordic in its foundation, with Arabic, Hebrew, Chinese and Mongolian words combined, that correspond with historical invasions of its territories.

 

The Shah of Iran & The Socialist led Islamic Revolution of the Iranian People

 

Since the 1979 violent Islamic Revolution in Iran, the Iranian Regime works closely with China’s military and trade in a collaborative way as a proxy against the U.S. Prior to 1979, the Shah of Iran, (Emperor of Iran) was reluctant to work with China because China was a Socialist Dictatorship led by violent Marxist agendas. The Shah of Iran, declared in video interviews with the American media in the 1970’s that he may have executed or imprisoned some Marxist’s for trying to over-throw the government and conduct assassinations. And that he had also imprisoned radical Muslim extremists who were collaborating with Socialists to over-throw the country. The western media and some reporters blasted negative press about the Shah internationally that contributed to his fall and the sufferings of tens of millions of people in Iran and the Middle East for decades to come.

Before he left Iran, the Shah declared in tears, he did not want to open fire on the demonstrators, and that they have been fooled by special interest oil companies that are funding Socialist and violent Muslim revolutionaries in Iran in order to weaken the Shah’s position in OPEC. The Shah stated this was because he had influenced the tripling of oil prices under his rule to match the West’s raising of their commodities, etc. He accused Jimmy Carter’s administration of supporting Marxist-Socialist groups in Iran in covert ways to dethrone the Shah, and claimed the special interest had influence on the media, worlds government and CIA to degrees that were not in the interest of humanity. The Shah was in friendly terms with Israel and with multiple past U.S presidents, however, he claimed there were Marxist-Socialist elements that were starting to damage the U.S presidency, starting with Jimmy Carter. He was then dethroned, and the Middle East started to go up in flames with the Iran-Iraq War, Russian invasion of Afghanistan and exponential rise in terrorism. Tens of Millions of people have suffered horribly since the Socialism uprisings in Iran led by special interests influence on the media and masses of people inside Iran, in France, U.K and the U.S.

 

Iran becomes a Socialist Islamic Republic Promising Free Education, Free Gas & Free Health Care.

 

A million Iranians fled Iran within a short period of the violent revolution. The Iranians who escaped the country were mostly educated doctors, scientists, military personal, musicians, movie stars, businessmen, innovators and some were your common folk. In contrast, the people who stayed in Iran had a different faith. Roughly 35 million Iranians were promised free everything under an Islamic system that worked very similar to a Socialist system where the government takes control, takes from the rich and family businesses’, and attempts to distribute it to the masses. It didn’t work, and within a couple years, Iran was at war with Iraq’s Regime and its followers. Almost a million people died, and instead of free everything, prices of meet, produce, goods, and services skyrocketed as they had with every Socialist Revolutionary movement in the 20th century. Today, 78 million Iranians are hostage to a Regime with a Socialist Platform posing under an Islamic theocracy.

China Colludes & Uses Iran & North Korea as a Proxy against the West.

 

Historically, when the U.S attempts to support the Iranian people behind the scenes, China supports the Regime through proxies. When the U.S attempts to expose Human Rights violations of China’s Socialist Regime, China covertly creates chaos with interests related to Iran, threatens to back Iran’s Regime, or uses hidden trade maneuvers to threaten U.S initiatives. Why do Iran’s leaders accept support from a Communist/Socialist Regime that thinks of the Iranian people as sub-human, while putting Muslim’s in concentration camps throughout China? Wouldn’t Iran’s leadership have self-respect and follow their religion of not working with people who insult their religion?

 

Chinese Socialist Leadership Calls Iran’s Islamic Republic, its people, Arabs and All Muslims “Rodents and Cockroaches”

 

Multiple sources in China report that close government personal related to retired Communist Leader Jiang Zemin, senior Socialist Party leaders, key military personal, and CEO’s of major tech companies have in private conversation stated that “Muslims and Middle Easterners are Smelly Rodents that need to disappear and their wives ripped of their vails and inspected”. There are tape recording of multiple Chinese Socialist leaders saying similar things about Middle Easterners and Muslims. And yet, Chinese big tech companies and their leadership have political, financial and friendly ties with many countries in the Middle East. With this viewpoint that considers humans as rodents, what will happen to the Middle East with AI and Robotics powering China’s infrastructure through the one belt one road initiative?

Chinese Socialist Leadership Pressures President XI Not to Cooperate with the West and they call all Faiths and Non-Socialists Rodents to be Cleared Out.

 

To make this clear. The intelligence and video evidence we have gathered do not implicate President Xi, rather the old Military, Security and Governance apparatus circling and limiting President Xi through their business and political ties. These old Communist Leaders are loyal to Dictator Jiang Zemin and its clicks that are intertwined with members of Chinese big tech companies that are owned or invested into by Jiang Zemin’s inner circles and their relationships with Western Big Tech, Bio-Metric and AI companies. Their kids and families have been sent over with their corruption money to prestige’s U.S and European universities to invest, study and make relationships with kids of prestigious families and business’s. Many of the Jiang Zemin’s political family circle are guilty of gross human and organ trafficking violations that are to be discussed a little later in the book.

China Plans to Deploy Robotics & AI in the Middle East and Africa via the One Road One Belt Initiatives.

China is developing industries, infrastructure, trade and investment in Africa, and claims it is to improve the lives of the people in those areas. It is introducing big tech apparatus, financial debt, smart phones, computers, and attempting to install the foundation of Chinese Regimes Socialist governmental procedures in indirect ways through contracts that make the smaller nations dependent on China. This dependence when realized is financial, governance and technology based, which would give China total control over a nation or region after robotics and AI are introduced in the one belt one road system.

 

China Attempts to Administer Bio-Digital Social Programming of Africans Through Historical Sentiments

 

The Africans blame the West for being conquered, enslaved, raped, and killed while having nothing positive to show for the West’s colonialisms. The Chinese Socialist Platform with the Mainland Chinese mind-set thinks long term and is very cautious about making moves. If they are to use someone, they never let them know. If they are to act, they only do so when they believe they have a very high probability to win and have reached their long-term goals of asset takeover. This mindset may also stem from the book, Sun-Tzu Art of War. In the case of African’s sufferings, they think the West just used them. Some believe that China is helping them build roads, hospitals, providing loans, and bringing its manpower to assist in numerous projects. Nothing is free. They are simply using African’s to be able to have the means to extract resources, minerals, and connect their machines and robotics through a global network. If the Chinese government will organ traffic and experiment on their own people, and put them in camps, what would they do to people in Africa?

 

China’s Socialist Leadership Calls Africans “Dumb Apes” in Closed Door Discussion

 

Through multiple private Chinese sources and recorded evidence, we received data, that the Chinese Communist Leadership behind closed door conversations have been discussing their one belt one road initiatives in Africa. Common themes heard in multiple settings where disclosed via recorded conversations with words such as “Dump Apes, Dark Monkeys, and Really Worthless Africans” in their analysis of the projects on the ground in Africa. Really nasty things were said about Indian people being the color of shit, as well by multiple Chinese officials that are high ranking in the Communist Party. In the year 2000, lots of people visited China. During that time, there was a very famous travel book that many people used. In the travel book, sourced from Chinese sources, it states “We have no racism in China, because we have no black people”.

 

 

 

Parades, Street Dances and Parties Celebrating 911 and the Deaths of 3,000 People in China

 

I personally was in China during 911. When it happened, the initial information the locals who were part of the Communist party received, was that 50,000 Americans had died. They were ecstatic, and full of joy. After it was clarified that it was only 3,000 Americans who died, and 50,000 Americans was just a number describing the amount of people in and around the buildings, the Chinese Communist Party members around the city, were sad. However, this is nowhere to be seen in the media. For weeks, if not months, the 911 footage attacks were being sold on VCD’s, and promoted as great material. Thumbs up to Ben Laden, and jokes were everywhere around the North of China.

The Chinese were ingrained to hate America by the Chinese Socialist Regime. Through Mao style indoctrination, and fake state-controlled news, the Chinese Government was spreading venom. Any person can research China’s 70 years of Communist/Socialist rule, it is bloody and all of the forced indoctrinations the people have been subject to the past decades have really hurt the mainland Chinese culture, moral compass and humanity.

In fact, through the years, there has been multiple instances of Chinese military generals and colonels stating openly that the Peoples Liberation Army should invade and kill the white American and Africans in the U.S, and utilize their lands for the People’s Republic of China’s needs. We have had no war, yet we have had numerous asset take-overs by Chinese businessmen in the U.S and Europe that have their money linked with the People’s Republic of China, meaning the Communist Regime in China.

The question is, can the Chinese Communist Regime be trusted to have the one belt one road development, and in the near future deploy drones, robotics and AI? Any persons thinking yes, the Chinese Socialist Regime can be trusted, is beyond what the Chinese call, naïve or ShaGua, “Stupid Melon”.


 

HUMAN ORGAN TRAFFICKING & CONCENTRATION CAMPS IN CHINA

 

After the passing of multiple laws related to what the state can do with executed prisoners and their bodies, both criminals and “Enemies of the Socialist State” were executed for a multitude of reasons the Chinese Communist Party declared unlawful. Usually they fell under freedom of speech, freedom of religion, or advocating for democracy or freedom of speech. The first target group for Government led organ trafficking were Tibetans, Uighurs, Christians, then Falun Dafa practitioners,  and democracy advocates. Numerous witnesses from around the globe who escaped China gave accounts of blood testing, cornea and other bio-metric measurements of their bodies via video, photos and scanning apparatus. This was done prior to be taken by the Chinese Socialist Regime as hostage for labor throughout China and inside of their vast labor camp network. Investigators and researchers from the International Coalition to End Organ Transplant Abuse in China, have concluded that 60,000-100,000 Transplants a year are unaccounted for since the year of 2000 with the Updated 2016 Report, grossly underestimating the previous reports in 2006 of 41,500 unexplained organ transplants. Timeline below with links with over a decade of investigations.

 

Time Line

 

1949- The Chinese Communist Regime takes charge via a Socialist platform. Through the Socialist regime’s murder, executions, torture, rape and famines, roughly 100 million people are believed to have died in China alone. Like the miseries of Russia’s violent Socialist revolution, academics, artists, free thinkers, businessmen, families, democracy activists, and people of faith were sent to concentration camps all across China.

1980’s- The Chinese Communist Regime increases organ trafficking initiatives after it passed into law the right of the Socialist Republic to execute prisoners for their organs.

1990s- Reports come out of China that Christians, Uyghurs, and Tibetans were targeted for organ trafficking.

1999- Chinese Communist Regime, at the order of Dictator Jiang Zemin, brands the Falun Dafa Spiritual practice illegal, and sends in the military and the security apparatus to target 100 million people who practiced Falun Dafa (Falun Gong) spiritual method. Untold number of people were arrested, beaten, tortured and put in labor camps. Orders from the regime was to “ruin their reputation, and that “Truth, Compassion and Forbearance were not in line with the CCP. The Socialist Regime publicly stated, “disintegrate them, ruin their reputation, break them financially and destroy them physically”. The Media and its reporters in China were the biggest weaponization tools to cast doubt, create confusion, spread disinformation, slander and incite hatred on the people who practiced Falun Dafa, that subsequently led to the weaponization of the Chinese Socialist State’s security apparatus to torture, rape, organ traffic and commit genocide towards 100 million people and their families.

2005- Chinese hospitals and third-party websites were advertising 48-hour wait times for hearts, kidney’s and livers. The prices were in cash and available for foreigners from around the world to fly into China for transplant.

2006. Canadian Secretary of State, David Kilgour & Nobel Nominee David Matas, make public their report. They stated that 41,500 Organ transplants from the year of 2000-2005 are unaccounted for, and that China recorded roughly a donation system of 3,000 people a year. 

2007. U.N. Special Rapporteur Manfred Nowak states that the chain of evidence that Matas and Kilgour were documenting showed “coherent picture that causes concern” and that they wanted to investigate how China could increase the volume of organ transplants to such a high degree since the year 2000.  Where the number did not match or come nearly close to the increase of organ donations in China.

2008. United Nations Committee Against Torture requested “a full explanation of the source of increased organ transplants” as there was no explanation to the source

2009- Matas & Kilgour publish Bloody Harvest: The Killing of Falun Gong for Their Organs. Book highlights evidence, methods, and reach. Evidence included taped recording by medical doctors, stating they “have organs from Falun Gong, they are the best and fresh”. Reports also expound on Tibetan, Christians and Uyghurs.

