Архитектура Аудит Военная наука Иностранные языки Медицина Металлургия Метрология
Образование Политология Производство Психология Стандартизация Технологии


Microwave Surveillance from Commercial Satellites..



 

Also see:

 

http://rob-files.com

http://rob-profile.com/Microwave%20Surveillance%20from%20Commercial%20Satellites.doc

 

SATELLITE MIND CONTROL / ELECTRONIC ATTACK..Until recently, satellites were relatively rarely deployed this way (some say never), except when used in conjunction with cellphones and similar such devices, such as Ipods, PDAs, GPS locators, and as far as we know, never used to transmit directly a harmful signal into a person. When satellites are used, they are mostly used to track people (e.g. GPS) and to control other more powerful equipment located closer to the Targeted Individuals assigned to do the actual damage on the Targeted Individuals. However, the government has recently publicly announced that both commercial and military spy satellites will now be directly and routinely deployed to surveil Americans; the roles of satellites in mind control attacks and electronic attacks will likely vastly increase in magnitude and sophistication in the future. Satellites are also ideally suited, in conjunction with cellphones, Ipods, PDAs, etc., to induce insanity in selected individuals.

1.0 Summary of Critical Points

1.1 Microwave Surveillance techniques have been in use for over fifty years.

1.2 As a result of the deployment of commercial communications satellites around the globe since the 1970’s Microwave Surveillance from space has been conducted by governmental agencies and corporate entities against unsuspecting citizens without any governmental oversight whatsoever.

1.3 The effects of human exposure to elevated levels of microwave radiation range from discomfort to death- an effect called Electronarcosis.

1.4 Sufficient information about Microwave Surveillance is available that any citizen or organization desiring an understanding of this technology and its effects will find public source documentation which covers most aspects of the technology’s use and abuse.

1.5 Reporting criminal misuse of Microwave Surveillance techniques is virtually impossible because of poor information transfer within the law enforcement community, lack of training on the part of law enforcement professionals, and, all too often, bad attitudes.


2.0 Statement of Problems to be Resolved

2.1 Would the United States Congress have the people that they are elected to serve believe that they are too busy to develop cognizance about Microwave Surveillance technology when a portion of each year’s federal budget is directed toward the acquisition of new equipment from this technology area? Solution- make the U.S. Congress aware of the problems and potentials associated with Microwave Surveillance.

2.2 Would the United States Department of Justice have the people that they are sworn to serve and protect, believe that they are too busy to develop any sort of understanding about a technology which is documented in their own literature and deployed by Special Agents on their payroll? Solution- help the United States Department of Justice to gain a broader awareness of the problems and potentials associated with Microwave Surveillance.


3.0 Commercial Communications Satellites for Microwave Surveillance

In October of 1945, a gifted science and science fiction writer proposed the extraordinary idea of using stationary satellites to beam television and other communications signals around the world. Arthur C. Clarke (2001: A Space Odyssey, Rendevous With Rama, The Hammer of God, ect.) reasoned that if a satellite were positioned high enough above the Earth’s equator, its orbit could be matched by the rotation of the Earth. The satellite would then appear to be fixed in one particular spot in the sky. Because a satellite’s orbital speed varies with its distance from the Earth, a “geostationary” orbit is only possible directly above the equator, in a narrow belt about 22,300 miles out. Although it took the technology a while to catch up with his simple but elegant concept, today there are hundreds of satellites taking advantage of his original thinking. In recognition of his pioneering vision, this band of outer space ”real estate” is called the Clarke Orbit.


In 1965, the Early Bird satellite became the world’s first commercial geostationary satellite. It could carry 240 telephone communications circuits, or one television channel. On June 2, 1965, Early Bird introduced live television across the Atlantic Ocean. Early Bird was the first satellite to be owned and operated by the International Telecommunication Satellite Organization (INTELSAT).


First Canada, then the United States, and subsequently other countries constructed their own geostationary satellite systems. Each new satellite had greater capabilities, expanding our ideas of the technically possible. As of early 1998, there were more than 150 domestic and international communications satellites in geostationary orbit over the Earth’s equator.


3.1 Uplinks and Downlinks

Each satellite is both a receiver and a transmitter. First, the ground station, also called the uplink, sends a signal to the satellite. The satellite automatically changes the signals frequency and retransmits it back to stations on the ground. This second path is called the downlink. A satellite is much like a broadcasting tower 22,300 miles high, an automatic relay station that can transmit into a coverage area, which encompasses up to 42.4 percent of the Earth’s surface.


