Welcome to Cerberus Investigations folks! I’m your webmaster, Ender Shepard, and I’ll be guiding you through the uncharted territories of truth, on this fine evening.

And before we dive into tonight’s explosive topic, let me just remind our loyal readers: Don’t forget to support us by visiting our website at cerberusinvestigations.neocities.org and sharing links with your friends.

Now, I know what you’re thinking. “Ender, what’s the real story behind…”

…well, that’s exactly what we’ll be discussing tonight! So grab a cup of globalist-free coffee, sit back, and get ready to have your mind (and eyes) blown by the truth!

delete the elite

But before I start this article, please note that our website is going to start monetizing itself. I’m looking into different things that we could sell, such as t-shirts. This is actually related a bit to the article, folks. Conspiracy related commerce will be up and running soon!

Now, are you ready to join me on this journey into forbidden technology?

Operations security (OPSEC) is a process that identifies critical information to determine whether friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information.

You need to take your Operational Security seriously. Keep in mind that these techniques won’t be effective against neanderthals because the hive mind, Boaz and Jachin, does remote viewing via the medulla oblongata.

freemasonic gathering

There isn’t much you can do if the neanderthals have control in such a way. According to Glen Kealey, if you still control your body, you can numb the medulla with ice cold water. That should allow you to break free, I don’t know if it works.

Tonight, we’re going to delve into the fascinating world of counter surveillance techniques and devices that’ll make you wonder if Big Brother and the Reptilians are indeed watching.

Shielding Yourself from Surveillance

We’ve got a real treat for you tonight. I’ll be walking you through some of the most effective methods to shield yourself from unwanted eyes and ears, including the creation of portable Faraday bags that’ll block even the most advanced surveillance signals.

faraday bag

You see, folks, a Faraday bag is essentially a shielded container that blocks electromagnetic radiation, including radio frequencies. And I’m not just talking about your average, run-of-the-mill Faraday bags. We’re talking about top-notch, high-security models that’ll keep your devices safe from the reptilians.

It’s actually quite simple. You can use materials like copper mesh, aluminum foil, and some basic electrical components to create a portable shield.

Just take an old backpack or lunchbox and tape some aluminum foil or a copper mesh to the insides so that everything in the container is shielded from Big Brother.

faraday bag materials

Protecting Against TEMPEST Attacks

We’re going to take a closer look at the threat of TEMPEST attacks.

Hackers can use electromagnetic pulses to steal sensitive information from even the most secure devices, remotely. But do you know how to protect yourself against these types of attacks? Well, I’m here to tell you that it’s not as complicated as you might think.

First, let me explain what TEMPEST is all about. It’s essentially a type of electromagnetic attack that uses pulses or waves to compromise sensitive information from electronic devices. And the key to protection lies in understanding how these attacks work and taking simple precautions to prevent them.

They can basically read your monitor and log your keystrokes remotely.

Now, I’m not just talking about using Faraday bags here. No, no, folks. We’re going to take it up a notch. I’ll be sharing some advanced techniques for protecting against TEMPEST attacks, including the use of shielding materials like mu-metal.

mu metal

Think about it, folks: with these simple precautions, you can safeguard your sensitive information from even the most determined government agents.

Blocking Radio Signals

We’re going to take a closer look at the technology behind radio frequency (RF) blocking devices.

You’ve probably heard about those so-called RF blockers that claim to eliminate unwanted signals, even new frequencies such as 5g. But do they really work? Well, let me tell you, folks, these RF blockers are indeed real! I plan to start selling tech like this on the website.

rf jammer

You can also get RF shielding paint that will keep Big Brother out.

Technology can be found online for all sorts of purposes but there is also suppressed technology like the Anti-5G USB that the government claims is “fraudulent” (of course they would say that!)

You can even buy a hat that will protect your brain from 5G, for only $99 USD!

Fortifying My Underground Base

You see, folks, when it comes to protecting yourself from surveillance, having a secure location is key. And I’m not just talking about any old bunker or hideout. No, no, my underground base is a state-of-the-art domicile that’s been designed and deployed inside a mountain in the Canadian Shield (mostly to be prepared against nuclear war and the reptilian climate change plot).

bunker

First of all, let me tell you how I protect myself from RF signals in the corridors. The walls are coated with a special RF shielding paint that blocks even the most advanced surveillance frequencies. And at the heart of my base is a giant Faraday cage that surrounds my overclocked coreboot AMD Athlon X2 5200+ computer.

This behemoth of a machine is the hub of my underground operation, and I’ve taken every precaution to ensure its security. Not only is it shielded by a Faraday cage, but it’s also equipped with an advanced thermite detonator that will incinerate the entire system in case of unauthorized access.

faraday setup

Health and Protecting Supplies

But it’s not just about the tech, folks. When it comes to protecting myself from chemical and biological attacks, I take a holistic approach. That’s why I brush my teeth with zyletol-based toothpaste, which is designed to neutralize even the most toxic substances. And let me tell you, I’m extremely vigilant when it comes to fluoride. I avoid it at all costs, not just because of its potential health risks, but also because of the sinister forces that have been using it to control populations for decades…

poison in the tap water

Now, I know what you’re thinking: ‘Ender, what about your coffee and supplies?’ Well, let me tell you, folks, those are locked away in a secure facility where they can’t be tampered with. I’ve got my coffee beans stored in airtight containers, and my water supply is purified to the highest standards.

locked coffee

And no fluoride anywhere.

But remember, folks, this is just my underground base. The true security lies in the mind and the will to protect oneself from the forces of oppression.

Conclusion

And that’s a wrap for tonight’s article, folks! Thanks for joining me on this journey into forbidden technology. Remember, in the world of conspiracy and counter-surveillance, it’s always better to be prepared.

If you have it in your heart, please donate XMR to our operation @ 87XrKJGCBLFdaSARsxshEJDVZpKVAhwLwLh8JFqrD7cU4CoAtHW3Msa8GKE3A4Y5siaUdN7UaFU3QJc18jaXsBp65KhEBgo

Until next time, stay vigilant, folks!