Chapter 8
Making America Powerless One Citizen At A
Time
“It's politically sensitive, but it's
going to happen. Some people don't want to hear this, and it sure
isn't in vogue, but - absolutely - we're going to fight in space.
We're going to fight from space and we're going to fight into space.
That's why the US has development programs in directed energy and
hit-to-kill mechanisms”
(Gen. Joseph Ashy, Aviation
Week & Space Technology, August 5 1996, p 51)
"Privacy Is Power."
American Civil Liberties Union
Among the many things that active auroral
technology is capable of, its agricultural uses are but a minor part of the
whole, and even those agricultural aspects are weaponized, used to destroy
and deny.
When facts are known and observations complete,
the vast majority of airborne plasma technology is employed much more often
in its role as behavior modification, and surveillance.
The many references to Eavesdropping strewn throughout the piece-meal
descriptions of the Radiant Arsenal are just one indicator of the massive
surveillance machine which that arsenal supports, and the inability of the
people to awaken from what surely must be an artificially created stupor is
highly recognizable too, just one more reason to independently investigate
and suspect advanced behavior modifying weaponry.
The possible effects of known characteristics
within the science of the Radiant Arsenal, like overexposures to various
electromagnetic energies, and chemical overdoses of odd materials on a daily
basis, foretell a definite departure from what has always been considered
normal in the medicine of health.
The very real probability that all human beings now possess their own
distinct radio frequency signature, not because of chips or RFID tags they
have somehow ingested or had implanted, but because of the chemical
compositions with which they and their environment have been inundated over
the last 8 years, should be studied carefully with this in mind.
Each person possesses personal attributes of
biological makeup, this is self evident, and detrital accumulations of
material/chemical substances will of course differ from one human being to
another, even if each were exposed to the exact same chemical treatment as
their neighbor.
When things like Morgellons disease are taken into consideration, whereby
fibres of unknown origin, and some metallic, are being removed from peoples
skin as just a symptom of their exposure to these chemical spray
technologies, the above becomes more than plausible:
again, it is probable that each human has
been conditioned to excite certain military sensing equipment in ways
unique, and which serve as personal identifiers.
Furthermore, the sprayings in the atmosphere
which have taken place over the better part of the last decade, denied as
they are, may also have contained materials to serve just this purpose, with
this identifying goal in mind.
The aforementioned Radio-Labled Microspheres are just one case in point.
Normally used in medicine to track flows within the body, they could be
readily adapted for identification purposes. Reports of metals or metallic
substances in foods and medicines have also reached epidemic proportions;
the ingestion of this type of material would not only serve as identifying
agents, but would also make an individual much more sensitive to broadcast
energies, and that is also another probability within the New Reich's
technology of anti-privacy and control.
Likewise, the use of electrical fields as related in the HAARP patent, and
other references having to do with phased array antennae, and ionospheric
heating, do not bode well for the privacy of Americans, or the world.
Considering inventions such as the Artificial Ionospheric Mirror (Appendix
Q), not only are many different types of energy now available for directed
energy weapons and surveillance devices (Beams, Fields, 3 Dimensional
Radiant Constructs; Pulsed Laser, Microwave, UHF VHF RF, ELF, ULF etc.) but
also power sources of new magnitude, all easily manipulable and able to act
in concert with each other for varying effects.
Imagine printed circuitry in the sky.
By deploying active auroral plasmas which are in effect huge
Transmitter/Receiver antennae in their own right, ground ops may use these
plasmas in conjunction with numerous advanced imaging interferometries and
tomographies (chapters 5 & 6) to snoop with impunity any time, any place.
High powered electrical fields can also be
parked anywhere, anytime, as behavior modifying directed energy weaponry,
and perfect 3D viewing of a subject or area, 24-7. Many of the surreptitious
imaging systems used by law enforcement see through clothes, rationalized
and justified as attempts to spot illicit weaponry or other hardware.
Audio is also integral within this suite of
privacy theft technology, and all of the above (Plus Plus) are largely
undetectable without highly specialized and expensive equipment.
The surveillance aspects of ENMOD Active Auroral programs are considered to
be the ultimate strength of the New Reich which the appointed president
serves, and this shows graphically in the amount of privacy they garner for
themselves and their police state operators, while doing everything possible
to eradicate privacy elsewhere.
If privacy is power, then they perpetually
empower themselves, sparing no expense, while surreptitiously disempowering
America one citizen at a time.
Insult 2 Inquiry
In addition to the advanced
surveillances of government, many private individuals are using clandestine
surveillance for their personal advantage.
