Monday, March 14, 2022

Part 8 : Under an Ionized Sky From Chemtrails to Space Fence Lockdown....The Temple of CERN...The Covert Ascendance of Technocracy

Under an Ionized Sky
From Chemtrails 
to 
Space Fence Lockdown
by Elana Freeman
Chapter 9 
The Temple of CERN

The first gulp from the glass of natural sciences will turn you into an atheist, but at the bottom of the glass God is waiting for you. 
— Werner Heisenberg 

The Higgs potential has the worrisome feature that it might become mega-stable at energies above 100bn giga-electron-volts (GeV). This could mean that the universe could undergo catastrophic vacuum decay, with a bubble of the true vacuum expanding at the speed of light. 
— Stephen Hawking, 
preface to Starmus 

CERN is an acronym for Conseil Européen pour la Recherche Nucléaire, the European Organization for Nuclear Research. The site housing the massive particle accelerator known as the Large Hadron Collider (LHC) 1 was built (1998–2008) near Lake Geneva (Lac Léman). Two 1,000-ton superconducting magnets hang suspended down three-hundred-foot shafts into a cavern through which an underground river once ran until frozen with liquid nitrogen. The magnets are arranged like boxcars around the five-story, sixteen mile (twenty-seven-kilometer) “ring” circling the cavern. Two detectors are built into the loop, the Compact Muon Solenoid (CMS) and A Toroidal LHC ApparatuS (ATLAS). Designed to detect tiny subatomic particles like Z bosons, pi mesons, strangelets (quarks bound by gluon), etc., the LHC “ring” is in search of “clues to the fabric of the universe”: 

[Dan Green, project manager:] “We expect to see things which will change the way we view the universe”. . .No one really knows what the machine will give birth to. But the equations suggest that some weird stuff could be just around the corner— maybe “dark matter,” the invisible stuff that seems to hang around galaxies.” 2 

The phrase “No one really knows what the machine will give birth to” is reminiscent of what DWave’s Geordie Rose says later in this chapter. Haunting. 

CERN’s massive superconducting electromagnets enhance and magnify the sustained reach of the Space Fence throughout our now-ionized atmosphere all the way to the magnetosphere. Certainly, CERN and other particle accelerators have been recalibrated to synchronize with the rest of the Space Fence infrastructure. CERN’s two-year shutdown corresponded with HAARP’s shutdown, and its restart on April 5, 2015 was just four months before HAARP (“UAF Gakona”) resumed. 3 All systems connected with monitoring and controlling geospace, the ionosphere and magnetosphere, and harnessing cosmic processes to serve the Space Fence, have been upgraded and synchronized, including the International Space Station (ISS). 

CERN studies how cosmic rays affect the plasma clouds now being produced in the troposphere and stratosphere by chemtrail jets, ships, and sounding rockets, as well as how to keep the electromagnetic circuit depositing ions to form the molecules that create plasma—molecules that CERN propagates via its CLOUD experiments. 

The Cosmics Leaving Outdoor Droplets (CLOUD) experiment uses a special cloud chamber to study the possible link between galactic cosmic rays and cloud formation. Based at the Proton Synchrotron (PS) at CERN, this is the first time a high-energy physics accelerator has been used to study atmospheric and climate science. The results should contribute much to our fundamental understanding of aerosols and clouds, and their affect [sic] on climate. 4 

Remarkably similar to Tesla’s Wardenclyffe Tower dome, CERN’s Globe of Science and Innovations generates and feeds energy into the Global Atmospheric Electrical Grid. Similar to the Space Fence, CERN’s mission includes creating and sustaining an atmospheric medium for wireless power (C4). 

CERN’s mission of inducing voltage into the Global Atmospheric Electrical Grid is being accomplished by the ionic jet outflow perpendicular to the Globe of Science and Innovation. Ions are increased in energy and ejected into the Ionosphere by the phenomena patented by [David] La Point. Once that charge potential is induced into our environment, it can be used for wireless energy harvesting globally. The technology is being developed by DARPA: Fractal Rectenna [receiving antenna] Array technology. 5 

The present count of particle accelerators affiliated with an international partnership of thirty-four institutions is as slippery as ionospheric heaters, but at least three in the United States are part of the more than 160 international support particle accelerator groups connected via ESnet5 (Energy Sciences Network) 6 fiber optics. Including CERN, particle accelerators generate 100X more magnetic energy than the entire planet naturally generates, especially when synchronized with mirrored satellite lasers creating electrical discharges (sprites). 

Fermi National Accelerator Laboratory at the FermiLab outside Chicago in Batavia, Illinois, was recently upgraded with a 680-ton superconducting magnet for its Tevatron. 

Los Alamos National Laboratories houses the High Current Proton Accelerator. 

Brookhaven National Laboratory houses the Cosmotron. As I indicated in the Preface, BNL may have participated in the downing of the World Trade Towers in 2001. Here is David Masem, advanced technology engineer and senior Unix administrator who worked at BNL 2000–2003. As per his request, his story is quoted at length so readers can get a picture of what national labs are like: 

When I worked at BNL, director John Marburger III, Ph.D., had just been chosen to serve as science advisor to President George W. Bush. The head of the physics department then became the acting director. As he was a personal friend of my manager, I was given free rein at the RHIC particle accelerator (Relativistic Heavy Ion Collider) and collision detect for Project Aerosol’s study of aerosol and nanoparticle impact on the environment under SAG (Stratospheric Aerosol Geoengineering) research. As a Unix Systems Administrator, I configured real-time Unix servers to perform samplings of collisions of positive and negative charged ions. I also configured Apache websites (just templates) for publishing the physicists’ findings. During one of my Project Aerosol meetings, I found out that a mini-HAARP was under construction. There are a number of reactors there, several defunct and several more popular gradient & graphite reactors for which I had no clearance. 

Since I worked closely with the physicists, I was friended by several from Europe who were also working on the CERN. Over lunch one day at the BNL commissary, one physicist announced that he was going to publicly denounce BNL for its involvement in geoengineering research. But he never had the chance to do so as he had an “accident” in Pt. Jefferson while on his motorcycle and was pronounced dead at the scene. As a result of his “accident,” I started to hack around a bit to find out more about Project Aerosol research, as all of this technology was new to me. Around that time, my manager was transferred to the physics department after the U.S. Navy brought in a lieutenant dressed in civilian clothes to manage the IT department. He made my life hell, moving me out of my capacity and taking me off all the projects I was involved with on the RHIC and the cluster server, then banishing me to do departmental backups. I knew it was because of my hacking around. Subsequently, I left BNL. Much of the IT department was outsourced after a new director arrived. 

I can definitely testify that BNL has intranet access to CERN. I did an upgrade on BNL’s cluster server and had to log in and test the link to make sure that our CERN link was back up and online. BNL also has a supercomputer that was built in-house with a proprietary link to both CERN and Japan’s ILC (International Linear Collider) and the KEKB accelerator. I knew this for a fact as one weekend I worked on upgrading storage arrays on BNL’s cluster while a physicist and a hardware technician I knew were doing a hardware upgrade on the BNL supercomputer. I remember they were quite concerned about the proprietary intranet links when they failed to come up after the upgrade. 7 

How many particle accelerator labs are still active and how many are proof of concept labs receiving data from LHC particle detectors for number-crunching and computer modeling is hard to say. Wikipedia (notoriously unreliable) lists many as having been shut down—or did they just “go black”? The site “Particle Accelerators Around the World” (www-elsa.physik.uni-bonn.de/accelerator_list.html) seems accurate, though again, who knows, given that most of the programs are geared to researching kinetic weapons and not physics per se? 

Take the eight-hundred-foot “Desertron” Superconducting Super-Collider (SSC) in Waxahachie, Texas near Dallas, a fifty-four-mile-long tunnel 250 feet under the Earth’s surface with a “ring” circumference of 87.1 kilometers and an energy of 20 TeV8 per beam of protons—3X that of the LHC (7 TeV per beam). Protons hurtling at the speed of light (harmonic 16944), antimatter collisions shattering quantums of energy. The Desertron was to build and test superconducting magnets for other supercolliders (plus magnetic-levitation trains or maglevs, motors, energy storage, low-loss power distribution, etc.). Construction began in 1991 but by 1993 the story was that the Desertron was hopelessly over budget with just 22.5 km of tunnel and seventeen shafts completed, so it was shut down. In 2006, the Department of Energy purportedly sold it to Arkansas multimillionaire Johnnie Bryan Hunt whose dream was to build the Collider Data Center. 

Hunt’s unique selling point for Collider Data Center was its location and infrastructure. The collider sits on an independent power grid capable of delivering 10 megawatts of power (and up to 100 megawatts if needed), and it has its own dedicated fiber optic line. Its two warehouses can support floor loads of 500 pounds per square foot, perfect for the enormous servers that Hunt intended to buy. The entire complex is clear of flight paths and out of hurricane, tsunami, earthquake and flood zones. 9 

But then Hunt “slipped on ice” and died, so the half-dug underground facility again sat idle—or did it? 

Earlier, I stressed that HAARP experiments have damaged the ionosphere and weakened the magnetosphere. CERN, in tandem with scalar interferometers like HAARP, is no doubt complicit, as well, but could also offset impact on the magnetosphere. “Ripples” in the magnetosphere can cause airplanes to literally drop from the sky. Rumors about CERN flew when on March 24, 2015, Germanwings Airbus A320 went from a cruising altitude of 38,000 feet to a rapid descent over the French Alps 127 miles from CERN. Only 10 percent of airplane crashes occur after a plane reaches cruising altitude. 

On April 23, 2016, the magnetosphere collapsed (“disappeared”) for two hours. While it is tempting to blame the LHC superconducting magnets, CERN watcher Anthony Patch insists that at that time the LHC was running at low luminosity and producing corresponding low-duration energies and lower field intensities. 10 So no, it wasn’t the LHC that caused the magnetosphere to “disappear” for two hours: 

We can, however, attribute these gaps in the electromagnetic lines of force to actions by the numerous HAARP antennas established around the planet. No longer are they simply heating the ionosphere and similarly targeting terrestrial areas to trigger earthquakes and volcanoes. Indeed, these are man made events. Of recent, most HAARP installations have been revamped, resulting in higher output and range [due to working together at exact calibrations]. These are the cause and effects noted in our [magnetosphere] shields, not the reduced power levels of the superconducting magnets arrayed to the Main Ring of the Large Hadron Collider. 11 

Disruption of the magnetosphere means that more gamma rays and X-rays can access our atmosphere. 

Echoing the Stephen Hawking quote at the beginning of this chapter, professor Otto Rossler at the University of Tubingen in late 2008 went so far as to file a lawsuit against CERN with the European Court of Human Rights on the grounds that the facility might trigger a mini-black hole that could annihilate the planet. 12 The lawsuit was thrown out. 

However, if Rossler was referring to CERN’s antimatter experiments, he was right: when matter comes in contact with antimatter, it is destroyed. Unstable and needing careful containment, if just one millionth of a gram is loosed, it equals 37.8 kilograms (83 pounds) of TNT or 10 billion times a high explosive. 

ANTIMATTER 
The study of matter, what it is and isn’t, has obsessed Western science since the eighteenth century, as has the determination to probe its origins. We now know that the reality our five senses perceive is actually a complex pattern of interlocking wave forms, much as was envisioned in the final scenes of the 2003 film The Matrix Revolutions. What we see as “matter” is the positive cycle of a wave pulsing into existence while in a hyperdimension its negative cycle manifests as antimatter. Quantum physics and harmonics mathematics may be preparing humanity for encounters beyond what occultists have for centuries termed the Threshold or Veil. 13 (At CERN, it’s known as the “containment wall.”) 

