Under an Ionized Sky
From Chemtrails
to
Space Fence Lockdown
by Elana Freeman
Chapter 9
The Temple of CERN
The first gulp from the glass of natural sciences will turn you into an atheist, but at the bottom of the
glass God is waiting for you.
— Werner Heisenberg
The Higgs potential has the worrisome feature that it might become mega-stable at energies above
100bn giga-electron-volts (GeV). This could mean that the universe could undergo catastrophic
vacuum decay, with a bubble of the true vacuum expanding at the speed of light.
— Stephen Hawking,
preface to Starmus
CERN is an acronym for Conseil Européen pour la Recherche Nucléaire, the European Organization for
Nuclear Research. The site housing the massive particle accelerator known as the Large Hadron Collider
(LHC)
1 was built (1998–2008) near Lake Geneva (Lac Léman). Two 1,000-ton superconducting magnets
hang suspended down three-hundred-foot shafts into a cavern through which an underground river once
ran until frozen with liquid nitrogen. The magnets are arranged like boxcars around the five-story, sixteen mile (twenty-seven-kilometer) “ring” circling the cavern. Two detectors are built into the loop, the
Compact Muon Solenoid (CMS) and A Toroidal LHC ApparatuS (ATLAS). Designed to detect tiny
subatomic particles like Z bosons, pi mesons, strangelets (quarks bound by gluon), etc., the LHC “ring” is
in search of “clues to the fabric of the universe”:
[Dan Green, project manager:] “We expect to see things which will change the way we view the universe”. . .No one really knows
what the machine will give birth to. But the equations suggest that some weird stuff could be just around the corner— maybe “dark
matter,” the invisible stuff that seems to hang around galaxies.”
2
The phrase “No one really knows what the machine will give birth to” is reminiscent of what DWave’s Geordie Rose says later in this chapter. Haunting.
CERN’s massive superconducting electromagnets enhance and magnify the sustained reach of the
Space Fence throughout our now-ionized atmosphere all the way to the magnetosphere. Certainly, CERN
and other particle accelerators have been recalibrated to synchronize with the rest of the Space Fence
infrastructure. CERN’s two-year shutdown corresponded with HAARP’s shutdown, and its restart on
April 5, 2015 was just four months before HAARP (“UAF Gakona”) resumed.
3 All systems connected
with monitoring and controlling geospace, the ionosphere and magnetosphere, and harnessing cosmic
processes to serve the Space Fence, have been upgraded and synchronized, including the International
Space Station (ISS).
CERN studies how cosmic rays affect the plasma clouds now being produced in the troposphere and
stratosphere by chemtrail jets, ships, and sounding rockets, as well as how to keep the electromagnetic
circuit depositing ions to form the molecules that create plasma—molecules that CERN propagates via its
CLOUD experiments.
The Cosmics Leaving Outdoor Droplets (CLOUD) experiment uses a special cloud chamber to study
the possible link between galactic cosmic rays and cloud formation. Based at the Proton Synchrotron (PS)
at CERN, this is the first time a high-energy physics accelerator has been used to study atmospheric and
climate science. The results should contribute much to our fundamental understanding of aerosols and
clouds, and their affect [sic] on climate.
4
Remarkably similar to Tesla’s Wardenclyffe Tower dome, CERN’s Globe of Science and Innovations
generates and feeds energy into the Global Atmospheric Electrical Grid. Similar to the Space Fence,
CERN’s mission includes creating and sustaining an atmospheric medium for wireless power (C4).
CERN’s mission of inducing voltage into the Global Atmospheric Electrical Grid is being accomplished by the ionic jet outflow
perpendicular to the Globe of Science and Innovation. Ions are increased in energy and ejected into the Ionosphere by the
phenomena patented by [David] La Point. Once that charge potential is induced into our environment, it can be used for wireless
energy harvesting globally. The technology is being developed by DARPA: Fractal Rectenna [receiving antenna] Array
technology.
5
The present count of particle accelerators affiliated with an international partnership of thirty-four
institutions is as slippery as ionospheric heaters, but at least three in the United States are part of the more
than 160 international support particle accelerator groups connected via ESnet5 (Energy Sciences
Network)
6
fiber optics. Including CERN, particle accelerators generate 100X more magnetic energy than
the entire planet naturally generates, especially when synchronized with mirrored satellite lasers creating
electrical discharges (sprites).
Fermi National Accelerator Laboratory at the FermiLab outside Chicago in Batavia, Illinois, was
recently upgraded with a 680-ton superconducting magnet for its Tevatron.
Los Alamos National Laboratories houses the High Current Proton Accelerator.
Brookhaven National Laboratory houses the Cosmotron. As I indicated in the Preface, BNL may have
participated in the downing of the World Trade Towers in 2001. Here is David Masem, advanced
technology engineer and senior Unix administrator who worked at BNL 2000–2003. As per his request,
his story is quoted at length so readers can get a picture of what national labs are like:
When I worked at BNL, director John Marburger III, Ph.D., had just been chosen to serve as science advisor to President George
W. Bush. The head of the physics department then became the acting director. As he was a personal friend of my manager, I was
given free rein at the RHIC particle accelerator (Relativistic Heavy Ion Collider) and collision detect for Project Aerosol’s study of
aerosol and nanoparticle impact on the environment under SAG (Stratospheric Aerosol Geoengineering) research. As a Unix
Systems Administrator, I configured real-time Unix servers to perform samplings of collisions of positive and negative charged ions.
I also configured Apache websites (just templates) for publishing the physicists’ findings. During one of my Project Aerosol
meetings, I found out that a mini-HAARP was under construction. There are a number of reactors there, several defunct and
several more popular gradient & graphite reactors for which I had no clearance.
Since I worked closely with the physicists, I was friended by several from Europe who were also working on the CERN. Over
lunch one day at the BNL commissary, one physicist announced that he was going to publicly denounce BNL for its involvement in
geoengineering research. But he never had the chance to do so as he had an “accident” in Pt. Jefferson while on his motorcycle
and was pronounced dead at the scene. As a result of his “accident,” I started to hack around a bit to find out more about Project
Aerosol research, as all of this technology was new to me. Around that time, my manager was transferred to the physics
department after the U.S. Navy brought in a lieutenant dressed in civilian clothes to manage the IT department. He made my life
hell, moving me out of my capacity and taking me off all the projects I was involved with on the RHIC and the cluster server, then
banishing me to do departmental backups. I knew it was because of my hacking around. Subsequently, I left BNL. Much of the IT
department was outsourced after a new director arrived.
I can definitely testify that BNL has intranet access to CERN. I did an upgrade on BNL’s cluster server and had to log in and
test the link to make sure that our CERN link was back up and online. BNL also has a supercomputer that was built in-house with
a proprietary link to both CERN and Japan’s ILC (International Linear Collider) and the KEKB accelerator. I knew this for a fact
as one weekend I worked on upgrading storage arrays on BNL’s cluster while a physicist and a hardware technician I knew were
doing a hardware upgrade on the BNL supercomputer. I remember they were quite concerned about the proprietary intranet links
when they failed to come up after the upgrade.
7
How many particle accelerator labs are still active and how many are proof of concept labs receiving
data from LHC particle detectors for number-crunching and computer modeling is hard to say. Wikipedia
(notoriously unreliable) lists many as having been shut down—or did they just “go black”? The site
“Particle Accelerators Around the World” (www-elsa.physik.uni-bonn.de/accelerator_list.html) seems
accurate, though again, who knows, given that most of the programs are geared to researching kinetic
weapons and not physics per se?
Take the eight-hundred-foot “Desertron” Superconducting Super-Collider (SSC) in Waxahachie,
Texas near Dallas, a fifty-four-mile-long tunnel 250 feet under the Earth’s surface with a “ring”
circumference of 87.1 kilometers and an energy of 20 TeV8 per beam of protons—3X that of the LHC (7
TeV per beam). Protons hurtling at the speed of light (harmonic 16944), antimatter collisions shattering
quantums of energy. The Desertron was to build and test superconducting magnets for other supercolliders (plus magnetic-levitation trains or maglevs, motors, energy storage, low-loss power
distribution, etc.). Construction began in 1991 but by 1993 the story was that the Desertron was
hopelessly over budget with just 22.5 km of tunnel and seventeen shafts completed, so it was shut down.
In 2006, the Department of Energy purportedly sold it to Arkansas multimillionaire Johnnie Bryan Hunt
whose dream was to build the Collider Data Center.
Hunt’s unique selling point for Collider Data Center was its location and infrastructure. The collider sits on an independent power
grid capable of delivering 10 megawatts of power (and up to 100 megawatts if needed), and it has its own dedicated fiber optic
line. Its two warehouses can support floor loads of 500 pounds per square foot, perfect for the enormous servers that Hunt
intended to buy. The entire complex is clear of flight paths and out of hurricane, tsunami, earthquake and flood zones.
9
But then Hunt “slipped on ice” and died, so the half-dug underground facility again sat idle—or did
it?
Earlier, I stressed that HAARP experiments have damaged the ionosphere and weakened the
magnetosphere. CERN, in tandem with scalar interferometers like HAARP, is no doubt complicit, as
well, but could also offset impact on the magnetosphere. “Ripples” in the magnetosphere can cause
airplanes to literally drop from the sky. Rumors about CERN flew when on March 24, 2015,
Germanwings Airbus A320 went from a cruising altitude of 38,000 feet to a rapid descent over the French
Alps 127 miles from CERN. Only 10 percent of airplane crashes occur after a plane reaches cruising
altitude.
On April 23, 2016, the magnetosphere collapsed (“disappeared”) for two hours. While it is tempting
to blame the LHC superconducting magnets, CERN watcher Anthony Patch insists that at that time the
LHC was running at low luminosity and producing corresponding low-duration energies and lower field
intensities.
10 So no, it wasn’t the LHC that caused the magnetosphere to “disappear” for two hours:
We can, however, attribute these gaps in the electromagnetic lines of force to actions by the numerous HAARP antennas
established around the planet. No longer are they simply heating the ionosphere and similarly targeting terrestrial areas to trigger
earthquakes and volcanoes. Indeed, these are man made events. Of recent, most HAARP installations have been revamped,
resulting in higher output and range [due to working together at exact calibrations]. These are the cause and effects noted in our
[magnetosphere] shields, not the reduced power levels of the superconducting magnets arrayed to the Main Ring of the Large
Hadron Collider.
11
Disruption of the magnetosphere means that more gamma rays and X-rays can access our atmosphere.
Echoing the Stephen Hawking quote at the beginning of this chapter, professor Otto Rossler at the
University of Tubingen in late 2008 went so far as to file a lawsuit against CERN with the European
Court of Human Rights on the grounds that the facility might trigger a mini-black hole that could annihilate
the planet.
12 The lawsuit was thrown out.
However, if Rossler was referring to CERN’s antimatter experiments, he was right: when matter
comes in contact with antimatter, it is destroyed. Unstable and needing careful containment, if just one millionth of a gram is loosed, it equals 37.8 kilograms (83 pounds) of TNT or 10 billion times a high
explosive.