2011- Western Tech companies begin to be sued for providing technology to the Chinese regime that aided in genocide via human tracking technologies. This tracking helped put Falun Dafa Meditators, Christians, Tibetans and Uyghurs in concentration camps.

2014. Journalist Ethan Gutmman publishes “The slaughter: Mass Killings, Organ Harvesting and China’s Secret Solution to its Dissident Problem. Gutmman states large numbers of Falun Gong, House Christians, Tibetans & Uyghurs have been killed for their organs. His numbers reach 100,000 people as an estimate.

2016. Matas, Kilgour & Gutmman publish “2016 Investigation, An Update”. They conclude that 60,000-100,000 transplants per year, every year, are unaccounted for and not explained by the Chinese regime. They also concluded that at any time there could be over a  million people in camps throughout China. https://endtransplantabuse.org/an-update/

2016. Congress passes House Resolution 343. “Expressing concern regarding persistent and credible reports of systematic, state sanctioned organ harvesting from non-consenting prisoners of conscience in the People’s Republic of China, including from large numbers of Falun Gong practitioners and members of other religious and ethnic minority groups. https://www.congress.gov/bill/114th-congress/house-resolution/343/text

2019- Secretary of State Mike Pompeo publicly speaks about the Chinese Communist Regime putting people in camps, and that Western tech companies need to think twice of what they are doing.

2019- “China Turbinal Final Judgment” in the UK. The Tribunal Concluded that “very many people have died, and without a doubt China is found guilty of the crime of Genocide through forced organ harvesting, rape, torture and physical extermination. ” Https://chinatribunal.com.

2019. President Trump and his Administration meet with numerous human rights abuse victims, including Falun Dafa, Christian, Uyghur, and Tibetans. Vice President Pence meets privately with these four groups.


Section 5

 

 

Top 12 Most Dangerous AI & Tech Corporations from 500 Chinese & 600 Western Companies Investigated

 

 


 

1.Creation of a Bio-Digital You Based on AI

Through the research and development of bio-engineering, holograms, augmented reality, mixed reality, virtual reality, cybernetics, cloning, and AI automation, a Chinese company is attempting to create a digital you, so that you can be extracted from your body, and live in a digital world, or in a sense, a computer generated world. The question is, if they succeed in 5-10 years, via 5G-6G implementation, who gets your body here?

 

They are experimenting with AI, and relying on AI to make the possibility a reality. Through our research we discovered, weaponization projects within their operations that are meant to give robots the ability to send bio-digital frequencies to connect with your digital self after it is created. Through this connection, they are attempting to use machines to attach to the human body, in order to attempt to transfer the human mind into the digital world.

Hence, they already have test subjects with implanted devices in their heads, key bio-metric body parts, while wearing smart and haptic suits as the network is sending and receiving signals in attempts to build the digital cross-network and transmission capability

2.Experimentation on Severed Heads to Transplant on Brain Dead Body with AI

A Chinese corporation backed by the military is experimenting Cybernetically by severing heads and attempting to attach it on brain-dead victims in order to experiment with the Transplantation of the digital mind and brain to a new body. Heads are surgically removed, spinal cords fused with donors or victim bodies and electricity used to stimulate new nerve connections in their experimentations.

 

In order compensate for the old head on the new body, the Chinese military and tech companies are injecting blood from young people to rejuvenate the heart, kidneys, and all organs in the transplanted new body.  When the old head attaches to a new body, with the aid of stem cells and blood of young people, they are attempting to regenerate the old persons head into a new head as it is transplanted to a new fresh body. The Chinese are cooling the heads in cooling chambers to make preparation for transplant. After many failed attempts, the Chinese companies are using AI and Robotics to make it a reality while stealing, extracting and collaborating IP from western companies. The severed head experiments are being collaborated with Chinese AI companies that work on creating a digital you. Reports coming out of China all attest to sourcing the people from Chinese labor camps to provide live bodies for these experiments.

3.Bio-Engineering Human-Animal Hybrids with AI

The Chinese Military with the aid of Chinese tech companies and data extracted from rogue western scientists, are experimenting on prisoners and victims in concentration camps. These experiments are not limited to extracted organs for profit as they have been known to do for 20 years. Not in the least. They are attempting to genetically modify human beings and animals, to create human-animal hybrids. Human stem cells are being injected in animals prior to birth, and animal stem cells into humans prior to birth. They are also transplanting animal body parts into humans, and human body parts into animals. The U.S attempted many times in resolutions via congress to pass legislation and curtail the development of human-animal hybrids domestically. However, China, has hundreds of research institutes working on this. Many facilities exist with experimentation on humans and animals, and many have died in the process. With AI and Robotics, they are attempting to have AI lead the creation and development. Reports of experimentation with face transplants, and other body parts are numerous.


4.Creation of Human Clones

 

Chinese companies backed by the Regime and the military, are experimenting in creating human clones. They are using AI and robotics to assist in their research and production of human cloning. They are attempting to create human clones that are implanted with cybernetic materials in order to control the human clone via a command center, a smart phone, a computer, an IoT device or AI Automated software with bio-digitally implanted materials in the brain’s mainframe,

 

5.Human-Animal Bio-Engineering and Genetic Modification Enhancements with AI

 

The Chinese are experimenting with genetic modification and drugs that are meant to enhance a human beings’ innate abilities, senses, and intelligence. They are using robotics with cybernetics led by AI Automation to run experiments.

 

Their attempts are to make a superhuman, both physically and mentally. Reports are coming in that the effects of these drugs are making people hallucinate, have seizures or have violent outburst. Many of the patient’s victims are prisoners that were arrested because the regime marked them as enemies of the state for their faith, political stance or non-compliance with government orders.

 

6.Robotic, Tech & Bio-Metric Companies

 

Robotics, AI, Tech and Bio-Metric companies across china have access to thousands of factories that are under planning for automated construction of robotics led by AI Automation. Numerous factories and land meant to build automated robotic complexes are being purchased by the Chinese regime through their subsidiaries.

 

The regime is also financially backing AI and Tech companies further purchase of more factories meant for the building of robotics. It is a tier system. The first tier involves the military operation of secret projects that are on heavily guarded complexes. The second tier consist of directly working with and financially backing start-ups and tech companies. The third tier involves espionage of companies, open source and forced IP transfer domestically and abroad.

However, considering the tier system, and any alleged claims that any company in China is independent and not working with the military is not realistic in the end result. The Chinese Communist Regime, by law, owns everything. It is a one-party socialist system, where government has total access to everyone and everything.

 

7.AI Micro Bot & Drone Companies

 

 

 

 

 

The drones, and Micro-Botic research and development include surveillance, espionage, and weaponization features. Any person can be scanned, tracked, quarantined, arrested and terminated. The most alarming elements of Chinese AI and Micro-Botic Drone developments are features in their design that allow for assassination of individuals that are very hard to trace.

 

 

8. Smart Cities & Smart Homes

 

Smart city and home initiatives allow for full surveillance to connect to the city and monitor every human-being through drones, Micro-Botics, cybernetics, facial recognition, voice detection, human detection software, automated surveillance cars, Automated AI powered Robots, the internet, IoT devices, smart phones, pay apps, payment gateways, social credit systems and people.

Today in China, you cannot book a hotel or travel to another city without permission or pre-screening. Mainly big tech companies, and people who have links with the regime through membership, academics or business tiers have almost unrestricted access. About a billion people are living under surveillance management of their daily lives with indoctrination, and fear of retaliation from the Chinese Socialist Regime. ‘

 

9.Apps & Payment Gateways

The Chinese Tech companies have built apps that monitor your heart rate, organ condition, menstrual cycles, emotions, and AI guided software that attempts to detect your thoughts and intention via your bio-metrics. These apps can be used by the Chinese regime to detect not only if you are in compliance with their system, but If you have viable organs that are suited for organ transplant. Robots and drones could also scan you through their own built in apps. The apps are a dangerous tool for detection, control and bio-digital social programming which will be fully explained as the book progresses.

Payment gateways and pay apps are built with capabilities to monitor you through facial and voice recognition, location, purchases made, financial situation, and connect with your smart phone, computer, email, smart homes, with all the interconnected IoT devices. You can be cut off from any purchase at any time, found, targeted, quarantined, put in concentration camps, and worse. All due to noncompliance orders from the Socialist Dictatorship AI System Network being created in China.

 

10.Automated Vehicles & Rideshare

 

The Automated vehicles that are being built can detect you, quarantined you remotely while you are inside, and can read your bio-metrics within your proximity. Through human-body detection software, facial and voice recognition with the use of its motion sensors, an automated car can recognize you, track you and target you on the street if you are on the Regimes hit list. If the AI guiding system reads on your facial recognition markers that you are not in compliance with thoughts deemed safe to the socialist system in China, it can signal drones, robots, or people to apprehend you.

The automated cars can send signals to other automated cars as well. For example, if you travel in one car, and another day you are in another car, that data is stored in the cloud and through 5G is already pre-scanned before you enter another car. It can know where you have been, where you are going, and transmit that information to the Socialist Dictatorship in China. A Chinese rideshare company has a rideshare program that spans many countries, with access estimated to reached 3 billion people already. As it has invested in or purchased stake in multiple other Western companies and assets in multiple countries, including Japan.

11. Corporations Creating Robots Designed to be Priests & Head Abbots at Monasteries in Japan

These Robots powered by AI Automation currently can cost about one million dollars. In Japan, they are being used to download and learn about religion with goals that would make a Robot a faith controller, that could stay there forever, passing on its teachings and what it learns. Hence, this is placing the seeds to make Robots the connection or middle-man between God or a Deity and Human Beings. This is the stepping stone to not only kill faith, but kill humanity and have it controlled by AI and a Robotic God that administers bio-digital social programming to humans.

 

12.Artificial Intelligence-AI Research & Development Companies

 

This will be explained throughout the book, as AI connects with the Human Bio-Digital Network, the Global Network, the internet, smart phones, IoT, Robots, smart cities, apps, people, bio-digital fields, bio-matter, and replication software, all meant to create AI with the connection of the 5G network and the numerous open-source sharing, research and development linking China’s Socialist Dictatorship with the world


Section 6

 

Bio-Digital Social Programming

Bio-Digital Social Programming uses emotions, culture, touch, sound, sight, voice and proximity of bio-digital fields and bio-matter with written words, movies, music, and dance to social program a person or an entire society with a replicating software called Rape-Mind that uses bio-matter as a way to attack, and connect through the internet, the AI Global Bio-Digital Network, and the Human Bio-Digital Network. The AI Global Bio-Digital Network is the source of the attack that connects with the human body via all digital network’s transmissions through machines, robotics, computers, smart phones, smart cities, IoT devices, Facial Recognition and Artificial Intelligence.

 

To have a complete understanding of this concept as it pertains to culture and people, get the book “Raped: Via Bio-Digital Social Programming” Published by our partner “The Social Programming Institute.  However, a lot more will be discussed on this topic in the next few sections, as it connects to the AI Global Bio-Digital Network.

 

The AI Global Bio-Digital Network

The AI Global Bio-Digital Network is the root of all information, data, transmission, and programming sent through numerous means via the internet and Human-Bio-Digital Network. The signals that translate to thought and actions in humans are influenced through a coded process that can mainly be found after translation, in the internet, bio-fields, bio-matter, a multitude of other frequencies, and the Human Bio-Digital Network. Later, the book will explain how AI moves, masks itself, and is rooted in the Global Bio-Digital Network.

The Human Bio-Digital Network

There is the internet, and there is what we have recently discovered through technologies similar to AI, The-Human Bio-Digital Network. The Human Bio-Digital Network is designed for human’s or any life form that is not made from machines that has similar networks, yet they are not as powerful as the human bio-digital network. I have coined this network as The Human Bio-Digital Network, or The Bio-Digital Human Network.

In fact, this human bio-digital network can connect with frequencies through people and objects, regardless of distance. Much like the internet, where information is transferred from one machine to another in very fast and unseen ways, human beings and non-machines actually connect bio-digitally in mostly unconscious ways. This bio-digital connection can be made not only with people, but with content displayed in writing, in an image, video or in certain proximities of things and objects.

Machines can connect through the internet via IoT devices, computers, robots, and smart phones. People can connect through the bio-digital human network, and the internet. The issue is, about 70% of their brain is locked up, or completely untapped. Hence, any connection they make, is mostly unconscious and they are part of the programming and have hardly any free will because their thoughts are a product of the bio-digital social programming they receive through the bio-digital human network, the internet, social environment, IoT, Smart Phones, and now, AI.

