Chapter 8
Making America Powerless One Citizen At A Time

“It's politically sensitive, but it's going to happen. Some people don't want to hear this, and it sure isn't in vogue, but - absolutely - we're going to fight in space. We're going to fight from space and we're going to fight into space. That's why the US has development programs in directed energy and hit-to-kill mechanisms”
(Gen. Joseph Ashy, Aviation Week & Space Technology, August 5 1996, p 51)


"Privacy Is Power."
American Civil Liberties Union

 

Among the many things that active auroral technology is capable of, its agricultural uses are but a minor part of the whole, and even those agricultural aspects are weaponized, used to destroy and deny.

 

When facts are known and observations complete, the vast majority of airborne plasma technology is employed much more often in its role as behavior modification, and surveillance.

The many references to Eavesdropping strewn throughout the piece-meal descriptions of the Radiant Arsenal are just one indicator of the massive surveillance machine which that arsenal supports, and the inability of the people to awaken from what surely must be an artificially created stupor is highly recognizable too, just one more reason to independently investigate and suspect advanced behavior modifying weaponry.

 

The possible effects of known characteristics within the science of the Radiant Arsenal, like overexposures to various electromagnetic energies, and chemical overdoses of odd materials on a daily basis, foretell a definite departure from what has always been considered normal in the medicine of health.

The very real probability that all human beings now possess their own distinct radio frequency signature, not because of chips or RFID tags they have somehow ingested or had implanted, but because of the chemical compositions with which they and their environment have been inundated over the last 8 years, should be studied carefully with this in mind.

 

Each person possesses personal attributes of biological makeup, this is self evident, and detrital accumulations of material/chemical substances will of course differ from one human being to another, even if each were exposed to the exact same chemical treatment as their neighbor.

When things like Morgellons disease are taken into consideration, whereby fibres of unknown origin, and some metallic, are being removed from peoples skin as just a symptom of their exposure to these chemical spray technologies, the above becomes more than plausible:

again, it is probable that each human has been conditioned to excite certain military sensing equipment in ways unique, and which serve as personal identifiers.

Furthermore, the sprayings in the atmosphere which have taken place over the better part of the last decade, denied as they are, may also have contained materials to serve just this purpose, with this identifying goal in mind.

The aforementioned Radio-Labled Microspheres are just one case in point. Normally used in medicine to track flows within the body, they could be readily adapted for identification purposes. Reports of metals or metallic substances in foods and medicines have also reached epidemic proportions; the ingestion of this type of material would not only serve as identifying agents, but would also make an individual much more sensitive to broadcast energies, and that is also another probability within the New Reich's technology of anti-privacy and control.

Likewise, the use of electrical fields as related in the HAARP patent, and other references having to do with phased array antennae, and ionospheric heating, do not bode well for the privacy of Americans, or the world. Considering inventions such as the Artificial Ionospheric Mirror (Appendix Q), not only are many different types of energy now available for directed energy weapons and surveillance devices (Beams, Fields, 3 Dimensional Radiant Constructs; Pulsed Laser, Microwave, UHF VHF RF, ELF, ULF etc.) but also power sources of new magnitude, all easily manipulable and able to act in concert with each other for varying effects.

Imagine printed circuitry in the sky.

By deploying active auroral plasmas which are in effect huge Transmitter/Receiver antennae in their own right, ground ops may use these plasmas in conjunction with numerous advanced imaging interferometries and tomographies (chapters 5 & 6) to snoop with impunity any time, any place.

 

High powered electrical fields can also be parked anywhere, anytime, as behavior modifying directed energy weaponry, and perfect 3D viewing of a subject or area, 24-7. Many of the surreptitious imaging systems used by law enforcement see through clothes, rationalized and justified as attempts to spot illicit weaponry or other hardware.

 

Audio is also integral within this suite of privacy theft technology, and all of the above (Plus Plus) are largely undetectable without highly specialized and expensive equipment.

The surveillance aspects of ENMOD Active Auroral programs are considered to be the ultimate strength of the New Reich which the appointed president serves, and this shows graphically in the amount of privacy they garner for themselves and their police state operators, while doing everything possible to eradicate privacy elsewhere.

 

If privacy is power, then they perpetually empower themselves, sparing no expense, while surreptitiously disempowering America one citizen at a time.


Insult 2 Inquiry
In addition to the advanced surveillances of government, many private individuals are using clandestine surveillance for their personal advantage.