ANTIMATTER
The study of matter, what it is and isn’t, has obsessed Western science since the eighteenth century, as has
the determination to probe its origins. We now know that the reality our five senses perceive is actually a
complex pattern of interlocking wave forms, much as was envisioned in the final scenes of the 2003 film The Matrix Revolutions. What we see as “matter” is the positive cycle of a wave pulsing into existence
while in a hyperdimension its negative cycle manifests as antimatter. Quantum physics and harmonics
mathematics may be preparing humanity for encounters beyond what occultists have for centuries termed
the Threshold or Veil.
13
(At CERN, it’s known as the “containment wall.”)
Think of antimatter/matter as the yin/yang of reality, the building blocks of atoms being electrons (-)
and protons (+), each with its own antimatter and opposite charge, as was mentioned in Chapter 7 while
discussing lightning, a natural particle accelerator producing antimatter. Chapter 6 mentioned how
lightning is the natural “particle accelerator” that produces antimatter, and how sprites are now being
manufactured to do the same.
With terms like “Higgs boson” and “God particle,” CERN claims to seek the “glue” binding all matter
together. What it really seeks is the antimatter rooted beyond the Threshold of earthly existence.
In 2004, the U.S. Air Force publicly announced that it was pursuing antimatter weapons, “the eerie
‘mirror’ of ordinary matter.”
14 With antimatter in hand, positron bombs would be “clean” bombs that
wouldn’t eject plumes of radioactive debris. But on Eugene Mirman’s Star Talk radio program,
astrophysicist Neil de Grasse Tyson blew holes in the military’s naïve way of thinking: “Ask yourself:
How much energy is keeping [the planet] together? Then you put more than that amount of energy into the
object. It will explode.”
Are some of the world’s particle accelerators already in the antimatter weapons business?
Antimatter being on the other side of the containment wall, enough strangelets must be produced so
that an explosive potential can tear the Veil, expose the antimatter realm, and alter the very fabric of
Space. Anthony Patch says that the right number of strangelets can change a planet into a neutron star.
(Shades of Stephen Hawking’s misgivings.) Blast the containment wall and psycho-energetics
15 will leak
through, operating on the same scalar “channel” as visions, dreams, “spooky action at a distance”
(quantum entanglement), synchronicities, and déjà vu—all of which share a frequency signature and
resonance with another, unseen side of existence.
Having deciphered antimatter’s signature and breached the Threshold, CERN opens the way to impact
everyone’s antimatter “tether.” For example, if it is true that CERN has breached the Veil and opened an
aperture (“portal”) welcoming antimatter into our dimension, it seems obvious that if antimatter is the yin
to matter’s yang, antimatter entities now in 3-space will need to either produce a plasma body (plasma
being the fourth state of matter) or occupy a body possibly already occupied.
In a quantum entanglement era, such a line of thinking is no longer so far-fetched. After all, the
military-intelligence apparatchik has been studying paranormal events and parapsychology for decades—ever since antimatter was discovered in 1955, as a matter of fact. And if dark matter and the Higgs Field
are wherever matter isn’t—like antimatter and æther
16—then proximity to the Threshold probably
quickens paranormal and parapsychological events. Which brings up questions regarding the relationship
between the paranormal and antimatter, beginning with What, if anything, are scientists and staff at
CERN experiencing?
CERN PSYOPS
The fact that the LHC’s huge, circular dharma-like geometry has been compared to ancient technologies
like the Egyptian pyramids points to its mythical stature: a vast, complex technology in quest of the tiny
building blocks of the universe. Is CERN the global elites’ Mecca or Rome “hidden in plain sight”?
Headlines in publications for the masses like the British Sunday Express—“Scientists at Large Hadron
Collider hope to make contact with PARALLEL UNIVERSE in days” (August 15, 2015)—make CERN
larger than life. Rumors of subterranean CIA headquarters beneath Lake Geneva add to the diversion from what is really going on there, and at the same time assure the scientifically minded that nothing but
“science” is going on at CERN and that the choreographed shiny LHC-like revolving sigils and Saturn
“rings” zipping around the Earth on news shows as tones deepen the state of TV trance are simply
coincidental.
17
The statue of the Hindu goddess Shiva Nataraja began dancing the Anandatandava or Cosmic Dance
of creation and destruction outside CERN headquarters in 2004. The town in France that CERN’s
presence dominates is called Saint-Genis-Pouilly, Pouilly referring to the Latin Appolliacum, a Roman
temple honoring Apollo and therefore a gateway to the underworld. But perhaps Shiva is dancing for the
Indian Apollyon, primordial destructive force of the universe . . .
Meanwhile, ritual and “mirrored” events are being leaked to the Internet and press to further obfuscate
public perception:
~March 9, 2015, the Shiva “Dance of Destruction” around the Large Hadron Collider a.k.a. Hindu dharma wheel in the
cavern,
18 Shiva’s dance being the dance of subatomic matter.
Wednesday, August 12, 2015, mirror event in New York City: a hologram of the Hindu goddess Kali cast upon the Empire State
Building.
~August 11, 2016, a seemingly Satanic (or Saturnalian?) night ritual replete with a female sacrifice in front of Shiva in the main
square.
19
Wednesday, June 1, 2016, mirror event in Switzerland; a two-part ritual spectacle in Switzerland to christen the opening of the $12
billion Gotthard Base Tunnel (35.4 miles long) buried a mile and a half under the Gotthard mountain range of the Swiss Alps.
20
Though not on site with CERN, the latitude of Gotthard Base Tunnel is 46.600°N and of CERN 46.233°N. (Serious ritual always
takes into account planetary and geodetic conditions.) Four heads of state and multiple global elites first watched the ritual
spectacle of robotic workers in orange jumpsuits peeling down to their underwear inside the cavern, then witnessed the Mystery
drama of Baphomet simulating anal rape as three scarabs, multiple mad souls and chaotic entities from other dimensions
undermined toiling humanity, and saving angels outside the cavern. The spectacle might have been entitled “Ripping the Veil” or
“Storming the Threshold.”
The Gotthard Base Tunnel “outing” of an authentic global elite spectacle-cum-ritual-cum-psyop no
doubt shocked those of the lower classes who were there as well as television audiences who eventually
saw what had been filmed, but it was pagan business as usual for the high-ranking elites in attendance. No
public debate over the artistic or religious merits of the “choreography” has been forthcoming. In fact, the
entire event has dropped neatly into the Orwellian Memory Hole (the subconscious). Such an Eyes Wide
Shut peep into the elite underworld was more than enough for the 99.9% conditioned to believe whatever
they are told and not necessarily what they are shown.
These rituals are connected with the intent that CERN throw open the gates of the Abyss to antimatter.
On an energetic level, “being human” straddles both matter and antimatter; thus it seems obvious that
these rituals are intended to open us to our antimatter side, given that our thoughts and feelings tend
toward one side or the other. Entities drawn to antimatter are demonic to human beings, so increased
production and extraction of antimatter will increase demonic presence. By wielding antimatter’s energy
signature, the LHC will “call” the antimatter signatures in human beings to activate.
It seems that the temple of CERN is about altering reality as we have known it.
21
Theoretical physicist
Feynman had it right: “If you aren’t deeply disturbed by quantum mechanics, you clearly haven’t
understood it.”
SATURN AND THE SPACE FENCE “RINGS”
On May 25, 2007—Bernard Eastlund died 12/12/2007—Bernard, Tom Bearden, Fred Bell, a filmmaker
and I had a conversation in Texas about the possible development of Saturn rings around the Earth
like a celestial space collider. It seemed like every time the LHC was activated, there were cyclotronic
reverberations like shockwaves of earthquakes, volcanic and massive spontaneous gravity (scalar)
wave activity.
— Billy Hayes, “The HAARP Man”
Even more startling than CERN’s antimatter quest may be its mysterious connection to NASA’s intent to
create Saturn-like “rings” around planet Earth—synchrotron rings that will serve interplanetary
communications, quantum shielding and surveillance, and the real SSS Space Fence lockdown.
First, let’s
follow the psyop breadcrumbs.
Saturn has six letters and is the sixth planet from the Sun with a six-sided polygon as its north pole.
Even the sixth day, Saturday—still a holy day for some—is named after Saturn. CERN’s logo is a
quantum entangled 666.
In Chapter 7, I mentioned NASA space scientist Robert Pfaff’s justification for altering the near-earth
space environment by referencing other dynamos
22 on Jupiter, Saturn, Uranus and Neptune.
23
In the same
context, I discussed how “dusty plasma” is being used to construct a conductive Saturn-like “CD disc”
around the equator bearing a chemical signature very like the conductive metal brew daily dumped by jets
and zapped by radio frequency—following the ancient As above, so below alchemical dictate by weaving
electro-chemical processes of the ionosphere and lower atmosphere into a plasma mesh or grid.
China is already working on a massive supercollider twice the size of any synchrotron or linear
particle accelerator and 7X more powerful than CERN to produce millions of—what? Is China’s
supercollider to serve as our planetary dynamo? Or will it be the Compact Linear Collider (CLIC) or
International Linear Collider (ILC) no longer firing electrons at each other but firing electrons and
positrons (antimatter) at each other? China’s quantum satellite is now experimenting with quantum entanglement.
24 Anthony Patch wonders if the quantum satellite will open portals to electrically link the
Earth’s rings with Saturn’s rings via Birkeland currents (plasma conduits).
25
Now, let’s go a little deeper into what Saturn represents to various global elites.
The incursion of thousands of Nazis into the United States under Operation Paperclip lends credence
to the possibility of a still-thriving secret Saturnalian Brotherhood in the United States, along with the
normal fare of Freemasons, Knights of Malta, Opus Dei, Satanists, etc.
The 33° system of initiation known as the Fraternitas Saturni or Saturnalian Brotherhood is a German
magical order founded in 1926. Originally, it was connected with Aleister Crowley and his Ordo Templi
Orientis (OTO); now, “Saturn-Magic” lodges are primarily headquartered in Germany, Austria, and
Switzerland, including offshoots like Ordo Saturni and Communitas Saturni.
I would not be surprised if NASA hosts a Saturnalian Lodge. Wikipedia defines NASA as “an
independent agency of the executive branch of the United States federal government,” but neglects to
mention that it was founded under SS officer Wernher von Braun (1912–1977) and Paperclip Nazis who
claimed to have derived technological insight from ancient “mythological” texts and entities beyond the
Veil through occult rituals. Thus, NASA may be a very different kind of “independent agency of the
executive branch.”
The most high-profile NASA move toward Saturn is surely the Cassini space probe launched with its
lander the Huygens on a Titan IVB/Centaur on October 15, 1997 and entering Saturn’s orbit in 2004 with
Huygens landing on Saturn’s moon Titan on January 14, 2005. Data has been transmitting back to Earth
ever since by using the orbiter as a relay, and the Cassini has been executing flybys of Saturn’s other
moons. However, once it enters Saturn’s rings and atmosphere, it is slated for destruction on September
15, 2017, supposedly “to ensure protection and prevent biological contamination to any of the moons of
Saturn thought to offer potential habitability.”