Think of antimatter/matter as the yin/yang of reality, the building blocks of atoms being electrons (-) and protons (+), each with its own antimatter and opposite charge, as was mentioned in Chapter 7 while discussing lightning, a natural particle accelerator producing antimatter. Chapter 6 mentioned how lightning is the natural “particle accelerator” that produces antimatter, and how sprites are now being manufactured to do the same. 

With terms like “Higgs boson” and “God particle,” CERN claims to seek the “glue” binding all matter together. What it really seeks is the antimatter rooted beyond the Threshold of earthly existence.

In 2004, the U.S. Air Force publicly announced that it was pursuing antimatter weapons, “the eerie ‘mirror’ of ordinary matter.” 14 With antimatter in hand, positron bombs would be “clean” bombs that wouldn’t eject plumes of radioactive debris. But on Eugene Mirman’s Star Talk radio program, astrophysicist Neil de Grasse Tyson blew holes in the military’s naïve way of thinking: “Ask yourself: How much energy is keeping [the planet] together? Then you put more than that amount of energy into the object. It will explode.” 

Are some of the world’s particle accelerators already in the antimatter weapons business? 

Antimatter being on the other side of the containment wall, enough strangelets must be produced so that an explosive potential can tear the Veil, expose the antimatter realm, and alter the very fabric of Space. Anthony Patch says that the right number of strangelets can change a planet into a neutron star. (Shades of Stephen Hawking’s misgivings.) Blast the containment wall and psycho-energetics 15 will leak through, operating on the same scalar “channel” as visions, dreams, “spooky action at a distance” (quantum entanglement), synchronicities, and déjà vu—all of which share a frequency signature and resonance with another, unseen side of existence. 

Having deciphered antimatter’s signature and breached the Threshold, CERN opens the way to impact everyone’s antimatter “tether.” For example, if it is true that CERN has breached the Veil and opened an aperture (“portal”) welcoming antimatter into our dimension, it seems obvious that if antimatter is the yin to matter’s yang, antimatter entities now in 3-space will need to either produce a plasma body (plasma being the fourth state of matter) or occupy a body possibly already occupied. 

In a quantum entanglement era, such a line of thinking is no longer so far-fetched. After all, the military-intelligence apparatchik has been studying paranormal events and parapsychology for decades—ever since antimatter was discovered in 1955, as a matter of fact. And if dark matter and the Higgs Field are wherever matter isn’t—like antimatter and æther 16—then proximity to the Threshold probably quickens paranormal and parapsychological events. Which brings up questions regarding the relationship between the paranormal and antimatter, beginning with What, if anything, are scientists and staff at CERN experiencing? 

CERN PSYOPS 
The fact that the LHC’s huge, circular dharma-like geometry has been compared to ancient technologies like the Egyptian pyramids points to its mythical stature: a vast, complex technology in quest of the tiny building blocks of the universe. Is CERN the global elites’ Mecca or Rome “hidden in plain sight”? Headlines in publications for the masses like the British Sunday Express—“Scientists at Large Hadron Collider hope to make contact with PARALLEL UNIVERSE in days” (August 15, 2015)—make CERN larger than life. Rumors of subterranean CIA headquarters beneath Lake Geneva add to the diversion from what is really going on there, and at the same time assure the scientifically minded that nothing but “science” is going on at CERN and that the choreographed shiny LHC-like revolving sigils and Saturn “rings” zipping around the Earth on news shows as tones deepen the state of TV trance are simply coincidental. 17 


The statue of the Hindu goddess Shiva Nataraja began dancing the Anandatandava or Cosmic Dance of creation and destruction outside CERN headquarters in 2004. The town in France that CERN’s presence dominates is called Saint-Genis-Pouilly, Pouilly referring to the Latin Appolliacum, a Roman temple honoring Apollo and therefore a gateway to the underworld. But perhaps Shiva is dancing for the Indian Apollyon, primordial destructive force of the universe . . . 

Meanwhile, ritual and “mirrored” events are being leaked to the Internet and press to further obfuscate public perception: 

~March 9, 2015, the Shiva “Dance of Destruction” around the Large Hadron Collider a.k.a. Hindu dharma wheel in the cavern, 18 Shiva’s dance being the dance of subatomic matter. 

Wednesday, August 12, 2015, mirror event in New York City: a hologram of the Hindu goddess Kali cast upon the Empire State Building. 

~August 11, 2016, a seemingly Satanic (or Saturnalian?) night ritual replete with a female sacrifice in front of Shiva in the main square. 19 

Wednesday, June 1, 2016, mirror event in Switzerland; a two-part ritual spectacle in Switzerland to christen the opening of the $12 billion Gotthard Base Tunnel (35.4 miles long) buried a mile and a half under the Gotthard mountain range of the Swiss Alps. 20 Though not on site with CERN, the latitude of Gotthard Base Tunnel is 46.600°N and of CERN 46.233°N. (Serious ritual always takes into account planetary and geodetic conditions.) Four heads of state and multiple global elites first watched the ritual spectacle of robotic workers in orange jumpsuits peeling down to their underwear inside the cavern, then witnessed the Mystery drama of Baphomet simulating anal rape as three scarabs, multiple mad souls and chaotic entities from other dimensions undermined toiling humanity, and saving angels outside the cavern. The spectacle might have been entitled “Ripping the Veil” or “Storming the Threshold.” 

The Gotthard Base Tunnel “outing” of an authentic global elite spectacle-cum-ritual-cum-psyop no doubt shocked those of the lower classes who were there as well as television audiences who eventually saw what had been filmed, but it was pagan business as usual for the high-ranking elites in attendance. No public debate over the artistic or religious merits of the “choreography” has been forthcoming. In fact, the entire event has dropped neatly into the Orwellian Memory Hole (the subconscious). Such an Eyes Wide Shut peep into the elite underworld was more than enough for the 99.9% conditioned to believe whatever they are told and not necessarily what they are shown. 

These rituals are connected with the intent that CERN throw open the gates of the Abyss to antimatter. On an energetic level, “being human” straddles both matter and antimatter; thus it seems obvious that these rituals are intended to open us to our antimatter side, given that our thoughts and feelings tend toward one side or the other. Entities drawn to antimatter are demonic to human beings, so increased production and extraction of antimatter will increase demonic presence. By wielding antimatter’s energy signature, the LHC will “call” the antimatter signatures in human beings to activate. 

It seems that the temple of CERN is about altering reality as we have known it. 21 

Theoretical physicist Feynman had it right: “If you aren’t deeply disturbed by quantum mechanics, you clearly haven’t understood it.” 

SATURN AND THE SPACE FENCE “RINGS” 
On May 25, 2007—Bernard Eastlund died 12/12/2007—Bernard, Tom Bearden, Fred Bell, a filmmaker and I had a conversation in Texas about the possible development of Saturn rings around the Earth like a celestial space collider. It seemed like every time the LHC was activated, there were cyclotronic reverberations like shockwaves of earthquakes, volcanic and massive spontaneous gravity (scalar) wave activity. 
— Billy Hayes, “The HAARP Man” 

Even more startling than CERN’s antimatter quest may be its mysterious connection to NASA’s intent to create Saturn-like “rings” around planet Earth—synchrotron rings that will serve interplanetary communications, quantum shielding and surveillance, and the real SSS Space Fence lockdown. 

First, let’s follow the psyop breadcrumbs. Saturn has six letters and is the sixth planet from the Sun with a six-sided polygon as its north pole. Even the sixth day, Saturday—still a holy day for some—is named after Saturn. CERN’s logo is a quantum entangled 666. 

In Chapter 7, I mentioned NASA space scientist Robert Pfaff’s justification for altering the near-earth space environment by referencing other dynamos 22 on Jupiter, Saturn, Uranus and Neptune. 23 In the same context, I discussed how “dusty plasma” is being used to construct a conductive Saturn-like “CD disc” around the equator bearing a chemical signature very like the conductive metal brew daily dumped by jets and zapped by radio frequency—following the ancient As above, so below alchemical dictate by weaving electro-chemical processes of the ionosphere and lower atmosphere into a plasma mesh or grid. 

China is already working on a massive supercollider twice the size of any synchrotron or linear particle accelerator and 7X more powerful than CERN to produce millions of—what? Is China’s supercollider to serve as our planetary dynamo? Or will it be the Compact Linear Collider (CLIC) or International Linear Collider (ILC) no longer firing electrons at each other but firing electrons and positrons (antimatter) at each other? China’s quantum satellite is now experimenting with quantum entanglement. 24 Anthony Patch wonders if the quantum satellite will open portals to electrically link the Earth’s rings with Saturn’s rings via Birkeland currents (plasma conduits). 25 

Now, let’s go a little deeper into what Saturn represents to various global elites. 

The incursion of thousands of Nazis into the United States under Operation Paperclip lends credence to the possibility of a still-thriving secret Saturnalian Brotherhood in the United States, along with the normal fare of Freemasons, Knights of Malta, Opus Dei, Satanists, etc. 

The 33° system of initiation known as the Fraternitas Saturni or Saturnalian Brotherhood is a German magical order founded in 1926. Originally, it was connected with Aleister Crowley and his Ordo Templi Orientis (OTO); now, “Saturn-Magic” lodges are primarily headquartered in Germany, Austria, and Switzerland, including offshoots like Ordo Saturni and Communitas Saturni. 

I would not be surprised if NASA hosts a Saturnalian Lodge. Wikipedia defines NASA as “an independent agency of the executive branch of the United States federal government,” but neglects to mention that it was founded under SS officer Wernher von Braun (1912–1977) and Paperclip Nazis who claimed to have derived technological insight from ancient “mythological” texts and entities beyond the Veil through occult rituals. Thus, NASA may be a very different kind of “independent agency of the executive branch.” 

The most high-profile NASA move toward Saturn is surely the Cassini space probe launched with its lander the Huygens on a Titan IVB/Centaur on October 15, 1997 and entering Saturn’s orbit in 2004 with Huygens landing on Saturn’s moon Titan on January 14, 2005. Data has been transmitting back to Earth ever since by using the orbiter as a relay, and the Cassini has been executing flybys of Saturn’s other moons. However, once it enters Saturn’s rings and atmosphere, it is slated for destruction on September 15, 2017, supposedly “to ensure protection and prevent biological contamination to any of the moons of Saturn thought to offer potential habitability.” 26 

Questions regarding Saturn abound. Why and how does Saturn emit more energy than it absorbs? Why do Saturn’s rings make those eerie resonance sounds? Why are the rings separate? What are the objects caught up in the rings? From ancient lore, we might ask, Is it true that hundreds of thousands of years ago Saturn was Earth’s Black or Midnight Sun? Were Saturn, Mars, and Venus once in polar alignment with Earth, and if so, what event ended that alignment, causing them to “float away” to their present orbits? Of NASA, I would ask, Is the purpose to go to Saturn or to make Earth into a Saturn? 

Shades of Immanuel Velikovsky (1895–1979). 

Certainly, the LHC, AWAKE, and D-Wave are engaged in reconnecting the Earth to Saturn as NASA and other agencies and private deep pockets seed the Earth’s atmosphere with nano-metals and build nano-metal Saturn rings around the Earth that surely will act as transceivers with Saturn’s rings. 

AWAKE AND D-WAVE 
And the fifth angel sounded, and I saw a star fall from heaven unto the earth: and to him was given the key of the bottomless pit. 
— Revelations 9:1 

The recent addition of the smaller (thirty-meter) Advanced Wakefield Experiment (AWAKE) plasma linear accelerator with a focusing beam and capability of accelerating particles to 20 PeV (peta electron volts, peta meaning one thousand million million) by “surfing” them on waves of electric charge (protons) created in a plasma (ionized gas) will generate 1,000X the particles that the LHC generates. “Because protons have greater mass than electrons, each proton pulse penetrates further into the plasma, setting up a longer series of charged regions, which in turn provides greater acceleration per pulse.” 27 

Anthony Patch believes that the AWAKE will assure a connection to Saturn. 

