Posts Tagged ‘rfid’

The Kassandra Project

Your Brain On Government Privacy Invasion

We received a lot of comments with stories about neural monitoring. Real stories from the real world, and now we want to collect them in a single post in order to give them a great visibility.

We need more cooperation, more organization in order to understand better the problem and it’s necessary to contact associations who handle the victims of this torture.

shiju

I am shiju from India.I have been targeted by nueral monitering system[mind reading project] since 2004 and still continues.As a targeted victim i had to face the torturing from Indians also.

Emmanuel

I Want to Know Who is Authorised to Moniter Indians. I am Facing Same Kind of Problems. But No one in my State not revel this thing . Please help me.

Emmanuel
India

sharihodges

My ex husband works at the NSA. He’s a senior officer and he’s been there 30 years. He’s a public embarrassment to the NSA and frankly, I caught them red handed last year. My ex disappeared 30 years ago and forgot to pay his child support. I found this deadbeat on Google last year and called the DOD. The NSA covered up the whole thing to protect the reputation of the agency. Look, people, the NSA is full of creeps and cronies from the military. My ex was busted from intelligence in 1970. His whole unit was investigated for national security breaches. They set up shop inside the NSA. It’s an old boy’s club full of drunks and druggies. I met these guys 30 years ago in the military. As long as my ex-husband works at the NSA, the whole military intelligence corps can kiss my ass.

Emmanuel

I am Emmanuel from India, The people in India , Esspecially in My State Tamil Nadu, The Persons Seen me on the Streets the Are Saying or reacting With unusal Actions. This caused me damage in my mind. I dont think these people are under law. there are so many unlaw ful things are going in India. I dont Know why these people are watching me . If any Person want to help me Please reply at , datacollection03@yahoo.co.in

Thanks

Emmanuel
India.

paul daughtrrey

I will like to say, this program is for real. I have been to very type of doctor you can image attempting to identify the physical problems I have encountered. To put this in context, I have a device in my brain which was not indentifiable by any any medical science but through research. This system can cause every negative event in your life. It can also cause your death. I am a professional pilot and this system is used on me while flying passengers in high density areas of the country. Making this very dangerous and can make you look like a complete idiot. I have seen the system with my own eyes and can tell you, your private life will cease as you know it. Please if you are a attorney or know anyone at NSA please help make my profession a safe operation by stopping the torture on me and allowing me to be normal. I beg you to take action.

siddique

I am from Bangladesh and a communication technologist by profession. It seems I am also being monitored by this devil technology called RNM (Remote neural monitoring) atleast for the last 5 years. At the beginning i thought i have some mental problem but now i know that is not the case. It seems to me that the people who are torturing me speaks my own local language but i dont think it is the local people who are doing it. May the super crappy computers they are using can also speak in many different languages and can monitor anyone via satellite. Sometimes i also feel what is happenning to me is beyond human limitations both ways but i dont know the exact answer. I am too little to know why I am targetted, I am just a simple person from a poor developing nation. Whatever that is, that is the biggest devil the history has ever encountered with and this counld bring the end of human kind. Wish someone could just stop it and companasate all the damages that we have suffered in our life.

