Main Menu
Updates
-
Update: December 09, 2024
Found A New Place....more - Important Updates
- Previous Updates
- Attack Log
Donations
- I accept cryptocurrency & PayPal
Available Books
New World War: Revolutionary Methods for Political Control
Dedication & Thanks
Volume I: Current Political Situation
- Overview
- Introduction
- Revolution in Warfare
- The Other World
- Dictatorship Creation
- The Groups Facilitating the Revolution
- Their Goal is Neo-Feudalism
- Problem-Reaction-Solution
- Volume I Commentary
Volume II: The New War
- The New War
- The New Enemy
- Initiatives to Remove Civil Liberties
- The Investigation
- Surveillance Technology and Methods
- Mind-Reading
- Volume II Commentary
Volume III: Weapons of The New War
- Introduction to Nonlethal Weapons
- Psychological Operations
- Introduction to Directed-Energy Weapons
- High-Powered Microwaves
- High-Powered Lasers
- Sonic Weapons
- Computer Network Operations
- Microwave Hearing
- Silent Subliminals
- Use of Citizen Informants
- Chemical and Biological
- Weather Warfare
- Miscellaneous Weapons and Tactics
- Volume III Commentary
Volume IV: The Coverup
- Volume IV Introduction
- Schizophrenia Spectrum Disorders
- Control of the Medical Industry
- Another Look at Schizophrenia
- Political Considerations
- Punitive Psychiatry in Communist Russia
- Coverup Initiatives
- Volume IV Commentary
- Conclusion
Appendix
- A Brief History of PsyOp
- Small-Scale Wars
- Nongovernmental Organizations
- Human-Computer Intelligence Network
- Electronic Tyranny
- Other Devices Connected to the GIG
- My Experience
- Sources
Other Sites
There have been multiple statements recently by government and official sources regarding the surveillance that is now being conducted globally. The investigations against political dissidents are aggressive and continuous.
For instance, a May 2003 report by Toffler Associates mentioned 24/7 “global persistent surveillance” accomplished using all sources. According to the report, surveillance technology is to be used to make the targeted individual aware that they’re being watched, in order to alter their behavior. They explained: “Technology will afford the power of observation to operationally affect the behavior of targets. ... This uncertainty, in itself, will be a lever available to persistent surveillance operators.”
In 2005 the RAND Corporation likewise announced in its Toward a Revolution in Intelligence Affairs publication: “Adversaries that know that they are persistently being watched are likely to change their behavior.” The US Army mentioned that aggressive and continuous surveillance will be used against the enemy.
The DSB commented in its 2004 task force report that “intrusive and persistent intelligence against any potential global adversary,” will be used. “Above all,” announced the DOD in February of 2006, “persistent surveillance and vastly better intelligence” will be used against enemy personnel.
Surveillance technology has been described as any system that can monitor or track the movements of individuals or their property. Satellites, millimeter waves, radar, x-rays, and radio waves are being used for surveillance. Different frequencies of EM energy vary in their ability to pass through objects.
Sensors are devices used for surveillance and weapons targeting.1 They are often integrated into C4ISR systems. Usually, each sensor is designed to detect something specific, which is why they are often networked. A network of a variety of sensors forms the core of most high-tech surveillance systems. At any level of the battlespace sensors can be installed.
Sensors can scan for radio frequency signals which emanate from various types of equipment or machinery. They can detect vibrations, heat, and magnetic fields. Sensors exist that can monitor the external environment such as ambient temperature, rainfall, wind, and solar radiation to provide information on a subject’s immediate surroundings.
A network of multi-modal (multi-sensory) sensors is able to detect the same stimuli as that of a human being. There is a vast amount of sensor types. They can be used to monitor living creatures, vehicles, ships, aircraft, etc. Sensors communicate with each other as well as a base station.
Sensors known as smart dust are as small as a spec of dust. They are basically microelectromechanical particles that relay information to a base station. Although each spec only has a basic function, deployed in a network of thousands or millions, they can provide much information.
Sensors can be deployed on satellites, UAVs, aircraft, underwater, and ground stations. They can be fixed or dropped from the air using UAVs. Some are designed to function in all weather conditions. Fixed sensors which can be installed near the subject are known as proximate or close-in sensors. Standoff (distant) sensors can remotely detect signals. Standoff and proximate sensors can be networked in combination to provide real-time actionable information.
The DOD has done a vast amount of research on sensor technology. Sensors will be used to track individuals, groups, and vehicles every place they go after they have been tagged. Sensors continue to become smaller and cheaper. Supersmart, programmable, self-producing nanosensors are said to be under development.
Millimeter waves (MMW), in the frequency range of 30 to 300 GHz, are like X rays which can see through walls, only they are more accurate and less hazardous. Different frequencies of MMW can be used for different purposes. For instance, a device can be tuned to pass through walls to search a home. The human body emits small amounts of millimeter waves which allow it to be detected through structures. MMV can also be tuned to see through a person’s cloths, or to search the contents of their belongings.
The objects which interact with a MMW device are converted through a computer to viewable images. MMW has been used in airports to screen passengers and urban combat settings to detect enemy combatants. This technology is said to be able to spot a single insect inside a piece of wood. Acoustic systems also exist which can see through walls and providing images of objects behind them.
Ground penetrating radar (GPR) can be used to detect underground facilities as well as people inside buildings. The GPR is connected to a computer and software exists which sharpens the images.
Satellites can be used for surveillance or for directing and guiding weapons attacks. According to the DSB, satellites will be used to accomplish the persistent global surveillance of targeted individuals who have been tagged.
Lasers can be used for high-precision locating and tracking in conjunction with radar systems. In passive mode, SBLs can allegedly observe objects and provide output at high resolutions. It has been suggested that SBLs can eventually be used to provide battlespace illumination, which is basically a space-based laser flashlight that can be shined anywhere on the planet.
As a future capability, the Air Force mentioned using a network of lasers connected to a computer that emit a wide range of frequencies to accomplish the complete internal and external inspection of a structure and produce a 3-dimensional image. DARPA has been working on similar technology to create detailed maps of the inside of structures without entering them.
A multi-purpose platform based in Gakona Alaska known as the High Frequency Active Auroral Research Project (HAARP), can also be used for remote surveillance, including the detection of underground structures, and strategic communication. More on HAARP will be covered in the Weather Warfare chapter.
Endnotes
1 As an example of the precision of the tracking and targeting of these sensors, the DOD has repeatedly demonstrated the ability to stun a fly in flight so that it falls right in front of me.