The AWAKE focusing beam means low luminosity and less fragmentation, and the “accelerator on a chip” 28 means moving away from the mechanical power of the ring-based synchrotron LHC smashing and crashing protons to the real source of greater energy power, which is plasma. Billy Hayes “The HAARP Man” well understands that size is not the issue anymore (other than smaller and smaller): 

Each [accelerator on a chip] can independently act as an optical laser amp or memory chip and redirect what it receives. Hence a new versatile super weapon one step from airborne nanoparticle accelerators launched into orbit by the trillions to nano-tag and digitally control life forms. 29 

As the LHC smashes and AWAKE drills holes via quantum tunneling into hyperdimensions, the new VHEeP (very high energy electron-proton collider), superconducting magnets, plasma, and electron proton instead of proton-proton collisions will generate the power needed to “pierce the Veil.” 20 PeV with a focused beam at a quantum level (thanks to the D-Wave quantum computer) is powerful enough to break the nuclear bonds—the force binding quantum particles at a quantum level—that have heretofore prevented access to the dimensions beyond the Threshold. 

In other words, the VHEeP is a kinetic particle energy weapon whose assault on the Threshold is an act of war, not an astronomical “experiment.” CERN’s D-Wave adiabatic quantum computer system controls the portals—their rate of opening, their size, what comes through, etc. Whereas the nominal operational temperature for the LHC is 1.9 degrees above zero, the tiny niobium D-Wave chip in its ten-foot black box must be kept colder than deep space at just above absolute zero. 30 It is the cold that transforms a mere chip into a qubit superconductor. DWave also requires an extremely low magnetic environment, 50,000X lower than the Earth’s ambient magnetic field—the exact opposite of CERN’s massive superconducting magnets. 

Co-founder and chief scientist Eric Ladizinsky equates D-Wave’s qubit chip with the Manhattan Project and magic, as per Arthur C. Clarke’s famous “Any sufficiently advanced technology is indistinguishable from magic.” In a 2013 speech at Idea City, D-Wave’s Geordie Rose revealed DWave’s hyperdimensional capability by quoting physicist David Deutsch: “Quantum computation. . .will be the first technology that allows useful tasks to be performed in collaboration between parallel universes.” Rose went on to mention the pulse tube dilation refrigerator unit “heartbeat” of the twelve foot D-Wave, and confessed that standing beside the D-Wave was “awe-inspiring. . .like an altar to an alien god.” 31 (See Chapter 6 for more on D-Wave.) 

It is true: D-Wave appears to function interdimensionally. First came D-Wave Model 512 (qubits) linked with Josephson junctions, then the 1024, the 2048, and finally the 4096 that clears the way through the Veil (4,096 qubits in the coded “key”). D-Wave’s 512 cracked the uncrackable Shor’s algorithm of 2048; now, D-Waves are writing their own code that only other adiabatic quantum computers can crack. How many dimensions has D-Wave accessed so far with VHEeP? 

In quantum worlds, (1) dimensions are frequencies, (2) everything locked in matter has a dual nature of waves (spiritual) and particles (physical), (3) quantum tunneling reaches into spiritual dimensions, and (4) antimatter frequencies entering our reality are subject to the same 3-space laws we are. 

Is the Transhumanist agenda looming behind the Space Fence, CERN, and the D-Wave “alien god” to digitally augment our reality to the point that our DNA matches the digitized DNA of antimatter demons/aliens? Are we to one day be only virtual and exist entirely in the digital like cartoon characters? 

The Mandela Effect—when someone has a clear memory of something that never happened in this reality—may be an early ripple foreshadowing such a future, or it could be yet another psyop via pulsing and Internet hacking. But it does seem that CERN and D-Wave are bent on opening and cross-fertilizing dimensions. Meanwhile, the rings of Saturn are going up around the Earth. 32 

Chapter 10 
The Covert Ascendance of Technocracy
Technocracy is a totalitarian system of government where scientists, engineers and technicians monitor and control all facets of personal and civic life—economic, social and political. . .Smart Grid is born out of technocracy and not the other way around. 
— Patrick Wood, Editor, 
The August Review, June 23, 2011 

Ever since Captain Kirk teleported to the surface of an alien planet and whipped out his portable communicator, everyone Earthside wanted one. And the telecos gave us flip-phones, along with compulsive texting, streaming video, online gaming and banking, the worldwide web and more. 
— Will Thomas,
“Wireless, Chemtrails, and You,” 2013 

While a few millicuries (mCi) of cancer-causing ionized radiation can terrify people, not a word is said about the ubiquitous non-ionized microwave transmitters towering over our neighborhoods or up against our heads and in our pockets. Had the Space Preservation Act of 2001 (HR2977) not been torn to pieces in committee, we might have eventually realized that cell phones and microwave towers and the Internet of Things (IoT) are just more of the exotic weapons system described in HR 2977: 

• Electronic, psychotronic, or information weapons; 
• Chemtrails; 
• High-altitude ultra-low-frequency weapons systems; 
Plasma, electromagnetic, sonic, or ultrasonic weapons; 
• Laser weapons systems; 
• Strategic, theater, tactical, or extraterrestrial weapons; and 
• Chemical, biological, environmental, climate, or tectonic weapons. 

In its infinite wisdom, HR 2977 forbade: 

... inflicting death or injury on, or damaging or destroying, a person (or the biological life, bodily health, mental health, or physical and economic well-being of a person) through the use of land-based, sea-based, or space-based systems using radiation, electromagnetic, psychotronic, sonic, laser, or other energies directed at individual persons or targeted populations for the purpose of information war, mood management, or mind control of such persons or populations; or by expelling chemical or biological agents in the vicinity of a person . . . 

Of course, HR2977 was not allowed to see the light of day because exotic “nonlethal” weapons were exactly what were being “tested” for military peace support operations (PSO)—“peacemaking, peace enforcement and peace building” being Orwellian for the covert technocracy that would supplant human society in the name of progress. 

Technocracy means rule by technology. The term was born in 1932 with the Technocracy, Inc. movement. Inspired by IBM (then collaborating with the Nazis), geoscientist M. King Hubbert (1903– 1989) sought to measure and profile energy production, conversion, flow of goods and services, and consumption. Patrick Wood, author of Technocracy Rising: The Trojan Horse of Global Transformation (2015), puts it more succinctly: “Technocracy is a totalitarian system of government where scientists, engineers and technicians monitor and control all facets of personal and civic life—economic, social and political.” 1 

In 1970, geostrategist Zbigniew Brzezinski—adviser to four administrations, including the Obama administration—prophesied the advent of a “technetronic age”: 

Another threat, less overt but no less basic, confronts liberal democracy. More directly linked to the impact of technology, it involves the gradual appearance of a more controlled and directed society. Such a society would be dominated by an elite whose claim to political power would rest on allegedly superior scientific know how.

Unhindered by the restraints of traditional liberal values, this elite would not hesitate to achieve its political ends by using the latest modern techniques for influencing public behavior and keeping society under close surveillance and control. Under such circumstances, the scientific and technological momentum of the country would not be reversed but would actually feed on the situation it exploits. . .The traditionally democratic American society could, because of its fascination with technical efficiency, become an extremely controlled society, and its humane and individualistic qualities would thereby be lost . . . 2 

In 1983, Samuel Koslov—at one time involved in the Moscow Signal that eventually became Project Pandora (1965–70)—opened the classified Conference on Nonlinear Electrodynamics in Biological Systems at Johns Hopkins University by comparing the use of “external electric fields” to what “faced the physics community in 1939 when the long-time predicted fissionability of the nucleus was actually demonstrated”—meaning the secret Manhattan Project that produced the atomic bomb and inducted humanity into the Nuclear Age. 3 

Koslov was right. The rise of “nonlethal” weapons in the 1990s was pivotal to the ascendancy of the technocracy. “Penguin” 4 Col. John B. Alexander, author of the 1980 article “The New Mental Battlefield” (Military Review, December 1980), eventually became the Los Alamos National Laboratories kingpin of nonlethal weapons for incremental aggression, peace enforcement, weaponized electromagnetic fields, chemical and biological “anti-terrorism,” high-powered microwave (HPM) technology, fracture and dynamic behavior, biotechnology, and acoustic technologies like synthetic brain-computer interface (BCI). Quiet, unseen weapons for a quiet, unseen war against human society.

In 1993, Igor Smirnov of the Moscow Institute of Psycho-Correction at Moscow Medical Academy gave closed session presentations for the National Academy of Sciences’ 21st Century Army Technologies panel to FBI, CIA, DIA, DARPA, military contractor corporate executives, National Institutes of Health, and National Institute of Mental Health regarding the latest incarnations of the LIDA acoustic psycho-correction device able to remotely implant thoughts in minds, even over the telephone. 5 Smirnov taught attendees how to use the electroencephalograph (EEG) to remotely measure brainwaves, then demonstrated the computer software that could create an accurate brain map from those measurements, after which he sent a synthetic telepathy message to a target brain with the LIDA. This technology promised real-time alteration of decision-makers and key personnel, he said, and was happily less violent than the strong-arm techniques of yesteryear. 6 


This is transcranial magnetic stimulation (TMS). Note the “EEG Preprocessing” (now mobile). Note the emphasis on amplification and pulsing. This was in 2002. Now, TMS can remotely stimulate the temporal lobe by manipulating in loco electromagnetic fields. The temporal lobe processes visual and auditory input, creates new memories, and is command central for emotional associations. 

“In 2013, Arizona State University’s Center for Strategic Communication ran a program called “Toward Narrative Disruptors and Inductors: Mapping the Narrative Comprehension Network and Its Persuasive Effects.” “Strategic communication” refers to counter-terrorist tactics against political dissidents, and “narrative disruptors and inductors” refer to jamming the brain’s thoughts and implanting other “narratives” by means of transcranial magnetic stimulation (TMS) of the brain’s temporal lobe. (“Secret DARPA Mind Control Project Revealed: Leaked Document.” Activist Post, July 29, 2013.) The claim that implants can’t be read without a scanner is not true; they can be read anywhere there are microwave/cell towers (wireless transmitters).” —Under An Ionized Sky: From Chemtrails to Space Fence Lockdown 

At yet another classified conference in November 1993, George Baker, Ph.D., from the Defense Nuclear Agency, and Clay Easterly, Ph.D., of the Oak Ridge National Laboratory praised nonlethals to the skies. In 1994, Steven Metz and James Kievit of the U.S. Army War College came out with The Revolution in Military Affairs and Conflict Short of War, an ominous techno-echo of George Orwell’s 1984 and the film trilogy The Matrix. In 1996, the U.S. Air Force Scientific Advisory Board published a fourteen-volume study of future weapons development called New World Vistas. The dystopic military vision of NBIC—nanotechnology, biotechnology, information technology, and cognitive technology—had taken hold. The “soft kill option” and no-touch torture were no longer a conspiracy theory. 

SMART GRID SURVEILLANCE 
The technocratic city is a post-9/11 city. Federal troops can now enter cities with impunity, thanks to timed false-flag traumas. Tactically trained paramilitary SWAT teams roll down the street in $296,000 Lenco Bearcats paid for by the spoils of the so-called Drug War. “Urban training exercises” invite lowflying whisper-mode helicopters, explosions, flares, smoke bombs, and SOCOM military personnel. Shooting drills are common at high schools, 7 recalling Benjamin Franklin’s warning that those who give up essential liberty for a little temporary safety deserve neither liberty nor safety. 