siddique

Hi Kassandra
My story is pretty much the same like others that I often read on the internet. As far as I know, in 2003 I first encountered with this remote harassment and it continues till now. At that time my wife was pregnant and we were expecting our first child and she was living with her father overseas. I was living with my mother and sister in our own home. I started to listen to voices in my own language that were reading out my own mind and everything I was doing. I heard conversation of several people who could follow me anywhere I go and read what I was thinking inside my mind and they would create noises and disturbances that most likely I could only hear but no one else and they would verbally abuse me. The situation started to deteriorate so much that I could hardly sleep at night as every time I tried to sleep they would wake me up with a big bang or some kind of electric shock. Sometimes I felt my feets were getting paralyzed due to some external force and someone operating some vibrational force on my heart, brain, ear, nose etc. I was virtually turned into a mad man suddenly in 2/3 weeks. Then I went to see a psychiatrist who said I might be schizophrenic and gave me some med.Taking those medicine finally I was able to sleep because it had strong sleeping pill and I would hear less than usual bcause of that med. Situation also makes people stronger and that actually happened to me that mentally and physically I tried to become stronger to survive. In addition God gifted me with a new born child and all that helped me to cope with that situation. But I still hear the voices that people following me everywhere and try to screw up anything I try to do to make progress either in my personal or professional life and I was thinking that I was the most unlucky person in the world but I didn’t know someone was intentionally causing my misfortune. They mess-up my computer, mobile phone remotely and it seems they are so powerful so that I am unable to do positive or important things in life. In the process I had to leave several very good jobs because of very silly reasons. Basically whoever wathcing me, they want to slow poison me to death and it is like a strategy game they are playing with real human being. Until very recently I thought I am a mental patient but as I browse through the net more I know that I was all wrong as so many people cannot have the same or similar symptoms like myself and I do not have any other abnormality and I held many important high tech jobs even with this sufferings which a schizophrenic or mental patient couldn’t possibly hold even if that was for a shorter time. I do believe even my wife and son are also suffering the side effects of what is happening to me if not more. In the last few years we had major health problems and drastic chages how we look like. I strongly believe whoever doing this to me is either a super power or something super natural power and I don’t want to point my figure to anyone or any agency unless I know for sure who is actually doing it. I just concentrate more on learning these days and pray to God, hoping God will guide me towards freedom one day and God can definitely rescue us all from this evil or devil whoever that is.
My email if anyone wants to drop me a line: coolbutterfly08@hotmail.com

Newsman

Victim’s ex-girlfriend’s father is NSA Psychotronic Operative.
Donate to Class Action Law Suit for All Victims

I am a former network and local television and radio news reporter.

I went into private practice as an independent television producer in 1998. In 2003, I saved 7-figures. The woman I was dating and soon to be engaged was very much into my money and cocaine.

The woman’s father is Rovert Gunn, Phd. He is a former veterans affairs clinical psychologist. in the mid 1960’s he was treating war veterans for post traumatic stress disorder and helped to deprogram prisoners of war. To be successful at deprogramming victims of torture means you muts unlock the secrets of mental and physical torture.

I dissolved my realtionship with the (40) woman when I realized she was having an affair with my (23) m,ale assistant. He was hacking my computers. He was eventually arrested by the New York Police Department.

In retaliation her father, now an NSA (NWO) operative, attacked me with visual projections and mind control. He also attacked my sister who was WRONGFULLY diagnosed with schizophrenia and paranoia. She was urged to undergo shock therapy.

The charges against the male assistant werer wrongfully dropped.

For 3+ years now I have been tortured in various ways. I have been “gang stalked.” I am constantly shocked all over my body, including my “a” cavity, groin and even my eyes.

These shocks are often sharp and direct. Sometimes they cause “itching ” sensations.

Additionally, I awaken every morning to “ringing in my ears.” When I shower the “voices in my head” are intense.

My thoughts become audible in my brain. Sometimes communciations are “interactive” — someone’s on the other end of the line.

The only way to fight back is witha class action law suit via the ACLU, the EFF or through a private attorney.

If we collected $20.00 from every victim in the world, we’d have a fighting chance.

You can communicate with me directly at WSTN1@aol.com.

Newsman

The primary operative of psychotronic mind control and torture is Robert Gunn, Phd. he is a former Veterans Affair clincail psychologist in Ann Arbor, Michigan. Since I dissolved my realtionship his daughter in 2003, he has tortured me and my family.

Gunn is the husband of Washtenaw County Commission Chairperson, Leah Gunn.

It is important to note that Michigan is the only state in the Union that has outlawed electronic harassment.

Want to direct your anger to your attackers? Now you know who HE is and where HE is.

siddique

One more thing i want to share is that attackers always try to target people who are lonely because lonely people are the most vulnerable to the acts of the perps. Therefore, my sincere advice to all who attacked is to be among lot of people all the time, be social and more specifically dont sleep alone.

About spending $20, $50 or more wouldn’t be a problem for myself and i think for many others if this is gonna be a well coordinated effort by a large group of people but as far as i understand some poeple are above the law and who is doing it always remains a question mark and so there is no evidence. I doubt the outcome of that.

God help us all in this regard.