 

What was once called corporate espionage, practiced in boardrooms and offices, has moved into the homes of many Americans, practiced in bedrooms and bathrooms! Almost every city supports a Spy Shop, or something along those lines, where cheap, miniature, and wireless surveillance equipment can be purchased, and they do a booming business.

Some organized groups responsible for these intrusions into individual privacy are performing these services of surveillance for hire.

 

Many times these spies can be identified by their knowledge and use of wireless communications technologies, while certain others snitching for profit can be identified by their membership in what have come to be known as adult gangs; these adult gangs often include off-duty law enforcement personnel or retired intelligence agents who are privy to state of the art technology.

There are also many people doing more mundane but just as intrusive surveillance and data collection work for government agencies such as the Department of Homeland Security (DHS), or the National Security Agency (NSA). The recent and ongoing debacle concerning blanket immunity for telecommunications companies and their illegal wiretapping activities is just one example of that.

 

Lawmaking such as the Patriot Act, committed by the appointee and his cadre of traitors during the last 8 years also indicates that government is intent on destroying the privacy of citizens. Occasionally but less often are the so called paparazzi journalists.

 

A worst case scenario with satanic overtones has been identified in the book "Monarch: The New Phoenix Program":

"Another aspect of the program is Revenge Incorporated, angry ex-spouses or business partners may enroll someone they wish to have revenge over, for a price. In a twist of life imitating art, targets are often broadcast on closed circuit television, radio, or on the internet in personal situations in their homes, much like a TV reality show.

 

The target is portrayed in the worst light possible to amuse the paying audience, personal conversations and habits as well as internal thoughts and imagery are spread among the groups who use this inside knowledge to harass the target in public and provoke shame, outbursts of anger and confrontation.

 

Targets are prompted by the remote technology to speak on sensitive topics or in a manner that will offend and motivate these private groups to participate. Most people who are viewing the target are not quite sure what they are watching, while others are sadistic enough not to care.

 

The person who is targeted may feel at times they are being played with, while other times to the victim it seems like the microwave assault is trying to kill them. Make no mistake the objective is to incarcerate the victim into a mental facility, penal institution, or to force a suicide.

 

Occasionally a target is murdered, generally in kind of a sweepstakes-like game that usually happens around a full moon.

 

These networks operate everywhere in virtually every country, so any target that tries to flee will only find themselves targeted elsewhere. Anyone who attempts to help a target or reveal the hidden aspects of the program will themselves become a target. Perfecting the psychology of control is also an important goal of MHS. Psychologists, much like BISCUIT teams, are employed to tailor programs to the individual that will exploit their personal or ethnic weaknesses.

 

Psychology classifies about 34 distinct personality types and learning how to control a certain type of individual can be applied to similar personality types or cultures in future operations..."


Hunter Gatherers
Tracking an individual suspected of a crime has always been a function of law enforcement, and the technology accompanying this duty has grown at a fantastic pace in the last few decades.

 

These activities have surpassed the definition of tracking in fact, and are now assignable to the realm of Data Gathering. Not only are criminals still tracked, but anyone and everyone are now the subjects of intense scrutiny with the purpose of assembling vast amounts of information about individual people, their activities, and the groups they inhabit. There are no exceptions. (1)

Once an individual becomes electronically identifiable through possession of an electronic signature, whether acquisition of that signature occurred through ingestion of metallics, inundation with cumulative nano-powders containing radio effected materials, or by actually being implanted with a device of some sort, (2) that person can be located and positively identified wherever they go, at any time.

 

The person can be Targeted, and that seems to be a main goal of the surveillance state. Additionally, many vehicles now include long range identifiers/signatures, and also most forms of identification, like drivers licenses. Some if not all of these may be scannable by satellite.

As mentioned previously, cell phones themselves are actually a type of tracking device, and they are just a very small part of the overall tracking technology being employed by a law enforcement which has become global in scope.

 

The data accumulated through tracking everyone is being used to populate huge databases of personal information from which, through the use of artificially intelligent machine programs, great detail can be inferred over lengthy periods of time. Habits, customs, likes, dislikes; exposures, disappearances, and frequencies thereof: all tell a tale, or could, if the need were ever to arise.

 

The reports of these type of computers being employed by law enforcement are scarce but becoming public. Some are noted to have surpassed all Turing tests for artificial intelligence, so that new tests are constantly required to measure the capabilities of these learning/inference engines.

 

The ever evolving CAPTCHA codes online, used to defeat robotic disruptors are a good example of this. (3)

So.