26
Questions regarding Saturn abound. Why and how does Saturn emit more energy than it absorbs? Why
do Saturn’s rings make those eerie resonance sounds? Why are the rings separate? What are the objects
caught up in the rings? From ancient lore, we might ask, Is it true that hundreds of thousands of years
ago Saturn was Earth’s Black or Midnight Sun? Were Saturn, Mars, and Venus once in polar alignment
with Earth, and if so, what event ended that alignment, causing them to “float away” to their present
orbits? Of NASA, I would ask, Is the purpose to go to Saturn or to make Earth into a Saturn?
Shades of Immanuel Velikovsky (1895–1979).
Certainly, the LHC, AWAKE, and D-Wave are engaged in reconnecting the Earth to Saturn as NASA
and other agencies and private deep pockets seed the Earth’s atmosphere with nano-metals and build
nano-metal Saturn rings around the Earth that surely will act as transceivers with Saturn’s rings.
AWAKE AND D-WAVE
And the fifth angel sounded, and I saw a star fall from heaven unto the earth: and to him was given the
key of the bottomless pit.
— Revelations 9:1
The recent addition of the smaller (thirty-meter) Advanced Wakefield Experiment (AWAKE) plasma
linear accelerator with a focusing beam and capability of accelerating particles to 20 PeV (peta electron
volts, peta meaning one thousand million million) by “surfing” them on waves of electric charge (protons)
created in a plasma (ionized gas) will generate 1,000X the particles that the LHC generates. “Because
protons have greater mass than electrons, each proton pulse penetrates further into the plasma, setting up a
longer series of charged regions, which in turn provides greater acceleration per pulse.”
27
Anthony Patch believes that the AWAKE will assure a connection to Saturn.
The AWAKE focusing beam means low luminosity and less fragmentation, and the “accelerator on a
chip”
28 means moving away from the mechanical power of the ring-based synchrotron LHC smashing and
crashing protons to the real source of greater energy power, which is plasma. Billy Hayes “The HAARP
Man” well understands that size is not the issue anymore (other than smaller and smaller):
Each [accelerator on a chip] can independently act as an optical laser amp or memory chip and redirect what it receives. Hence a
new versatile super weapon one step from airborne nanoparticle accelerators launched into orbit by the trillions to nano-tag and
digitally control life forms.
29
As the LHC smashes and AWAKE drills holes via quantum tunneling into hyperdimensions, the new
VHEeP (very high energy electron-proton collider), superconducting magnets, plasma, and electron proton instead of proton-proton collisions will generate the power needed to “pierce the Veil.” 20 PeV with a focused beam at a quantum level (thanks to the D-Wave quantum computer) is powerful enough to
break the nuclear bonds—the force binding quantum particles at a quantum level—that have heretofore
prevented access to the dimensions beyond the Threshold.
In other words, the VHEeP is a kinetic particle energy weapon whose assault on the Threshold is an
act of war, not an astronomical “experiment.”
CERN’s D-Wave adiabatic quantum computer system controls the portals—their rate of opening, their
size, what comes through, etc. Whereas the nominal operational temperature for the LHC is 1.9 degrees
above zero, the tiny niobium D-Wave chip in its ten-foot black box must be kept colder than deep space at
just above absolute zero.
30
It is the cold that transforms a mere chip into a qubit superconductor. DWave also requires an extremely low magnetic environment, 50,000X lower than the Earth’s ambient
magnetic field—the exact opposite of CERN’s massive superconducting magnets.
Co-founder and chief scientist Eric Ladizinsky equates D-Wave’s qubit chip with the Manhattan
Project and magic, as per Arthur C. Clarke’s famous “Any sufficiently advanced technology is
indistinguishable from magic.” In a 2013 speech at Idea City, D-Wave’s Geordie Rose revealed DWave’s hyperdimensional capability by quoting physicist David Deutsch: “Quantum computation. . .will
be the first technology that allows useful tasks to be performed in collaboration between parallel
universes.” Rose went on to mention the pulse tube dilation refrigerator unit “heartbeat” of the twelve foot D-Wave, and confessed that standing beside the D-Wave was “awe-inspiring. . .like an altar to an
alien god.”
31
(See Chapter 6 for more on D-Wave.)
It is true: D-Wave appears to function interdimensionally. First came D-Wave Model 512 (qubits)
linked with Josephson junctions, then the 1024, the 2048, and finally the 4096 that clears the way through
the Veil (4,096 qubits in the coded “key”). D-Wave’s 512 cracked the uncrackable Shor’s algorithm of
2048; now, D-Waves are writing their own code that only other adiabatic quantum computers can crack.
How many dimensions has D-Wave accessed so far with VHEeP?
In quantum worlds, (1) dimensions are frequencies, (2) everything locked in matter has a dual nature
of waves (spiritual) and particles (physical), (3) quantum tunneling reaches into spiritual dimensions, and
(4) antimatter frequencies entering our reality are subject to the same 3-space laws we are.
Is the Transhumanist agenda looming behind the Space Fence, CERN, and the D-Wave “alien god” to
digitally augment our reality to the point that our DNA matches the digitized DNA of antimatter
demons/aliens? Are we to one day be only virtual and exist entirely in the digital like cartoon characters?
The Mandela Effect—when someone has a clear memory of something that never happened in this
reality—may be an early ripple foreshadowing such a future, or it could be yet another psyop via pulsing
and Internet hacking. But it does seem that CERN and D-Wave are bent on opening and cross-fertilizing
dimensions. Meanwhile, the rings of Saturn are going up around the Earth.
32
Chapter 10
The Covert Ascendance of Technocracy
Technocracy is a totalitarian system of government where scientists, engineers and technicians
monitor and control all facets of personal and civic life—economic, social and political. . .Smart Grid
is born out of technocracy and not the other way around.
— Patrick Wood, Editor,
The August Review, June 23, 2011
Ever since Captain Kirk teleported to the surface of an alien planet and whipped out his portable
communicator, everyone Earthside wanted one. And the telecos gave us flip-phones, along with
compulsive texting, streaming video, online gaming and banking, the worldwide web and more.
— Will Thomas,
“Wireless, Chemtrails, and You,” 2013
While a few millicuries (mCi) of cancer-causing ionized radiation can terrify people, not a word is said
about the ubiquitous non-ionized microwave transmitters towering over our neighborhoods or up against
our heads and in our pockets. Had the Space Preservation Act of 2001 (HR2977) not been torn to pieces
in committee, we might have eventually realized that cell phones and microwave towers and the Internet
of Things (IoT) are just more of the exotic weapons system described in HR 2977:
• Electronic, psychotronic, or information weapons;
• Chemtrails;
• High-altitude ultra-low-frequency weapons systems;
. Plasma, electromagnetic, sonic, or ultrasonic weapons;
• Laser weapons systems;
• Strategic, theater, tactical, or extraterrestrial weapons; and
• Chemical, biological, environmental, climate, or tectonic weapons.
In its infinite wisdom, HR 2977 forbade:
... inflicting death or injury on, or damaging or destroying, a person (or the biological life, bodily health, mental health, or physical
and economic well-being of a person) through the use of land-based, sea-based, or space-based systems using radiation,
electromagnetic, psychotronic, sonic, laser, or other energies directed at individual persons or targeted populations for the purpose
of information war, mood management, or mind control of such persons or populations; or by expelling chemical or biological agents
in the vicinity of a person . . .
Of course, HR2977 was not allowed to see the light of day because exotic “nonlethal” weapons were
exactly what were being “tested” for military peace support operations (PSO)—“peacemaking, peace
enforcement and peace building” being Orwellian for the covert technocracy that would supplant human
society in the name of progress.
Technocracy means rule by technology. The term was born in 1932 with the Technocracy, Inc.
movement. Inspired by IBM (then collaborating with the Nazis), geoscientist M. King Hubbert (1903–
1989) sought to measure and profile energy production, conversion, flow of goods and services, and
consumption. Patrick Wood, author of Technocracy Rising: The Trojan Horse of Global Transformation
(2015), puts it more succinctly: “Technocracy is a totalitarian system of government where scientists,
engineers and technicians monitor and control all facets of personal and civic life—economic, social and
political.”
1
In 1970, geostrategist Zbigniew Brzezinski—adviser to four administrations, including the Obama
administration—prophesied the advent of a “technetronic age”:
Another threat, less overt but no less basic, confronts liberal democracy. More directly linked to the impact of technology, it
involves the gradual appearance of a more controlled and directed society. Such a society would be dominated by an elite whose
claim to political power would rest on allegedly superior scientific know how.
Unhindered by the restraints of traditional liberal
values, this elite would not hesitate to achieve its political ends by using the latest modern techniques for influencing public behavior
and keeping society under close surveillance and control. Under such circumstances, the scientific and technological momentum of
the country would not be reversed but would actually feed on the situation it exploits. . .The traditionally democratic American
society could, because of its fascination with technical efficiency, become an extremely controlled society, and its humane and
individualistic qualities would thereby be lost . . .
2
In 1983, Samuel Koslov—at one time involved in the Moscow Signal that eventually became Project
Pandora (1965–70)—opened the classified Conference on Nonlinear Electrodynamics in Biological
Systems at Johns Hopkins University by comparing the use of “external electric fields” to what “faced the
physics community in 1939 when the long-time predicted fissionability of the nucleus was actually
demonstrated”—meaning the secret Manhattan Project that produced the atomic bomb and inducted
humanity into the Nuclear Age.
3
Koslov was right. The rise of “nonlethal” weapons in the 1990s was pivotal to the ascendancy of the
technocracy. “Penguin”
4 Col. John B. Alexander, author of the 1980 article “The New Mental Battlefield”
(Military Review, December 1980), eventually became the Los Alamos National Laboratories kingpin of
nonlethal weapons for incremental aggression, peace enforcement, weaponized electromagnetic fields,
chemical and biological “anti-terrorism,” high-powered microwave (HPM) technology, fracture and
dynamic behavior, biotechnology, and acoustic technologies like synthetic brain-computer interface
(BCI). Quiet, unseen weapons for a quiet, unseen war against human society.
In 1993, Igor Smirnov of the Moscow Institute of Psycho-Correction at Moscow Medical Academy
gave closed session presentations for the National Academy of Sciences’ 21st Century Army
Technologies panel to FBI, CIA, DIA, DARPA, military contractor corporate executives, National
Institutes of Health, and National Institute of Mental Health regarding the latest incarnations of the LIDA
acoustic psycho-correction device able to remotely implant thoughts in minds, even over the telephone.
5
Smirnov taught attendees how to use the electroencephalograph (EEG) to remotely measure brainwaves,
then demonstrated the computer software that could create an accurate brain map from those
measurements, after which he sent a synthetic telepathy message to a target brain with the LIDA. This
technology promised real-time alteration of decision-makers and key personnel, he said, and was happily
less violent than the strong-arm techniques of yesteryear.
6
This is transcranial magnetic stimulation (TMS). Note the “EEG Preprocessing” (now mobile). Note the emphasis on amplification and pulsing.
This was in 2002. Now, TMS can remotely stimulate the temporal lobe by manipulating in loco electromagnetic fields. The temporal lobe
processes visual and auditory input, creates new memories, and is command central for emotional associations.