Mike

You can disable the predators using a powerwand from wherever you are. Read the Don Croft articles on “EDUCATE YOURSELF NEWS” on google. It has to do with accessing the etheric plane and using your own energy and the real law. These predators open themselves up to a world of justice and no innocent beings can be harmed in this manner. It is like magnifying their own intentions back at them 10x. Through eyes closed,visualisation,words,will,intent and emotion you can do things especially fight back. We have been dumbed down and programmed to believe their is nothing I can do when you can. Prayer works not because someone outside you is helping you when you ask but because humans have creator abilities. In this case you have to destroy and begin all your so called prayers with the word destroy never taught by the controlling religions controlled by TPTB. Ever wonder why shamans and Indians have been attacked and weeded out throughout history? It’s because of this hidden/suppressed knowledge they want to wipe out. Indians are even given casinos to take them off the meditating path. This is the reason they do things in secret so nobody thinks there is anything wrong therfore no one sends energy/prayer against them. Blast them and their technology into oblivion because you can. I have been attacked and going after them since 2004. Radionics is what they(service to self) use to get what they want by tapping into machines in the etheric plane. Humans have an etheric body and can access the plane without technology through so called meditation and after awhile do not even need a powerwand to send your justice. They cannot not use the real law so they turn to machines and technology to try to cheat it but they are still subject to it. If you have any questions or want some tips feel free to email me at filasm@aol.com Remember Blast em. They deserve it

Share Kassandra Project feed:Subscribe Kassandra Project

The Kassandra Project

, , , , , , , , ,

Advertisements

The Kassandra Project

Global Research, September 6, 2008

If incorporating personal details into an RFID (radio-frequency identification) chip implanted into a passport or driver’s license may sound like a “smart” alternative to endless lines at the airport and intrusive questioning by securocrats, think again.

Since the late 1990s, corporate grifters have touted the “benefits” of the devilish transmitters as a “convenient” and “cheap” way to tag individual commodities, one that would “revolutionize” inventory management and theft prevention. Indeed, everything from paper towels to shoes, pets to underwear have been “tagged” with the chips. “Savings” would be “passed on” to the consumer. Call it the Wal-Martization of everyday life.

RFID tags are small computer chips connected to miniature antennae that can be fixed to or implanted within physical objects, including human beings. The RFID chip itself contains an Electronic Product Code that can be “read” when a RFID reader emits a radio signal. The chips are divided into two categories, passive or active. A “passive” tag doesn’t contain a battery and its “read” range is variable, from less than an inch to twenty or thirty feet. An “active” tag on the other hand, is self-powered and has a much longer range. The data from an “active” tag can be sent directly to a computer system involved in inventory control–or surveillance.

But as Consumers Against Supermarket Privacy Invasion and Numbering (CASPIAN), the American Civil Liberties Union (ACLU), the Electronic Frontier Foundation (EFF) and the Electronic Privacy Information Center (EPIC) state in a joint position paper, “RFID has the potential to jeopardize consumer privacy, reduce or eliminate purchasing anonymity, and threaten civil liberties.” As these organizations noted:

While there are beneficial uses of RFID, some attributes of the technology could be deployed in ways that threaten privacy and civil liberties:

* Hidden placement of tags. RFID tags can be embedded into/onto objects and documents without the knowledge of the individual who obtains those items. As radio waves travel easily and silently through fabric, plastic, and other materials, it is possible to read RFID tags sewn into clothing or affixed to objects contained in purses, shopping bags, suitcases, and more.

* Unique identifiers for all objects worldwide. The Electronic Product Code potentially enables every object on earth to have its own unique ID. The use of unique ID numbers could lead to the creation of a global item registration system in which every physical object is identified and linked to its purchaser or owner at the point of sale or transfer.

* Massive data aggregation. RFID deployment requires the creation of massive databases containing unique tag data. These records could be linked with personal identifying data, especially as computer memory and processing capacities expand.

* Hidden readers. Tags can be read from a distance, not restricted to line of sight, by readers that can be incorporated invisibly into nearly any environment where human beings or items congregate. RFID readers have already been experimentally embedded into floor tiles, woven into carpeting and floor mats, hidden in doorways, and seamlessly incorporated into retail shelving and counters, making it virtually impossible for a consumer to know when or if he or she was being “scanned.”