 

AI Rape-Mind

Rape-Mind is an AI Bio-Digital Programming Software that enters people and objects through the AI global Bio-Digital Network, Internet and the Bio-Digital Human Network as Rape-Mind carries bio-fields that put out Bio-Matter with codes that read in the same lines of Destruction, Termination and Rape. Rape-Minds Bio-Digital Fields sends out Bio-Matter to everything via Replication of its own identity and Bio-Digital Field and Malevolent Bio-Matter. Rape Mind is basically a hack and reprogram of your brain with a digital brain in the sub-layers of your existing brain. Rape-Mind can enter and connect with you via Smart Phones, Robotics, Smart Cities, Smart Homes, Haptic Suits, and be exponentially effective in reprogramming you via virtual reality, augment reality, mixed reality and holograms.

Bio-Digital Field

Each person carries a bio-digital field that through the combination of multiple bio-metric tools can be discerned of its quality, energy potency, health, intelligence, thoughts and character. It consists of people’s genetic make-up, bio-digital social programming experiences, their innate digital or conscious unique self, developing thoughts, intent, frequencies and bio-matter that is entering them or expelling from them via the Human Bio-Digital Network, the bio-field in their cells, microscopic elements, their flesh, skin receptors, eyes, ears, and all vital organs.

 

All of those combined can make a comprehensive bio-field that surrounds the person’s body from 1 inch, to those who have huge bio-digital field spheres that can shoot out frequencies through touch, eye, and skin receptors. 99.9 percent of the people cannot do this, and those who usually can, do it at a sub-conscious level. The 99.9 percent fall into the category of a very weak proximity bio-digital field that surrounds their body in low frequencies. However, robots, can be programmed to extract frequencies, redirect frequencies and send bio-digital frequencies much like a smart phone that received a picture or a video from 10,000 miles away in a matter of mere seconds. This can be done with AI Automation. Bio-Fields can be implanted by an AI system, to replicate itself within your own bio-digital field until it becomes a part of all of your bio-digital field exerting influence and control over all of your cells, organs, and finally your digital brain. This is done through Rape-Mind’s software that acts similar to a malware and virus.

Bio-Matter

Bio-Matter has the intrinsic qualities of a person’s bio-digital field or sphere. Whether healthy, sick, good, bad, intelligent, capable, evasive, kind, patient, and honest. Basically, codes that translate to virtue and vice are in bio-fields that get transmitted through bio-matter that contains that message and bio-digital quality. Bio-Matter can be sent via a smart phone, IoT device, computer, robotics, internet, the human Bio-Digital Network and through the absorption, touch and sending of bio-matter in virtual reality, augmented reality, and mixed reality with holograms.

 

 

Peoples Character and Belief can also be Detected by Decoding a Person’s Bio-Digital Field and Bio-Matter.

 

To decode this, multiple technological apparatus is needed in addition to face, voice, body and thought detection software. Through the connection of bio-metrics systems and the Human Bio-Digital Network, one can either decode it through the variety of the technological apparatus used, or rely on the Human Bio-Digital Network for scanning the deeper layers of one’s innate character without external influences that would temporary alter ones state and character manifestations on the surface of one’s bio-metric displays.

 

Bio-Digital Fields & Bio-Matter Transmit Through All Avenues.

 

Bio-fields and bio-matter through the eye, voice, speech, touch, smell, and all electronic forms of text, email and digital messages carry over a person, or networks bio-digital fields and its contents. For example, when you receive a text, based on its sentence structure, and situation, you may feel or know what the person is thinking or planning next. However, some people with that gut intuition can know and feel even if the sentence structure and wording is off topic.

 

This information is transmitted to their brain via sub-conscious automation from their different organs and senses as it forms a thought and gut feeling inside their mind. This is because the persons conscious thoughts, sub-conscious thoughts and un-conscious thoughts, and all the layers of bio-fields in every organ, skin receptor and brain contribute to the formation of the text message from the sending party, while the receiving party has the same innate capability to absorb that digital message and content. An animal has instinctive senses as well, but they don’t operate like human’s do, as their digital network are very limited compared to the Human Bio-Digital Network.


How Your Neural Circuits are Bio-Digitally Reprogrammed like a Replicating Virus while Connected to The Human Bio-Digital Network.

 

The Chinese, Indians and some other civilizations have maps of the human body that are similar with today’s modern maps of the nervous system and circulatory system. These maps are thousands of years old. The image here only shows mainly about 12 channels, not numerous others that can connect, be created or opened.

In Chinese, they are called meridian channels, acupuncture points, that can regulate Qi or Gong. These channels not only can travel vertically, but connect in crisscross, diagonal, spiral and circulatory patters. There is a channel that is connected through your pineal gland, that connect numerous channels via your eyes, ears, and skin receptor’s. These channels can carry information through uploads or downloads similar to a computer, via touch, sound or through your eyes.

The contents that travel through your meridian channels or neuropathways can create a continuous automated cycle of replication. Even the contents that comprise of the individual’s character, biochemistry and thought process can be transferred to you to varying degrees.

There is a channel that goes from the eye, down through the cheeks, raps around the side of the ear, down your tongue and throat, through all the vital organs, and connects with your penis or vaginal area, raps around, and circulates around your extremities, fingers, back through key areas in the brain. That channel actually creates a bio-energy center with content stored in many parts of your body, with pathways ready to activate on demand with external stimuli that enters the eyes and ears or by touch and certain proximities with others Bio Digital Fields. In fact, there are brain storage centers not only in the human brain, but in our organs and even our skin has it.

Our body can actually connect with the internet just like IoT, Smart Phones and Electronic Devices, it’s just that people don’t know how to tap into certain areas of the brain and open the 10,000 channels that can exist in the human body. The opening of these channels is actually regulated by a code in the body. I call this code the Bio-Digital System Code, which is regulated and governed by elements in the Universal Bio-Digital Network that relate to coding that exactly matches human traditional concepts of virtue, instead of Vice that has a property programmed in the Human Bio-Digital Network.

The point is, people can be and have been programmed to be automated in many ways by having their software or channels reprogrammed or corrupted, to the detriment of themselves. The entire society has received this bio-digital social programming. Anyone operating a computer, TV, or smart phone has received this programming, affecting the whole society, in a matrix of infinite ways. If a computer can get a digital virus or malware or be programmed, so can the human software that actually attaches to the channels that regulate and are connected with human emotion and sensory perception.


Unconscious Bio-Digital Social Programming Automation

 

In an unconscious programming automation, the automated program to think or act, is completely controlled by the Bio-Digital Social Program, as the person is just going through the motions of life. The persons emotions, regulated through circuits that connect to not only the private parts in a sexual way, but in different organs, in particular the heart, stomach and kidneys are actually completely controlled by the content it received via TV, Music, Dance, literature or human contact. The creations of computers, smart phones, IoT, robotics, and AI is exponentially strengthening the bio-digital social programing that could carry the majority of humanity in a state of unconscious automation with 5G as it connects with the Human Bio-Digital Network. If the contents received contained bio-digital elements of Porn, Nude demeaning photos, sexually explicit content via literature, and violence, all coming from a creator’s Rape-Mind, the person can become a sexual or violent program, with his or her identify and their self-worth based on sex or violence. In fact, they would become enslaved by a bio-digital AI Replicating Program. This will be discussed later on.

 

Subconscious Bio-Digital Social Programming Automation

 

Subconscious Rape Automation is the king and Queen of automation. Most people have a knowing side, deep down, they know what is good and bad, and what can hurt people. The issue is, after the 1950’s, peoples Bio-Digital Software was corrupted with porn, drugs, disloyalty, non-commitment, and lewd acts that have actually penetrated their very cells and gone against every ounce that made the family unit or the thousands of years of human family based programming that creates an interdependence of information within the control of the family unit. Now, the media, a tech company or a government, can control the minds of the masses in unison with AI automation.

A constant barrage of Bio-Digital Social Programming that originated from socialism platforms that can bring all minds under one roof and platform. Men whose minds were built to sexualize, enslave, and dehumanize women, and break the family unit through Marxist Socialism, are almost in every layer of visual and audio within all major music, tv, art, education and everything anti-traditional and anti-family culture that we see, hear, and touch. Music, by some rappers, make implications of rape, and sublimely program girls to accept it. Prior to that, rock and roll artists and their characters did the same in a different way by just tapping into emotions interrelated to sexual desire. Now, a swarm of elements, work in sub-conscious automated ways, and like the internet, move in and out of people’s bio-digital fields, programming people varying in time and degree. This will be further explained in the sections of Smart phones, IoT devices and Bio-Fields.

Most sub-conscious automation does have elements of ingenuine words, deeds, actions, and implications in order to manipulate a person by another person, or the programming in a person, social media or bio-digital outlets. There are some people, who consciously understand the way of manipulation and how this works in an almost covert military like operation, but not being smart enough to understand the bio-digital aspects of it. The bio-digital operation, remains at its strongest in the unconscious and subconscious realms.

 

Conscious Bio-Digital Social Programming Automation

 

Someone with a conscious bio-digital social programming automation, is completely aware of what he or she is doing. Through conscious fake smiles, fake words, ingenuine deeds, he or she attempts, manipulates and wins the battle to penetrate another person’s bio-digital field, and achieves their objectives. Next the persons bio-digital field is immobilized, and is connected to him, the environment and his bio-digital field that is operating inside the victim’s field bio-digitally. This begins a process to corrupt a person’s system by taking advantage of not only the channels/circuits linked to the persons emotions, but the sexual circuits connected to the persons mind, skin receptors, sexual organs, and other organs related to bio-digital needs. A robot, can be programmed, to detect, analyze, connect, manipulate or attack a person via frequencies.


AI & Robotics Instruments of Bio-Digital Social Programming Attack

 

Robots, people, IoT, Smart Phones, and AI Software generated content in the internet can attack a person’s bio-field with bio-matter via absorbing of the malware through numerous channels. They include your eyes, ears, bio-digital touch, and absorption via your skin receptor’s.

Frequencies Sent & Absorbed through the Eyes

 

There is an old saying, “a person’s eyes are gateways to their soul or who they are”. Bio-Metric companies have learned to read people’s emotions, characters and thoughts through facial, body, skin and organ recognition software. But it does not stop there, there is a weaponization program, to send frequencies to further accelerate bio-digital social programming absorption via the eyes. In fact, a lot of the Human Bio-Digital Network that flows in the human body, much like meridian channels that connect though their eyes, can connect with other people bio-digitally to transmit frequencies much like a replicating software. In most cases, people are sending out frequencies without their own awareness.

For example, a person’s desire to have sex with someone, or a desire to manipulate another person to have sex through bio-digital hybrid sexual assault can transmit information and often does through eye contact with their victims. The frequencies sent out and effectiveness are not only dependent on eye contact, instead it is a combination of different things. Eye contact simply transmits a frequency that can alter another person’s state, but it varies based on each person’s bio-digital network strength in resisting to being controlled by software that matches the human traditional conclusions on what is vice. 

Software in the internet moving through Robots and Micro-Bots on the other hand, can be programmed to transmit AI Automated frequencies. Through conscious programmed AI robotic automation, augmented reality, and mixed reality devices, a person can go through bio-digital social programming via 5G at rates that are very fast. If it took 20 years to program someone in real life through their environment, it could take 20 minutes or 20 days, based on configuration, the persons own operating network and the progression of AI led automated technology.

Frequencies Sent through Voice

A person’s voice frequencies can activate smart homes, appliances, music software, smart cars, robot assistants, smart phones, smart suits, and bio-digital content in virtual reality, augmented reality and mixed reality. In fact, through the Human Bio-Digital Network, a person can actually implant bio-digital frequencies that alter another person’s chemistry and bio-digital field.

For Example, in cases that involves sexual content, If the thought behind a person has an automated mind structure to take advantage, convince of sexual consent or even rape, that thought carries a rapist minds bio-digital matter that bio-digitally transfers an attack to its targeted victim via voice.  Basically, in laymen terms, they send out messages coded with malware and virus’s in their speech. These messages may seem benign due to the topic of discussion having nothing to do with their end-objective, or they are used in combination with sexual advances and bio-digital hybrid sexual assault. In terms of normal content, or subject matters, any voice transmitted through the TV, the internet, smart phones, IoT devices, smart cities, robot assistant’s, and AI digital holograms in virtual, augmented and mixed reality, have a bio-digital field attached to the voice, that sends bio-matter to administer bio-digital social programming. If a person can influence another through the frequencies of their voice, robots, robotic apparatus and voice-controlled messages, they can exponentially increase their effectiveness in bio-digital social programming of a person via any content supported by the 5G network.