“In 2013, Arizona State University’s Center for Strategic Communication ran a program called “Toward Narrative Disruptors and Inductors:
Mapping the Narrative Comprehension Network and Its Persuasive Effects.” “Strategic communication” refers to counter-terrorist tactics
against political dissidents, and “narrative disruptors and inductors” refer to jamming the brain’s thoughts and implanting other “narratives” by
means of transcranial magnetic stimulation (TMS) of the brain’s temporal lobe. (“Secret DARPA Mind Control Project Revealed: Leaked
Document.” Activist Post, July 29, 2013.) The claim that implants can’t be read without a scanner is not true; they can be read anywhere
there are microwave/cell towers (wireless transmitters).”
—Under An Ionized Sky: From Chemtrails to Space Fence Lockdown
At yet another classified conference in November 1993, George Baker, Ph.D., from the Defense
Nuclear Agency, and Clay Easterly, Ph.D., of the Oak Ridge National Laboratory praised nonlethals to the
skies. In 1994, Steven Metz and James Kievit of the U.S. Army War College came out with The
Revolution in Military Affairs and Conflict Short of War, an ominous techno-echo of George Orwell’s
1984 and the film trilogy The Matrix. In 1996, the U.S. Air Force Scientific Advisory Board published a
fourteen-volume study of future weapons development called New World Vistas. The dystopic military
vision of NBIC—nanotechnology, biotechnology, information technology, and cognitive technology—had taken hold. The “soft kill option” and no-touch torture were no longer a conspiracy theory.
SMART GRID SURVEILLANCE
The technocratic city is a post-9/11 city. Federal troops can now enter cities with impunity, thanks to
timed false-flag traumas. Tactically trained paramilitary SWAT teams roll down the street in $296,000
Lenco Bearcats paid for by the spoils of the so-called Drug War. “Urban training exercises” invite lowflying whisper-mode helicopters, explosions, flares, smoke bombs, and SOCOM military personnel.
Shooting drills are common at high schools,
7
recalling Benjamin Franklin’s warning that those who give
up essential liberty for a little temporary safety deserve neither liberty nor safety.
Public protests are rare, but not because there is nothing to protest. There is everything to protest, but
we have all watched the six o’clock news in horror as antipersonnel HSS (hypersonic sound) pain ray
“risk management tools” like the Humvee-mounted LRADs (long-range acoustic devices) roll into
Baghdad or Kabul for “area denial, perimeter security and crowd control.” Like the HIDA (high-intensity
directed acoustics “sonic bullet”), the LRAD can damage hearing while broadcasting speech up to three
hundred meters (“voice of God” weapon
8
). The Thunder Generator—a cannon using a mixture of
liquefied petroleum, cooking gas, and air—is similar, discharging a blast that can inflict permanent
damage or even death if one is standing within ten meters of it; and the “heat ray” Active Denial System(ADS) is designed to behave like a particle beam weapon utilizing a narrow solid-state plasma antenna
for individual pain beams.
Besides “risk management tools,” a technocracy needs security police forces and border patrols.
Multiple-tour infantry and Special Forces now return home to patrol shopping malls in cities that look
more and more like Baghdad and Kabul. The millions of dollars that went into their counterinsurgency
training need not go to waste as long as the public can be kept on edge with lone nuts, drug trafficking,
terror networks, and standard violent Hollywood fare—
Everywhere in films, in popular books on the grocery store shelves and in video games, there’s an obsession with hit men, serial
killers, sexual psychopaths and government agents with a license to kill; popular killers range from those in an underground, criminal
world to those wearing badges and working under the lethal rights granted by [a] national sovereign.
9
When the CIA’s former director George H.W. Bush referenced “a thousand points of light” in his
Presidential candidate acceptance speech in 1988,
10 he was probably referring to the advent of the Smart
Grid and its satellite “eyes in the sky” above and glowing microwave towers below in an atmosphere
bristling with a driftnet of conductive metal particulates, nanobot sensors and microprocessors outside
and inside human bodies. As activist and targeted individual (TI) Carolyn Williams Palit put it in 2007:
What they are ultimately trying to do up there is create charged-particle, plasma beam weapons. Chemtrails are the medium —
GWEN pulse radars, the various HAARPs, and space-based lasers are the method, or more simply: Chemtrails are the medium —
directed energy is the method. Spray and Zap.
11
An efficient technocracy is absolutely dependent upon a consolidated digital wireless grid:
a single, integrated communication-enabled electric delivery and monitoring system, collectively called Smart Grid. . .Thirty years
ago, a researcher’s mantra was “Follow the money, follow the power.” This must now be restated: “Follow the energy, follow the
power”. . .Global companies like IBM, GE and Siemens are putting their full effort behind the ‘build-out’ that will consolidate all of
America into a single, integrated, communication-enabled electric delivery and monitoring system, collectively called Smart Grid . .
.
12
The fact that cable companies like Time Warner, AT&T, and Comcast aren’t subject to common
carriage regulations points clearly to their “insider” military status. Telecom mergers have carte blanche.
Monopolies control telephone and cable lines. After the AOL-Time Warner merger and AT&T-MediaOne
merger, the FCC granted cable companies the right to manage the speed at which sites appear, block
content, and deny ISP access. Comcast, the world’s largest cable company, controls one-third of U.S.
households.
ATT and Verizon collaborate with Israel’s “super intrusive” Verint and Narus to perform mass
surveillance on American communications, sifting traffic 24/7 at key Internet gateways around the U.S.
James Bamford, author of The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping
on America, writes that Israel is the eavesdropping capital of the world
13 and never need to be concerned
about congressional oversight of its activities in the U.S., as the CIA and Mossad are Gog and Magog.
The global Smart Grid is up and running, jarringly symbolized by the NSA’s megalithic Intelligence
Community Comprehensive National Cybersecurity Initiative Data Center in Bluffdale, Utah, twenty-five
miles south of Salt Lake City (mentioned in Chapter 6). Above ground, the Utah Data Center occupies 1.5
million square feet and quantifies in yottabytes (1 yottabyte = 1 trillion terabytes, or 1 quadrillion
gigabytes) what is vacuumed up from satellite and underwater ocean cable
14
intercepts.
Southeast of the Utah Data Center in the Mimbres territory of Catron County, New Mexico, AT&T has
an underground communications facility. In 1977, the Dia Art Foundation commissioned American
sculptor Walter De Maria to build a piece of land art called The Lightning Field right over that
underground facility: four hundred stainless steel poles precisely two inches in diameter and twenty feet
7.5 inches in height, spaced 220 feet apart, their pointed tips defining a horizontal plane in a grid array
measuring one mile by one kilometer.
SMART METERS AND THE INTERNET OF THINGS (IOT)
The technocracy has had high hopes for smart meters, and not just as a 24/7 home energy accounting
system counting kilowatts. In 2013, 35.5 percent of all U.S. electrical customers had smart meters, a 20
percent increase over 2012. By 2014, 58,545,938 smart meters had been installed, with 51,710,725 being
residential.
15
In the developing world, there were 5.16 million units in Europe, the Middle East, and
Africa in 2011. A Market Research reports for global smart meter sales listed the English-speaking spy
network Echelon (Five Eyes) as a “top player.”
16
In fact, read between the lines of Title XIII of the Clean Energy / Energy Independence and Security
Act, signed into law on December 19, 2007, and you will see that smart meters are really about
surveillance, period. Note the repetition of the (military) term “deployment”:
(1) Increased use of digital information and controls technology to improve reliability,
security, and efficiency of the electric grid;
(2) Dynamic optimization of grid operations and resources, with full cyber-security;
(3) Deployment and integration of distributed resources and generation, including renewable
resources;
(4) Development and incorporation of demand response, demand-side resources, and energy efficiency resources;
(5) Deployment of ‘smart’ technologies (real-time, automated, interactive technologies that
optimize the physical operation of appliances and consumer devices) for metering,
communications concerning grid operations and status, and distribution automation;
(6) Integration of ‘smart’ appliances and consumer devices;
(7) Deployment and integration of advanced electricity storage and peak-shaving technologies,
including plug-in electric and hybrid electric vehicles, and thermal-storage air
conditioning;
(8) Provision to consumers of timely information and control options;
(9) Development of standards for communication and interoperability of appliances and
equipment connected to the electric grid, including the infrastructure serving the grid;
(10) Identification and lowering of unreasonable or unnecessary barriers to adoption of smart
grid technologies, practices, and services.
Unlike regular electric AMR (automated meter reading) meters, smart meters are two-way AMI
(advanced meter infrastructure), supposedly to “allow utilities and customers to interact to support smart
consumption applications.”
17
Smart meters are joined at the hip with the Internet of Things (IoT). By 2020, every American home is
to have a two-way gas and electricity AMI logging energy use of smart appliances at two-second
intervals, as per power signatures. If Li-Fi
18 complements your WiFi, its 1-watt LED [light-emitting
diode] has a microchip in it that can simultaneously connect multiple computers to the Internet. Every
plug-in and wireless appliance, every film you watch, whether you are home or not, your state of
wakefulness or sleep, is monitored, thanks to the ZigBee microchip in each smart meter that wirelessly
communicates from smart appliances to utility poles, central utilities offices, police stations, and fusion
centers.
And ZigBee chips have a kill switch.
Home energy accounting and surveillance are two smart meter agendas under the technocracy. The
third agenda is to serve as a node in the computing architecture, given that the computer cards in the
communications modules of smart meters have the same computing power as a cell phone. With Linux
software, Hive Computing, smart meter vendor Itron and partner Cisco are building a mesh network of
nodes from millions of smart meters for a distributed intelligence platform of greater Smart Grid control
—for “socially useful computing tasks,” of course.
19
. . .the latent capacity of the world’s smart meter network approaches that of the world’s better known supercomputers. For
example, 3,000 smart meters have nearly the same amount of processing power and memory capability as Deep Blue, the IBM
supercomputer that beat Garry Kasparov in a game of virtual chess in 1997, and 150,000 meters add up to about half the computing
power of IBM’s Watson supercomputer . . .
20
That’s one teraflop (1 trillion floating operations per second) of processing power. One million smart
meters is the equivalent of the world’s twentieth fastest supercomputer.
Lovely: a supercomputer module active 24/7 on the outer wall of your home or business in a
neighborhood filled with other modules, all receiving and sending transmissions, paid for by consumers
who must deal with the health issues and cybersecurity issues of third-party software nosing around
through smart meters.
21
The IoT overseen by smart meters makes every neighborhood a veritable antenna farm that affects the
health of all life forms within the target zone. Daniel Hirsch, a lecturer on nuclear policy at University of
California Santa Cruz, stresses that one smart meter exposes people to 100X the microwave radiation of a
cell phone.
22 Symptoms following from exposure range from an inability to sleep deeply to headaches,
heart palpitations, chronic fatigue, difficulty concentrating, and cancer.
Opponents nationwide have testified that radiofrequency emissions from Smart Meters cause headaches, nausea, and insomnia. A
Hurst woman told the Dallas Morning News in June that her autistic daughter began having seizures when their Smart Meter was
installed. . .Opponents of Smart Meters nationwide have complained about inaccurate readings, radiofrequency interference with
medical and other devices in their homes, and privacy and security concerns.
23
The electromagnetic impact of smart meters extends far beyond the 900 MHz resonating from home
wiring. Add the 2.4 GHz frequencies of the machine-to-machine Home Area Network (HAN) overseeing
the smart meters in your area and you have RFR (radio frequency radiation) in the harmful microwave
range of 1–300 GHz. Now add the collector meter antennas affixed to telephone poles to serve as
transmission hubs for 500–1,000 homes, with frequencies from 850 MHz to 1.9 GHz for cell phone
connectivity.