* Individual tracking and profiling. If personal identity were linked with unique RFID tag numbers, individuals could be profiled and tracked without their knowledge or consent. For example, a tag embedded in a shoe could serve as a de facto identifier for the person wearing it. Even if item-level information remains generic, identifying items people wear or carry could associate them with, for example, particular events like political rallies. (“Position Statement on the Use of RFID on Consumer Products,” Privacy Rights Clearinghouse, November 14, 2003)


RFID under the skin

As the corporatist police state unfurls its murderous tentacles here in the United States, it should come as no surprise that securocrats breathlessly tout the “benefits” of RFID in the area of “homeland security.” When linked to massive commercial databases as well as those compiled by the 16 separate agencies of the “intelligence community,” such as the Terrorist Identities Datamart Environment (TIDE) that feeds the federal government’s surveillance Leviathan with the names of suspected “terrorists,” it doesn’t take a genius to conclude that the architecture for a vast totalitarian enterprise is off the drawing board and onto the streets.

As last week’s mass repression of peaceful protest at the Republican National Convention in St. Paul amply demonstrated, the Bush regime’s “preemptive war” strategy has been rolled out in the heimat. As the World Socialist Web Site reports,

On Wednesday eight members of the anarchist protest group the Republican National Convention Welcoming Committee (RNCWC) were charged under provisions of the Minnesota state version of the Patriot Act with “Conspiracy to Riot in Furtherance of Terrorism.”

The eight charged are all young, and could face up to seven-and-a-half years in prison under a provision that allows the enhancement of charges related to terrorism by 50 percent. …

Among other things, the youth, who were arrested last weekend even prior to the start of the convention, are charged with plotting to kidnap delegates to the RNC, assault police officers and attack airports. Almost all of the charges listed are based upon the testimony of police infiltrators, one an officer, the other a paid informant. (Tom Eley, “RNC in Twin Cities: Eight protesters charged with terrorism under Patriot Act,” World Socialist Web Site, 6 September 2008)

As the ACLU pointed out, “These charges are an effort to equate publicly stated plans to blockade traffic and disrupt the RNC as being the same as acts of terrorism. This both trivializes real violence and attempts to place the stated political views of the defendants on trial,” said Bruce Nestor, president of the Minnesota Chapter of the National Lawyers Guild. “The charges represent an abuse of the criminal justice system and seek to intimidate any person organizing large scale public demonstrations potentially involving civil disobedience,” he said.

An affidavit filed by the cops in order to allow the preemptive police raid and subsequent arrests declared that the RNCWC is a “criminal enterprise” strongly implying that the group of anarchist youth were members of a “terrorist organization.”

Which, as we have learned over these last seven and a half years of darkness, is precisely the point: keep ’em scared and passive. And when they’re neither scared nor passive, resort to police state tactics of mass repression. While the cops beat and arrested demonstrators and journalists outside the Xcel Energy Center, neanderthal-like Republican mobs chanted “USA! USA!” while the execrable theocratic fascist, Sarah Palin, basked in the limelight. But I digress…

Likened to barcodes that scan items at the grocery store check-out line, what industry flacks such as the Association for Automatic Identification and Mobility (AIM) fail to mention in their propaganda about RFID is that the information stored on a passport or driver’s license is readily stolen by anyone with a reader device–marketers, security agents, criminals or stalkers–without the card holder even being remotely aware that they are being tracked and their allegedly “secure” information plundered. According to a blurb on the AIM website,

Automatic Identification and Mobility (AIM) technologies are a diverse family of technologies that share the common purpose of identifying, tracking, recording, storing and communicating essential business, personal, or product data. In most cases, AIM technologies serve as the front end of enterprise software systems, providing fast and accurate collection and entry of data. (“Technologies,” Association for Automatic Identification and Mobility, no date)

Among the “diverse family of technologies” touted by AIM, many are rife with “dual-use” potential, that is, the same technology that can keep track of a pallet of soft drinks can also keep track of human beings.

Indeed, the Association touts biometric identification as “an automated method of recognizing a person based on a physiological or behavioral characteristic.” This is especially important since “the need” for biometrics “can be found in federal, state and local governments, in the military, and in commercial applications.” When used as a stand-alone or in conjunction with RFID-chipped “smart cards” biometrics, according to the industry “are set to pervade nearly all aspects of the economy and our daily lives.”

Some “revolution.”

The industry received a powerful incentive from the state when the Government Services Administration (GSA), a Bushist satrapy, issued a 2004 memo that urged the heads of all federal agencies “to consider action that can be taken to advance the [RFID] industry.”