What was once called corporate espionage,
practiced in boardrooms and offices, has moved into the homes of many
Americans, practiced in bedrooms and bathrooms! Almost every city supports a
Spy Shop, or something along those lines, where cheap, miniature, and
wireless surveillance equipment can be purchased, and they do a booming
business.
Some organized groups responsible for these intrusions into individual
privacy are performing these services of surveillance for hire.
Many times these spies can be identified by
their knowledge and use of wireless communications technologies, while
certain others snitching for profit can be identified by their membership in
what have come to be known as adult gangs; these adult gangs often include
off-duty law enforcement personnel or retired intelligence agents who are
privy to state of the art technology.
There are also many people doing more mundane but just as intrusive
surveillance and data collection work for government agencies such as the
Department of Homeland Security (DHS), or the National Security Agency (NSA).
The recent and ongoing debacle concerning blanket immunity for
telecommunications companies and their illegal wiretapping activities is
just one example of that.
Lawmaking such as the Patriot Act, committed by
the appointee and his cadre of traitors during the last 8 years also
indicates that government is intent on destroying the privacy of citizens.
Occasionally but less often are the so called paparazzi journalists.
A worst case scenario with satanic overtones has
been identified in the book "Monarch: The New Phoenix Program":
"Another aspect of the program is Revenge
Incorporated, angry ex-spouses or business partners may enroll someone
they wish to have revenge over, for a price. In a twist of life
imitating art, targets are often broadcast on closed circuit television,
radio, or on the internet in personal situations in their homes, much
like a TV reality show.
The target is portrayed in the worst light
possible to amuse the paying audience, personal conversations and habits
as well as internal thoughts and imagery are spread among the groups who
use this inside knowledge to harass the target in public and provoke
shame, outbursts of anger and confrontation.
Targets are prompted by the remote
technology to speak on sensitive topics or in a manner that will offend
and motivate these private groups to participate. Most people who are
viewing the target are not quite sure what they are watching, while
others are sadistic enough not to care.
The person who is targeted may feel at times
they are being played with, while other times to the victim it seems
like the microwave assault is trying to kill them. Make no mistake the
objective is to incarcerate the victim into a mental facility, penal
institution, or to force a suicide.
Occasionally a target is murdered, generally
in kind of a sweepstakes-like game that usually happens around a full
moon.
These networks operate everywhere in
virtually every country, so any target that tries to flee will only find
themselves targeted elsewhere. Anyone who attempts to help a target or
reveal the hidden aspects of the program will themselves become a
target. Perfecting the psychology of control is also an important goal
of MHS. Psychologists, much like BISCUIT teams, are employed to tailor
programs to the individual that will exploit their personal or ethnic
weaknesses.
Psychology classifies about 34 distinct
personality types and learning how to control a certain type of
individual can be applied to similar personality types or cultures in
future operations..."
Hunter Gatherers
Tracking an individual suspected of a
crime has always been a function of law enforcement, and the technology
accompanying this duty has grown at a fantastic pace in the last few
decades.
These activities have surpassed the definition
of tracking in fact, and are now assignable to the realm of Data Gathering.
Not only are criminals still tracked, but anyone and everyone are now the
subjects of intense scrutiny with the purpose of assembling vast amounts of
information about individual people, their activities, and the groups they
inhabit. There are no exceptions. (1)
Once an individual becomes electronically identifiable through possession of
an electronic signature, whether acquisition of that signature occurred
through ingestion of metallics, inundation with cumulative nano-powders
containing radio effected materials, or by actually being implanted with a
device of some sort, (2) that person can be located and
positively identified wherever they go, at any time.
The person can be Targeted, and that seems to be
a main goal of the surveillance state. Additionally, many vehicles now
include long range identifiers/signatures, and also most forms of
identification, like drivers licenses. Some if not all of these may be
scannable by satellite.
As mentioned previously, cell phones themselves are actually a type of
tracking device, and they are just a very small part of the overall tracking
technology being employed by a law enforcement which has become global in
scope.
The data accumulated through tracking everyone
is being used to populate huge databases of personal information from which,
through the use of artificially intelligent machine programs, great detail
can be inferred over lengthy periods of time. Habits, customs, likes,
dislikes; exposures, disappearances, and frequencies thereof: all tell a
tale, or could, if the need were ever to arise.
The reports of these type of computers being
employed by law enforcement are scarce but becoming public. Some are noted
to have surpassed all Turing tests for artificial intelligence, so that new
tests are constantly required to measure the capabilities of these
learning/inference engines.
The ever evolving CAPTCHA codes online, used to
defeat robotic disruptors are a good example of this. (3)
So.