The cumulative effect of wireless 900 MHz, 1.9 GHz, and 2.4 GHz,
24 coupled with conductive
nanoparticle “clouds,” points directly to the neighborhood “cancer clusters” popping up everywhere. This
from Canada:
When the suburb is all transmitting, for example, in parallel signals to NAN M2M [Neighbourhood Area Network machine-to machine] contact, not only are there clouds inside the residences but also an overcloud at about 2.5 meters and above in streets
and above boundary layers of rooftops where the noise [of the Alasdair Philips “electrosmog” detector] can increase from
reasonable background levels of below 0.05 microWatt/cm
2
to 400 microWatt/cm
2
in ambient air.
Clearly the impact of SMART meter networks is phenomenal, especially when clustered together, inducing Doppler effects for
long distances, sometimes hundreds of meters in series of clusters, reflections, generation of “noise” and probably
thousands of new signals/cubic meters.
25
[Emphasis added.]
Is it any wonder that Lloyd’s of London, the world’s foremost insurer of risk, refuses to cover health
effects from wireless devices, including cell towers? Here is Sharon Noble, director of Coalition to Stop
Smart Meters:
Lloyd’s of London is one of the largest insurers in the world and often leads the way in protection, taking on risks that no one else
will. Attached is a recent renewal policy which, as of Feb. 7, 2015, excludes any coverage associated with exposure to non-ionizing
radiation. In response to clarification, this response was received on Feb. 18, 2015 from CFC Underwriting LTD, London, UK
agent for Lloyd’s: “The Electromagnetic Fields Exclusion (Exclusion 32) is a General Insurance Exclusion and is applied across the
market as standard. The purpose of the exclusion is to exclude cover for illnesses caused by continuous long-term non-ionising
radiation exposure i.e. through mobile phone usage.”
26 [You would think that quote would open up some eyes, but not in this dumbed down society of I want it, and I want it now d.c ]
Smart Meter arcs are burning out computers and shorting out surge protectors and appliances. Add the
complicating factor of the conductive metal nanoparticulates falling from chemical jet trails and power
poles bursting into flame make more sense than “a build-up of dust on transformers that shorted out due to
low-lying fog.”
27
Ionized “precipitation-inducing materials” in electrosmog
28 are more to the point.
Not all Americans are lying down for the Smart Grid rollout of smart meters. For example, a fifty five-year-old Houston woman ordered a CenterPoint Energy worker attempting to install a smart meter off
her property at gunpoint,
29 having astutely perceived that smart meter installation represents a clear and
present danger of explosions, hot sockets, flashovers, and deadly fires, not to mention the loud, obnoxious
hum 30
foretelling endless health problems.
SMARTPHONES
Life evolved with negligible levels of microwave radiation. An increasing number of scientists
speculate that our own cells, in fact, use the microwave spectrum to communicate with one another,
like children whispering in the dark, and that cell phones, like jackhammers, interfere with their
signaling.
— Arthur Firstenberg,
“The Largest Biological Experiment Ever,” 2006
What is emanating from the forest of cell phone (microwave) towers going up invisibly interweaves with
the chemical trail grids overhead. In 2013, it was finally made public that the CIA’s division of
Behavioral and Social Sciences and Education was funding a geoengineering study in concert with the
National Academy of Sciences (NAS), NOAA, and NASA:
The National Academy has held two previous workshops on geoengineering, but neither was funded by the intelligence community,
says Edward Dunlea, the study director of the latest project. The CIA would not say why it had decided to fund the project at
this time. . .The last time the government tried to do cutting-edge research related to the atmosphere—with the High-frequency
Active Auroral Research Project (HAARP), which aimed to protect satellites from nuclear blasts—people speculated that it might
be a death ray, a mind control weapon, or, worst of all. . .a way to control the weather.
31
[Emphasis added.]
The presence of the word “behavioral” should have sounded the alarm.
Hacking masses of cell phones, computers, and brains is easy in a conductive metal-rich atmosphere.
WikiLeaks revealed a package of spy tools called the FinIntrusion Kit for hacking into WiFi (“IT
intrusion” = hacking), while Fin Fisher’s FinSpy takes over smartphones like iPhones or Windows
Mobile, then with Fin USB Suite transfers information to fusion centers, police stations, corporations, etc.
The Fin malware is produced by Gamma Group, a shadowy UK corporation.
32
The little transceivers we call cell or mobile phones are perfect for spying. More important are the
mental and physical health effects of what amounts to cell phone addiction with cell phone radiation
dialing into our cells. We’ve been bioelectrical beings for millions of years, but now our cells are forced
to interact with artificial EM signals as our tower-like bodies process the pulsed frequencies of AM/FM
(amplitude/frequency modulation) radio, metal appliances, cars, ionized rain and snow, glass, towers,
antennas, and the constantly zapped metal nanoparticulates raining down and into our lungs. Headaches
and migraines, foggy thinking, forgetfulness, weak concentration, impaired learning, and accelerated
dementia reflect the rising ricochet of EM signals and the ionized nanoparticles breaching our blood-brain
barrier. The first mile above the Earth is buzzing with two million times the amount of electromagnetic
radiation (EMR) of 1900.
Neither telecom giants nor Big Pharma are keen on the public learning that two minutes on a cell
phone or sitting near a cordless phone base or wireless computer router will short-circuit the body-brain
electrical ion flow and end in clumps of fibril proteins growing in electromagnetically altered brains. It
seems that the World Health Organization (WHO) reclassification of cell phone and WiFi emissions as
possible carcinogens was not enough; few Americans know or care that a federal appeals court has
blocked the City of San Francisco from requiring retailers to issue warnings to cell phone buyers.
33
Western Europe and Israel have had wireless technologies a decade longer than North America, which
may be why 250,000 Swedish citizens are on permanent disability for microwave sickness, early
Alzheimer’s, Parkinson’s, fibromyalgia, multiple sclerosis, and cancer.
34 As the price of our love for
convenience and comfort climbs, it is just a matter of time before landlines are quietly discontinued.
35
Despite all the cell phone radiation lawsuits,
36 smartphones continue to be the favored Trojan horse of
the Smart Grid. 7.3 billion cell phone users don’t realize they are now the proud owners of two-way
microwave radios pulsing low levels of EMR and producing brain cancers like ipsilateral glioma.
37 WiFi
has gone from radiating a one-hundred-yard microwave cloud (“hotspot”) for people to tap into, to
wireless MiFi routers that can be carried wherever one goes. Meanwhile, the iPhone 6, Moto X, Nexus 6,
etc., with their built-in hotspots are demanding ever more Towers of Babel and satellites for voice,
Internet, music, video games, TV reception, and video streaming. WiMAX upgrades to LTE now grace
towers and broadcast in the 5.8 GHz spectrum to fill in those frustrating receptivity gaps between towers.
Add satellites with steerable spot beams and a barium-enriched atmosphere and you have a
weaponized Smart Grid with sizzling microwave “clouds” ready and waiting everywhere. Cloud-based
systems are highly hackable corporate-owned and corporate-managed shared-space server farms not
subject to public oversight.
Are specific absorption rates (SARs) of radiation being field-tested on large populations? The
maximum legal SAR is 1.6 watts per kilogram of tissue, an adult male head standard, not an adult female
or child head, and concerned only with overheating body tissue, not with subthermal effects.
38 AT&T and
T-Mobile employ the Global System for Mobile Communication (GSM) with a SAR 100X that of the
Code Division Multiple Access (CDMA) system employed by Verizon and Sprint. And if 2G phones
(GSM/UMTS and CDMA/W-CDMA) are “bioactive”—doublespeak for potentially harmful to living
bodies—what does that make 5G and 6G smartphones?
39
Frequencies 1–5 GHz penetrate organ systems. Fifth-generation (5G) cell phones operate in the 28–
100 GHz range, the same frequency as the extremely high frequency (30–300 GHz) millimeter wavelength
spectrum (10–1mm) used in Raytheon’s active denial system (ADS) directed energy weapon for
“perimeter security and crowd control.”
40 The supposed justification for the millimeter / terahertz
spectrum is that the 700 MHz to 2.6 GHz WiFi bandwidth is saturated and consumers are demanding yet
more speed and bandwidth. The truth is closer to how 5G cell phones and the tower antennas they require
will serve population control. 5G will mean cell antennas on residential streets, so the insides of homes
will be irradiated, blasting through walls with millimeter wave technology. Cellular mm-wave
propagation every quarter of a mile in densely populated areas is extremely unwise if safety is the
primary consideration, which it is not.
Ronald Powell, Ph.D. (Harvard) in applied physics (emfanalysis.com, smartgridawareness.org), and
Yael Stein, M.D. of Hadassah Medical Center, Jerusalem, are begging the FCC Commissioners to
withdraw 5G:
Computer simulations have demonstrated that sweat glands concentrate sub-terahertz waves in human skin. Humans sense these
waves as heat. The use of sub-terahertz (millimeter wave) communications technology (cell phones, WiFi, antennas) could cause
humans to perceive physical pain via nociceptors.
41
The smaller the wave, the more damage to human and animal metabolism. Millimeter waves in 5G
have 25X the WiFi microwave photon energy of 2.4 GHz. Translated into impact on living cells,
millimeter wave photons disturb 25X as many molecules as current WiFi and 4G disturb. TETRA
(Terrestrial Trunked Radio) phones used by police and military are the most dangerous,
42 with TETRA
carrier frequencies typically at 400 MHz and modulation frequencies at 17 Hz, the brain’s frequency
range being 0.5–30 Hz.
Synergy is a term we must become familiar with as we weigh the risks of increasing SARs. Synergy
goes beyond mere mathematical increase (“100X that of the CDMA”) to an exponential impact of
competing and overlapping non-ionized and ionized radiations. In a January 1, 2008 email, public health
scientist, epidemiologist, and leading expert on electromagnetic radiation Dr. George Carlo hit the
microwaved nail on the head:
EMR [electromagnetic radiation] is most likely a synergen in these cases, including the case with the disappearing birds. The
exposures such as pesticides, chemtrails, harvesting of forests, and urban sprawl are not causes competing with EMR — they are
additive and synergistic causes. They are insults to the system that require strong biological compensation to overcome. EMR
depletes that ability to compensate, and thus the person — or species — succumbs to the effects of the environmental insult more
severely and more rapidly.
43
PHASED ARRAYS, HOLOGRAMS,
AND ELECTRONIC WARFARE (EW)
Thus far, we’ve determined that the average American neighborhood is now an electromagnetic
interchange of crisscrossing signals from computers, television, smart meters, cell phones, microwave
ovens, IoT, utilities, military frequencies, transportation guidance systems—all translating to more cancer
clusters, compromised immune systems, miscarriages, premature aging, and DNA damage as signals
invisibly jet from one emitter to another, pulsing over high-voltage lines, along pipelines and cable,
railroad tracks, assaulting the natural frequencies of forests, bodies, and brains.