An example of capitalist “ingenuity” or another insidious invasion of our right to privacy? In 2006, IBM obtained a patent that will be used for tracking and profiling consumers as they move around a store, even if access to commercial databases are strictly limited.

And when it comes tracking and profiling human beings, say for mass extermination at the behest of crazed Nazi ideologues, IBM stands alone. In his groundbreaking 2001 exploration of the enabling technologies for the mass murder of Jews, communists, Roma and gays and lesbians, investigative journalist Edwin Black described in IBM and the Holocaust how, beginning in 1933, IBM and their subsidiaries created technological “solutions” that streamlined the identification of “undesirables” for quick and efficient asset confiscation, deportation, slave labor and eventual annihilation.

In an eerie echo of polices being enacted today against Muslims and left-wing “extremists” by the corrupt Bush regime in their quixotic quest to “keep America safe” in furtherance of capitalist and imperialist goals of global domination, Black writes:

In the upside-down world of the Holocaust, dignified professionals were Hitler’s advance troops. Police officials disregarded their duty in favor of protecting villains and persecuting victims. Lawyers perverted concepts of justice to create anti-Jewish laws. Doctors defiled the art of medicine to perpetrate ghastly experiments and even choose who was healthy enough to be worked to death–and who could be cost-effectively sent to the gas chamber. Scientists and engineers debased their higher calling to devise the instruments and rationales of destruction. And statisticians used their little known but powerful discipline to identify the victims, project and rationalize the benefits of their destruction, organize their persecution, and even audit the efficiency of genocide. Enter IBM and its overseas subsidiaries. (IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America’s Most Powerful Corporation, New York: Crown Publishers, 2001, pp. 7-8)

As security and privacy analyst Katherine Albrecht writes describing IBM’s patented “Identification and Tracking of Persons Using RFID-Tagged Items in Store Environments,”

…chillingly details RFID’s potential for surveillance in a world where networked RFID readers called “person tracking units” would be incorporated virtually everywhere people go–in “shopping malls, airports, train stations, bus stations, elevators, trains, airplanes, restrooms, sports arenas, libraries, theaters, [and] museums”–to closely monitor people’s movements. (“How RFID Tags Could Be Used to Track Unsuspecting People,” Scientific American, August 21, 2008)

According to the patent cited by Albrecht, as an individual moves around a store, or a city center, an “RFID tag scanner located [in the desired tracking location]… scans the RFID tags on [a] person…. As that person moves around the store, different RFID tag scanners located throughout the store can pick up radio signals from the RFID tags carried on that person and the movement of that person is tracked based on these detections…. The person tracking unit may keep records of different locations where the person has visited, as well as the visitation times.”

Even if no personal data are stored in the RFID tag, this doesn’t present a problem IBM explains, because “the personal information will be obtained when the person uses his or her credit card, bank card, shopper card or the like.” As Albrecht avers, the link between the unique RFID number and a person’s identity “needs to be made only once for the card to serve as a proxy for the person thereafter.” With the wholesale introduction of RFID chipped passports and driver’s licenses, the capitalist panoptic state is quickly–and quietly–falling into place.

If America’s main trading partner and sometime geopolitical rival in the looting of world resources, China, is any indication of the direction near future surveillance technologies are being driven by the “miracle of the market,” the curtain on privacy and individual rights is rapidly drawing to a close. Albrecht writes,

China’s national ID cards, for instance, are encoded with what most people would consider a shocking amount of personal information, including health and reproductive history, employment status, religion, ethnicity and even the name and phone number of each cardholder’s landlord. More ominous still, the cards are part of a larger project to blanket Chinese cities with state-of-the-art surveillance technologies. Michael Lin, a vice president for China Public Security Technology, a private company providing the RFID cards for the program, unflinchingly described them to the New York Times as “a way for the government to control the population in the future.” And even if other governments do not take advantage of the surveillance potential inherent in the new ID cards, ample evidence suggests that data-hungry corporations will.

I would disagree with Albrecht on one salient point: governments, particularly the crazed, corporate-controlled grifters holding down the fort in Washington, most certainly will take advantage of RFID’s surveillance potential.