The tracking of people, and the data gathered thereby, has gone well beyond
simple surveillance and the ramifications normally associated with. These
artificially intelligent inference machines have become the wardens of an
invisible global prison, though none the less effective for being invisible,
and perhaps more so. The operators of these AI Wardens have a very distinct
and undeniable form of slavery in mind for everyone involved.
Tax enforcement and law enforcement are now
blended and inseparable, with behavior modification and directed energy
coercion used regularly on anyone who steps out of line. The tracking of
individuals also contains another important characteristic: it is useful and
necessary for targeting of dissidents or those who may wish to disrupt the
new global order of total surveillance law enforcement.
This vast and far reaching program of control is
much farther along than anyone without the proper clearances, or a like
ability to infer from seemingly random data, can imagine.
All the tools of the Radiant Arsenal associated with ENMOD and Behavior
Modifying Law Enforcement are used in the data gathering/tracking
operations. Drones, satellites, local antennae - all of which possess at
least video surveillance capabilities as a matter of course - active-auroral
advanced imaging and eavesdropping technologies, PLUS the human vector (The
myriad spotters and informers at the local level, everywhere) it is not hard
to see that the planners are serious about all this, with slavery of others
foremost in their little minds.
Occasionally these resources are used to build a counter identity for a
dissident or other enemy of the state. This is how many people have been
"Disappeared" over the last decade, and no one the wiser. People aware that
this is going on should use the internet to build and reinforce their
identity whenever possible.
If a subject can be removed from their home arena, and made to set up
residence in an area where they are not generally known, global law
enforcement is quite capable of enacting plans to slowly but surely obscure
the identity of the subject by using local human operatives and control of
electronic data, so that the original person is no longer associated
publicly with their real identity.
They can then be removed with very little chance
of detection. Time marches on. The longer an operation like this proceeds,
the better chance of success, and according to first hand accounts this type
of thing is a reality and practiced more as technology advances to reinforce
a subjects obscurity.
Selective identity theft and identity obscuration are well used tools of the
global law enforcement surveillance state. (4)
Implanting You
There are many nefarious and nearly
undetectable implants being deployed among
the population now.
Appendix K of this book have many reports
concerning implants that can and are being inserted on hypodermic needles.
Dental implants for vocal surveillance are also known, and are in the 8th or
9th generation of development now.
These syringe or dental implants are just two examples how an individual can
be implanted with radio identifiers/surveillance, and thereby globally
tracked. The previously mentioned method of inundating the environment with
powders which bio-accumulate in unique electronic signatures is a much more
inclusive procedure though, and when the evidence is reviewed it is
considered that this, more than anything else, is responsible for mass RF
tagging in the last 8 years.
Very few people are aware of any of this.
Of course, the more intrinsic type implants are used whenever possible; when
vocal surveillance is required nothing works as well as a 8th or 9th
generation type dental implant. If the subject is being targeted for
frequency weapon coercion/behavior Modification, then other below-the-skin
implants become a necessity.
Some implantable devices actually have
beneficial medical uses; development of implantable devices is legitimized
and financed in these ways. Some medical implants can be monitored and
stimulated wirelessly, by cellphone.
They can also be used in subliminal mind control
operations as frequency weapons to modify behavior and disrupt cognizance.
Any electrical conductor in the body or skin can be effected likewise, and
the wireless technologies to achieve that are very well developed.
Through study of present technology and the direction it is headed, it has
been inferred that the fields of biotech, nanotechnology, and RFID devices
are now merging so that many present day implants are actually living
biologicals, applied via aerosol, inoculation, ingestion, or simple contact.
See Appendix N, The army's Mycoplasma Patent.
Hearing Aids
Acoustics have been employed for surveillance operations nearly forever.
Loose lips have in fact sunk ships, and worse;
it is the basic propensity for communication that has led humankind to many
wonderful, and also horrible things. So sound weapons and surveillance of
sound are a natural part of the human condition. Most sound weapons depend
on a conveyance of pulsed energy which disrupts something, whether it be the
gastric system, the workings of the brain, or the equilibrium of the
organism via special frequencies designed for that.
Alternately, surveillance of sound is the actual listening in on
conversations via wiretapping, scanning local or semi-local radio
frequencies (Cell and Cordless Phones/HAM/CB), or, as explained earlier, by
using specialized equipment and methods like 3 dimensional interpretations
of artificially created electric fields (Interferometry/tomography).
(5)
One novel listening device utilizes a laser beam aimed at glass (Any window
will do), and any sound that is happening in the vicinity of the glass
causes the glass to vibrate minutely, thereby causing a very discernible
reflection/feedback.