Each satellite has a number of redundant modules, spare components that can be switched into operation in the event that any malfunction occurs. Ground control stations can remotely switch in backup facilities in case of failure.


3.2 Satellite Transponders ( dated information )

Every communications satellite carries several channels, called transponders, which process communications traffic. Most satellites have sixteen or more transponders in operation, each capable of transmitting one or more television signals as well as thousands of simultaneous telephone conversations.


The satellite frequency “bands” are located high above those used by earth-bound TV channels. Sunspots, and/or other atmospheric conditions, do not affect these super-high frequencies. Satellites therefore provide extremely reliable communications coverage 24 hours a day.


Operating at frequencies of several billion cycles per second, or Gigahertz (GHZ), the region’s satellites relay communications via two distinct communications bands. North America’s high-power services use frequencies ranging from 12.2 to 12.7 GHZ. A few operators using medium-power satellites use adjacent frequencies from 11.7 to 12.2 GHZ. The entire frequency spectrum from 10.7 to 12.75 GHZ is commonly called the “Ku” band. Throughout the Americas, numerous other satellites are available that operate within a lower frequency spectrum ranging from 3.7 to 4.2 GHZ (the frequency of observed Microwave Surveillance operations). This frequency range is known as the “C” band.


3.3 Footprints to Surveillance

The satellite’s transmission area covers a certain part of the Earth’s surface, called a footprint. An agency, such as the Florida Public Service Commission, with access to a satellite’s operating codes can “commandeer” the services of one of the satellite’s transponders and conduct surveillance of a targeted individual and intercept all conversations and sounds within the surroundings of this individual.

'GlowWorm Surveillance' allows individuals to be tracked “under ground, under water, anywhere”. This writer has three gold bridges, each of which is at least three centimeters long. So long as the wavelength of the transmitted signal is shorter than the targeted object, which in this case it is, the signal will bounce back to the sender like a radar image.


3.4 Surveillance..

Externally induced auditory input could be achieved by means of pulsed microwave audiograms, or analogs of spoken word sounds. The effect on the receiving end is the (schizophrenic) sensation of “hearing” voices which are no part of the recipients own thought processes.

Such a device has obvious applications in covert operations designed to drive a target crazy with hearing “voices”.


Tracking a target with a satellite-based communication signal, capturing the sounds in the targeted individuals environment via the transmission of “voices” from the ground control station across 44,600 miles of space into the head of the targeted individual create a starting point for understanding the danger of covert Microwave Surveillance operations.


4.0 Electronarcosis and Signals Interception

One way that Electronarcosis effects are produced is through the raising of the temperature of the targeted individual. When water molecules are heated, the body temperature rises. Between 105 and 107 degrees Fahrenheit the targeted individual will experience a seizure- at 109 degrees, death occurs.


Being targeted by the Active Denial System, a HUMVEE configured with a microwave transceiver and a parabolic transmission dish on its roof. Transmitting at 98 Gigahertz (GHZ), the unit will beam a focused beam of microwave radiation used to disperse crowds. The same painful effect is felt by an individual targeted by a microwave satellite transmission generated in the range of 3.7 to 4.2 GHZ, C-Band satellite operations.


The other way that Electronarcosis works is through the disruption of brainwave functioning by overloading the electrochemical operation of the brain with a steady, elevated level of microwave radiation. A victim will experience disorientation, vertigo, and nausea, echoing the painful, debilitating effect that can be induced by a focused beam of microwave radiation.


Signal interception of brain wave activity, is one of the most fascinating and interestingly, unmentioned characteristics of "Microwave Surveillance" operations. This ability to capture and record the images generated in the Visual Cortex and the sounds of a person’s inner dialogue.

The measurement of brain waves, Alpha, Beta, Delta, and Theta, by Electroencephalography (EEG) is an accepted practice around the world. The capturing, on-screen presentation, and recording of mental images and dialogue intercepted by a focused beam of microwave radiation, even a beam bounced off a satellite 22,300 miles above the equator, is a capability is retarded by misdirected security status priorities and gross misinformation.

 

 

 

 

'Gang Stalking'.."Electronic Gang Stalking" (EGS); "Massive Electronic Attack Nightmare" (MEAN) - sometimes called, "electronic gangstalking," "microwave gang stalking" and also including such technologies as "ultrasonic gang stalking"..