In 2005 for example, the Senate Republican High Tech Task force praised RFID applications as “exciting new technologies” with “tremendous promise for our economy.” In this spirit, they vowed to “protect” RFID from regulation and legislation. Needless to say, the track record of timid Democrats is hardly any better when it comes to defending privacy rights or something as “quaint” as the Constitution.

Under conditions of a looming economic meltdown, rising unemployment, staggering debt, the collapse of financial markets and continuing wars and occupations in Iraq and Afghanistan, U.S. imperialism, in order to shore up its crumbling empire, will continue to import totalitarian methods of rule employed in its “global war on terror” onto the home front.

The introduction of RFID-chipped passports and driver’s licenses for the mass surveillance and political repression of the American people arises within this context.

Tom Burghardt is a researcher and activist based in the San Francisco Bay Area. In addition to publishing in Covert Action Quarterly, Love & Rage and Antifa Forum, he is the editor of Police State America: U.S. Military “Civil Disturbance” Planning, distributed by AK Press.

Share Kassandra Project feed:Subscribe Kassandra Project

The Kassandra Project

, , , , , , , , , ,

The Kassandra Project

Your Brain On Government Privacy Invasion

The following information was evidence provided in a civil suit against the federal government in the case Akwei v. NSA (92-0449). John St. Clair Akwei is a former National Security Agency employee and whistle-blower who exposed the use of neural monitoring to spy on individuals. The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies.

(Source)

How The National Security Agency (NSA) Illegally And Unconstitutionally Harasses Law-Abiding Americans Everyday. How, you ask? Quite simply, actually. It’s done by EMF or ELF Radio Waves, and a technology known as “Remote Neural Monitoring”. Haven’t you ever wondered about that ringing in your left ear? Well, here are the reason(s). And just why should the NSA do this, you ask? To silence any who who dare to speak out against them or any other agency, or the Government or simply to think for themselves, and “outside the box”, if you will. Think not? Then, read on……….

Blanket coverage of all electronic communication in the U.S. and the world to ensure national security. The NSA at Ft. Meade, Maryland has had the most advanced computers in the world since the early 1960’s. NSA technology is developed and implemented in secret from private corporations, academia, and the general public.

Signals Intelligence (SIGINT)

The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies. Signals Intelligence is based on the fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves. The NSA/DoD has developed proprietary advanced digital equipment which can remotely analyze all objects whether man-made or organic that have electrical activity.

Domestic Intelligence (DOMINT)

The NSA has records on all U.S. citizens. The NSA gathers information on U.S. citizens who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent National Security Anti-Terrorist surveillance network in place. This surveillance network is completely disguised and hidden from the public.

Tracking individuals in the U.S. is easily and cost-effectively implemented with the NSA’s electronic surveillance network. This network (DOMINT) covers the entire U.S., involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously. Cost effective implementation of operations is assured by NSA computer technology designed to minimize operations costs. NSA personnel serve in Quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track. N.S.A. personnel in the community usually have cover identities such as social workers, lawyers and business owners.

Individual citizens occasionally targeted for surveillance by independently operating NSA personnel.

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA’s domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.

NSA’s domestic electronic surveillance network

As of the early 1960’s the most advanced computers in the world were at the NSA, Ft. Meade. Research breakthroughs with these computers were kept for the NSA. At the present time the NSA has nanotechnology computers that are 15 years ahead of present computer technology. The NSA obtains blanket coverage of information in the U.S. by using advanced computers that use artificial intelligence to screen all communications, irregardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists. These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the U.S. is a result of the NSA’s Signals Intelligence (SIGINT) mission. The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF spectrum. This equipment was developed, implemented, and kept secret in the same manner as other electronic warfare programs. With this technology NSA personnel can non-obtrusively tap into any communication device in existence. This includes computers, telephones, radio and video-based devices, printers, car electronics, and even the minute electrical fields in humans (for tracking individuals).

Signals Intelligence Remote Computer Tampering

The NSA keeps track of all PCs and other computers sold in the U.S. This is an integral part of the Domestic Intelligence network. The NSA’s EMF equipment can tune in RF emissions from personal computer circuit boards (while filtering out emissions from monitors and power supplies). The RF emission from PC circuit boards contains digital information in the PC. Coded RF waves from the NSA’s equipment can resonate PC circuits and change data in the PC’s. Thus the NSA can gain wireless modem-style entry into any computer in the country for surveillance or anti-terrorist electronic warfare. Radio and Television signals can be substituted at the receiving end with special EMF equipment. Replacing signals in Radios and Televisions is another outgrowth of the NSA’s Signals Intelligence (SIGINT) mission.