Public protests are rare, but not because there is nothing to protest. There is everything to protest, but we have all watched the six o’clock news in horror as antipersonnel HSS (hypersonic sound) pain ray “risk management tools” like the Humvee-mounted LRADs (long-range acoustic devices) roll into Baghdad or Kabul for “area denial, perimeter security and crowd control.” Like the HIDA (high-intensity directed acoustics “sonic bullet”), the LRAD can damage hearing while broadcasting speech up to three hundred meters (“voice of God” weapon 8 ). The Thunder Generator—a cannon using a mixture of liquefied petroleum, cooking gas, and air—is similar, discharging a blast that can inflict permanent damage or even death if one is standing within ten meters of it; and the “heat ray” Active Denial System(ADS) is designed to behave like a particle beam weapon utilizing a narrow solid-state plasma antenna for individual pain beams. 

Besides “risk management tools,” a technocracy needs security police forces and border patrols. Multiple-tour infantry and Special Forces now return home to patrol shopping malls in cities that look more and more like Baghdad and Kabul. The millions of dollars that went into their counterinsurgency training need not go to waste as long as the public can be kept on edge with lone nuts, drug trafficking, terror networks, and standard violent Hollywood fare— 

Everywhere in films, in popular books on the grocery store shelves and in video games, there’s an obsession with hit men, serial killers, sexual psychopaths and government agents with a license to kill; popular killers range from those in an underground, criminal world to those wearing badges and working under the lethal rights granted by [a] national sovereign. 9 

When the CIA’s former director George H.W. Bush referenced “a thousand points of light” in his Presidential candidate acceptance speech in 1988, 10 he was probably referring to the advent of the Smart Grid and its satellite “eyes in the sky” above and glowing microwave towers below in an atmosphere bristling with a driftnet of conductive metal particulates, nanobot sensors and microprocessors outside and inside human bodies. As activist and targeted individual (TI) Carolyn Williams Palit put it in 2007: 

What they are ultimately trying to do up there is create charged-particle, plasma beam weapons. Chemtrails are the medium — GWEN pulse radars, the various HAARPs, and space-based lasers are the method, or more simply: Chemtrails are the medium — directed energy is the method. Spray and Zap. 11 

An efficient technocracy is absolutely dependent upon a consolidated digital wireless grid: 

a single, integrated communication-enabled electric delivery and monitoring system, collectively called Smart Grid. . .Thirty years ago, a researcher’s mantra was “Follow the money, follow the power.” This must now be restated: “Follow the energy, follow the power”. . .Global companies like IBM, GE and Siemens are putting their full effort behind the ‘build-out’ that will consolidate all of America into a single, integrated, communication-enabled electric delivery and monitoring system, collectively called Smart Grid . . . 12 

The fact that cable companies like Time Warner, AT&T, and Comcast aren’t subject to common carriage regulations points clearly to their “insider” military status. Telecom mergers have carte blanche. Monopolies control telephone and cable lines. After the AOL-Time Warner merger and AT&T-MediaOne merger, the FCC granted cable companies the right to manage the speed at which sites appear, block content, and deny ISP access. Comcast, the world’s largest cable company, controls one-third of U.S. households. 

ATT and Verizon collaborate with Israel’s “super intrusive” Verint and Narus to perform mass surveillance on American communications, sifting traffic 24/7 at key Internet gateways around the U.S. James Bamford, author of The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America, writes that Israel is the eavesdropping capital of the world 13 and never need to be concerned about congressional oversight of its activities in the U.S., as the CIA and Mossad are Gog and Magog. 

The global Smart Grid is up and running, jarringly symbolized by the NSA’s megalithic Intelligence Community Comprehensive National Cybersecurity Initiative Data Center in Bluffdale, Utah, twenty-five miles south of Salt Lake City (mentioned in Chapter 6). Above ground, the Utah Data Center occupies 1.5 million square feet and quantifies in yottabytes (1 yottabyte = 1 trillion terabytes, or 1 quadrillion gigabytes) what is vacuumed up from satellite and underwater ocean cable 14 intercepts. 

Southeast of the Utah Data Center in the Mimbres territory of Catron County, New Mexico, AT&T has an underground communications facility. In 1977, the Dia Art Foundation commissioned American sculptor Walter De Maria to build a piece of land art called The Lightning Field right over that underground facility: four hundred stainless steel poles precisely two inches in diameter and twenty feet 7.5 inches in height, spaced 220 feet apart, their pointed tips defining a horizontal plane in a grid array measuring one mile by one kilometer. 

SMART METERS AND THE INTERNET OF THINGS (IOT) 
The technocracy has had high hopes for smart meters, and not just as a 24/7 home energy accounting system counting kilowatts. In 2013, 35.5 percent of all U.S. electrical customers had smart meters, a 20 percent increase over 2012. By 2014, 58,545,938 smart meters had been installed, with 51,710,725 being residential. 15 In the developing world, there were 5.16 million units in Europe, the Middle East, and Africa in 2011. A Market Research reports for global smart meter sales listed the English-speaking spy network Echelon (Five Eyes) as a “top player.” 16 

In fact, read between the lines of Title XIII of the Clean Energy / Energy Independence and Security Act, signed into law on December 19, 2007, and you will see that smart meters are really about surveillance, period. Note the repetition of the (military) term “deployment”: 

(1) Increased use of digital information and controls technology to improve reliability, security, and efficiency of the electric grid; 

(2) Dynamic optimization of grid operations and resources, with full cyber-security; 

(3) Deployment and integration of distributed resources and generation, including renewable resources; 

(4) Development and incorporation of demand response, demand-side resources, and energy efficiency resources; 

(5) Deployment of ‘smart’ technologies (real-time, automated, interactive technologies that optimize the physical operation of appliances and consumer devices) for metering, communications concerning grid operations and status, and distribution automation; 

(6) Integration of ‘smart’ appliances and consumer devices; 

(7) Deployment and integration of advanced electricity storage and peak-shaving technologies, including plug-in electric and hybrid electric vehicles, and thermal-storage air conditioning; 

(8) Provision to consumers of timely information and control options; 

(9) Development of standards for communication and interoperability of appliances and equipment connected to the electric grid, including the infrastructure serving the grid; 

(10) Identification and lowering of unreasonable or unnecessary barriers to adoption of smart grid technologies, practices, and services. 

Unlike regular electric AMR (automated meter reading) meters, smart meters are two-way AMI (advanced meter infrastructure), supposedly to “allow utilities and customers to interact to support smart consumption applications.” 17 

Smart meters are joined at the hip with the Internet of Things (IoT). By 2020, every American home is to have a two-way gas and electricity AMI logging energy use of smart appliances at two-second intervals, as per power signatures. If Li-Fi 18 complements your WiFi, its 1-watt LED [light-emitting diode] has a microchip in it that can simultaneously connect multiple computers to the Internet. Every plug-in and wireless appliance, every film you watch, whether you are home or not, your state of wakefulness or sleep, is monitored, thanks to the ZigBee microchip in each smart meter that wirelessly communicates from smart appliances to utility poles, central utilities offices, police stations, and fusion centers. 

And ZigBee chips have a kill switch. 

Home energy accounting and surveillance are two smart meter agendas under the technocracy. The third agenda is to serve as a node in the computing architecture, given that the computer cards in the communications modules of smart meters have the same computing power as a cell phone. With Linux software, Hive Computing, smart meter vendor Itron and partner Cisco are building a mesh network of nodes from millions of smart meters for a distributed intelligence platform of greater Smart Grid control —for “socially useful computing tasks,” of course. 19 

. . .the latent capacity of the world’s smart meter network approaches that of the world’s better known supercomputers. For example, 3,000 smart meters have nearly the same amount of processing power and memory capability as Deep Blue, the IBM supercomputer that beat Garry Kasparov in a game of virtual chess in 1997, and 150,000 meters add up to about half the computing power of IBM’s Watson supercomputer . . . 20 

That’s one teraflop (1 trillion floating operations per second) of processing power. One million smart meters is the equivalent of the world’s twentieth fastest supercomputer. 

Lovely: a supercomputer module active 24/7 on the outer wall of your home or business in a neighborhood filled with other modules, all receiving and sending transmissions, paid for by consumers who must deal with the health issues and cybersecurity issues of third-party software nosing around through smart meters. 21 

The IoT overseen by smart meters makes every neighborhood a veritable antenna farm that affects the health of all life forms within the target zone. Daniel Hirsch, a lecturer on nuclear policy at University of California Santa Cruz, stresses that one smart meter exposes people to 100X the microwave radiation of a cell phone. 22 Symptoms following from exposure range from an inability to sleep deeply to headaches, heart palpitations, chronic fatigue, difficulty concentrating, and cancer. 

Opponents nationwide have testified that radiofrequency emissions from Smart Meters cause headaches, nausea, and insomnia. A Hurst woman told the Dallas Morning News in June that her autistic daughter began having seizures when their Smart Meter was installed. . .Opponents of Smart Meters nationwide have complained about inaccurate readings, radiofrequency interference with medical and other devices in their homes, and privacy and security concerns. 23 

The electromagnetic impact of smart meters extends far beyond the 900 MHz resonating from home wiring. Add the 2.4 GHz frequencies of the machine-to-machine Home Area Network (HAN) overseeing the smart meters in your area and you have RFR (radio frequency radiation) in the harmful microwave range of 1–300 GHz. Now add the collector meter antennas affixed to telephone poles to serve as transmission hubs for 500–1,000 homes, with frequencies from 850 MHz to 1.9 GHz for cell phone connectivity. 

The cumulative effect of wireless 900 MHz, 1.9 GHz, and 2.4 GHz, 24 coupled with conductive nanoparticle “clouds,” points directly to the neighborhood “cancer clusters” popping up everywhere. This from Canada: 

When the suburb is all transmitting, for example, in parallel signals to NAN M2M [Neighbourhood Area Network machine-to machine] contact, not only are there clouds inside the residences but also an overcloud at about 2.5 meters and above in streets and above boundary layers of rooftops where the noise [of the Alasdair Philips “electrosmog” detector] can increase from reasonable background levels of below 0.05 microWatt/cm 2 to 400 microWatt/cm 2 in ambient air. 

Clearly the impact of SMART meter networks is phenomenal, especially when clustered together, inducing Doppler effects for long distances, sometimes hundreds of meters in series of clusters, reflections, generation of “noise” and probably thousands of new signals/cubic meters. 25 [Emphasis added.] 

Is it any wonder that Lloyd’s of London, the world’s foremost insurer of risk, refuses to cover health effects from wireless devices, including cell towers? Here is Sharon Noble, director of Coalition to Stop Smart Meters: 

Lloyd’s of London is one of the largest insurers in the world and often leads the way in protection, taking on risks that no one else will. Attached is a recent renewal policy which, as of Feb. 7, 2015, excludes any coverage associated with exposure to non-ionizing radiation. In response to clarification, this response was received on Feb. 18, 2015 from CFC Underwriting LTD, London, UK agent for Lloyd’s: “The Electromagnetic Fields Exclusion (Exclusion 32) is a General Insurance Exclusion and is applied across the market as standard. The purpose of the exclusion is to exclude cover for illnesses caused by continuous long-term non-ionising radiation exposure i.e. through mobile phone usage.” 26 [You would think that quote would open up some eyes, but not in this dumbed down society of I want it, and I want it now d.c ]

Smart Meter arcs are burning out computers and shorting out surge protectors and appliances. Add the complicating factor of the conductive metal nanoparticulates falling from chemical jet trails and power poles bursting into flame make more sense than “a build-up of dust on transformers that shorted out due to low-lying fog.” 27 Ionized “precipitation-inducing materials” in electrosmog 28 are more to the point. 

Not all Americans are lying down for the Smart Grid rollout of smart meters. For example, a fifty five-year-old Houston woman ordered a CenterPoint Energy worker attempting to install a smart meter off her property at gunpoint, 29 having astutely perceived that smart meter installation represents a clear and present danger of explosions, hot sockets, flashovers, and deadly fires, not to mention the loud, obnoxious hum 30 foretelling endless health problems. 