The tracking of people, and the data gathered thereby, has gone well beyond simple surveillance and the ramifications normally associated with. These artificially intelligent inference machines have become the wardens of an invisible global prison, though none the less effective for being invisible, and perhaps more so. The operators of these AI Wardens have a very distinct and undeniable form of slavery in mind for everyone involved.

 

Tax enforcement and law enforcement are now blended and inseparable, with behavior modification and directed energy coercion used regularly on anyone who steps out of line. The tracking of individuals also contains another important characteristic: it is useful and necessary for targeting of dissidents or those who may wish to disrupt the new global order of total surveillance law enforcement.

 

This vast and far reaching program of control is much farther along than anyone without the proper clearances, or a like ability to infer from seemingly random data, can imagine.

All the tools of the Radiant Arsenal associated with ENMOD and Behavior Modifying Law Enforcement are used in the data gathering/tracking operations. Drones, satellites, local antennae - all of which possess at least video surveillance capabilities as a matter of course - active-auroral advanced imaging and eavesdropping technologies, PLUS the human vector (The myriad spotters and informers at the local level, everywhere) it is not hard to see that the planners are serious about all this, with slavery of others foremost in their little minds.

Occasionally these resources are used to build a counter identity for a dissident or other enemy of the state. This is how many people have been "Disappeared" over the last decade, and no one the wiser. People aware that this is going on should use the internet to build and reinforce their identity whenever possible.

If a subject can be removed from their home arena, and made to set up residence in an area where they are not generally known, global law enforcement is quite capable of enacting plans to slowly but surely obscure the identity of the subject by using local human operatives and control of electronic data, so that the original person is no longer associated publicly with their real identity.

 

They can then be removed with very little chance of detection. Time marches on. The longer an operation like this proceeds, the better chance of success, and according to first hand accounts this type of thing is a reality and practiced more as technology advances to reinforce a subjects obscurity.

Selective identity theft and identity obscuration are well used tools of the global law enforcement surveillance state. (4)


Implanting You
There are many nefarious and nearly undetectable implants being deployed among the population now.

 

Appendix K of this book have many reports concerning implants that can and are being inserted on hypodermic needles. Dental implants for vocal surveillance are also known, and are in the 8th or 9th generation of development now.

These syringe or dental implants are just two examples how an individual can be implanted with radio identifiers/surveillance, and thereby globally tracked. The previously mentioned method of inundating the environment with powders which bio-accumulate in unique electronic signatures is a much more inclusive procedure though, and when the evidence is reviewed it is considered that this, more than anything else, is responsible for mass RF tagging in the last 8 years.

 

Very few people are aware of any of this.

Of course, the more intrinsic type implants are used whenever possible; when vocal surveillance is required nothing works as well as a 8th or 9th generation type dental implant. If the subject is being targeted for frequency weapon coercion/behavior Modification, then other below-the-skin implants become a necessity.

 

Some implantable devices actually have beneficial medical uses; development of implantable devices is legitimized and financed in these ways. Some medical implants can be monitored and stimulated wirelessly, by cellphone.

 

They can also be used in subliminal mind control operations as frequency weapons to modify behavior and disrupt cognizance. Any electrical conductor in the body or skin can be effected likewise, and the wireless technologies to achieve that are very well developed.

Through study of present technology and the direction it is headed, it has been inferred that the fields of biotech, nanotechnology, and RFID devices are now merging so that many present day implants are actually living biologicals, applied via aerosol, inoculation, ingestion, or simple contact.

 

See Appendix N, The army's Mycoplasma Patent.


Hearing Aids
Acoustics have been employed for surveillance operations nearly forever.

 

Loose lips have in fact sunk ships, and worse; it is the basic propensity for communication that has led humankind to many wonderful, and also horrible things. So sound weapons and surveillance of sound are a natural part of the human condition. Most sound weapons depend on a conveyance of pulsed energy which disrupts something, whether it be the gastric system, the workings of the brain, or the equilibrium of the organism via special frequencies designed for that.

Alternately, surveillance of sound is the actual listening in on conversations via wiretapping, scanning local or semi-local radio frequencies (Cell and Cordless Phones/HAM/CB), or, as explained earlier, by using specialized equipment and methods like 3 dimensional interpretations of artificially created electric fields (Interferometry/tomography). (5)

One novel listening device utilizes a laser beam aimed at glass (Any window will do), and any sound that is happening in the vicinity of the glass causes the glass to vibrate minutely, thereby causing a very discernible reflection/feedback.