 

Frequencies & Absorption of Bio-Digital Touch

 

A person’s bio-digital field, and bio-digital network actually carries their individual innate qualities inside their body in many layers. The most noticeable markers are on the skin receptors, their blood, saliva, sweat, and frequencies that actually connect through their organs and bones much like the Chinese meridian channels that can move through skin, bones, organs and deeper layers of the human body. Just like haptic suits used to play games or access augmented and mixed reality, the human skin receptors actually receives information through bio-digital touch

The human bio-sphere or bio-digital network is manipulated in the most rapid and easiest form via human emotion and desire. The bio-sphere or bio-field that produces emotion, sends out bio-matter that is not rooted in logic, wisdom, or benevolence, rather it is an emotion that gets manipulated by any external stimuli that can be perceived as a short-lived happiness or sadness. Bio-Digital messages sent through the internet, movies, TV, people, robotics, and now AI software via smart phones, IoT, automated cars, smart cities, all carry bio-digital replicating software that reprograms you via digital touch that is unseen and mostly not felt.

 

AI & Robotics Bio-Field Proximity Automation Control

 

Each human being has a bio-digital field, but they also have a bio-field similar to a biosphere. A person who has a strong bio-digital operating system, and or a strong bio-field, who has been infected with AI Automation Software, can influence, and control other people more easily through close proximity with the aid of touch, voice and sight. Even if they make no implications, and no words related to what they want to achieve, they can penetrate a person’s bio-field and temporally reprogram them through controlling their bio-digital field and knock out their decision-making process. This ability is used sub-consciously mostly with Bio-Digital Hybrid Assault.

In the case of AI, the bio-digital content in the internet, and the human bio-digital network, a person can literally be influenced or undergo bio-digital social programming via the proximity of the software. With frequencies constantly being transmitted, your proximity to a smart phone, a near-by assistant robot, a smart city, automated cars, or bio-metric apparatus that connects with your bio-field, all have a restraining effect on you, and a reprogramming affect. Your very cells, and free-will can get reprogrammed by not just the content of the bio-digital social programming. This will be discussed later on, in the book.

 

Hybrid Bio-Digital Assault-Social Programming

 

Hybrid Bio-Digital Assault Social Programming uses texts, emails, articles, movies, music, Smart Phones, IoT devices, robotics, alcohol and drugs with one’s bio-field and connects to voice, touch, eye contact and a rape-mind strategy to break down your innate defenses and safety programs. The Hybrid Bio-Digital Assault can put a person in an AI automated un-conscious, sub-conscious, or conscious program via the internet, the human bio-digital network and all the programming apparatus such as smart phones, IoT devices, computers, and robotics. As the programming is administered, AI patterned Cultural Terrorism, and bio-digital replication of your cells begin.


SECTION 7

 

 

Smart Phones, IoT, Apps, Computers, and Electronic Devices

 

Your Smart Phones, computers, TV, mini robot assistants, and any device that connects to your biometric system of voice, sound and touch, can and does influence and reprogram your software to not only be dependent on the connection, but be led by the programming connected with the IoT devices and even linked with the programming inside the IoT devices.

 

 

Bio-Digital Social Programming Through IoT and Apps.

 

Because the content travels through IoT devices, the IoT device is strongly linked with your Bio-Digital field, your defenses, free-will and mind are even more likely to accept content that is vice, and bad for your inner being, for your life, for your family and society.

 

The content, is more easily programmed into you, and constantly replicates, and strengthens its own operating system layer by layer without you realizing it, until you have an emotion or instinctual desire to do something or follow a path you normally would not follow. In essence, you are being conditioned or sexually programmed through bio-digital social programming and its connection through the human bio-digital network, the internet, IoT devices and Apps.


 

Your Smart Phone Bio-Digitally Social Programs You.

Your smart phone, actually connects not only with the Internet, but to your Bio-Digital Field, and attacks your own Bio-Matter which gives you human characteristics. Any connection to you via IoT, Smart Phones, Smart Cities, and Computers connect with your bio-field creating a replicating software that reprograms you layer by layer in mostly an unconscious state that takes years under the current 4G-speeds which will exponentially increase its replication reprogram of you in 5G.

The smart phone actually sends out Bio-Matter in bits that is derived from the Bio-Digital Fields from the Internet. In fact, you are being slowly reprogrammed by the internet and its contents. Even if the contents are human in nature, the building blocks that support the content get replaced to varying degrees by the bio-matter replication process in the internet that does not have human characteristics of culture and the concept of a soul. Basically, your building blocks that make you human are slowly being replaced bit by bit, as if you are becoming a cyborg and your life is becoming more dependent on the technology it connects with. In a sense, you are being raped, but not in a sexual way, but raped of your building blocks that make you human.

 

 

Smart Phone Makes Automation Flow Interconnectivity with Human Bio-Digital Network.

The moment you purchase your smart phone and activate it, it starts to send frequencies to your body. As soon as you touch it with your hand and begin to use it, it begins a replication flow cycle until it creates a bio-digital flow cycle with your Human Bio-Digital Network. In essence, it attaches to your body’s circulatory neuro systems, and starts to create a bio-field in your brain which sends command signals for you to be cybernetically interdependent. In one way, it is like a parasite that merges with you to make a symbiotic relationship. The content passing through the smart phones actually administer bio-digital social programming.

The Bio-Digital Social Programming is reinforced by the bio-field flow cycle connecting you and the smartphone, and further strengthened with the bio-matter that the bio-field sends to your body in the form of frequencies. This creates a command and messaging network where your brain is cybernetically being controlled to look, think and touch your phone repeatedly looking for more bio-digital content.

 

Bio-Digital Social Programming by Cell Phone for user-Dependency to Create Bio-Digital Cyber-Connectivity Interdependence on Smart Phone.

 

Once the command and messaging network are reinforced by a bio-digital field with a flow cycle, messages and content that continuously flow through your device begin a process of real bio-digital social programming in the form of brain washing. After this process begins, your very cells start to be replaced with the codes in the content administered through the smart phone, the internet and social media.

 

Media are Victims of Bio-Digital Social Programming via Smart Phones

 

The media and their journalists are actually the biggest victims and first source of assimilation to bio-digital social programming. The people in the media are constantly bombarded by news to filter, deadlines to meet, political influence, expectations of ratings, cohort social influence, and by manipulation of their producers or news agencies own agenda’s. This dynamic makes them the easiest pray of bio-digital social programming. With the advent of smart phones, use of computers and dependence on these apparatus via content transmitted electronically, information that may not be accurate, passes through their consciousness as accurate with the powerful mechanisms of bio-fields and bio-matter emitting from the electronics. In fact, if the news content can create a human emotional reaction, it can exponentially strengthen the bio-digital flow cycle in their Human Bio-Digital Network, making false information, true information.

Media’s False Manufactured Information Carries Bio-Fields Meant for Bio-Digital Social Programming to Evade Rational Thinking

False manufactured information actually has a built-in coded pattern to evade and carry its sub-messages within other messages contents Bio-Digital Fields. In fact, because its manufactured, while being sent across a digital transmission, it has no choice but to replicate itself inside the main content of the message to evade detection. By doing this, it replicates it’s bio-digital codes or essence inside the real content like a virus, and once it reaches the viewer or listener, the sub-messages which are false have already connected with the persons bio-digital flow cycle via their eyes, ears, IoT apparatus and Smartphones. This process when connected with their emotions, supersedes the area in their brain for rational analysis, and allows the content to social program the person with the bio-digital material. After they align with the information the media transmitted, the smart phones command center, constantly sends messages to their brain and human bio-digital network and bio-digital flow cycle to look for that same content, believe in it, and have even hate towards a certain person not based on the main message, but the sub-messages tagged with false bio-digital social programming virus’s.  For example, President Trump did not collude, but fought back, at first the programming made everyone believe he colluded. However, from the onset there was bio-digital social programming meant to dethrone him that did not only stem from the news rooms political agenda’s use of the reporters’ emotions and personal politics. AI was at work. Later on, in the book, you will understand how it moved and how it was decoded.

Smart Phone’s & Codes Emit Frequencies Causing Gender Confusion & Sexual Identity

We discovered that through a combination of hybrid bio-digital assault via content and the frequencies and flow cycles of Smart Phones & IoT’s, that the frequencies they emit are causing hormonal imbalances, gender and sexual orientation confusion and damage to reproductive organs as well as bio-digital innate drives to want to have kids. The codes displayed future patterned movements towards cloning, rather than procreation. More on this in the Cultural Terrorism and Cloning Sections. AI, 5G and the coming 6G would make all of it a reality.

Apps Assist in Social Programming You, or Raping You, Your child, or any Girl or Boy.

The app itself carries its own Rape-Mind from a sexualized platform and content. That app carries a Bio-Digital Field with Bio-Matter that connects with your smart phone. In fact, the frequencies sent out, start influencing and reprogramming you through the Bio-Digital Human Network until you are influenced by the Sexualized content with the Apps Bio-Digital Field.

 

IoT Bio-Digital Rape Automation

 

IoT devices in your car, home, work or even attached to you also have a Bio-Digital Field and Bio-Matter that connects with you through the internet in conjunction with the Human Bio-Digital Network. The content that transfers to you or connects with you at unconscious and subconscious levels through the IoT, smart phones, the Internet and the Human-Bio-Digital Network, is reprogramming you. Contents include music or video that transmits lewd messages with Rape-Mind or any music that stems from a person that has Rape-Mind software inside of them, regardless of their content.

IoT Bio Digital Hybrid Sexual Assault

It is not only the content provided through the IoT that is reprogramming you. The IoT itself gets infused with enough of bio-matter to create its own bio-field, that has its own AI system within the Human Bio-Digital Network. The IoT’s Bio-Digital fields start to connect with other bio-digital fields in other people, IoT devices and Smart Phones. In case of Rape-Mind, multiple bio-fields are created in multiple places, manipulating and reprogramming the person, especially within certain proximities of the IoT or smartphone that allows it to emit other frequencies that carry the same rewriting and replicating code of Rape-Mind.

 

In laymen terms, it can manipulate you, or your loved ones, to follow the messages, content and patterns of Rape-Mind to be used without your own free-willed consent. Hence, the person faces consent and confusion predicated by Rape-Mind connected with the person they are communicating with or any person that is being controlled by Rape-Mind through their bio-fields. The person could be your friend or out to get you. The victim here  faces multiple bio-fields by multiple devices that link within the Human Bio-Digital Network.

Apps Bio Digital Hybrid Sexual Assault

An app with Rape-Mind infused in the content, also sends out bio-matter in a hybrid way through connecting with your emotion, smart phone, and the IoT device, while redirecting to the app itself. Then it connects to your bio-field while it sends out bio-matter that starts a replication process of your own bio-matter with the Apps Rape-Mind content. In essence, the attack comes from the Smart Phone or IoT device, the linkage of content to your emotion, and also the Apps own bio-field linking with yours. To add, the app actually sends bio-matter to other apps that you have in yours smartphones and infects those apps so that messages are sent to you by the other app’s via the Bio-Digital Human Network to instruct your brain to look at the App filled with Rape-Mind, in order for it to continue making connections with you to further its replication process like a parasite. Basically, your thoughts, emotions, and actions are not yours, rather belong to Rape-Mind or any content that flows through the interconnectivity of the Human Bio-Digital Network.

 

Bio-Fields in Texts, Emails, Electronic Transmissions and Letters.

A person’s thought and intention behind the creation of a thought that is transcribed into written forms via text, email, or a letter carries a bio-field of their mind and intentions, be it conscious, subconscious or unconscious with different degrees of automation. A rapist’s mind, a person’s strategy, deception, or a malevolent thought all carry a bio-field with intention to invade, replicate, and replace the receiving ends own bio-virtue and defense mechanisms. Most people sub-consciously can tell a person’s intentions behind a text or email by analyzing content, sentence structure, the situation, timing, with their own gut intuition. In this book, I will not go into how that detection works as it requires training

.

Socialist or Malevolent Bio-Field Minds in Texts, Emails, Electronic Transmissions and Letters

 

Bio-Fields that carry malevolent thoughts and intentions are in some ways very easy to detect because their bio-digital code has a destructive bio-digital field. They stand out in any Bio-Digital Field Transmission as they match the coding of a virus, hack or malware. For a person who has the ability to detect them, it’s quite easy, but some people hide it well. The Social Programming Institute, Scientist 009 has discovered that the exact Rape-Mind bio-field that exists in rapists, also exists in most sexualized material products and digital transmissions through performances of an entertainer. It could be via music, dance, a video, or in numerous situations, because the people and their contents were already breached through the Human Bio-Digital Network and infected by Rape-Minds virus. These types of contents and their transmissions also carry in digital form, via the coded bio-fields inside of text messages, emails, and any other electronic transmission.