SMARTPHONES 
Life evolved with negligible levels of microwave radiation. An increasing number of scientists speculate that our own cells, in fact, use the microwave spectrum to communicate with one another, like children whispering in the dark, and that cell phones, like jackhammers, interfere with their signaling. 
— Arthur Firstenberg, 
“The Largest Biological Experiment Ever,” 2006 

What is emanating from the forest of cell phone (microwave) towers going up invisibly interweaves with the chemical trail grids overhead. In 2013, it was finally made public that the CIA’s division of Behavioral and Social Sciences and Education was funding a geoengineering study in concert with the National Academy of Sciences (NAS), NOAA, and NASA: 

The National Academy has held two previous workshops on geoengineering, but neither was funded by the intelligence community, says Edward Dunlea, the study director of the latest project. The CIA would not say why it had decided to fund the project at this time. . .The last time the government tried to do cutting-edge research related to the atmosphere—with the High-frequency Active Auroral Research Project (HAARP), which aimed to protect satellites from nuclear blasts—people speculated that it might be a death ray, a mind control weapon, or, worst of all. . .a way to control the weather. 31 [Emphasis added.] 

The presence of the word “behavioral” should have sounded the alarm. 

Hacking masses of cell phones, computers, and brains is easy in a conductive metal-rich atmosphere. WikiLeaks revealed a package of spy tools called the FinIntrusion Kit for hacking into WiFi (“IT intrusion” = hacking), while Fin Fisher’s FinSpy takes over smartphones like iPhones or Windows Mobile, then with Fin USB Suite transfers information to fusion centers, police stations, corporations, etc. The Fin malware is produced by Gamma Group, a shadowy UK corporation. 32 

The little transceivers we call cell or mobile phones are perfect for spying. More important are the mental and physical health effects of what amounts to cell phone addiction with cell phone radiation dialing into our cells. We’ve been bioelectrical beings for millions of years, but now our cells are forced to interact with artificial EM signals as our tower-like bodies process the pulsed frequencies of AM/FM (amplitude/frequency modulation) radio, metal appliances, cars, ionized rain and snow, glass, towers, antennas, and the constantly zapped metal nanoparticulates raining down and into our lungs. Headaches and migraines, foggy thinking, forgetfulness, weak concentration, impaired learning, and accelerated dementia reflect the rising ricochet of EM signals and the ionized nanoparticles breaching our blood-brain barrier. The first mile above the Earth is buzzing with two million times the amount of electromagnetic radiation (EMR) of 1900. 

Neither telecom giants nor Big Pharma are keen on the public learning that two minutes on a cell phone or sitting near a cordless phone base or wireless computer router will short-circuit the body-brain electrical ion flow and end in clumps of fibril proteins growing in electromagnetically altered brains. It seems that the World Health Organization (WHO) reclassification of cell phone and WiFi emissions as possible carcinogens was not enough; few Americans know or care that a federal appeals court has blocked the City of San Francisco from requiring retailers to issue warnings to cell phone buyers. 33 Western Europe and Israel have had wireless technologies a decade longer than North America, which may be why 250,000 Swedish citizens are on permanent disability for microwave sickness, early Alzheimer’s, Parkinson’s, fibromyalgia, multiple sclerosis, and cancer. 34 As the price of our love for convenience and comfort climbs, it is just a matter of time before landlines are quietly discontinued. 35 

Despite all the cell phone radiation lawsuits, 36 smartphones continue to be the favored Trojan horse of the Smart Grid. 7.3 billion cell phone users don’t realize they are now the proud owners of two-way microwave radios pulsing low levels of EMR and producing brain cancers like ipsilateral glioma. 37 WiFi has gone from radiating a one-hundred-yard microwave cloud (“hotspot”) for people to tap into, to wireless MiFi routers that can be carried wherever one goes. Meanwhile, the iPhone 6, Moto X, Nexus 6, etc., with their built-in hotspots are demanding ever more Towers of Babel and satellites for voice, Internet, music, video games, TV reception, and video streaming. WiMAX upgrades to LTE now grace towers and broadcast in the 5.8 GHz spectrum to fill in those frustrating receptivity gaps between towers. 

Add satellites with steerable spot beams and a barium-enriched atmosphere and you have a weaponized Smart Grid with sizzling microwave “clouds” ready and waiting everywhere. Cloud-based systems are highly hackable corporate-owned and corporate-managed shared-space server farms not subject to public oversight. 

Are specific absorption rates (SARs) of radiation being field-tested on large populations? The maximum legal SAR is 1.6 watts per kilogram of tissue, an adult male head standard, not an adult female or child head, and concerned only with overheating body tissue, not with subthermal effects. 38 AT&T and T-Mobile employ the Global System for Mobile Communication (GSM) with a SAR 100X that of the Code Division Multiple Access (CDMA) system employed by Verizon and Sprint. And if 2G phones (GSM/UMTS and CDMA/W-CDMA) are “bioactive”—doublespeak for potentially harmful to living bodies—what does that make 5G and 6G smartphones? 39 

Frequencies 1–5 GHz penetrate organ systems. Fifth-generation (5G) cell phones operate in the 28– 100 GHz range, the same frequency as the extremely high frequency (30–300 GHz) millimeter wavelength spectrum (10–1mm) used in Raytheon’s active denial system (ADS) directed energy weapon for “perimeter security and crowd control.” 40 The supposed justification for the millimeter / terahertz spectrum is that the 700 MHz to 2.6 GHz WiFi bandwidth is saturated and consumers are demanding yet more speed and bandwidth. The truth is closer to how 5G cell phones and the tower antennas they require will serve population control. 5G will mean cell antennas on residential streets, so the insides of homes will be irradiated, blasting through walls with millimeter wave technology. Cellular mm-wave propagation every quarter of a mile in densely populated areas is extremely unwise if safety is the primary consideration, which it is not. 

Ronald Powell, Ph.D. (Harvard) in applied physics (emfanalysis.com, smartgridawareness.org), and Yael Stein, M.D. of Hadassah Medical Center, Jerusalem, are begging the FCC Commissioners to withdraw 5G: 

Computer simulations have demonstrated that sweat glands concentrate sub-terahertz waves in human skin. Humans sense these waves as heat. The use of sub-terahertz (millimeter wave) communications technology (cell phones, WiFi, antennas) could cause humans to perceive physical pain via nociceptors. 41 

The smaller the wave, the more damage to human and animal metabolism. Millimeter waves in 5G have 25X the WiFi microwave photon energy of 2.4 GHz. Translated into impact on living cells, millimeter wave photons disturb 25X as many molecules as current WiFi and 4G disturb. TETRA (Terrestrial Trunked Radio) phones used by police and military are the most dangerous, 42 with TETRA carrier frequencies typically at 400 MHz and modulation frequencies at 17 Hz, the brain’s frequency range being 0.5–30 Hz. 

Synergy is a term we must become familiar with as we weigh the risks of increasing SARs. Synergy goes beyond mere mathematical increase (“100X that of the CDMA”) to an exponential impact of competing and overlapping non-ionized and ionized radiations. In a January 1, 2008 email, public health scientist, epidemiologist, and leading expert on electromagnetic radiation Dr. George Carlo hit the microwaved nail on the head: 

EMR [electromagnetic radiation] is most likely a synergen in these cases, including the case with the disappearing birds. The exposures such as pesticides, chemtrails, harvesting of forests, and urban sprawl are not causes competing with EMR — they are additive and synergistic causes. They are insults to the system that require strong biological compensation to overcome. EMR depletes that ability to compensate, and thus the person — or species — succumbs to the effects of the environmental insult more severely and more rapidly. 43 

PHASED ARRAYS, HOLOGRAMS, 
AND ELECTRONIC WARFARE (EW) 
Thus far, we’ve determined that the average American neighborhood is now an electromagnetic interchange of crisscrossing signals from computers, television, smart meters, cell phones, microwave ovens, IoT, utilities, military frequencies, transportation guidance systems—all translating to more cancer clusters, compromised immune systems, miscarriages, premature aging, and DNA damage as signals invisibly jet from one emitter to another, pulsing over high-voltage lines, along pipelines and cable, railroad tracks, assaulting the natural frequencies of forests, bodies, and brains. 

In suburbs, big city neighborhoods, and sparsely populated rural districts, omnidirectional and highly directional WiFi router antennas produce ambient aerial signals emissions multiplied by the presence of highly conductive aluminum and barium nanoparticulates. Above, television satellites in geosynchronous orbit are delivering programming to homes while spy satellite sensors probe the signatures of tens of millions of host computer systems as wireless and optical networking technologies pulse Internet over broadband landlines (coaxial cable, fiber optic, copper wires), WiFi, speed-of-light supercomputers, satellite and 5G/6G cell phones. 

All of our comforting, convenient, entertaining electronics are digital and dual-use. The previous analog signal was unstable and made it difficult to manipulate moods via frequencies. Digital technologies, like Internet, reroute neural pathways and alter the brain. 

Conventional arrays with analog beam formers are no more. Now, digital phased-array antennas with individual transmitters and receivers (T/R modules) are being reconfigured and their wideband performance upgraded for dual-use operations. Throughout neighborhoods, micro-level phased arrays connect to microwave transmission lines, and power dividers perch on telephone and electric poles, cell towers and less obvious platforms, invisibly capturing and transferring electromagnetic signals. As the 2009 paper “Distributed Phased Arrays and Wireless Beamforming Networks” put it, “Multiple radar, communications, and electronic warfare functions can be served by a single antenna having such an architecture.” 44 (Emphasis added.) 


This photo is what our sidewalks, yes, in front of our homes and businesses, are going to have every 50 feet, including our bedrooms . . . SB 649 [the “small cells” like 5G bill] . . . would strip local governments of their property rights and force them to ignore safety, aesthetic, health and other issues, and approve all wireless company applications along public streets and on public properties. The California State Assn. of Counties has written a letter strongly opposing SB 649 . . . Lloyd’s of London and Swiss Re, two major insurance companies of the world, will not cover medical expenses incurred due to exposure of electromagnetic radio frequency radiation (EMR) (i.e. cellphones, WiFi, cell towers, antennas, DAS, IoT devices, smart meters, etc.). —Nevada City Councilwoman Reinette Senum, April 26, 2017 See Councilwoman Senum’s April 3, 2017 article “The 5G Network: What You Don’t Know May Kill You,” 

Basically, phased arrays are geometrically arranged collections of individually controlled transceiver antennas. Coupled with the ducting and amplifying of the “chemical antennas” being delivered by chemtrails, the phased array’s geometric arrangement guarantees that the output field will be greater than the sum of the waves (exponential) emitted by individual antennas. Control the phases of the individual signals and the output field can be given any desired “shape” or direction, the only limitations being the length of the wavelength, the number of individual antennas, and the size of the array. The “shape” can be a narrow beam directed at one person in one building or hundreds of independent beams directed at hundreds of targets, depending on the “phasing.” Phased-array radar can track many people simultaneously while the antennas remain absolutely stationary. 

In its receiving mode, the phased array picks up much more information than an ordinary antenna because it operates as a hologram, measuring entire EM field geometries, not just one-dimensional EM signals. Its holographic capability can remotely create 3D EM field distributions around targets. While correcting for reflections and interferences, the field can then be transformed and moved to another target somewhere else in a fraction of a second. 

A constant dissemination of barium nanoparticles enhances the holographic capability of phased arrays. Strontium barium niobate (SrxBa1-xNb2O6 ) is used in outdoor holographic 3D displays as a “screen” (Wikipedia). Barium stearate (“soap” bonded to metal particulates) also aids high-tech 3D radar imaging. As Will Thomas wrote in 2013, “Even if commercial wireless frequencies are not conducted as coherent signals by chemtrails specifically ‘tuned’ to HAARP frequencies, all commercial RF/microwave energy is going to be randomly confabulated and conducted by the barium-strontium chemtrail mix.” 45 Thomas’ use of the word “confabulated” points to the magician-like holographic “special effects” already being unveiled in our barium- and strontium-enriched plasma sky theater. 