 

This vibration is then interpreted/constructed into human discernible sound. Any conversations going on near glass are prone to eavesdropping in this manner, and the device is well known for its ability to listen from a distance, as well as for its high quality results. This is actually the same principle which was used in vinyl records, where a diamond needle was made to vibrate as it rides through the grooves of the plastic disc.

 

These vibrations are then amplified and filtered to become high quality sound products. There are laser treatments used in many imaging operations too, so that both sound, and very clear imagery can be gained from any area a laser beam can enter. Most lasers of this type are of wavelengths invisible to the human eye.

The above surveillance operations, like so much else, can be reproduced with active auroral technologies through the use of artificial ionospheric plasma mirrors, and ground or satellite based power sources/beams. When those configurations are utilized, the range of these type of devices is vastly increased. There are many variations of this process.

When other technological advances are taken into account, such as this University of Southern California News Service Release below, one can only wonder at the true state of affairs concerning the New Reich's abilities of audio surveillance.

"...Machine Demonstrates Superhuman Speech Recognition Abilities date: 9/30/99... The system can distinguished words in vast amounts of random "white" noise and noise with amplitude 1,000 times the strength of the target auditory signal. Human listeners can deal with only a fraction as much.

 

And the system can pluck words from the background clutter of other voices, the hubbub heard in bus stations, theater lobbies and cocktail parties, for example. With just a minor adjustment, the system can identify different speakers of the same word with superhuman acuity...."

To clarify that: now all this listening technology has become computerized, automatic, and is being used in operations like ECHELON, which is said to monitor many millions of private communications world wide, per day.

 

That being a figure from the late 90's, it is fair to think there has been some progress made in ECHELONS ability to listen and monitor, and we must rest assured, even though the evidence is yet forthcoming, that ECHELON is not alone, anymore.

 

The one axiom that applies across the board when studying the technology of control is this: what is made available to we the people, visible and invisible alike, is just a small amount of what really is.


 

Notes

(1) Stolen Information Populating TIA Databases http://www.acm.org/usacm/Issues/CFP03.ppt
Total Information Awareness
 

(2) Tracking Devices - Digital Angel - Tiny Human-Borne Monitoring Device Sparks Privacy Fears - By Richard Stenger
CNN Interactive Writer http://www.brickhousesecurity.com/gps-car-tracking-vehicle-logging.html - Appendix K

(3) artificial intelligence web agents - Web Hunting: Design of a Simple Intelligent Web Search Agent - by G. Michael Youngblood

(4) Case #12 of 406 - William Joseph Gallagher 2000-2008 - POST OFFICE BOX 125 - Hachita NM 88040

(5) Through-wall radar image reconstruction based on time-domain transient signals in the presence of noise - Ho, A.T.S. Tham, W.H. Low, K.S.
This paper appears in: Geoscience and Remote Sensing Symposium, 2005. IGARSS '05. Proceedings. 2005 IEEE International
Publication Date: 25-29 July 2005
Volume: 6, On page(s): 4271- 4274
ISBN: 0-7803-9050-4
Posted online: 2005-11-14 10:10:52.0
New Concepts for Through the Wall Radar using Multiple UWB Antennas
P. Millot, N. Maaref, G. Autret, C. Pichot, J.-Y. Dauvignac, and O. Picon (France)
Keywords
Radar, Through-the-wall, Detection, SAR, Trilateration.
Abstract
In this paper, we present a study of short range radar for through-the-wall (TTW) detection and tracking of human beings. New concepts envisaged here are based on an Ultra Wide Band (UWB) waveform and on the use of numerous separated antennas. First the choice of the frequency bandwidth for the ideal radar system is discussed. Then a new experimental set-up recently made in our laboratory is presented. This system uses UWB oscillators (VCO) in ultra-fast sweep frequency mode that are able to cover the 500 MHz - 8 GHz bandwidth. A simple UWB homodyne set-up is also proposed with three receiving channels and new performing UWB antennas. This system is now able to detect human motion and locate it by trilateration. A full wave 2D simulator using the FDTD method has also been performed in order to deliver synthetic data for studying signal processing algorithms (coherent and incoherent). These algorithms, although well known in some other contexts, are here applied to UWB TTW imaging and detection and some quasi real time formulations are proposed. Results are presented on a test configuration computed by the simulator.
* From Proceeding (566) Antennas, Radar, and Wave Propagation - 2007

Back to Contents