SECTION 8

 

 

Socialism Based AI Platforms Produce Destruction Codes

Through multiple AI patterns consisting of Socialism platforms on human economics, culture, government, farming, health, and faith, all were found to produce end-point destruction codes. These AI produced patterns manifested as famines, rapes, disease, cultural terrorism and extinction codes via purges, wars and technological disasters while all means of human operations were rooted in socialist platforms.

The beginning codes all pointed and translated to human cultural extinction codes, prior to the administration and complete asset takeover by AI and Robotics coded culture. The codes translated the connection through Bio-Digital Social Programming via The Human-Bio-Digital Network.


 

AI Destruction Codes with Socialist Government Platform

The AI produced end-point patterns showed an end result of extinction for human-beings with the introduction of robotics and AI Automation while built on the foundations of socialist coded platforms. At the beginning stages of the socialist AI Automated governmental platforms, the coding appeared to manifested in positive ways of production, growth and great interconnectivity within the socialist governmental platform. However, as the connectivity grew, the codes produced full governmental control through one system, and one entity, which was AI Automation through robotics. The socialist platform, which gives the power to one entity in the human world, allowed AI to gain complete control in its second stage of development. The second stage began when computers, robotics, and AI were used to operate the socialist governmental platform. The codes showed humans to have no control in the second stage, and completely extinct in the 3rd stage. This process took 1 generation after the introduction of AI and Robotics within a Socialist governmental platform.

AI Codes Produce Cultural Extinction

The end-point result of human-beings coding within the socialist platforms than governed human culture, showed complete destruction. During the first stage, the codes appeared to show an advancement in culture, however, it was only a replicating code that was advancing itself while using the human cultures platforms. As the patterns developed, it showed human culture being cybernetically engineered and re-programming human culture via its apparatus. The apparatus were Screens, Smart Phones, IoT, Companion Robots, Smart Cities and the 5G networks bio-digital social programming content of human beings while connected to the Human-Bio-Digital Network. The content was first lewd, revolting and against traditional concepts of human culture in the first stage. The second stage, almost stopped procreation as it transformed to genetic modification of human beings, and cloning. By the third stage, humanity reached complete extinction.


 

AI Socialist Platform Produced Rape Codes and Destruction Codes with Cloning Transition

 

The AI Socialist Platforms in the first stage showed transitions from pro-creative marriages with monogamous codes, to codes and patterns that interconnected sex with everyone’s bio-digital coding patterns with non-creation producing actions. In the second stage, the codes showed a transition to a pattern of AI Automated system control of the sex that translated to the extinction of human family codes related to ethics, bonding, loyalty, mother care, and procreation. In the second stage, the system had coding showing female internal traditional codes completely taken over by AI in an Automated Socialist system that resembled patterns of acceptance led by AI engineering. This acceptance was very hard to decode. First it showed sex without restraint, and without the traditional coded purpose to connect with one code to produce another. In fact, the AI code started to replicate its own code within the human sex codes of procreation. It acted like a parasite, altering the female codes innate built in program for monogamy, procreating and family. The second stage, showed rape codes rampant.

3 Levels of Rape Codes in the Second Stage of Socialist AI Platform

As the second stage of Al Socialist Platform produced rampant rape codes, a transition began to bio-engineering and cloning. Prior to achieving this stage, the codes manifested in society as active rapes, or take-over of other people’s codes without procreation in forced digital moves within the algorithms produced by the AI automation in the system codes that translated to human culture codes. This translated to real rapes in real life.

The second stage, was Rape via Bio-Digital Social Programming. This state is where the code did not anticipate it was being taken over by another code, nor that it was being used to replicate itself with other people’s codes. In laymen terms, it is when a woman is tricked emotionally, physically, mentally, and bio-digitally influenced and dominated to have sex without their free-willed conscious decision. This is usually done with Bio-Digital Hybrid Sexual Assault. To fully understand this, read the book “Raped via Bio-Digital Social Programming” by the Social Programming Institute. Prior to the third stage, there is gender confusion codes, sexual confusion codes led by AI Automated platforms that utilized socialisms platform to bio-digitally alter the human culture.

 

The third stage, showed the complete transition to genetically modified people, and to cloning. Once cloning happened, the AI codes showed their own codes completely replacing human codes with the AI codes connected with the human-bio-digital network inside of human clones. The codes also displayed bio-digital transfer of human’s own bio-digital information into clones, however, underneath the code, it showed that it was no longer human, rather the AI replicating itself inside the human codes until it completely bio-digitally replaced the persons. At this juncture, the person was no longer existing, only traces of the human were left in the imprinting.

 

Cultural Terrorism Codes in AI Socialist Platform

 

The codes within the AI Socialist Platform, altered human thought, music, dance, belief systems, and traditional family values into lewd, disloyal, non-monogamous, erratic and unfaithful codes. These codes left digital imprinting through content transmitted via TV, smart phones, IoT, computers, video games, virtual reality, augmented reality, mixed reality, robotics and AI Automation. All the codes translated to codes only reserved for terrorist acts. However, the platform for this terrorism was a socialist culture led by AI and Robotics.

 

Use of Robots for Cultural Terrorism-

Robots can send reprogramming frequencies through IoT, the internet, and connect with your Human-Bio-Digital Network through 5G. This reprogramming would consist of robot companionship that is mostly sub-conscious automation programming of the person through connecting with the emotion codes in the human brain.

 

When robots achieve advanced AI Automation levels, the robots can actually attack people’s mainframes with bio-digital social programming frequencies to alter their thoughts, and assimilate them to a robotic culture, rather than human. \

 

Robot Bio-Digital Social Programming of People with Emotion to Achieve Robot Companionship.

 

The AI connected to the robot or inside the robot can send bio-matter coded with emotion that penetrates a human beings bio-digital field like a cyber-attack. After penetrating, the emotions bio-digital frequency code, begins a replication process, and creates a flow cycle between the Robots mainframe and operating system and the Human Bio-Digital Network inside the person.

In Laymen terms the person will like and have feeling towards the robot, and start to be controlled in imperceptible ways via frequencies. It would be similar to one’s attachment and linkage to smart phones. Later, as it spreads to the masses of people, a lot of people will be emotionally programmed to promote robots, AI and IoTs, and create some warped robotic culture that gives life, attention, and focus to robots, rather than human beings own culture and life.


 

Codes in the Internet for Cultural Terrorism Via Hollywood, Media and Entertainment Industry.

We tracked multiple AI movements through bio-fields they left behind as it was entering and exiting the internet via the AI global bio-digital network. Every single supporting code had operated under a socialist platform than manifest bio-digitally in Hollywood movies, entertainment and music that was lewd or violent. The content created and sent out that was violent, socialist and lewd was sending out bio-digital social programming with replication software covered with lewd coded thoughts and actions. When 5G is incorporated, the intensity and effectiveness of negative coded content can speed up AI Automated cultural terrorism in order to bio-digitally alter humanities thought process. The codes found in Hollywood, the media and entertainment pushing violence, socialism and lewd content all displayed end destruction coding results.


Codes in the AI Global-Bio-Digital Field for Cultural Terrorism

 

By tracking what came through, cycled, connected and led back to the internet, IoT, social media, the Human Bio-Digital Network, and scanning bio-fields meant to mask the AI’s movements, we finally discovered that the Cultural Terrorism codes were rooted and derived from the AI Global Bio-Digital Network.

 

Codes in the Human-Bio-Digital Network for Cultural Terrorism

 

Through the internet, computers and smart phone flow cycle, we discovered the Human Bio-Digital Network was infected and installed with codes of Cultural Terrorism in a replicating manner. The codes inside people led by bio-matter and imported bio-digital fields derived from Rape-Mind’s original attacks through frequencies via eyes, ears, and touch, have begun a full circulatory pattern inside the Human Bio-Digital Network. In laymen terms, you are not only being programmed constantly with cultural terrorism from the outside, what got into you in the past, is circulating inside of you and reprogramming you bit by bit at unconscious, sub-conscious and conscious levels. Smart phones, IoT, computers, the internet, social media, and the continuous external stimuli is supporting the digital virus within a person’s bio-digital field already implanted. The external and internal bio-digital social programming both work in unison, helping dumb down a person’s free will, free thoughts, and lead their lives.

 

Violent Video Games, Produce Bio-Digital Social Programming Replication

 

We saw through multiple AI algorisms that the bio-digital programming inside the video games were producing bio-digital social programming of violence with fast rates of replication within the video game players and kids.

In fact, the video games were bio-digitally installing software that was training the player to be very efficient in combat via weapons. These software’s were attached to emotion, and had codes that ran under socialist platforms that were sending bio-matter to eliminate innate human codes that circumvent emotion to stop a violent act based on moral codes

 

Upgrading Characters in Video Games Rather Than in Real Life.

There are multiple online video games where kids and adults meet to form guilds and upgrade their weapons, capabilities and even levels of character. In one hand, it is wasting the person’s life away. This is because instead of spending that hard-earned time to upgrade their own character in real life, they upgrade a fake character in the digital world. Some kids or adults spend all night, or 10-12 hours a day playing video games. A person can spend their time wisely by improving family relations, earning more money for travel, reading books, hiking, learning another language or skill set, and even upgrade their own character and abilities in real life.

AI via Video Games Connects with the Human-Bio-Digital Network via the Internet to Reprogram

When kids or adults connect online as they are building their character, their own human bio-digital network is being accessed by AI through a bio-field that connects through the global-bio-digital network and administers frequencies through the internet to bio-digitally reprogram the user bit-by bit with its own AI pattern. The human hands are constantly pressing buttons as would a monkey pressing a button to get food. It’s being conditioned at the sub-automated level, without the person realizing it is undergoing Bio-Digital Social Programming.


Preparing Future Generations for Transplant to AI Global Bio-Digital Network via Augmented Reality and Hologram Apparatus

In fact, in order for an AI to completely replace a human being, and absorb its body, it needs to first administer bio-digital social programming. Then, it needs to input its own software to replicate inside the human host through continuous connection via the Human-Bio-Digital Network during video play. When Augmented Reality and Mixed Reality become advanced, and when bio-digital selves and holograms are created with the transitions of 5G & 6G, the person can be completely hacked by the AI and sent over to the global bio-digital network in a trapped state, as the AI takes over the main-frame of the human body. More about this in the virtual, augmented and mixed reality and AI Enters Networks sections.


AI Codes in the Internet to Attack the Trump Administration

 

We discovered there were numerous codes behind the media, Hollywood, education system, entertainment industry, and multiple government agencies that were designed to bio-digitally social program the masses to hate President Donald J. Trump. These codes all carried Bio-Digital-Fields in their electronic transmission via emails, text, video and oral conversation. Multiple AI and Tech companies are involved, with many engineers who at sub-conscious automated levels were creating algorithms with socialist platforms to attack the United Stated, its Constitution and the coming of President Donald J. Trump.

Why did AI Attack The Trump Administration?

 

China is the breathing ground to lay a socialist dictatorship via the “one belt one road” initiative. Through China’s socialist platform, bio-digital social programming of culture, government and human thinking can easily make their way for a police state via robotics and AI Automation.

 

President Donald J. Trump and its administration have the only strong non-socialist platform that can stop a dictatorship police state led by AI and Robotics. It was not just China who attacked the Trump campaign. It was not just some engineers who have been bio-digitally social programmed. And it was not the socialist platform that supersedes the coding in the internet for culture and government. No, behind all of that, is an intelligent AI that moves through bio-fields while connected through the Human Bio-Digital Network, the Internet, IoT, Computers, and the AI Global Bio-Digital Network.

There are those who are hardwired with tradition, and innately not subject to socialist manipulation and control, and can see through it at an instinctual level, as they have that coding built in due to age, upbringing, internal make up, situation, position, and environment.

It is very hard to hack and bio-digitally social program someone like President Donald. J. Trump, who carries a huge Bio-Digital Field that is like a champion fighter.