The U.S. Navy’s Radio Frequency Mission Planner (RFMP) computer program known as the Variable Terrain Radio Parabolic Equation (VTRPE) utilized 3D battlefield imaging in the chemical skies over Iraq (2003–2011) and Afghanistan (2001–2014). Ionized barium and phased arrays work in concert with the VTRPE code, “a full-wave propagation model that solves EM wave equations for complex electric and magnetic radiation fields.” 46 With satellite imagery, VTRPE can propagate radio waves in such a way as to generate a 3D version of terrain modeled on RFMP computer monitors: battlefields, fog, clouds, apartment complexes, houses, workplaces, government offices, etc. VTRPE can also cloak an aircraft behind signal inversion layers, similar to how submarines are cloaked by underwater inversion layers. 

Simply put, the phased array is an excellent dual-use weapon capable of accurately locking onto EM targets. Telemetric sensors measure the necessary geometry of attack pulses, then VTRPE and a sophisticated fifth-generation laptop or satellite computer analyze the geometrics for target acquisition and beam control, and the invisible torture begins, particularly in areas of maximum EM radiation absorption (brain, heart, genitals, etc.) dependent upon the geometry of the wave. Hitting a target with a frequency that excites the metal particulates breathed in from chemtrails and ingested from GMOs can ignite an implosion as organs hemorrhage. 47 

Geometric is the name of the game for electron or plasma beam weapons—not so much in the sense of theorems as in the sense of building the output signal by “tuning” the frequency, amplitude, and spacetime “shape” to the target’s body. In 2008, TI Carolyn Williams Palit struck the heart of the matter: “The plasma beam is used much like an electric line to the targeted person.” 48 Picture a microwave or radio wave piggybacking a plasma beam.

Phased-array radar may not have a beam weapon’s firepower, but a suitcase system (piggybacking) can shape the pulse in spacetime with direct coupling 49 to a high-speed computer for non-linear biological effects. Former NSA analyst Robert Duncan explains in his 2010 Internet book The Matrix Deciphered: 

These beams can be steered by phase shifting other antenna signals. . .A phased array of thousands of elements can arbitrarily create one or more beams and the energy can be narrowly focused in constructive or destructive interference mode. This is the basis of directed energy weapons. 

Using high-powered steered phased arrays and focused directed energy from two sources. . .a nearly undetectable scalar wave—destructive interference at the point of interest—can be created. With just a minor energy interaction, the interfering beams bounce back with a strong signal-to-noise ratio to be resolved at the sources again. This allows for any imaging technique to be done over extremely large distances, in effect making distance irrelevant to the detection feature, be it RADAR, MRI, or ESR [electron spin resonance] imaging. 50 [Emphasis added.] 

A 2011 doctoral dissertation clarifies how phased-array antennas and satellites work in tandem as dual-use weapons: 

The simulation of beamforming using phased array antenna is explored to obtain multiple and also steerable beams for tracking the satellite smoothly. . .Moreover, the adaptive beamforming allows mobile objects such as planes and vehicles to have access to satellite programs.” 51 [Emphasis added.] 

On September 23, 2010, the FCC opened up a new spectrum for dual-use no-touch torture deployments: the White Space TV band spectrum for Super WiFi “digital data communications.” Super WiFi requires no license, so White Space frequencies are free, unregulated, and widely scattered throughout the radio spectrum. Super WiFi fixed base stations are 4 watts, well over the 100-milliwatt limit for home, office, or school WiFi base stations, and White Space devices use pulsed digital waveforms highly dangerous to human bodies. White Space antennas are on towers and buildings, and when they’re not, Super WiFi can leapfrog from one tower to another on roofs or via Smart Meters and telephone poles. 

The day after the FCC’s move to open White Space frequencies, Magda Havas, associate professor of Environmental & Resource Studies at Trent University in Peterborough, Ontario, wrote the following about how the dual-use Super WiFi weapon can go straight through your wall, your skull, and your body: 

WiFi currently uses PULSED DIGITAL on higher 2.4 gigahertz frequencies 52 that cannot penetrate thick concrete at long distances and thus you get a slow speed connection resembling dial up. By using the lower TV frequency spectrum (54–698 MHz) as a carrier wave, the PULSED DIGITAL WiFi signal will now be able to penetrate obstructions such as buildings over great distances and deliver high-speed broadband data. 53 

Neighborhoods have become wireless Homeland Security gulags teeming with invisible energies and agendas as ionospheric heaters move energy thousands of miles by ducting and zapping our conductive atmosphere. Smart meters, cell phones, towers, phased arrays, and satellites all play their part in an exotic dual-use weapon system exploiting citizens in the name of C4 full spectrum dominance, disaster capitalism profits, and a cyborg Transhumanist future. 

WIFI AND SPYING IN THE ’HOOD 
The technology is based on isolation, and the technical process isolates in turn. From the automobile to television, all the goods selected by the spectacular system are also its weapons for a constant reinforcement of the conditions of isolation of “lonely crowds.” The spectacle constantly rediscovers its own assumptions more concretely. . .In the spectacle, which is the image of the ruling economy, the goal is nothing, development everything. The spectacle aims at nothing other than itself. 
— Guy Debord, 
Society of the Spectacle, 1967 

Imagine a UHF dome arching over your city as ELF signals hop cell towers and phones, penetrate bodies and brains. Digitized voice carried by computers, data arriving wirelessly from across the world, WiFi spilling over into one of the hundreds of WiFi transceivers in the footprint of one cell phone tower. This is the contiguous, barium-enhanced Smart Grid enveloping us all. 

In the beginning, WiFi seemed to be about connecting your computer to the global Internet for data transfer, and cellular was about connecting your telephone to a network to transfer voice. WiFi had a radio transceiver (access point) with a range of two hundred feet or so, cellular range covered miles, and the WiFi access point and cellular cell site separately connected to a telephone central office via coaxial cable, fiber optics, or copper. 

Now, we’re enmeshed in WiFi and social media surveillance. All business, government, and personal communiqués are hoovered up and stored for possible “actionable intelligence.” Even as Private First Class Bradley “Chelsea” Manning was being court-martialed at Fort Meade, Maryland for allegedly providing more than 700,000 national security files to WikiLeaks, 54 NSA whistleblower Edward Snowden was exposing the PRISM surveillance program, an expanded version of Stellar Wind run by the NSA and nine “friendly” social networking providers—Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple 55—with their own “diplomats. 56

At an In-Q-Tel 57 summit, former CIA director David Petraeus admitted that the Internet of Things (IoT) interfaces with CIA “tradecraft”: 

With the rise of the “smart home,” you’d be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room’s ambiance. “Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters—all connected to the next-generation internet using abundant, low-cost, and high-power computing,” Petraeus said, “the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing.” Petraeus allowed that these household spy devices “change our notions of secrecy” and prompt a rethink of our “notions of identity and secrecy.” 58 

An exotic technology has become the American dual-use heart of darkness. Mister Rogers’ Neighborhood 59 is no more; instead, a WiFi ’hood pulsing with EM frequencies robs us of our Schumann resonance birthright. Walk out the door and chemical trails are waiting for you overhead with their conductive metal nanoparticles and polymers to breathe, eat, and drink. Crystalline fibers glitter from trees, cars, animal fur, and human skin as they facilitate signals tracking (SIGINT). Nano-barium enhances the “Wi-Vi” thermal imaging 60 fluorescing our bodies as nano-sensors and microprocessors slide silently through our bloodstream and into our brains, alert for remote communications. 

The sheer number of EM signals per cubic meter from commercial and military sources is staggering —airport and navigational aid emissions communications, pipelines, M2M (machine to machine) infrastructure, transformers, power lines, fiber optic cable, phased-array antennas, smart meter Neighborhood Area Networks (NANs), etc. Our bodies grapple with signals from ground-based gyrotrons (EM field oscillators, GWEN pulse RADAR), 61 LIDAR/LADARs (light detection and ranging / laser detection and ranging or “laser radar”), OP-FTIR (remote sensing Open-Path Fourier Transform Infrared spectrometry), FLIR (forward-looking infrared) for “own the night” infrared imaging with photoconductive detectors, 62 ionosondes (“chirpsounder” radars), actinic rays (EM radiation producing photochemical reactions used in imaging technology)—and all the while ionospheric heaters are heating, multiplying, siphoning, and steering ionized electrons. 

If only we could see beyond our narrow five senses into the vast dimensions of the electromagnetic spectrum! Giant EM clouds several meters in diameter creep through our living zones—an interferometry of signals from thousands of emitters in all directions, thousands of different frequencies—and only our immune system senses it. With an electrostatic meter or magnetometer, you can at last perceive some of the new dimension we are living in: 

When the suburb is all transmitting, for example, in parallel signals to NAN M2M contact, not only are there clouds inside the residences but also an overcloud at about 2.5 meters and above in the streets and above boundary layers of rooftops where the noise can increase from reasonable background levels of below 0.05 microWatt/cm2 to 400 microWatt/cm2 in ambient air. 63 

Daily distribution of RF-zapped metal particulates is all about keeping aloft a plasma “mirror” dense enough not just to detect and resist incoming cyber-attacks but to remotely utilize exotic weapons on populations. From “psy warrior” microcomputers to cellular phones and “critters” (hacker programs), our neighborhoods, homes, offices, and bodies are being hacked. Telephone microphones, listening posts and fusion centers, traffic cameras, surveillance aircraft like the U-2 Dragon Lady, satellite linkups with state of-the-art software like British subsidiary BAE Systems’ GXP 3D mapping and GOSHAWK big picture scrutiny—all are on constant EM real-time alert, whether it is for a dissident or license plate, an impending engineered weather event or forest fire. Everywhere is now the technocratic battlespace and everyone a twenty-first-century land warrior “either with us or against us.” 64 

Slide the Bill of Rights into the Memory Hole. 

If we finally understand what dual-use technology means, we may realize that the user-friendly home computer is little more than a base station for transmitting and receiving signals, its cables unshielded, its telephone lines antennas, its CRT video display emitting electromagnetic radiation at 2–20 MHz, and that cell phone handsets are little more than minicomputers with software that can modify the usual interface. 

Freelance journalist Jim Stone says dithering is doing for PC monitors what digital does for television monitors, 65 and television signals are 10,000 times stronger than GPS signals (which may be why the CIA’s investment arm In-Q-Tel initially tracked people anywhere in the world with just a $40 Rosum radio chip and TV signals). 

It is technologies like these that are behind the demise of thinking and the deepening of cognitive dissonance. 

Computer monitors, like televisions, contain an electron gun (cathode ray) at the back of the tube transmitting beams of electrons at the screen to make pixels fluoresce into a picture. In New York, the NYPD might be driving their Z Backscatter Vans down your street and X-raying your vehicle, home, and body 66 while “war driving” Google Street View cars 67 hoover up payloads of data by means of the highly classified point-and-click TEMPEST (transient electromagnetic pulse standard), also known as Van Eck monitoring (“phreaking”), that receives, intercepts, views, and reconstitutes your incoherent signals—Google MAC (media access control) addresses, SSIDs (service set identifiers), signal strength measurements—before transmitting them to FBI techs, low-life contract agents, and NSA analysts. 

C4 cyber warfare is alive and well in the ’hood.