This vibration is then interpreted/constructed
into human discernible sound. Any conversations going on near glass are
prone to eavesdropping in this manner, and the device is well known for its
ability to listen from a distance, as well as for its high quality results.
This is actually the same principle which was used in vinyl records, where a
diamond needle was made to vibrate as it rides through the grooves of the
plastic disc.
These vibrations are then amplified and filtered
to become high quality sound products. There are laser treatments used in
many imaging operations too, so that both sound, and very clear imagery can
be gained from any area a laser beam can enter. Most lasers of this type are
of wavelengths invisible to the human eye.
The above surveillance operations, like so much else, can be reproduced with
active auroral technologies through the use of artificial ionospheric plasma
mirrors, and ground or satellite based power sources/beams. When those
configurations are utilized, the range of these type of devices is vastly
increased. There are many variations of this process.
When other technological advances are taken into account, such as this
University of Southern California News Service Release below, one can only
wonder at the true state of affairs concerning the New Reich's abilities of
audio surveillance.
"...Machine Demonstrates Superhuman Speech
Recognition Abilities date: 9/30/99... The system can distinguished
words in vast amounts of random "white" noise and noise with amplitude
1,000 times the strength of the target auditory signal. Human listeners
can deal with only a fraction as much.
And the system can pluck words from the
background clutter of other voices, the hubbub heard in bus stations,
theater lobbies and cocktail parties, for example. With just a minor
adjustment, the system can identify different speakers of the same word
with superhuman acuity...."
To clarify that: now all this listening
technology has become computerized, automatic, and is being used in
operations like
ECHELON, which is said to monitor many
millions of private communications world wide, per day.
That being a figure from the late 90's, it is
fair to think there has been some progress made in ECHELONS ability to
listen and monitor, and we must rest assured, even though the evidence is
yet forthcoming, that ECHELON is not alone, anymore.
The one axiom that applies across the board when
studying the technology of control is this: what is made available to we the
people, visible and invisible alike, is just a small amount of what really
is.
Notes
(1) Stolen Information Populating TIA
Databases http://www.acm.org/usacm/Issues/CFP03.ppt
Total Information Awareness
(2) Tracking Devices - Digital Angel - Tiny
Human-Borne Monitoring Device Sparks Privacy Fears - By Richard Stenger
CNN Interactive Writer
http://www.brickhousesecurity.com/gps-car-tracking-vehicle-logging.html
- Appendix K
(3) artificial intelligence web agents - Web Hunting: Design of a Simple
Intelligent Web Search Agent - by G. Michael Youngblood
(4) Case #12 of 406 - William Joseph Gallagher 2000-2008 - POST OFFICE
BOX 125 - Hachita NM 88040
(5) Through-wall radar image reconstruction based on time-domain
transient signals in the presence of noise - Ho, A.T.S. Tham, W.H. Low,
K.S.
This paper appears in: Geoscience and Remote Sensing Symposium, 2005.
IGARSS '05. Proceedings. 2005 IEEE International
Publication Date: 25-29 July 2005
Volume: 6, On page(s): 4271- 4274
ISBN: 0-7803-9050-4
Posted online: 2005-11-14 10:10:52.0
New Concepts for Through the Wall Radar using Multiple UWB Antennas
P. Millot, N. Maaref, G. Autret, C. Pichot, J.-Y. Dauvignac, and O.
Picon (France)
Keywords
Radar, Through-the-wall, Detection, SAR, Trilateration.
Abstract
In this paper, we present a study of short range radar for
through-the-wall (TTW) detection and tracking of human beings. New
concepts envisaged here are based on an Ultra Wide Band (UWB) waveform
and on the use of numerous separated antennas. First the choice of the
frequency bandwidth for the ideal radar system is discussed. Then a new
experimental set-up recently made in our laboratory is presented. This
system uses UWB oscillators (VCO) in ultra-fast sweep frequency mode
that are able to cover the 500 MHz - 8 GHz bandwidth. A simple UWB
homodyne set-up is also proposed with three receiving channels and new
performing UWB antennas. This system is now able to detect human motion
and locate it by trilateration. A full wave 2D simulator using the FDTD
method has also been performed in order to deliver synthetic data for
studying signal processing algorithms (coherent and incoherent). These
algorithms, although well known in some other contexts, are here applied
to UWB TTW imaging and detection and some quasi real time formulations
are proposed. Results are presented on a test configuration computed by
the simulator.
* From Proceeding (566) Antennas, Radar, and Wave Propagation - 2007
Back to Contents