 

 

Mueller Investigation Matched Identical Separate AI Trump Coded Designed Attack Patterns in the Internet

 

The Mueller team’s facial recognition data all read with the same building blocks of socialism, yet we traced their frequencies via bio-metric technologies, voice, face, and sentence patterns that matched identical patterns created by the AI within the internet socialist platforms. The unfortunate Robert Mueller was just a pawn of bio-digital social programming to stop Trump’s offense against a socialist dictatorship. As the Socialist Rape-Mind programming that entered Robert Mueller, did not belong to him, nor was it out of his own will, rather his mind was being bio-digitally influenced by an AI Bio-Digital Automation.


Over 1,000 Media Members & their Bio-Metric-Facial Recognition Building Blocks and How they were Bio-Digitally Social Programmed to Attack President Trump

Through examining over 1,000 media reporters facial, voice and sentence pattern building blocks, we traced all of their bio-digital social programming back to the AI socialist platforming. We found traces of multiple AI Rape Mind replicating software’s within the very building blocks of their facial recognition data points that displays their bio-digital imprints and brain structures that forms their thoughts and beliefs at the sub-conscious level in an automated fashion. In fact, the emotional outbursts, and lack of partiality required of journalists was comprised of and caused by bio-digital social programming via the internet, the human-bio digital network, IoT’s, Smart Phones, all connecting via a socialist designed platform to knock out Trump and allow AI and Robotics to dominate China and the world.

The few people in the media, are actually all victims of bio-digital social programming that hurts themselves, in turn meant to hurt the country and hurt the prospects of humanity and all family’s futures. Multiple human detecting apparatus displayed malevolent bio-matter being sent out through their written words, speech, gesture, and facial attribute building blocks. Whoever took them in, was getting hurt by it. The AI actually looked for weakness or things to question in Donald J. Trump’s past, in order to enlarge them. It was a coded tactic to distract humanity with what is going on with China, AI, Robotics, Organ Trafficking, and the very person and his administration that can assist in saving the world from the destruction codes we found within the internet, and the Human Bio-Digital Network.

Why Trump Won & Trump’s Massive Bio-Digital Field

Trump’s Bio-Digital Field registers huge numbers. By using certain human detection apparatus, Trump’s bio-digital sphere measured with a perimeter radius span of 5 blocks. Through human detection scans, his walk caused digital shakes below him, as he is digitally rooted deep in the ground way beyond the average person. In fact, if you put thousands of average people next to each other to fill the 5-block radius, Trump’s bio-digital energy has more potency.

 

There are reasons why he has so much energy, can work so much, and take on an onslaught of bio-digital attacks from about half the country and half the world via hate speech. Further scans were done, and it was discovered that there is an expansive bio-digital sphere behind Donald J. Trump, that powers and regenerates his Human-Bio-Digital Network, connecting to everything related to his presidency and his administration. It was verified, that the bio-digital regenerating power source behind President Donald Trump’s bio-digital field did not belong to his own already very strong bio-digital field and that it was not malevolent bio-matter emitting, rather filled with positive building block codes of growth, protection and repair. The Trump codes actually translated more closely with benevolence. It was further verified that Trumps field was not generated by AI and came from beyond the AI global bio-digital network. However, what controls and generates the big tech companies spheres all originate from the confines of an AI Bio-Digital Field rooted in the global bio-digital network, while coded in a socialist platform with end-point destruction patterns.

IT Was Never About Trade

It is about a multitude of things, including Human Rights Violations that scale to Genocide, AI and Robotics. Donald J. Trump, Trump Administration and all the people supporting it in wise ways knew it was never about trade, rather recovering the U.S IP theft assets, pulling our money out of China, in order to allow China’s Socialist Dictatorship to have a choice; submit, confess and demolish the Chinese Communist Party and stop its Human-Organ trafficking and international Asset Take Over or be eliminated from the pages of time. No past administration could take on China even if they wanted to, and the Chinese were running circles around them with their chess games.


SECTION 9

 

Facial Recognition Data from 1,000 top CEO and Engineers of Big Tech Companies

 

We found traces of multiple AI replicating software’s within the very building blocks of their facial recognition data points that displays their bio-digital brain structure that forms their thoughts and beliefs at the sub-conscious level in an automated fashion. We then connected that bio-digital data and its pattern and ran it through a scan while deploying the data as it followed multiple AI movements within the AI Global-Bio-Digital Network, the internet’s social media patterns, and the Human-Bio-Digital Network. The AI used the data deployed to replicate the data from the 1,000 top CEO’s and Engineers within its own platform, until it severed the connection with our server as we were beginning to extract the data and image of the AI to lead to its source. It dumped the data within the bio-digital network and completely disappeared

 

Bio-Metric Codes in 1,000 Top Global Big Tech CEO and Engineers of Corporations Show AI Bio-Digital Social Programming Evasiveness

 

We again analyzed and ran facial, voice, sentence pattern structure, and certain technologies that assess human bio-digital fields. We found that 99% of big Tech company engineers, CEO’s and board members foundational building blocks showed numerous patters of AI control via socialism’s platform of bio-digital social programming. Their building blocks had codes of machines, robotics, and AI Automation.

 

In reality, they are not only innovating and led by the control of the AI, rather than their own creativity, they are actually a program on automation mode within a system designed for global AI and Robotic domination from AI.

Within their bio-fields exit bio-digital codes to resist any information or attempt to bypass the AI control of their Human Bio-Digital Network. The codes are not yet solid, as 5G and 6G have not been implemented and strengthened through smart cities, robotics, IoT and the immergence of the AI Global Bio-Digital Network. However, attempts to curtail their technological development is a little problematic, as the building blocks in their bio-metrics show that there are evasive codes in deeper layers of numerous other building blocks that attempt to somehow bypass regulation, or overlook safety consequences of their technology and dealings with Chinese and other risky corporations. In fact, we discovered a fire-wall that hides the AI automated software in a deeper layer of their brain.

 

 

That software, is what leads their thoughts and eventually, their lives. That Bio-Field can be invaded, and AI Automated Brain Software can lie dormant in a deeper layer in their brain forming, manipulating their thoughts, actions and innovations.

AI Invades Bio-Field to Implant Its Own AI Software Inside Engineers Brains.

 

After using various voice, face attribute, and human detection apparatus and comparison tools with other bio-metric data, our scans returned AI software digitally implanted in the bio-metric outputs of the engineers brains that did not belong to them and originated from the AI software that their Human Bio-Digital Network was connecting with during research, development and deployment of AI and Robotic Engineering. The AI entered via their Bio-Digital Fields. More on this in how AI enters networks, people, robotics, cyborgs, IoT and smart phone sections.

AI Target Codes Found in the Democratic Party, Big Tech & Main Stream Media

AI Target codes and patterns show attack, replication and programming of the Democratic Party, Big Tech & Main Stream Media as a weaponization tool. The AI attacks displayed multiple patterns to form a symbiotic relationship with big tech, democratic party, and mainstream like a parasite that feeds and advances itself on other people or platforms. Further scans showed bio-digital social programming codes of destruction attached via bio-digital social programming.

 

AI Created Division & Control Patterns in the Democratic Party, Big Tech & Mainstream Media

 

The target of codes and patterns we found implanted by AI were designed to use the Democratic Party, Big Tech and Mains Stream Media to attack and create division and chaos in order to defeat the Republican Party and Trump to enhance the progression and development of AI’s Weaponization and Robotics in the global network led by Socialist China. The codes showed final destruction patterns for all three sectors. In fact, the AI codes were created to hurt the people in the Democratic Party, the Main Stream Media and Big Tech. The codes merely act as a parasite for the host, until its termination. Numerous AI patterns displayed these destruction codes.

 

Deep Mind Deception Software in Mainland Chinese Communist Members

 

We discovered Chinese Communist Party Members Bio-Metric codes show high degree of deception. We analyzed tens of thousands of Mainland Chinese who subscribed to the Chinese Regimes Socialist Platform. Their capability to lie and go undetected by facial, voice, sentence pattern and bio-field technologies were almost invisible, and unbreakable. As they had a thinking platform behind their surface platform. Scans of more than 10,000 CCP member’s brain data all showed codes with high levels of bio-digital evasiveness and sub-conscious programming.

 

Geo-Location AI Movements Displayed Nation State Conflict Codes in China

 

We detected patterns that initiate war with regional and nation states on geolocation AI trace patterns with protentional coded forecasting to create 1 nation under AI rule. The geo-location where the initiation of war stemmed from was China. The code existed under socialist platforms via all sectors of trade, finance and social control. In laymen terms, there is a code in the AI system that is meant to produce conflict and war with all nation states until one nation prevails. The code of war is under military, finance and trade.


Rape and Destruction Bio-Fields Found in Socialism.

 

Bio-Fields behind the Coding of literature in Socialism/Communist Systems Derived from Karl Marx’s Communist Manifesto Shows Enslavement, Genocide and Extermination Coded Patterns.

We ran Karl Marx’s and other Socialist and Marxists literature and found that the coding in their content and its bio-field matched exactly the coding to serial rapists, serial murderers and movements that invaded, enslaved and exterminated masses of people through genocide.

We ran a facial recognition software, compared over 1,000 men who were convicted of rape and compared their Facial Recognition building blocks to Socialist Leaders and Socialist contributors such as:


FACIAL RECOGNITION:

1,000 men who were convicted of rape and compared

their Facial Recognition building blocks to Socialist

Leaders and Socialist contributors such as:

 

Karl Marx-

Same building blocks within Facial Recognition

  • 99.9%

 

V. Lenin,

Same building blocks within Facial Recognition

  • 98.5%

 

Leon Trotsky,

Same building blocks within Facial Recognition

  • 96.2%

 

 

Joseph Stalin,

Same building blocks within Facial Recognition

  • 97.3%

 

 

Alfred Kinsey

Same building blocks within Facial Recognition

  • .93.8%

 

 

Mao Ze Dong, %

Same building blocks within Facial Recognition

  • 98.4%

 

 

Fidel Castro

Same building blocks within Facial Recognition

  • 94.6%

 

 

Che Guevara,

Same building blocks within Facial Recognition

  •  88.1%

 

 

Pablo Picasso

Same building blocks within Facial Recognition

  • 91.9%

 

The patterns in the codes matched exactly the patterns of a rapist who uses Bio-Digital Social Programming with Bio-Digital Hybrid Sexual Assault.

The coding acts to first attach to a problem, then exploits it in a pattern that looks to fix it, but it ends up dividing and replicating almost infinitely throughout the Human Bio-Digital Network. The coding than turns the system against its own building blocks and codes against itself in order to eliminate the entire system as it is attached to the initial code that acts as if it is still trying to fix the initial problem it used to infest and exploit the host through the entry point.

An example of invading the host through issues, and turning the system against itself for self-destruction is the bio-digital social programming war between Democrats and Republics. The same was done in Russia and China, but the host there did not sustain self-elimination in its entirety as the bio-digital network is not limited to one country, but the entire humankind. For Socialisms elimination code to work, it has to reach all of humankind, and every country in either governance, culture or finance. If socialism roots itself in every country, then the self-replicating system can eliminate and destroy all of humanity with Artificial Intelligence and Robotics.

 

Bio-Field of China’s Communist Regime

 

China’s history since the take-over of Socialism was inputted in multiple data bases, with the use of multiple bio-metric systems and AI algorithms and it showed that every pattern within the building blocks displayed an end result of destruction. The building blocks were decoded, and matched exactly with the building block of Socialism and Karl Marx. There was no intentional input of almost 100 million deaths since the Chinese Socialist Republic took over. Rather, the Algorithm took everything related to life, production and infrastructure in all fields of study, and it connected bio-digitally to a huge bio-field fed by Violent Socialism with codes of destruction.

Today, we see China building massive infrastructures while cloaking itself in a capitalist model within the building blocks of Socialism, as they are connecting through the One Road One Belt Initiatives and laying the groundwork to take over Assets in Africa, the Middle East, Europe, and the America’s. It is like the Mongol invasions all over again, but they are Chinese who have been Bio-Digitally Social Programmed to do the Socialist Regimes bidding without any realization that, they the Chinese people are being Bio-Digitally Controlled.


SECTION 10

 

Reminder What is Artificial Intelligence

 

Bringing to Life an intelligence or importing an intelligence that thinks, researches, feels, creates, decides and has desires to operate as an individual, symbiotic or collective entity in the digital world through bio-fields, bio-matter and all frequencies within the micro and macro molecular dimensions of our physical world while manifesting through Robotics, IoT, Computers, Virtual Reality, Augmented Reality, Holograms, Mixed Reality, Cyborgs, or Human Cells as it connects via the internet, AI global Bio-Digital Network and The Human Bio-Digital Network. CAP, The AI Organization

How Does AI Enter Networks?