In suburbs, big city neighborhoods, and sparsely populated rural districts, omnidirectional and highly
directional WiFi router antennas produce ambient aerial signals emissions multiplied by the presence of
highly conductive aluminum and barium nanoparticulates. Above, television satellites in geosynchronous
orbit are delivering programming to homes while spy satellite sensors probe the signatures of tens of
millions of host computer systems as wireless and optical networking technologies pulse Internet over
broadband landlines (coaxial cable, fiber optic, copper wires), WiFi, speed-of-light supercomputers,
satellite and 5G/6G cell phones.
All of our comforting, convenient, entertaining electronics are digital and dual-use. The previous
analog signal was unstable and made it difficult to manipulate moods via frequencies. Digital
technologies, like Internet, reroute neural pathways and alter the brain.
Conventional arrays with analog beam formers are no more. Now, digital phased-array antennas with
individual transmitters and receivers (T/R modules) are being reconfigured and their wideband
performance upgraded for dual-use operations. Throughout neighborhoods, micro-level phased arrays
connect to microwave transmission lines, and power dividers perch on telephone and electric poles, cell
towers and less obvious platforms, invisibly capturing and transferring electromagnetic signals. As the
2009 paper “Distributed Phased Arrays and Wireless Beamforming Networks” put it, “Multiple radar,
communications, and electronic warfare functions can be served by a single antenna having such an
architecture.”
44
(Emphasis added.)
This photo is what our sidewalks, yes, in front of our homes and businesses, are going to have every 50 feet, including our bedrooms . . . SB
649 [the “small cells” like 5G bill] . . . would strip local governments of their property rights and force them to ignore safety, aesthetic, health
and other issues, and approve all wireless company applications along public streets and on public properties. The California State Assn. of
Counties has written a letter strongly opposing SB 649 . . . Lloyd’s of London and Swiss Re, two major insurance companies of the world, will
not cover medical expenses incurred due to exposure of electromagnetic radio frequency radiation (EMR) (i.e. cellphones, WiFi, cell towers,
antennas, DAS, IoT devices, smart meters, etc.).
—Nevada City Councilwoman Reinette Senum, April 26, 2017
See Councilwoman Senum’s April 3, 2017 article “The 5G Network: What You Don’t Know May Kill You,”
Basically, phased arrays are geometrically arranged collections of individually controlled transceiver
antennas. Coupled with the ducting and amplifying of the “chemical antennas” being delivered by
chemtrails, the phased array’s geometric arrangement guarantees that the output field will be greater than
the sum of the waves (exponential) emitted by individual antennas. Control the phases of the individual
signals and the output field can be given any desired “shape” or direction, the only limitations being the
length of the wavelength, the number of individual antennas, and the size of the array. The “shape” can be
a narrow beam directed at one person in one building or hundreds of independent beams directed at
hundreds of targets, depending on the “phasing.” Phased-array radar can track many people
simultaneously while the antennas remain absolutely stationary.
In its receiving mode, the phased array picks up much more information than an ordinary antenna
because it operates as a hologram, measuring entire EM field geometries, not just one-dimensional EM signals. Its holographic capability can remotely create 3D EM field distributions around targets. While
correcting for reflections and interferences, the field can then be transformed and moved to another target
somewhere else in a fraction of a second.
A constant dissemination of barium nanoparticles enhances the holographic capability of phased
arrays. Strontium barium niobate (SrxBa1-xNb2O6
) is used in outdoor holographic 3D displays as a
“screen” (Wikipedia). Barium stearate (“soap” bonded to metal particulates) also aids high-tech 3D radar
imaging. As Will Thomas wrote in 2013, “Even if commercial wireless frequencies are not conducted as
coherent signals by chemtrails specifically ‘tuned’ to HAARP frequencies, all commercial RF/microwave
energy is going to be randomly confabulated and conducted by the barium-strontium chemtrail mix.”
45
Thomas’ use of the word “confabulated” points to the magician-like holographic “special effects” already
being unveiled in our barium- and strontium-enriched plasma sky theater.
The U.S. Navy’s Radio Frequency Mission Planner (RFMP) computer program known as the Variable
Terrain Radio Parabolic Equation (VTRPE) utilized 3D battlefield imaging in the chemical skies over
Iraq (2003–2011) and Afghanistan (2001–2014). Ionized barium and phased arrays work in concert with
the VTRPE code, “a full-wave propagation model that solves EM wave equations for complex electric
and magnetic radiation fields.”
46 With satellite imagery, VTRPE can propagate radio waves in such a way
as to generate a 3D version of terrain modeled on RFMP computer monitors: battlefields, fog, clouds,
apartment complexes, houses, workplaces, government offices, etc. VTRPE can also cloak an aircraft
behind signal inversion layers, similar to how submarines are cloaked by underwater inversion layers.
Simply put, the phased array is an excellent dual-use weapon capable of accurately locking onto EM targets. Telemetric sensors measure the necessary geometry of attack pulses, then VTRPE and a
sophisticated fifth-generation laptop or satellite computer analyze the geometrics for target acquisition
and beam control, and the invisible torture begins, particularly in areas of maximum EM radiation
absorption (brain, heart, genitals, etc.) dependent upon the geometry of the wave. Hitting a target with a
frequency that excites the metal particulates breathed in from chemtrails and ingested from GMOs can
ignite an implosion as organs hemorrhage.
47
Geometric is the name of the game for electron or plasma beam weapons—not so much in the sense of
theorems as in the sense of building the output signal by “tuning” the frequency, amplitude, and spacetime
“shape” to the target’s body. In 2008, TI Carolyn Williams Palit struck the heart of the matter: “The
plasma beam is used much like an electric line to the targeted person.”
48 Picture a microwave or radio
wave piggybacking a plasma beam.
Phased-array radar may not have a beam weapon’s firepower, but a suitcase system (piggybacking)
can shape the pulse in spacetime with direct coupling
49
to a high-speed computer for non-linear
biological effects. Former NSA analyst Robert Duncan explains in his 2010 Internet book The Matrix
Deciphered:
These beams can be steered by phase shifting other antenna signals. . .A phased array of thousands of elements can arbitrarily
create one or more beams and the energy can be narrowly focused in constructive or destructive interference mode. This is the
basis of directed energy weapons.
Using high-powered steered phased arrays and focused directed energy from two sources. . .a nearly undetectable scalar
wave—destructive interference at the point of interest—can be created. With just a minor energy interaction, the interfering beams
bounce back with a strong signal-to-noise ratio to be resolved at the sources again. This allows for any imaging technique to be
done over extremely large distances, in effect making distance irrelevant to the detection feature, be it RADAR, MRI, or ESR
[electron spin resonance] imaging.
50
[Emphasis added.]
A 2011 doctoral dissertation clarifies how phased-array antennas and satellites work in tandem as
dual-use weapons:
The simulation of beamforming using phased array antenna is explored to obtain multiple and also steerable beams for
tracking the satellite smoothly. . .Moreover, the adaptive beamforming allows mobile objects such as planes and vehicles to have
access to satellite programs.”
51
[Emphasis added.]
On September 23, 2010, the FCC opened up a new spectrum for dual-use no-touch torture
deployments: the White Space TV band spectrum for Super WiFi “digital data communications.” Super
WiFi requires no license, so White Space frequencies are free, unregulated, and widely scattered
throughout the radio spectrum. Super WiFi fixed base stations are 4 watts, well over the 100-milliwatt
limit for home, office, or school WiFi base stations, and White Space devices use pulsed digital
waveforms highly dangerous to human bodies. White Space antennas are on towers and buildings, and
when they’re not, Super WiFi can leapfrog from one tower to another on roofs or via Smart Meters and
telephone poles.
The day after the FCC’s move to open White Space frequencies, Magda Havas, associate professor
of Environmental & Resource Studies at Trent University in Peterborough, Ontario, wrote the following
about how the dual-use Super WiFi weapon can go straight through your wall, your skull, and your body:
WiFi currently uses PULSED DIGITAL on higher 2.4 gigahertz frequencies
52
that cannot penetrate thick concrete at long
distances and thus you get a slow speed connection resembling dial up. By using the lower TV frequency spectrum (54–698 MHz)
as a carrier wave, the PULSED DIGITAL WiFi signal will now be able to penetrate obstructions such as buildings over great
distances and deliver high-speed broadband data.
53
Neighborhoods have become wireless Homeland Security gulags teeming with invisible energies and
agendas as ionospheric heaters move energy thousands of miles by ducting and zapping our conductive
atmosphere. Smart meters, cell phones, towers, phased arrays, and satellites all play their part in an
exotic dual-use weapon system exploiting citizens in the name of C4 full spectrum dominance, disaster
capitalism profits, and a cyborg Transhumanist future.
WIFI AND SPYING IN THE ’HOOD
The technology is based on isolation, and the technical process isolates in turn. From the automobile
to television, all the goods selected by the spectacular system are also its weapons for a constant
reinforcement of the conditions of isolation of “lonely crowds.” The spectacle constantly rediscovers
its own assumptions more concretely. . .In the spectacle, which is the image of the ruling economy, the
goal is nothing, development everything. The spectacle aims at nothing other than itself.
— Guy Debord,
Society of the Spectacle, 1967
Imagine a UHF dome arching over your city as ELF signals hop cell towers and phones, penetrate bodies
and brains. Digitized voice carried by computers, data arriving wirelessly from across the world, WiFi
spilling over into one of the hundreds of WiFi transceivers in the footprint of one cell phone tower. This
is the contiguous, barium-enhanced Smart Grid enveloping us all.
In the beginning, WiFi seemed to be about connecting your computer to the global Internet for data
transfer, and cellular was about connecting your telephone to a network to transfer voice. WiFi had a
radio transceiver (access point) with a range of two hundred feet or so, cellular range covered miles, and
the WiFi access point and cellular cell site separately connected to a telephone central office via coaxial
cable, fiber optics, or copper.
Now, we’re enmeshed in WiFi and social media surveillance. All business, government, and personal
communiqués are hoovered up and stored for possible “actionable intelligence.” Even as Private First
Class Bradley “Chelsea” Manning was being court-martialed at Fort Meade, Maryland for allegedly
providing more than 700,000 national security files to WikiLeaks,
54 NSA whistleblower Edward
Snowden was exposing the PRISM surveillance program, an expanded version of Stellar Wind run by the
NSA and nine “friendly” social networking providers—Microsoft, Yahoo, Google, Facebook, PalTalk,
AOL, Skype, YouTube, and Apple
55—with their own “diplomats.
56
)
At an In-Q-Tel
57 summit, former CIA director David Petraeus admitted that the Internet of Things
(IoT) interfaces with CIA “tradecraft”:
With the rise of the “smart home,” you’d be sending tagged, geolocated data that a spy agency can intercept in real time when you
use the lighting app on your phone to adjust your living room’s ambiance. “Items of interest will be located, identified, monitored,
and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and
energy harvesters—all connected to the next-generation internet using abundant, low-cost, and high-power computing,” Petraeus
said, “the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to
quantum computing.” Petraeus allowed that these household spy devices “change our notions of secrecy” and prompt a rethink of
our “notions of identity and secrecy.”