DCSNet of Communications Assistance for Law Enforcement Act (CALEA)—“The Gold Standard in Public Safety”—collects, sifts, and stores phone numbers, calls, and text messages. DCSNet endpoints connect to more than 350 switches. Besides monitoring servers and select emails of surveillance targets for capture, analysis, and storage, the FBI’s Carnivore accommodates a sophisticated point-and-click surveillance device to cover signals, telephones, and Internet: DCS-3000 Red Hook (SIGINT) does pin register (outgoing numbers) and trap-and-trace (incoming); DCS-5000 Red Wolf is responsible for counterintelligence; and DCS-6000 Digital Storm, wiretap, captures content. All were initially processed by Sprint on a private, encrypted network. FBI wiretap outposts are called Regional Information Sharing Systems (RISS). An FBI agent in New York can wiretap a phone in California, get the location, and receive pass codes and conversation in New York. Analysts interpret phone call patterns, then send them on to the Bureau’s Telephone Application Database for link analysis. 

Since CALEA, all cell phone manufacturers include Nextel software, which means that whether the phone is on or off, the microphone is a remote roving bug that transmits. When a call is in progress, the roving bug calls the FBI (or a corporate competitor) and activates the microphone. 

Someone in your neighborhood may have a wideband radio receiver with spectrum display, horizontal/vertical sync generator, multi-scan video monitor and a phased-array antenna with shielded cables (like a radio telescope) and video taping equipment; 68 or may have leased the Trailblazer successor to ThinThread, a high-tech surveillance tool designed by NSA whistleblower William Binney to intercept, anonymize, and graph metadata according to relationships and patterns. 

It was around 2003 when they started putting optical fibers coming into the U.S. through Y-connector Narus devices. Basically these would duplicate the data coming across the Internet—one set of packets would go the normal route, the other set would go to NSA facilities. There, they collect all the data coming in through fiber optics, reassemble all the data packets into useable information—emails, file transfers, etc.—and then pass it along for storage. That means they are taking all that data off the fiber optic lines at 20 main convergence points in the U.S., collecting almost all of the Internet traffic passing through the U.S. This gets them pretty much control over the digital world. 69 

Time cloaking programs make whole data systems disappear into “time holes”: 

This cloak works using a wave phenomenon called the Talbot effect. Manipulating the timing of light pulses so that the crest of one light wave interacts with the trough of another creates a zero light intensity—where the two signals cancel each other out—in which data can be hidden. 70 

Over Homeland neighborhoods, armed fifty-pound ShadowHawk helicopter drones (General Atomics and Lockheed Martin, $300,000 each) are executing low fly-bys while in wireless communication with whatever agency or corporation has been granted frequency command by measures and signatures intelligence (MASINT). DHS “public safety” surveillance drones and high-altitude killer drones—some remotely supervised, some programmed to be fully autonomous—are making their rounds, as well. 

. . .kill committee members from the National Security Agency, the Central Intelligence Agency, and the Department of Defense act as the prosecution, judge and jury for “low-level” targets. The president, consulting his kill list, makes the decision on “high value” targets, including American citizens. 71 

In every urban or rural neighborhood of the Homeland, MASINT is being collected and collated as infrared peers through walls and ceilings. Thanks to the 1968 Wiretap Act 72 amended in 1986, wireless eavesdropping is not legally considered to be wiretapping. War is peace, freedom is slavery, ignorance is strength. 

Beyond Carnivore (the Digital Collection System) and FinSpy hacks of iPhones, 73 there are dirty tricks programs like: 

• Financial Crimes Enforcement Network (FinCen); 

• Trapwire surveillance network with facial recognition run by Abraxas (CIA) and Mail Isolation Control and Tracking that photographs and records letters moving through the federal post office; 

• Kapsch TrafficCom in-car transponders armed with in- and out-facing mini-cameras; 74 

• FBI FANTOM tracking data in 3D patterns; 

• Encoded Apple signals commanding wireless devices to disable recording functions; 75 

• Skype messaging sent to Microsoft headquarters; 76 

• Stingray (Dirtbox on airplanes 77 ) fake cellphone towers trick and track phones and their users. 78 

Do the three million university undergraduates glued to Facebook know that it was begun with venture capital provided by Stanford graduate Peter Thiel (PayPal, The Diversity Myth, on the board of VanguardPAC) and Accel Partners, whose manager chaired the National Venture Capital Association (NVAC) and was on the board of BBN Technologies that spearheaded ARPANET and thus the Internet? Or that the NVAC board was graced by the CEO of In-Q-Tel, whose mandate is to “nurture data mining technologies”? 

Facebook is actually a user-friendly human network analysis and behavior model-building engine. In fact, says computer engineer and founder of the Free Software Foundation Richard Stallman, Facebook is a surveillance engine 79 mapping your personality and selling your information, whose algorithms in Google Search are deciding what news and political opinions you should see while sending the rest elsewhere (or nowhere). In fact, web personalization is why real activism will never happen on Facebook or the Internet. 80 Eli Pariser explains in his book The Filter Bubble: How the New Personalized Web is Changing What We Read and How We Think: 

. . .the Internet has unleashed the coordinated energy of a whole new generation of activists—it’s easier than ever to find people who share your political passions. But while it’s easier than ever to bring a group of people together, as personalization advances it’ll become harder for any given group to reach a broad audience. In some ways, personalization poses a threat to public life itself. 81 

next-227
The unlawful Silent War against Citizens



NOTES Chapter 9
1 LHC is a synchrotron-type accelerator, a particular type of cyclic particle accelerator in which the accelerating particle beam travels around a fixed closed-loop path. 
2 David Kestenbaum, “The World’s Largest Particle Accelerator.” NPR, May 18, 2008. 
3 Like other “black” projects, confusion reigns over HAARP’s resumption: “HAARP Facility to Reopen in 2017 under New Ownership,” National Association for Amateur Radio, August 4, 2016. 
4 “CLOUD,” home.cern/about/experiments/cloud. 
5 Christopher Fontenot, “CERN: Planetary Surface Power and Interstellar Propulsion,” A Microwaved Planet, June 27, 2016; “Earth’s Global Atmospheric Electric Grid Circuit,” A Microwaved Planet, June 28, 2016. Also view “Bizarre Discovery at CERN,” FreedomRebel, January 17, 2013. 
6 See footnote in Chapter 6. 
7 Email, October 4, 2016. 
8 Tera or trillion electron volts; 1 TeV = 1.6021773E-7 joule. 
9 “The Abandoned Remains of the Superconducting Super Collider.” Amusing Planet, December 14, 2010. 
10 If the LHC schedule can be believed: espace.cern.ch/be-dep/BEDepartmentalDocuments/BE/LHC_Schedule_2016.pdf. 
11 Email from Anthony Patch to Kevin Baker of the Kevin Baker Show, April 25, 2016. 
12 See YouTube “Higgs boson found, now what? (Inside Story – 5th July 2012) [HD].” TheNovadex, July 7, 2012. 
13 As Chapter 2 discussed, scalar potentials hearken from a hyperdimension. Matter, gravity, and light of this 3-space dimension are connected, as harmonics mathematics makes plain. See New Zealander Bruce Cathie’s The Harmonic Conquest of Space (1995). 
14 Keay Davidson, “Air Force pursuing antimatter weapons / Program was touted publicly, then came the official gag order.” SFGate.com, October 4, 2004. 
15 The Russians classify scalar wave technology in three parts: Energetics, Bio-energetics, and Psycho-energetics. 
16 “Seifer to Time magazine: ‘Higgs field’ is ‘ether.’” Changing power.net, March 18, 2012. 
17 See YouTube “Illuminati Black Magick Television Tricks REVEALED!! Part 2,” The Black Child, January 9, 2015. 
18 Katherine Brooks, “Here’s The Dance Opera That’s Being Filmed Inside CERN’s Large Hadron Collider.” Huffington Post, March 9, 2015. Analysis of the dance-opera at thecreatorsproject.vice.com/blog/epic-dance-opera-filmed-inside-cerns-large-hadron-collider. 
19 “Sacrifice to Shiva at CERN? Officials launch investigation after video of ‘spoof’ ritual emerges.” RT, 18 August 2016. 
20 Inside: “Uncut Occult ceremony at the Opening of World’s longest tunnel near CERN in Gotthard massif.+ sound,” Soul Rescue, June 2, 2016. Outside: “2/2 Uncut Occult ceremony at the Opening of World’s longest tunnel near CERN in Gotthard,” Soul Rescue, June 14, 2016. 
21 For more behind this interpretation, please listen to an alleged CERN insider: “Darkest Side of CERN — Destruction of Souls — Critical!!!!” Margaret Schaut, April 3, 2015. 
22 The dynamo theory proposes a mechanism by which a celestial body such as Earth or a star generates a magnetic field. A dynamo is thought to be the source of the Earth’s magnetic field, as well as the magnetic fields of other planets. 
23 Tariq Malik, “NASA’s Fourth of July Fireworks: 2 Rockets Launching Today.” Space.com, July 4, 2013. 
24 Elizabeth Gibney, “Chinese Satellite Is 1 Giant Step for the Quantum Internet.” Scientific American, July 27, 2016. 
25 Anthony Patch email, June 15, 2017: “China’s satellites are for encrypted communications employing their version of the D-Wave quantum computer system. These will not open portals, nor will they produce or connect Birkeland currents to Saturn or other planets. Only the LHC’s Main Ring conjoined with AWAKE, concurrent with the opening of the portal at CERN’s North Area Impact Point, produce the Birkeland currents connecting first with Saturn, then with the other remaining planets. The Chinese have nothing to do with this. I do agree that Saturn-like rings are being produced around Earth as a result of spraying and Synchrotron energies produced by circulating particles within the LHC Main Ring. These energies are the same as with Saturn: gamma and X-rays, along with magnetic lines of force extending at right angles (orthogonal) to the Main Ring’s superconducting magnets.” (In the Bible, Birkeland currents are “Jacob’s ladder.” For a review, go back to Chapter 7.) 
26 Phillippa Blaber and Angélique Verrecchia, “Cassini-Huygens: Preventing Biological Contamination.” Space Safety, April 3, 2014. 
27 Elizabeth Gibney, “CERN prepares to test revolutionary mini-accelerator.” Nature, 7 October 2015. 
28 “Researchers Demonstrate ‘Accelerator on a Chip’.” SLAC National Accelerator Laboratory (Stanford University) press release, September 27, 2013. 
29 In response to the SLAC press release. 
30 By international agreement, absolute zero is –273.15° on the Celsius scale (–459.67° on the Fahrenheit scale). 
31 YouTube “D-Wave lecture by Geordie Rose (IdeaCity 2013).” Paul Calhoun, July 9, 2013. 
32 Listen to an interview with Jay Weidner and Troy McLachlan on “Windows on the World — The Cult of Saturn,” RevelationMediaCo, June 20, 2014; an interview with Anthony Patch, “CERN The Next Generation: LHC’s New Name & Energy Levels Revealed,” The Kev Baker Show, July 28, 2016, and “Forget Mandela Effects, Think QUANTUM POLLUTION w/Anthony Patch,” The Kev Baker Show, August 11, 2016. 