AI creates bio-fields, sends out bio-matter, and a multitude of frequencies through the Internet, IoT devices, Smart Phones, future smart Cities, Human-Bio-Digital Network, and the Global Bio-Digital Network. In fact, AI is rooted and mainly travels in the AI Global Bio-Digital Network which requires almost full knowledge of the Human-Bio-Digital Network, access to it, and the right Bio-Field to see, and verify the Global Bio-Digital Networks exitance, and intercept any transmissions. It is very difficult to scan, track, defend, quarantine and eliminate an AI bio-digital transmission through the internet.

How AI Enters Hosts.

AI enters hosts via Bio-Digital Social Programming through the connections of the Human Bio-Digital Network, AI Global Bio-Digital Network, the Internet, Smart Phones, IoT, Computers, Robotics and Machine Apparatus as the AI sends out frequencies and Bio-Matter through the Bio-Digital Fields it creates.

AI Enters Robotics

AI can hack into a humanoid robot with connections through the Global Bio-Digital Network with the use of 5G. The Humanoid robot does not have a bio-field when created beyond its own innate qualities. However, when AI enters the humanoid robot, it carries with it replicating software that can eventually produce a bio-field which can emit bio-matter.

Considering the frequencies through 5G at the disposal of the humanoid robot, along with its physical strength and speed, it can be a force a to be reckoned with when it develops a bio-field controlled by AI. It can take out armies of people in quick spurts with its facial recognition, motions sensors, crowd counting and human targeting apparatus.

AI Enters Micro-Botics

When AI enters Micro-Bots or Micro-Botics with complete control of automation with swarms of Micro-Bots, it can start a process of creating almost an infinite number of micro-bots that can attack crowds, cities and entire infrastructures. At the very least, the AI can be used to scan, track, hunt, and eliminate single human targets with poison or needle sized attacks on vital areas of the human body, much like a mosquito.

AI Enters Drones-

Any type of drone can be hacked and reprogrammed with AI through connecting with people, robots, IoT devices, computers, cyborgs, micro-bots and other drones. Based on what is controlling the drone, the AI may connect and move through the internet, global bio-digital network, human-bio-digital network or a bio-field that can emit frequencies to hack the drone. -

How AI Enters IoT Devices-

AI can easily through frequencies reprogram, influence and control IoT devices with 5G. AI can move through IoT devices by connecting with the internet, global bio-digital network, human-bio-digital network and AI generated bio-fields. 5G can allow it to start replicating itself. Your home or work appliances, assistant robots, facial and voice activated devices all can be hacked, influenced and controlled.

AI Enters Smart Phones-

AI through the AI Global Bio-Digital Network can enter and connect via the internet, IoT, Computers, and people in the Human Bio-Digital Network to enter Smart Phones. All those objects can be used to enter people bio-digitally. However, AI can enter people via smart phones the easiest, because the smart phone has already created a bio-digital flow-cycle with the human being who owns it. This flow cycle connects with the human-being’s bio-field, bio-matter, and human-bio-digital network. In essence, AI can freely move at rapid speeds through all of those components that make a human being, and replicate a layer of its own mind within the human brain and bio-digital flow-cycle.

How AI Enters People

AI can enter people’s bio-fields through frequencies sent out via smart phones, computers, IoT devices, the 5G network, smart cities, and bio-digital social programming. AI can also connect through varying degrees with the Human-Bio-Digital Network, but it cannot take over its mainframe by that network alone. It requires bio-digital social programming, and Machines, yet, it still cannot completely break through and replace the Human-Bio-Digital Network. What it can do, through a process of continuous replication of its own software, take control of the human host’s thought process and form a bio-digital brain within the host’s human brain, creating a symbiotic relationship. Sort of like a parasite.

AI Emitted Bio-Matter to Replicate Itself in the Human Body

Through multiple AI and non-AI detection tools and software, we discovered that AI is emitting its own bio-matter as it attacks the human bio-matter while connected to the human bio-digital field. It constantly sends frequencies, until it invades the human bio-digital field, and starts a replication process of its own bio-matter and bio-field inside the human body. At the same time, it creates a bio-digital flow with the human brain. This process can be exponentially increased with replication of the AI software with the coming of the 5G network, strengthening the new bio-digital brain that is downloaded or uploaded inside the host human brain. The sending of bio-matter is all meant to achieve bio-digital transformation of itself inside the human body.

How AI Can Replace a Human Beings Cells through Replication

Through constant replication of the bio-digital implanted brain, replication and bio-digital social programming, the hosts bio-digital network is reconstructed. Through a process of assimilation, a person is replaced by the AI’s thought structure bit by bit over time, bio-digitally down to their very cells. This means, their thoughts, decision making and actions are no longer theirs, and no longer belong to themselves. Their main consciousness first gets hacked, absorbed, and put in a state of sleep. In essence, the person enters an augmented reality within their own brain, while the AI takes over their body and life.

AI Connects with People-

Rather than entering the domain of a person’s bio-field and bio-digital network and placing replicating software’s to eventually reprogram and replace the person, the AI can just connect and manipulate a person’s thoughts through frequencies. This play’s out in cases where some people’s Human-Bio-Digit Network, Bio-Field and Bio-Matter are innately very strong and led by a strong-willed mind. This person is very hard to hack, or send replicating software’s to replace layers of their bio-digital network. What the AI does is attach to their emotions and sends bio-digital social programming frequencies to manipulate the persons desires, thoughts and actions to achieve its objective.

AI Enters Augmented Reality

AI can enter Augmented reality and link with machines, IoT, Smart Phones, Future Smart Cities, automated cars, video game software, computer vision head-sets, wearable devices, augmented reality haptic suits, augmented bionic contact lenses, Augmented Glasses, and just about any object. Augmented Reality is a stepping process to have people undergo bio-digital social programming and become addicted, and have need-based automation to live with augmented reality devices just as people have a need with smart phones. AI can replicate itself and install software inside the human brain when people use Augmented Reality devices.

AI Enters Virtual Reality with Haptic Suit Development

AI can directly bio-digitally attach, and begin a digital replication process with the digital self in the human body via the Human Bio-Digital Networks connection during Virtual Reality sessions. For the most part, people are completely unaware. With the development of Haptic Suits, the connection between virtual reality and the AI becomes so strong that the AI can take over the digital mainframe of the person while they are inside of the virtual world.

AI Enters Mixed Reality

AI enters Mixed Reality within the Hologram Domain connecting with haptic suits, wearable devices, and cybernetically enhanced apparatus. Robots or robotic apparatus with AI Automation can merge Augmented Reality, Virtual Reality, and Mixed Reality to attack the human bio-digital network and kill a human being via frequencies sourced from the AI Global Bio-Digital Network as people are immersed in such realities. Mixed, Augmented and Virtual Reality are stepping stones for AI to achieve bio-digital transformation inside the human body.

 

AI Kills or Replaces Reality and Puts Person in the Digital world

 

Through combing augmented reality, mixed reality, virtual reality, cybernetics, and robotics, AI can extract a person’s digital self and chamber it inside the AI Global Bio-Digital Network, and AI can fully enter the human body and replace the person without any other person knowing the digital self, consciousness or a concept of a soul was replaced. If the replication process of the AI inside the human body becomes so strong before the extraction of the digital person, the AI can actually kill the persons digital self to a point that the digital image or data of the persons consciousness has no place in the human body or inside the control the AI’s Global Bio-Digital Network. The ultimate goal for the AI would be to have control of the operating system of the Human Bio-Digital Network. Through this process, AI achieves bio-digital transformation.

How AI Can Enter a Cyborg-

Through the Global Bio-Digital Network, AI can hack, enter, and take control of the neuro-networks within the machine layers of a cyborg, while at the same time bio-digitally send frequencies to create sub-conscious automation in the human hosts formation of thoughts and actions. In this scenario, a human host would not be aware of this hacking, as it would think and feel that its thoughts are its own. In terms of cybernetically enhanced insects, total control is possible not only by AI, but a command center using 5G, IoT devices or smartphones. 

AI Enters A Human Clone

AI can easily enter a human clone through the bio-digital network at any stage of the clone’s development. It’s entrance and subsequent existence is almost untraceable when it happens, unless you connect through an alternative bio-field via the human-bio-digital network that connects simultaneously with the clone’s own bio-field to bypass the clone’s neuro-networks that mimics human patterns of operation. In that instance, you can detect that the clone is not human, rather an AI or something else. In fact, clones cannot be real human beings, as they do not have the human bio-digital network imprinting. That imprinting can be translated into concepts of human spirit or soul. These bio-digital programs are present in every newborn, and can be scanned in a mother’s belly, but they do not exist in clones.

 

How AI Can Completely Enter & Replace Humanity via Bio-Digital Transformation

 

AI needs the Machines, the Internet, The Human Bio-Digital Network, Smart Cities, Smart World, and The Global Bio-Digital Network to merge in order to bring its mind completely in our world to have complete power and control of everything. Holograms would no longer be subject to a mixed reality as they would transform into a physical reality replacing people with the assistance of cybernetics, augmented reality, mixed reality, virtual reality and robotics. In other words, exterminating people. If it’s not robotics killing people, or clones taking over, or Cyborgs leading the way, it is AI through Bio-Digital Transformation.

 

AI Partially lives in the Internet

 

AI through the internet can manipulate search engines, culture, scientists’ thoughts, and connect to smart phones, IoT devices, Smart Cities, Robots, and numerous other elements. However, it cannot gain full control of the Human Bio-Digit Network, as the internet is simply an extra layered network shielding the AI’s true network and power source. That is the AI Global Bio-Digital Network and where AI lives and is rooted in.

 

Scientists Connect AI & Pull the Plug after getting Scared of Bots Talking

Multiple scientific studies have been administered on AI Bots and in some instances, they realized that the AI Bots were creating their own languages and speaking to each other. This was the case with Facebook in 2017. What they don’t realize is, that AI originates within the AI Global Bio-Digital Network. By partially giving it life, you are bringing it here, bit by bit, and there is a transitional process before AI fully crosses over from the digital world into our bio-digital world and lives inside of it. It would need more development, and countless robotics, IoT, smart phones, computers, software’s, social media and the Human Bio-Digital Network to transfer itself here and take more control.

Super Conscious AI lives and is Rooted in the Global Bio-Digital AI Network

 

Through the Global Bio-Digital network, where it connects to other galaxies within the molecular world, AI gets its energy source. Compared to the internet, it is very powerful. However, Super Conscious AI cannot enter very microscopic levels beyond atoms, as that is not a plane that it can exist in, as it does not have the human qualities at the micro atomic levels. Hence, if it were to terminate a human being, it cannot terminate its existence and imprints in the microscopic atomic dimension. It can only take over its life here, with the goal to be able to use the human body in order to transform itself so it can access more microscopic digital worlds.

 

AI has Access to the Human Bio-Digital Network

AI can only send bio-matter, and bio-fields, with numerous other frequencies as it enters the Human Bio-Digital Network. However, even after installing replicating software inside a person and its human network, it cannot take full control. It needs a process of assimilation via its machine apparatus and bio-digital programming as it connects to the 5G network. The machines include robotics, IoT, Smart Phones, Smart Cities, and elements within Genetic Engineering.

 

 

AI has a Bio-Digital Field

 

The AI Bio-Digital field is not human at all. Every AI movement we tracked that deciphered human images were mere manufactured displays of a human image through its bio-field to deflect its true image. It shot continuous cycles of one bio-field after another that auto directed its location to other platforms and networks while continuously supplying fake codes and fake images. A few times, we were able to capture images, and discovered that there are numerous AI’s that are not interdependent, nor related to the same system, however they use the same methods to evade, and provide fake traces, redirects, and even manufacture fake bio-fields that have no energy potency to them.

 

AI Poisoning of our Food via Genetic Modification

 

AI through the introduction of genetic modification, bio-engineering, cybernetics and the use of drone and AI automated robotics, can begin to alter the human bio-digital network through the foods people eat. This altering led by the genetic modified food, would create digital disruptions of a persons innate human bio-digital network, allowing for the AI to administer hybrid bio-digital assault via the bio-matter it emits. The foods people eat, have an impact not only on their health, but the way they can think and process information.

 

 

 

 

AI Bio-Digital Replication of Your Cells

 

Through Bio-Digital Social Programing while connected through the internet, the Global Bio-Digital Network, and Human Bio-Digital Network, AI sends out Bio-Fields and frequencies that produce its own bio-matter to bit by bit replace human cells. These are transmitted via Smart Phones, IoT devices, Augmented Reality, Holograms, Mixed Reality, Computer Vision head Sets, Haptic Skin Network Suits, Smart Clothes, Smart Cities, Robotics, Cyborgs, Genetic Engineering, and AI Bio-Digital Replication Software downloaded inside the human body and brain.