58
An exotic technology has become the American dual-use heart of darkness. Mister Rogers’
Neighborhood
59
is no more; instead, a WiFi ’hood pulsing with EM frequencies robs us of our Schumann
resonance birthright. Walk out the door and chemical trails are waiting for you overhead with their
conductive metal nanoparticles and polymers to breathe, eat, and drink. Crystalline fibers glitter from trees, cars, animal fur, and human skin as they facilitate signals tracking (SIGINT). Nano-barium enhances
the “Wi-Vi” thermal imaging
60
fluorescing our bodies as nano-sensors and microprocessors slide silently
through our bloodstream and into our brains, alert for remote communications.
The sheer number of EM signals per cubic meter from commercial and military sources is staggering
—airport and navigational aid emissions communications, pipelines, M2M (machine to machine)
infrastructure, transformers, power lines, fiber optic cable, phased-array antennas, smart meter
Neighborhood Area Networks (NANs), etc. Our bodies grapple with signals from ground-based
gyrotrons (EM field oscillators, GWEN pulse RADAR),
61 LIDAR/LADARs (light detection and ranging /
laser detection and ranging or “laser radar”), OP-FTIR (remote sensing Open-Path Fourier Transform Infrared spectrometry), FLIR (forward-looking infrared) for “own the night” infrared imaging with
photoconductive detectors,
62
ionosondes (“chirpsounder” radars), actinic rays (EM radiation producing
photochemical reactions used in imaging technology)—and all the while ionospheric heaters are heating,
multiplying, siphoning, and steering ionized electrons.
If only we could see beyond our narrow five senses into the vast dimensions of the electromagnetic
spectrum! Giant EM clouds several meters in diameter creep through our living zones—an interferometry
of signals from thousands of emitters in all directions, thousands of different frequencies—and only our
immune system senses it. With an electrostatic meter or magnetometer, you can at last perceive some of
the new dimension we are living in:
When the suburb is all transmitting, for example, in parallel signals to NAN M2M contact, not only
are there clouds inside the residences but also an overcloud at about 2.5 meters and above in the streets
and above boundary layers of rooftops where the noise can increase from reasonable background levels
of below 0.05 microWatt/cm2 to 400 microWatt/cm2 in ambient air.
63
Daily distribution of RF-zapped metal particulates is all about keeping aloft a plasma “mirror” dense
enough not just to detect and resist incoming cyber-attacks but to remotely utilize exotic weapons on
populations. From “psy warrior” microcomputers to cellular phones and “critters” (hacker programs), our
neighborhoods, homes, offices, and bodies are being hacked. Telephone microphones, listening posts and
fusion centers, traffic cameras, surveillance aircraft like the U-2 Dragon Lady, satellite linkups with state of-the-art software like British subsidiary BAE Systems’ GXP 3D mapping and GOSHAWK big picture
scrutiny—all are on constant EM real-time alert, whether it is for a dissident or license plate, an
impending engineered weather event or forest fire. Everywhere is now the technocratic battlespace and
everyone a twenty-first-century land warrior “either with us or against us.”
64
Slide the Bill of Rights into the Memory Hole.
If we finally understand what dual-use technology means, we may realize that the user-friendly home
computer is little more than a base station for transmitting and receiving signals, its cables unshielded, its
telephone lines antennas, its CRT video display emitting electromagnetic radiation at 2–20 MHz, and that
cell phone handsets are little more than minicomputers with software that can modify the usual interface.
Freelance journalist Jim Stone says dithering is doing for PC monitors what digital does for
television monitors,
65 and television signals are 10,000 times stronger than GPS signals (which may be
why the CIA’s investment arm In-Q-Tel initially tracked people anywhere in the world with just a $40
Rosum radio chip and TV signals).
It is technologies like these that are behind the demise of thinking and the deepening of cognitive
dissonance.
Computer monitors, like televisions, contain an electron gun (cathode ray) at the back of the tube
transmitting beams of electrons at the screen to make pixels fluoresce into a picture. In New York, the
NYPD might be driving their Z Backscatter Vans down your street and X-raying your vehicle, home, and
body
66 while “war driving” Google Street View cars
67 hoover up payloads of data by means of the highly
classified point-and-click TEMPEST (transient electromagnetic pulse standard), also known as Van Eck
monitoring (“phreaking”), that receives, intercepts, views, and reconstitutes your incoherent signals—Google MAC (media access control) addresses, SSIDs (service set identifiers), signal strength
measurements—before transmitting them to FBI techs, low-life contract agents, and NSA analysts.
C4 cyber warfare is alive and well in the ’hood.
DCSNet of Communications Assistance for Law Enforcement Act (CALEA)—“The Gold Standard in
Public Safety”—collects, sifts, and stores phone numbers, calls, and text messages. DCSNet endpoints
connect to more than 350 switches. Besides monitoring servers and select emails of surveillance targets
for capture, analysis, and storage, the FBI’s Carnivore accommodates a sophisticated point-and-click
surveillance device to cover signals, telephones, and Internet: DCS-3000 Red Hook (SIGINT) does pin register (outgoing numbers) and trap-and-trace (incoming); DCS-5000 Red Wolf is responsible for
counterintelligence; and DCS-6000 Digital Storm, wiretap, captures content. All were initially processed
by Sprint on a private, encrypted network. FBI wiretap outposts are called Regional Information Sharing
Systems (RISS). An FBI agent in New York can wiretap a phone in California, get the location, and
receive pass codes and conversation in New York. Analysts interpret phone call patterns, then send them on to the Bureau’s Telephone Application Database for link analysis.
Since CALEA, all cell phone manufacturers include Nextel software, which means that whether the
phone is on or off, the microphone is a remote roving bug that transmits. When a call is in progress, the
roving bug calls the FBI (or a corporate competitor) and activates the microphone.
Someone in your neighborhood may have a wideband radio receiver with spectrum display,
horizontal/vertical sync generator, multi-scan video monitor and a phased-array antenna with shielded
cables (like a radio telescope) and video taping equipment;
68 or may have leased the Trailblazer
successor to ThinThread, a high-tech surveillance tool designed by NSA whistleblower William Binney
to intercept, anonymize, and graph metadata according to relationships and patterns.
It was around 2003 when they started putting optical fibers coming into the U.S. through Y-connector Narus devices. Basically
these would duplicate the data coming across the Internet—one set of packets would go the normal route, the other set would go to
NSA facilities. There, they collect all the data coming in through fiber optics, reassemble all the data packets into useable
information—emails, file transfers, etc.—and then pass it along for storage. That means they are taking all that data off the fiber
optic lines at 20 main convergence points in the U.S., collecting almost all of the Internet traffic passing through the U.S. This gets
them pretty much control over the digital world.
69
Time cloaking programs make whole data systems disappear into “time holes”:
This cloak works using a wave phenomenon called the Talbot effect. Manipulating the timing of light pulses so that the crest of one
light wave interacts with the trough of another creates a zero light intensity—where the two signals cancel each other out—in
which data can be hidden.
70
Over Homeland neighborhoods, armed fifty-pound ShadowHawk helicopter drones (General Atomics
and Lockheed Martin, $300,000 each) are executing low fly-bys while in wireless communication with
whatever agency or corporation has been granted frequency command by measures and signatures
intelligence (MASINT). DHS “public safety” surveillance drones and high-altitude killer drones—some
remotely supervised, some programmed to be fully autonomous—are making their rounds, as well.
. . .kill committee members from the National Security Agency, the Central Intelligence Agency, and the Department of Defense
act as the prosecution, judge and jury for “low-level” targets. The president, consulting his kill list, makes the decision on “high value” targets, including American citizens.
71
In every urban or rural neighborhood of the Homeland, MASINT is being collected and collated as
infrared peers through walls and ceilings. Thanks to the 1968 Wiretap Act
72 amended in 1986, wireless
eavesdropping is not legally considered to be wiretapping. War is peace, freedom is slavery, ignorance
is strength.
Beyond Carnivore (the Digital Collection System) and FinSpy hacks of iPhones,
73
there are dirty
tricks programs like:
• Financial Crimes Enforcement Network (FinCen);
• Trapwire surveillance network with facial recognition run by Abraxas (CIA) and Mail
Isolation Control and Tracking that photographs and records letters moving through the
federal post office;
• Kapsch TrafficCom in-car transponders armed with in- and out-facing mini-cameras;
74
• FBI FANTOM tracking data in 3D patterns;
• Encoded Apple signals commanding wireless devices to disable recording functions;
75
• Skype messaging sent to Microsoft headquarters;
76
• Stingray (Dirtbox on airplanes
77
) fake cellphone towers trick and track phones and their
users.
78
Do the three million university undergraduates glued to Facebook know that it was begun with venture
capital provided by Stanford graduate Peter Thiel (PayPal, The Diversity Myth, on the board of
VanguardPAC) and Accel Partners, whose manager chaired the National Venture Capital Association
(NVAC) and was on the board of BBN Technologies that spearheaded ARPANET and thus the Internet?
Or that the NVAC board was graced by the CEO of In-Q-Tel, whose mandate is to “nurture data mining
technologies”?
Facebook is actually a user-friendly human network analysis and behavior model-building engine. In
fact, says computer engineer and founder of the Free Software Foundation Richard Stallman, Facebook is
a surveillance engine
79 mapping your personality and selling your information, whose algorithms in
Google Search are deciding what news and political opinions you should see while sending the rest
elsewhere (or nowhere). In fact, web personalization is why real activism will never happen on
Facebook or the Internet.
80 Eli Pariser explains in his book The Filter Bubble: How the New
Personalized Web is Changing What We Read and How We Think:
. . .the Internet has unleashed the coordinated energy of a whole new generation of activists—it’s easier than ever to find people
who share your political passions. But while it’s easier than ever to bring a group of people together, as personalization advances
it’ll become harder for any given group to reach a broad audience. In some ways, personalization poses a threat to public life
itself.
81
next-227
The unlawful Silent War against Citizens
NOTES Chapter 9
1 LHC is a synchrotron-type accelerator, a particular type of cyclic particle accelerator in which the accelerating particle beam travels
around a fixed closed-loop path.
2 David Kestenbaum, “The World’s Largest Particle Accelerator.” NPR, May 18, 2008.
3 Like other “black” projects, confusion reigns over HAARP’s resumption: “HAARP Facility to Reopen in 2017 under New Ownership,”
National Association for Amateur Radio, August 4, 2016.
4 “CLOUD,” home.cern/about/experiments/cloud.
5 Christopher Fontenot, “CERN: Planetary Surface Power and Interstellar Propulsion,” A Microwaved Planet, June 27, 2016; “Earth’s
Global Atmospheric Electric Grid Circuit,” A Microwaved Planet, June 28, 2016. Also view “Bizarre Discovery at CERN,” FreedomRebel,
January 17, 2013.
6 See footnote in Chapter 6.
7 Email, October 4, 2016.
8 Tera or trillion electron volts; 1 TeV = 1.6021773E-7 joule.
9 “The Abandoned Remains of the Superconducting Super Collider.” Amusing Planet, December 14, 2010.