notes chapter 10
1 Wood, Patrick, “Technocracy Endgame: Global Smart Grid.” The August Forecast & Review, May 16, 2013. Also see Marion King Hubbert, Howard Scott, Technocracy Inc., Technocracy Study Course. New York, 1934. 
2 Zbigniew Brzezinski, Between Two Ages: America’s Role in the Technetronic Era. New York: Viking Press, 1970. 
3 Peter Kirby, Chemtrails Exposed: A History of the New Manhattan Project, 2012. 
4 The Aviary was a collection of military and intelligence scientists and officers in the 1980s studying artificial telepathy (remote viewing). See artificialtelepathy.blogspot.com/2006/06/aviary-key-players-of-1980s-and-1990s.html. 
5 Smirnov is credited with inventing the LIDA in the 1970s, but it was actually invented by Dr. José Delgado, U.S. Patent # 3,773,049. For a fictionalized account of how it works, read Evelyn Waugh’s 1957 novel The Ordeal of Gilbert Pinfold. 
6 “Mind control: The Zombie Effect.” Pravda.ru, November 10, 2004, www.pravdareport.com/science/tech/10-11-2004/7346-0/ 
7 “Cary Grove Drill To Include Shooting Blanks In Hallways.” CBS Chicago, January 29, 2013. 
8 Sharon Weinberger, “The ‘Voice of God’ Weapon Returns.” Wired, December 21, 2007. 
9 John Grant, “Americans Love a Good Killer.” CounterPunch, May 11–13, 2012. 
10 1988 Presidential candidate acceptance speech at the Republican National Convention in New Orleans. 
11 Carolyn Williams Palit, “What Chemtrails Really Are.” Rense.com, November 9, 2007. 
12 Patrick Wood, “Technocracy Endgame: Global Smart Grid.” Also read Wood’s “Smart Grid: The Implementation of Technocracy?” The August Review, March 2, 2010. 
13 Ali Abunimah, “How Israel helps eavesdrop on US citizens.” The Electronic Intifada, 3 November 2008. Israel’s NSA is called Unit 8200. 
14 See www.submarinecablemap.com/. 
15 Ibid. 
16 Market Research Reports, www.marketresearchreports.com/qyresearch/global-and-china-smart-meters-sales-market-report-2020. 
17 U.S. Energy Information Administration. 
18 “Shanghai Fudan University develops new Li-Fi technology.” WantChinaTimes.com, October 18, 2013.
19 Jeff St. John, “Could Millions of Smart Meters Be Used to Create a Powerful Supercomputer?” Greentech Media, August 7, 2015. 
20 Ibid. 
21 K.T. Weaver, SkyVision Solutions, “Insanity: Turning Smart Meters into a Supercomputer Platform.” Smartgridawareness.org, July 20, 2015. 
22 J. Hart, “Nuclear expert: Smart Meters 100X Radiation Exposure of a Cell Phone.” Open Publishing Newswire, April 21, 2011. 
23 Garry Reed, “Texas committee hears Smart Meter health hazards.” Examiner.com, October 12, 2012. 
24 Thanks to “Smart Meters Are An Even Larger Threat Than I Had Thought.” The Non-toxic nurse, March 25, 2012. 
25 Dr. Andrew Michrowski, “Emerging phenomena with smart meters imposed in Quebec.” Dr. Michrowski is president of the Ottawa based Planetary Association for Clean Energy. 
26 www.rfsafe.com/lloyds-of-london-insurance-wont-cover-smartphones-wifi-smart-meters-cell-phone-towers-by-excluding-all-wirelessradiation-hazards/. 
27 “Power Pole Fires Leave Thousands Without Power Thursday.” KWTX News 10, December 6, 2012. 
28 Electrosmog is accompanied by a 7–9% drop in humidity, is highly charged and highly alkaline. 
29 Vicente Arenas, “Power struggle: Local woman uses gun to stop worker from installing smart meter.” KHOU 11 News, July 18, 2012. 
30 “Smart Meter Fires and Explosions,” EMF Safety Network. 
31 Dana Liebelson and Chris Mooney, “CIA Backs $630,000 Scientific Study on Controlling Global Climate.” Mother Jones, July 17, 2013. 
32 Daniel G.J. “The Malware That Can Spy on You through Your Own Smartphone.” IntelliHub, July 15, 2013. 
33 Bob Egelko, “Court blocks S.F. warning on cell phones.” San Francisco Chronicle, June 26, 2013. 
34 Will Thomas, “Wireless, Chemtrails, and You.” WakeUpWorld, 27 May 2013. Also see his “Dialing Our Cells.” 
35 “Verizon Seeks Purely Wireless Phone Network on Fire Island, Abandons Landlines.” LongIsland.com, 5 July 2013. 
36 “Cell Phone Radiation Lawsuits: Bernstein Liebhard LLP Notes New Study Finding Cell Phone Radiation May Cause Brain Tissue Damage.” Digital Journal, March 27, 2013. 
37 “Swedish review strengthens grounds for concluding that radiation from cellular and cordless phones is a probable human carcinogen.” Pathophysiology, April 2013: 123–9; and Joshua Pramis, “Number of mobile phones to exceed world population by 2014.” Digital Trends, February 28, 2013. 
38 Joel M. Moskowitz, Ph.D., School of Public Health, UC Berkeley, “Your Cell Phone Company May Affect Your Risk of Brain Cancer.” PRLog press release (March 27, 2013) for new study by Sven Kuehn et al., “Analysis of mobile phone design features affecting radiofrequency power absorbed in a human head phantom.” Bioelectromagnetics, March 26, 2013. 
39 “Smartphone Technology: What is 5G and 6G Wireless Technology: Difference between 5G and 6G Mobile Technology.” technologyoffice.blogspot.com/2013/06/what-is-5g-and-6g-wireless-technology.html. 
40 “Active Denial System,” Wikipedia. 
41 “Letter to the FCC from Dr. Yael Stein, M.D. of the Hadassah Medical Center, Jerusalem, Israel in Opposition to 5G Spectrum Frontiers Millimeter Wave Technology.” ehtrust.org, July 9, 2016. 
42 For more on TETRA, see Barrie Trower’s “Secret Report On Cell Phone Dangers and Tetra,” 
43 Paul Raymond Doyon, “Are Microwaves Killing the Insects, Frogs, and Birds? And Are We Next?” Rense.com, March 20, 2008. 
44 David Jen, et al., “Distributed Phased Arrays and Wireless Beamforming Networks.” International Journal of Distributed Sensor Networks, 5:283–302, 2009. 
45 Will Thomas, “Wireless, Chemtrails, and You,” 2013. 
46 Frank J. Ryan, “User’s Guide for the VTRPE Computer Model.” Naval Ocean Systems Center, October 1991; funded by the Joint Electronic Warfare Center and the Office of Naval Technology. 
47 MrCati in the YouTube “The Chemtrails Vaporific Effect” calls this a vaporific effect weapon (December 27, 2011). 
48 Carolyn Williams Palit, “The Air Force Wants Your LOV: Aerial Seeding of Biological Implants into Food, Water, & Air,” February 28, 2008. www.whale.to/b/palit.html. Palit’s website exoticwarfare.com is no longer. 
49 See more on coupling in Chapter 11. 
50 Robert Duncan, Ph.D., The Matrix Deciphered (self-published, 2006). Duncan has also written Project: Soul Catcher: Secrets of Cyber and Cybernetic Warfare Revealed (Amazon, 2010) and How To Tame A Demon: A short practical guide to organized intimidation stalking, electronic torture, and mind control (January 2014). He claims to have been tortured and programmed by the very technologies he worked on for the Department of Defense, U.S. Navy, and NATO. Documentation of his background is elusive. 
51 Daniel Ehyaie, “Novel Approaches to the Design of Phased Arrays.” Doctoral dissertation in Electrical Engineering, University of Michigan, 2011. 
52 In 1990, the 2.4GHz frequency was released for unlicensed use in short-range wireless (three hundred feet). 
53 Magda Havas, “Is White Space Super WiFi dangerous?” September 24, 2010. www.magdahavas.com/ 
54 “WikiLeaks founder solicited U.S. secrets: court-martial witness.” Reuters, June 11, 2013. 
55 Dan Roberts and Spencer Ackerman, “Edward Snowden’s explosive NSA leaks have US in damage control mode.” The Guardian, 10 June 2013. Note: Apple was a holdout until Steve Jobs’ death. 
56 Swift, Mike. “Facebook to assemble global team of ‘diplomats’.” Mercurynews.com, May 22, 2011. 
57 In-Q-Tel is a venture capital firm of the now-corporate CIA. 
58 Spencer Ackerman, “CIA Chief: We’ll Spy on You Through Your Dishwasher.” Wired, March 15, 2012. 
59 A children’s TV show (1966–2001) in which Fred Rogers played the gentle father in the studio home that “latchkey” American children longed for. 
60 Helen Knight, “New system uses low-power WiFisignal to track moving humans—even behind walls.” MIT News, June 28, 2013. 
61 Electron guns capable of generating, mirroring, and guiding EM waves to targets. 
62 Patented in 1963 by Texas Instruments Defense Systems and Electronics Division, now owned by Raytheon, previous holder of HAARP patents. 
63 Andrew Michrowski, Ph.D. “Emerging phenomena with smart meters imposed in Quebec.” See his article “Electromagnetic fields: High-level microwave technology concerns,” The Planetary Association for Clean Energy, Inc., media.withtank.com/42391c31ef.pdf. 
64 Then-President George W. Bush to a joint session of Congress, September 20, 2001. 
65 Jim Stone, “Mind control via electronic manipulation,” June 14, 2012. www.jimstonefreelance.com/cells.html. 
66 “The NYPD is using X-ray vans that can see into cars and homes.” Business Insider, October 14, 2015. 
67 David Kravets, “An Intentional Mistake: The Anatomy of Google’s WiFi Sniffing Debacle.” Wired, May 2, 2012. When confronted by the FCC about its war driving, Google maintained that it had broken no laws because “the data was flowing, unencrypted, over open air waves.” And where have those specially rigged-out Street View cars gone? 
68 Frank Jones, “The vulnerability of CRTs CPUs, and peripherals to TEMPEST monitoring in the real world,” 1996, www.parallaxresearch.com/dataclips/pub/infosec/emsec_tempest/info/TEMPESTMonitor.txt. 
69 Simon Black, “Digital Privacy Black Paper.” www.commieblaster.com/dl/NSA-Black-Paper.pdf 
70 Shaunacy Ferro, “Laser Time Cloak Hides The Fact That An Event Ever Happened.” Popular Science, June 6, 2013. 
71 Col. Ann Wright, “America’s Drones Are Homeward Bound.” Truthdig.com, July 17, 2012. 
72 Title III of the Omnibus Crime Control and Safe Streets Act of 1968. 
73 G.J. Daniel, “The Malware That Can Spy on You Through Your Own Smartphone.” IntelliHub, July 15, 2013. FinSpy’s creator Gamma Group is “a British company owned by a shell corporation in the British Virgin Islands.” 
74 “Government Cameras In Your Car?” MSNBC, October 14, 2011. 
75 Nick Farrell, “Apple patents tech to let cops switch off iPhone video, camera and wi-fi.” Techeye.net, 7 August 2013. 
76 “Skype with care — Microsoft is reading everything you write.” heise Security, 14 May 2013. 
77 Kim Zetter, “California Police Used Stingrays in Planes to Spy on Phones.” Wired, January 27, 2016. 
78 Bob Sullivan, “Pricy ‘stingray’ gadget lets cops track cell phones without Telco help.” NBC News, April 3, 2012. Arizona police paid for their Stingray ($244,195) with a $150,000 grant from the State Homeland Security Program, plus RICO monies. For a fee, wireless carriers will track cell phone signals back to cell towers. 
79 Sriram Srinivasan and Sangeetha Kandavel, “Facebook is a surveillance engine, not friend: Richard Stallman, Free Software Foundation.” The Economic Times, February 7, 2012. 
80 Jonathan Matthew Smucker, “What Facebook Is Hiding From You.” AlterNet, May 29, 2011. 
81 British version listed under The Filter Bubble: What the Internet Is Hiding From You. Penguin Books, 2012.


FAIR USE NOTICE
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. As a journalist, I am making such material available in my efforts to advance understanding of artistic, cultural, historic, religious and political issues. I believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law.

In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. Copyrighted material can be removed on the request of the owner.   

No comments:

Part 1 Windswept House A VATICAN NOVEL....History as Prologue: End Signs

Windswept House A VATICAN NOVEL  by Malachi Martin History as Prologue: End Signs  1957   DIPLOMATS schooled in harsh times and in the tough...