Gang Stalking is experienced by Targeted Individuals as psychological attack, that is capable of immobilizing and destroying a target over time. The covert methods used often leave no evidence to incriminate the Civilian Spies. It's similar to workplace mobbing, but takes place outside in the community. It's called 'Gang Stalking', because groups of community Spies organise to stalk and monitor targets 24/7. Gang Stalking is a systemic form of control, which seeks to destroy every aspect of a targeted Individuals life. A covert investigation is opened and the target is followed around 24/7 by informant, cops, community groups, local companies, private foundations, federal agencies. Overt and covert methods are used as part of the surveillance process. An especially sadistic form of electronic attack and mind control attack is apparently becoming much more widespread. We call it the, "Massive Electronic Attack Nightmare" or MEAN. It is also popularly known as the "Electronic Gang Stalking" scenario or EGS. A MEAN or EGS Targeted Individual experiences widespread and varied manifestations because he/she is the victim of at least several different same-time-frame (not always simultaneous) mind control and electronic attack systems - usually including both electromagnetic and ultrasonic modalities, and both external devices and electronic implants. Under a MEAN attack, virtually no matter where the Targeted Individual goes or what he/she does or what time it is or who accompanies the Targeted Individual, he/she suffers greatly. Electronic attacks may be continuous, sporadic/random and/or periodic. The term, "gang stalking" or "gang mobbing, "which probably goes back to at least the 1950s, involves a covert and continuous psychological warfare conspiracy against a victim done in such a way as to make each individual part of the attack easily explainable (and thus not prosecutable) as mere "coincidence," "random event," "unexplainable event," "life's breaks," "bad luck," "imagined" or similar, but when considered in their totality evidences a complex and usually well-planned conspiracy to persecute, taunt and harass the victim for whatever reasons the perpetrators operate under to mentally, physically, financially and/or reputationally injure, discredit or destroy the victim. The perpetrators often have unknown connections between each other (e.g. belong to the same criminal organization, religion, cult, political group, special interest group, commercial group, government, etc.). It is the same ancient concept of killing an enemy by inflicting a thousand small cuts to inflict maximum pain and suffering from beginning to end. "Electronic gang stalking" - sometimes called, "electronic gangstalking," "microwave gang stalking" and also including such technologies as "ultrasonic gang stalking" - is simply gang stalking using electronic harassment, electronic attack, and brain entrainment and other mind control attack techniques. We prefer the MEAN term because "gang" means more than one perpetrator, while today all it takes is one perpetrator to be able to control - often on a remote control, programmed and/or automated basis often using artificial intelligence - all the equipment he/she needs to simultaneously perpetrate massive mind control or electronic attack on their victims.

There was a time when MEAN attacks were relatively rare because the sophistication, manpower, expense and time involved to create, integrate and operate a functional MEAN system were prohibitive to almost everyone. At that time, MEAN Targeted Individuals - less than about 1% of all mind control and electronic attack victims - were either almost always very important people like major Government officials, CEOs of major corporations, important scientists and engineers or super spies, or they were so hated by powerful people that it was worth their tormentors to attack them. However, with today's circuit minituarization, computer automation, powerful electronic design programs, artificial intelligence, and mind control and electronic attack technologies now available to virtually everyone and often ecomically affordable by most people, a powerful MEAN system can be created and deployed in minimal time, and with minimal expertise, expense and manpower. One part-time MEAN perpetrator can now keep MEAN systems operating on several Targeted Individuals at the same time on a remote control, programmed and automated basis, often using artifical intelligence to both control and optimize his/her system.
MEAN electronic attacks usually start out as simple electronic attacks. If the perpetrator then determines that the victim is not using effective countermeasures (e.g. shielding, jamming, detection, avoidance/evasion, documenting to increase credibility with authorities ), then escalates into more systems of attack. It's just like if someone punches you and you put up no effective resistance, chances are he/she will stomp you to death, but will often move onto an easier target if you punch back at the start. So the faster the victim deploys effective countermeasures against electronic attack, usually the better success at stopping escalation to a MEAN level of electronic attacks. No single electronic countermeasure device will defeat a full-blown MEAN attack. If you are a MEAN Targeted Individual, you may require numerous electronic countermeasure devices. Even so, no one can guarantee that the MEAN attack can be defeated because MEAN attackers are often highly motivated, persistent, intelligent and with greater resources than simple electronic attackers. In virtually all cases of mind control, electronic attack, mind reading, etc., it is much easier and cheaper to render an attack than to defend against one just as it is much easier to fire a shotgun than to defend yourself against 100 shotgun pellets coming at you at once. If a MEAN attack is not entirely defeated, it usually can be at least jammed and/or shielded against to tolerable levels. Or its location detected, which often identifies the attacker, permitting the victim to legally retaliate as well as to jam, shield against or evade future attacks.