Detecting EMF Fields in Humans for Surveillance.

A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance. NSA personnel can dial up any individual in the country on the Signals lntelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S.

NSA Signals Intelligence Use of EMF Brain Stimulation

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra program of the early 1950’s, which included neurological research into “radiation” (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as “Radiation Intelligence,” defined as “information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation.” Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret. The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in die brain continuously. The NSA records aid decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In military fighter aircraft, for example.) For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia. Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain-programming purposes.

Capabilities of NSA operatives using RNM

There has been a Signals Intelligence network in the U.S. since the 1940’s. The NSA, Ft. Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brain. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech and 3D sound, and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears) and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods, and motor control. Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.

National Security Agency Signals Intelligence Electronic Brain Link Technology

NSA SigInt can remotely detect, identify and monitor a person’s bioelectric fields. The NSA’s Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz, .5 milliwatt electro-magnetic emissions from the brain. Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called “evoked potentials.” Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials.” The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain. NSA SigInt uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level). EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control. Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain). Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community. RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in That specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band. An example of EMF Brain Stimulation:

Brain Area Bioelectric Resonance Frequency Information Induced Through Modulation
Motor Control Cortex 10 HZ Motor Impulse Co-ordination
Auditory Cortex 15 HZ Sound which bypasses the ears
Visual Cortex 25 HZ Images in the brain, bypassing the eyes
Somatosensory Cortex 09 HZ Phantom Touch Sense
Thought Center 20 HZ Imposed Subconscious Thoughts

This modulated information can be put into the brain at varying intensities from subliminal to perceptible. Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived. The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to 5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to authorities about their activities against the Plaintiff in the last twelve years. The Kinnecome group has about 100 persons working 24-hours-a-day at Ft Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.

NSA Techniques and Resources

Remote monitoring/tracking of individuals in any location. inside any building, continuously, anywhere in the country. A system for inexpensive implementation of these operations allows for thousands of persons in every community to be spied on constantly by the NSA.

Remote RNM Devices

a) NSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals and can send messages through the nervous system to affect their performance.
b) [Information missing from original]
c) RNM can electronically identify individuals and track then anywhere in the U.S. This equipment is on a network and is used for domestic intelligence operations, government security, and military base security, and in case of bioelectric warfare.

Spotters and Walk-Bys in Metropolitan Areas

a) Tens of thousands of persons in each area working as spotters and neighborhood/business place spies (sometimes unwittingly) following and checking on subjects who have been identified for covert control by NSA personnel.
b) Agents working out of offices can be in constant communication with Spotters who are keeping track of the NSA’s thousands of subjects in public.
c) NSA Agents in remote offices can instantly identify (using RNM) any individual spotted in public whom is in contact with surveillance subject.

Chemicals and Drugs into Residential Buildings with hidden NSA-lnstalled and maintained plastic plumbing lines.

a) The NSA has kits for running lines into residential tap water and air ducts of subjects for the delivery of drugs (such as sleeping gas or brainwashing aiding drugs). This is an outgrowth of CIA pharmapsychology.

Brief Overview of Proprietary U.S. Intelligence/Anti-Terrorist Equipment Mentioned.

Fixed network of special EMF equipment that can read EEGs in human brains and identify/track individuals by using digital computers. ESB (Electrical Stimulation to the Brain) via EMF signal from the NSA Signals Intelligence is used to control subjects.
EMF equipment that gathers information from PC circuit boards by deciphering RF emissions thereby gaining wireless modem-style entry into any personal computer in the country.
All equipment hidden, all technology secret, all scientific research unreported (as in electronic warfare research).
Not known to the public at all, yet complete and thorough implementation of this method of domestic intelligence has been in place since the early 1980’s.

“We are rapidly entering the age of no privacy, where everyone is open to surveillance at all times: where there are no secrets from the government” ~ William O. Douglas (U.S. Supreme Court Justice)

Share Kassandra Project feed:Subscribe Kassandra Project

The Kassandra Project

, , , , , , , , ,