91 [Who is responsible to the radiowave]: The intelligence community rules the electromagnetic manipulation

There are many conspiracies and assassinations triggered by the radiowave, but we have no clue which incidents were caused by the electromagnetic operation. There were some cases almost certainly operated by the radiowave manipulator, though they were not 100% proved yet.

If one of them was perfectly sure, the electromagnetic wave capability can be open to the public, but the reality is not yet to be. These damages were hard to be proved, which is one of the reasons why the wave has not been officialized yet. Additinally, the intelligence community has tried quite hard to hide their capability to manipulate the people through the electromagnetic wave irradiation.

However, this technology is actually deployed to affect the important political event. The radiowave might be used as a supplement to the overall operation and should be the center of operation for some time. In either way, this is not solely operated, highly likely with other physical manipulations, which implies there is a possibility to see whether this technology is used or not, by investigating other related operation to the subject.

If one specific incident looks like caused by the electromagnetic wave and if it partially composes the overall operation, we should conclude the wave is employed for the manipulation. You can figure out the radiowave functionality as there are many symptoms raised until here. The whole functions are not covered, but this is still a technology whose capability is restricted mechanically.

There are multiple groups employing this technology at least in Japan, as there are several political directions appeared when the electromagnetic wave is used for the political plot. It is also used for non-political crime, hence there are other perpetrators applying this technology purely for their interest, which is highly likely a result of the misuse of intelligence assets.

The enormous facility only used to be deployed in the past, but the size should be shrunk to be portable. I still have no clue how small it is, but the size should be small enough to be loaded into a car. Although, it does not mean old facilities are out of use. If you have been a subject of the electromagnetic operation for a long time, you can find an enormous device, i.e. a pole used for the antenna, around your place.

A progress of the technology also capacitates a complicated operation, though the most advanced should be exclusive to the main group. It should be just the CIA and Japanese police intelligence in Japan and it should be the intelligence community or just the CIA in the US case. The most advanced one is the thought reading, next to an unidentified inner voice.

Having said that, an old technology of the simple frequency pattern is still capable of assassinating you. Or, it might drive you to commit a crime by way of the emotional explosion. There are more groups capable of this traditional operation, which is still dangerous as well.


[shadow brokers]6:the real figures of shadow brokers

Shadow brokers are Japanese data brokers who consist the domestic crime infrastructure and commit a ransomware. This is the main profile of them.


At the same time, this guy can speak English. I am not sure how good he is, but at least they can make himself understood in English and can communicate with foreign criminals. These foreigners are highly likely related to the equation group and are highly likely to hire the Japanese data broker to disguise their identities.


The shadow brokers have a skill-set to hack the corporate server, but I doubt they can sneak into the NSA server. It is more like they obtained the data from others, though their action was a total breach of the national security and it is assumed to be a felony. Japanese police should have an interest in them, but also the CIA and FBI should come to Japan to investigate them.


I am not sure how many data brokers are in practice in Japan, but there are limited number of players holding a capability of hacking and ransomware. I assume Japanese authority can narrow down the suspect within ten probabilities. When they have registered as the private investigator in Japan, the police know who they are at least. It is necessary to register as such to conduct a private investigation in Japan, which is applicable to the data broker if they would like to sell their product in the consumer market.


One more addition, but the member of this global crime organization have likely visited Japan and knew the brokers’ English capability through the conversation. If we can catch shadow brokers, we can tail others as well.


[shadow brokers]4:they are data brokers

The next focal point is a “brokers”. The broker is also called as “broker” in Japan, though it is used for the special term to the security broker or the real estate broker, while the general intermediator is not called as such. It implies they have conducted a job descripted as the broker in Japanese term.


This consideration narrows down their possible profile. Their business should not be security and real estate brokers and I came up with one possibility that they are smugglers or human traffickers. They are called as the underground import broker in Japanese term.


In the end, the broker is often used by the criminal. The illegal transporter is almost always called as such in Japan, and then researching further into the detail, I found out which criminals they should belong to. That is the data broker.


“Shadow brokers” are data brokers, partially accumulating their data by hacking into the corporate server. This skill-set is transformed to the ransomware, as they had to find a new source of income after the regulation was tightened after the massive leak of personal information in 2014 when tens of million data was leaked by the inside job. This leaked data was sold to the data broker, which was resold in the market. That is why the regulation was tightened and they needed to find another source of income.


I assume that was one of the motivations why they started to employ a ransomware, as they already had a capability of hacking. All in all, this is a profile of “shadow brokers”.


[shadow brokers]2:they are criminals committing a ransomware

There is another statement written by Shadow brokers concerning the auction of those tools.


Auction Instructions

– ——————–

We auction best files to highest bidder. Auction files better than stuxnet. Auction files better than free files we already give you. The party which sends most bitcoins to address: 19BY2XCgbDe6WtTVbTyzM9eR3LYr6VitWK before bidding stops is winner, we tell how to decrypt. Very important!!! When you send bitcoin you add additional output to transaction. You add OP_Return output. In Op_Return output you put your (bidder) contact info. We suggest use bitmessage or I2P-bote email address. No other information will be disclosed by us publicly. Do not believe unsigned messages. We will contact winner with decryption instructions. Winner can do with files as they please, we not release files to public.


Linked from <https://en.wikipedia.org/wiki/The_Shadow_Brokers>


In this statement, there is an expression of “decryption instructions”, which is originally created by the Japanese sentence meaning “We will tell you a way of the decryption”. This word “decryption” is a noun in Japanese as well, but easily converted to a verb as it is. If they are not familiar with the word “decryption”, they should mention rather “decrypting instruction”. This “decryption” possesses a meaning of the present participle in this statement, implying it is used as a verb in their communication frequently.


The bottom line is “decryption” is used as a noun and verb in Japanese, or “decrypt” and “decrypting” is not used in Japanese language system, once “decryption” got a dominance, as it can be used as a noun and verb.


The word of “decryption” is often used by engineers of encrypted communication. The decryption key is a necessary component to read an encrypted message. Although, there are other types of people who are familiar with this word, which are criminals committing a ransomware. They hack the corporate server, which is encrypted not to be read. Then, they ask the management to pay a ransom to get a decryption code.


In this occasion, the word “decryption” is used in Japanese well, saying “We will tell you a way of decryption, once the payment is confirmed”. That is why they used “decryption instructions”, indicating they are Japanese criminals of the ransomware.