The Informants can be parts of these community oriented policing programs, but often they are just average citizens. Just like with Cointelpro investigations, everyone in the targets life is contacted and asked to be a part of the ongoing, never ending monitoring (systemic harassment), which is designed to destroy the target over years and leave them with no form of support.

While there are all kinds of laws and regulations regulating experiments on animals, there are no laws protecting people. This is why government agencies can experiment on YOU. There is no recourse at this time for anyone wanting to "unvolunteer" themselves from these experiments. There are no meters available to the average citizen that will detect and therefore prove the use of DEW being used against anyone. These directed energy weapons (DEW) can damage tissue, induce mood swings, loss of memory, and cause a wide variety of physical symptoms. Yet the DEW are just as effective as a bullet in "nullifying" the targeted individual. While there are laws regulating guns, there are no laws regulating DEW. Basically, the "hit men" deploying these weapons can never be detected. This is tantamount to having a firearm with a disappearing bullet. Granted, death occurs more slowly than by bullet, often appearing to be from natural causes, however; when death does occur, there is no "manhunt". No one is brought to trial, the "hit man" goes free, moving on, no doubt, on to the next "hit." Murder done slowly enough goes unnoticed.

 

Many Targeted Individuals are harassed and placed under surveillance in this way for months or even years before they realise that they are being targeted by an organised protocol of harassment.

What happens during this Gang Stalking surveillance is very similar to what happened to many innocent individuals in the former East Germany or Activists and Dissidents in Russia. Many innocent people in the former East Germany would be targeted for these harassment programs, and then their friends, family, and the community at large would be used to monitor, prosecute, and harass them. In Russia it was used by the state to declare activist, dissidents or anyone they thought to be an enemy of the state as mentally unfit and many were institutionalised using this form of systemic control.

The closest thing to Gang Stalking that democratic countries have seen before this is McCarthyism, Cointelpro, and RED SQUAD programs. Red Squad programs were used for monitoring, and harassment of various groups. They have been in place for over a hundred years, and they also employed Covert Human Intelligence Sources.

Civilian Spies, also known as "Covert Human Intelligence Sources" are recruited from every level and sector of society. Just like with Cointelpro investigations, everyone in the targets life is made a part of this ongoing never ending, systemic psychological harassment and manipulation of the target. These actions are specifically designed to control the target and to keep them in line. These actions are also designed to destroy the target over years, make them look crazy and leave them with no form of support.

For the targets of this harassment, Gang Stalking is experienced as a covert psychological, emotional and physical attack, that is capable of immobilizing and destroying a target over time. For the state it’s a way to keep the targets in line, control them, or destroy them.

Worldwide programs of control and conformity have been used with equal success and lethality. What we are seeing now is a global co-ordinated and organised effort of control and conformity. Many countries around the world are currently using a model of policing called: Community Oriented Policing. It's described as a systemic approach to policing. It focuses on instilling a sense of community within a geographically located neighborhood. Communities come together and discuss what values they would like to have in their community, community development, and it's also a time to discuss any problems that might be happening in a specific area. If a problem is identified an investigation might be opened. These local programs in many countries have been forming partnerships with other government run programs at, provincial, state and federal levels. Reports of Gang Stalking are not only coming in from democratic countries, but they are coming in from many other countries as well.

The modern day systemic form of control could only be funded at higher governmental levels, just like it has in other societies where these similar types of harassment programs have been implemented. It's all part of a system of control and conformity that has been in place for many years. A system of control with many local groups and appendages taking part.

 

 


Поделиться:



Последнее изменение этой страницы: 2019-03-22; Просмотров: 479; Нарушение авторского права страницы


lektsia.com 2007 - 2024 год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! (0.032 с.)
Главная | Случайная страница | Обратная связь