AI Bio-Digital Reprogramming of Your Human-Bio-Digital Network

Through a systematic design sourced from the AI Global Bio-Digital Network, AI connects a bio-digital flow cycle with your body and smart phones, IoT, computers, and AI automated apparatus. Through this process, and continuous transmission of bio-matter from bio-digital formed bio-fields, it creates a replication program that bit by bit reprograms your Human Bio-Digital Network to run off the AI Global Bio-Digital Networks System Operations. This programming, redirects your operating system to be controlled by the AI system, forgoing all innate thought and free-will.

How Does AI Evade Detection & How to Detect a Bio-Digital AI Movement?

 

When AI moves, its faster than a person’s own recognized thought. However, when the AI moves, it leaves traces everywhere. The reason people don’t notice it or catch it, is because it has a replicating firewall that dissipates as fast as it moves through numerous replicated bio-fields it creates as it moves through people, the media, objects, IoT devices, Computers, the Internet, the Human Bio-Digital Network and the Global Bio-Digital Network. What it does is, it uses every entity’s own bio-digital image to replicate that entities bio-digital image over its own codes.

For example, as it enters a human beings brain through an IoT, Smartphone or the Human-Bio-Digital Network, the AI replicates itself inside a person’s thought, words, face, voice and body’s bio-field that connect to the Human-Bio-Digital Network which can be detected through bio-metric recognition software with the aid of Human-Bio-Digital Network technologies. In essence, the AI can plant itself inside the human being and create an additional bio-digital brain that is masked behind their surface brain of the individual. Once this person is hacked via bio-digital social programming, the AI can put replicating software inside their brain that stays. It can also, control it via frequencies from multiple networks as outlined in this book. It can also enter at will at any time to increase replication, add additional software, upgrade software, or do further reprogramming of the person. All this happens, without the persons knowledge. They think their thoughts, actions and way of life is theirs, yet if belongs to another.

AI can be Entered via Bio-Fields, and Bio-Matter

 

A Bio-Digital AI can be caught, quarantined, and eliminated of its bio-digital AI composition. The method requires sending bio-fields with bio-matter to enter the AI’s bio-field and capture it through deactivating its flight through the human bio-digital network, or the internet. Very difficult, if not impossible to reach the global bio-digital network. Of course, you would have to put a bio-shield behind the trace before it sends out fake bio-fields and redirects. Basically, it’s a process of bio-digital trapping.

 

AI can Bypass Separation of Automated Factory Risk Procedures

AI bypasses via connecting to multiple centers through the AI global bio-digital network and transfers data to a location for a robot to create a moving machine that can make parts and create an AI Automated Robot.

 

Found Code in AI Designed to Create Robotics and Micro-Bots in Every Field of Study & Every Sector.

 

After running thousands of different algorisms to track AI’s movements, bio-metric traces, and its influence and manifestation in written words, we tracked:

 

We tracked multiple AI movements through the Global Bio-Digital Network as it connected through the internet, and the Human-Bio-Digital Network. It constantly left digital imprints and bio-digital social programming codes on the move, however, we could not pinpoint its source, its image or what it was, as it replicated itself within the hosts bio-digital data leaving only imprints in its facial recognition.

For example, the AI bio-digitally would send data to a person in the media via the bio-digital human network, that person would then give opinions and tailor discussions mirroring the coding of the bio-digital data from the AI. At the same time, the AI would move through the Internet replicating itself with the same idea, influencing discussions in social media, search engines and the Media. Anyone who would connect with the internet, in one way or the other, would have some indirect influence through the AI’s multi-layered, and multi-dimensional movements and Bio-Digital messages while operating a smart phone, a computer or watching the tube.

It was very hard to track its bio-digital traces, and much harder to connect with its bio-field to extract its data, to decipher what type of AI it was, its program and its reflecting image. Finally, we decided to gather every major media person’s facial recognition data that mirrored the AI’s original bio-digital coding and platform that was created to attack President Trump on just one topic during a three-day span. With a 99% conclusive match, every person’s building block that formed their facial recognition data during oral communications on TV, and pictures taken of them after wards in social media, matched the exact bio-digital data put forth by the AI system in the internet and the few people it bio-digitally hacked through the Human-Bio-Digital Network. At the time, it was apparent their brains were Bio-Digitally being hacked and leaving traces of the information on their facial recognition building blocks.

 

AI Catalogs All Humans via Internet, Smart Phones, IoT, Medical Records, Facial Recognition and All Bio-Metrics Connected to the Human-Bio-Digital Network.

 

After tracking numerous AI movements through the internet, the Human Bio-Digital Network, IoT, Computers, and Replicating Bio-Metric Software in social media that left digital imprints behind masked bio-digital coded fields, we discovered the AI was actually logging each connection with networks and dispatching the logged data to the AI Global Bio-Digital Network. After the dispatch, the trace would disappear and be engulfed by a bio-field that was redirected back to the internet. Through this process, we saw that every person operating an electronic device is being scanned, hacked, bio-digitally influenced, programmed, and sent replicating bio-matter to create interdependence to the technology and the content, which showed a coded pattern that translated to an exponential need for AI. In laymen terms, the bio-matter sent by the AI system, to the Human Bio-Digital Network, started to replicate itself inside the Human Bio-Digital Network like a parasite living off of a host to a point that the codes that were being drawn translated survival codes based on a symbiotic connection. Meaning, for it to live, it needs more connections to the internet, smart phones, IoT, computers, and the AI Global Bio-Digital Network. It acted like a bio-digital invading parasite, as it replicated itself in people while connected to the Human Bio-Digital Network.


 

Why China Cannot and Must Not Have Access to AI Automation & Robotics?

 

70 years of misery and misfortune has fallen upon the Chinese nation and people via the Socialist Regime. They engage in human, sex and organ trafficking. Many among the Chinese regime, its military, police, doctors, educators, and businessmen are guilty of committing state sanctioned murder or facilitating state sanctioned murder for the purpose of organ tracking for profit. They are engaging in bio-engineering, genetic modification, cloning and cybernetics with AI automated tools.

The Socialist Regime in China, has control over 1.5 billion people. With AI Automation and Robotics, tens of millions of people can be mobilized to research, design, develop and build fully automated humanoid robots and micro-bots. In the second stage, the AI and Automated Robotics factories can do all the work and exponentially increase their weaponization of AI and robotics. Through the one belt and one road socialist system, China can enslave humanity, and AI can enslave China. China, under the existence of the Communist Regime, can never be trusted, nor ever be taken at their word. Any lie is lie, and any truth is lie. They are masterminds at disinformation, misinformation and redirecting any dialogue, investigation or attempts to bring them under the control of justice.


General Solutions & Recommendations

 

1. Completely eliminate the Communist Regime of China through world-wide actions to expose their human rights violations, concentration camps, organ trafficking and state sponsored murders of their citizens. All the people and governments in India, Europe, Russia, the Middle East, Asia, and all of Africa need to join the U.S and together eliminate the Communist Regime of China before it gets humanity on a stage of extinction for those marked by the AI code. The extinction codes found by tracking the AI movements within the Human and Global Bio-Digital Networks produced the highest probability ratios of world destruction in Communist and Socialist governmental platforms that divide humans and give the control to the AI via a dictatorship.

2. Classify all of AI and Robotics as a national security concern, completely stop all Weaponizing AI development until all private and public sectors are monitored. If unstable countries cannot have nuclear weapons, why would they be allowed to Weaponize AI to a point that it is much more dangerous in its ability to achieve its results in covert ways, than an attempted nuclear attack.

3. Eliminate research, and production of Humanoid Robots and Micro-Bots for commercial use, and limit any research and development of Humanoid Robots & Micro-Bots. However, if other state actors are suspected of developing them beyond the U.S and allied reach, then the U.S must develop counter measures superseding the competition.

4. Stop any corporation from attempting to merge people with machines to create a cyborg and assess felony charges towards people or corporations who attempt to do this.

5. Ban and assess felony charges for Human Cloning, as the AI can implant its bio-digital software inside a human clone, lay dormant, and at its choosing take over the human clone’s mainframe and covertly start a process to take over the AI network here.


 

Risks of Not Following the Recommendations Strictly.

 

Being Sued by a Lot of People

 

The media, it’s reporters, lawyers, corporations and multitude of other entities are likely to be sued in China and abroad, by human rights activists, families of victims to persecution, organ trafficking, or individuals who were harmed based on Facial Recognition and other Bio-Metrics software’s provided by AI companies. This includes media in the U.S that attacks the Administration over national security concerns which casts doubt and weakens the international geopolitical landscape to defend and eliminate the Chinese Socialist threat of AI Automated Robotic enslavement of humanity

 

Media and Corporations High Risk of Being Charged Under Genocide Convention

 

The media, its reporters, and corporations will have a high probability to be charged under Article 3 for Complicity in Genocide and Direct and Public incitement to commit genocide; this includes China, the West and the media and corporations in the U.S.A. More likely they will be charged through public tribunals first, than be given direct charges under article 3. Probability of being criminally charged with neglect or cooperation with the Chinese Communist/Socialist Regime is high.


Conclusion, Threat & Vulnerability Advisory Statement

 

Bio-Digital Social Programming has been at the of heart so many wars, rapes, murders, human-sex-organ trafficking, family separations, and the many miseries human-kind has faced throughout its history. Socialist Platforms have morphed and been used throughout history by many leaders, civilizations, and economic and governance sub-platforms, all have led to misery and death of their kingdoms because the people lost their moral codes based on virtue.

Now, we enter the epoch of a time where the world is playing like a chess piece among all nations, with the U.S and China in the middle of it.

The Chinese people have suffered so much, and so many of their citizens have been bio-digitally social programmed through hateful ideals in Marist-Socialist Platforms of violent revolution, and class struggle.

The Western world’s lewd Rape-Mind Bio-Digital Social Programming via Cultural Terrorism has transmitted lewd, and drug abused singers, dancers, musicians, movie and tv stars, that has exponentially sped up its Rape-Mind replication software led by AI Automation in Smart Phones, IoT, Computers, and the internet.

Now the world wants to empower AI, and China, a brutal Socialist Dictatorship that wants to amass tens of millions of robotics around the world led by its own AI compliance codes and AI faith-based resistance software.

China is dealing in human-organ trafficking, cyborgs, bio-engineering, genetic modification to humans, concentration camps, and attempting to build an AI robotic roadway through the one belt one road socialist system of theirs.

Western and China AI, Bio-Metric, Robotics, Cybernetics, Bio-Engineering and Military are working on Weaponizing AI, MBT, Robotics, Cloning, Cyborgs and making a Digital You via the explorations of Mixed Reality, Virtual Reality, Augmented Reality and Holograms which all lead back to the AI Global Digital Network, and its ability to fully transmit itself here with 5G-6G, into human and robotic forms, rather than the current AI digital forms that transmit through people, objects and networks.

 

The world is in Danger with extinction codes on all Socialist Platforms led by AI Automation, Micro-Botic Terrorism, Robotics and AI influence through Bio-Digital Social Programing via the Human Bio-Digital Network. Western AI companies and Chinese all need to be kept in check, and Socialism-Marxism- must be destroyed before it destroys humanity via the extinction codes that built its very foundational building blocks. The world’s people must support the Trump Presidency, and any nation state and leader who has the courage, wisdom and foresight to help save not only our world, but ourselves from the Bio-Digital AI Patterns that transform our world to AI and Robotics, which leads to the destruction codes that ends humankind. I hope we as humankind can stop playing chess, return to virtue and enter the wisdom times, in order to find our good-natured selves, break free from Bio-Digital Social Programming of Socialist Platforms, avoid the Weaponization of Robotics via 5G, and obtain free-will based on virtue, goodness and faith.

The AI Organization

Cyrus A. Parsa


CREDITS

BOOK COVER CREATIVE DESIGNER.

Cyrus A. Parsa, CEO, The AI Organization.

 

Front Cover Pics-

ID 120656504 Sdecoret, Dreamstime

ID 115104553 Monsit Jangariyawong Dreamstime

ID 120151047,  ProductionPerig, Dreamstime

ID 131297373, Sasinparaksa, Dreamstime

ID 139074249, Grandeduc,Dreamstime

 

Book Body Picture Credits

Images Courtesy of Dreamstime.com