10 If the LHC schedule can be believed: espace.cern.ch/be-dep/BEDepartmentalDocuments/BE/LHC_Schedule_2016.pdf.
11 Email from Anthony Patch to Kevin Baker of the Kevin Baker Show, April 25, 2016.
12 See YouTube “Higgs boson found, now what? (Inside Story – 5th July 2012) [HD].” TheNovadex, July 7, 2012.
13 As Chapter 2 discussed, scalar potentials hearken from a hyperdimension. Matter, gravity, and light of this 3-space dimension are
connected, as harmonics mathematics makes plain. See New Zealander Bruce Cathie’s The Harmonic Conquest of Space (1995).
14 Keay Davidson, “Air Force pursuing antimatter weapons / Program was touted publicly, then came the official gag order.”
SFGate.com, October 4, 2004.
15 The Russians classify scalar wave technology in three parts: Energetics, Bio-energetics, and Psycho-energetics.
16 “Seifer to Time magazine: ‘Higgs field’ is ‘ether.’” Changing power.net, March 18, 2012.
17 See YouTube “Illuminati Black Magick Television Tricks REVEALED!! Part 2,” The Black Child, January 9, 2015.
18 Katherine Brooks, “Here’s The Dance Opera That’s Being Filmed Inside CERN’s Large Hadron Collider.” Huffington Post, March 9,
2015. Analysis of the dance-opera at thecreatorsproject.vice.com/blog/epic-dance-opera-filmed-inside-cerns-large-hadron-collider.
19 “Sacrifice to Shiva at CERN? Officials launch investigation after video of ‘spoof’ ritual emerges.” RT, 18 August 2016.
20 Inside: “Uncut Occult ceremony at the Opening of World’s longest tunnel near CERN in Gotthard massif.+ sound,” Soul Rescue, June
2, 2016. Outside: “2/2 Uncut Occult ceremony at the Opening of World’s longest tunnel near CERN in Gotthard,” Soul Rescue, June 14, 2016.
21 For more behind this interpretation, please listen to an alleged CERN insider: “Darkest Side of CERN — Destruction of Souls —
Critical!!!!” Margaret Schaut, April 3, 2015.
22 The dynamo theory proposes a mechanism by which a celestial body such as Earth or a star generates a magnetic field. A dynamo is
thought to be the source of the Earth’s magnetic field, as well as the magnetic fields of other planets.
23 Tariq Malik, “NASA’s Fourth of July Fireworks: 2 Rockets Launching Today.” Space.com, July 4, 2013.
24 Elizabeth Gibney, “Chinese Satellite Is 1 Giant Step for the Quantum Internet.” Scientific American, July 27, 2016.
25 Anthony Patch email, June 15, 2017: “China’s satellites are for encrypted communications employing their version of the D-Wave
quantum computer system. These will not open portals, nor will they produce or connect Birkeland currents to Saturn or other planets. Only
the LHC’s Main Ring conjoined with AWAKE, concurrent with the opening of the portal at CERN’s North Area Impact Point, produce the
Birkeland currents connecting first with Saturn, then with the other remaining planets. The Chinese have nothing to do with this. I do agree that
Saturn-like rings are being produced around Earth as a result of spraying and Synchrotron energies produced by circulating particles within the
LHC Main Ring. These energies are the same as with Saturn: gamma and X-rays, along with magnetic lines of force extending at right angles
(orthogonal) to the Main Ring’s superconducting magnets.” (In the Bible, Birkeland currents are “Jacob’s ladder.” For a review, go back to
Chapter 7.)
26 Phillippa Blaber and Angélique Verrecchia, “Cassini-Huygens: Preventing Biological Contamination.” Space Safety, April 3, 2014.
27 Elizabeth Gibney, “CERN prepares to test revolutionary mini-accelerator.” Nature, 7 October 2015.
28 “Researchers Demonstrate ‘Accelerator on a Chip’.” SLAC National Accelerator Laboratory (Stanford University) press release,
September 27, 2013.
29 In response to the SLAC press release.
30 By international agreement, absolute zero is –273.15° on the Celsius scale (–459.67° on the Fahrenheit scale).
31 YouTube “D-Wave lecture by Geordie Rose (IdeaCity 2013).” Paul Calhoun, July 9, 2013.
32 Listen to an interview with Jay Weidner and Troy McLachlan on “Windows on the World — The Cult of Saturn,” RevelationMediaCo,
June 20, 2014; an interview with Anthony Patch, “CERN The Next Generation: LHC’s New Name & Energy Levels Revealed,” The Kev
Baker Show, July 28, 2016, and “Forget Mandela Effects, Think QUANTUM POLLUTION w/Anthony Patch,” The Kev Baker Show,
August 11, 2016.
notes chapter 10
1 Wood, Patrick, “Technocracy Endgame: Global Smart Grid.” The August Forecast & Review, May 16, 2013. Also see Marion King Hubbert, Howard Scott, Technocracy Inc., Technocracy Study Course. New York, 1934.
2 Zbigniew Brzezinski, Between Two Ages: America’s Role in the Technetronic Era. New York: Viking Press, 1970.
3 Peter Kirby, Chemtrails Exposed: A History of the New Manhattan Project, 2012.
4 The Aviary was a collection of military and intelligence scientists and officers in the 1980s studying artificial telepathy (remote viewing). See artificialtelepathy.blogspot.com/2006/06/aviary-key-players-of-1980s-and-1990s.html.
5 Smirnov is credited with inventing the LIDA in the 1970s, but it was actually invented by Dr. José Delgado, U.S. Patent # 3,773,049. For a fictionalized account of how it works, read Evelyn Waugh’s 1957 novel The Ordeal of Gilbert Pinfold.
6 “Mind control: The Zombie Effect.” Pravda.ru, November 10, 2004, www.pravdareport.com/science/tech/10-11-2004/7346-0/
7 “Cary Grove Drill To Include Shooting Blanks In Hallways.” CBS Chicago, January 29, 2013.
8 Sharon Weinberger, “The ‘Voice of God’ Weapon Returns.” Wired, December 21, 2007.
9 John Grant, “Americans Love a Good Killer.” CounterPunch, May 11–13, 2012.
10 1988 Presidential candidate acceptance speech at the Republican National Convention in New Orleans.
11 Carolyn Williams Palit, “What Chemtrails Really Are.” Rense.com, November 9, 2007.
12 Patrick Wood, “Technocracy Endgame: Global Smart Grid.” Also read Wood’s “Smart Grid: The Implementation of Technocracy?” The August Review, March 2, 2010.
13 Ali Abunimah, “How Israel helps eavesdrop on US citizens.” The Electronic Intifada, 3 November 2008. Israel’s NSA is called Unit 8200.
14 See www.submarinecablemap.com/.
15 Ibid.
16 Market Research Reports, www.marketresearchreports.com/qyresearch/global-and-china-smart-meters-sales-market-report-2020.
17 U.S. Energy Information Administration.
18 “Shanghai Fudan University develops new Li-Fi technology.” WantChinaTimes.com, October 18, 2013.
19 Jeff St. John, “Could Millions of Smart Meters Be Used to Create a Powerful Supercomputer?” Greentech Media, August 7, 2015.
20 Ibid.
21 K.T. Weaver, SkyVision Solutions, “Insanity: Turning Smart Meters into a Supercomputer Platform.” Smartgridawareness.org, July 20,
2015.
22 J. Hart, “Nuclear expert: Smart Meters 100X Radiation Exposure of a Cell Phone.” Open Publishing Newswire, April 21, 2011.
23 Garry Reed, “Texas committee hears Smart Meter health hazards.” Examiner.com, October 12, 2012.
24 Thanks to “Smart Meters Are An Even Larger Threat Than I Had Thought.” The Non-toxic nurse, March 25, 2012.
25 Dr. Andrew Michrowski, “Emerging phenomena with smart meters imposed in Quebec.” Dr. Michrowski is president of the Ottawa based Planetary Association for Clean Energy.
26 www.rfsafe.com/lloyds-of-london-insurance-wont-cover-smartphones-wifi-smart-meters-cell-phone-towers-by-excluding-all-wirelessradiation-hazards/.
27 “Power Pole Fires Leave Thousands Without Power Thursday.” KWTX News 10, December 6, 2012.
28 Electrosmog is accompanied by a 7–9% drop in humidity, is highly charged and highly alkaline.
29 Vicente Arenas, “Power struggle: Local woman uses gun to stop worker from installing smart meter.” KHOU 11 News, July 18, 2012.
30 “Smart Meter Fires and Explosions,” EMF Safety Network.
31 Dana Liebelson and Chris Mooney, “CIA Backs $630,000 Scientific Study on Controlling Global Climate.” Mother Jones, July 17,
2013.
32 Daniel G.J. “The Malware That Can Spy on You through Your Own Smartphone.” IntelliHub, July 15, 2013.
33 Bob Egelko, “Court blocks S.F. warning on cell phones.” San Francisco Chronicle, June 26, 2013.
34 Will Thomas, “Wireless, Chemtrails, and You.” WakeUpWorld, 27 May 2013. Also see his “Dialing Our Cells.”
35 “Verizon Seeks Purely Wireless Phone Network on Fire Island, Abandons Landlines.” LongIsland.com, 5 July 2013.
36 “Cell Phone Radiation Lawsuits: Bernstein Liebhard LLP Notes New Study Finding Cell Phone Radiation May Cause Brain Tissue
Damage.” Digital Journal, March 27, 2013.
37 “Swedish review strengthens grounds for concluding that radiation from cellular and cordless phones is a probable human carcinogen.”
Pathophysiology, April 2013: 123–9; and Joshua Pramis, “Number of mobile phones to exceed world population by 2014.” Digital Trends,
February 28, 2013.
38 Joel M. Moskowitz, Ph.D., School of Public Health, UC Berkeley, “Your Cell Phone Company May Affect Your Risk of Brain
Cancer.” PRLog press release (March 27, 2013) for new study by Sven Kuehn et al., “Analysis of mobile phone design features affecting
radiofrequency power absorbed in a human head phantom.” Bioelectromagnetics, March 26, 2013.
39 “Smartphone Technology: What is 5G and 6G Wireless Technology: Difference between 5G and 6G Mobile Technology.”
technologyoffice.blogspot.com/2013/06/what-is-5g-and-6g-wireless-technology.html.
40 “Active Denial System,” Wikipedia.
41 “Letter to the FCC from Dr. Yael Stein, M.D. of the Hadassah Medical Center, Jerusalem, Israel in Opposition to 5G Spectrum
Frontiers Millimeter Wave Technology.” ehtrust.org, July 9, 2016.
42 For more on TETRA, see Barrie Trower’s “Secret Report On Cell Phone Dangers and Tetra,”
43 Paul Raymond Doyon, “Are Microwaves Killing the Insects, Frogs, and Birds? And Are We Next?” Rense.com, March 20, 2008.
44 David Jen, et al., “Distributed Phased Arrays and Wireless Beamforming Networks.” International Journal of Distributed Sensor
Networks, 5:283–302, 2009.
45 Will Thomas, “Wireless, Chemtrails, and You,” 2013.
46 Frank J. Ryan, “User’s Guide for the VTRPE Computer Model.” Naval Ocean Systems Center, October 1991; funded by the Joint
Electronic Warfare Center and the Office of Naval Technology.
47 MrCati in the YouTube “The Chemtrails Vaporific Effect” calls this a vaporific effect weapon (December 27, 2011).
48 Carolyn Williams Palit, “The Air Force Wants Your LOV: Aerial Seeding of Biological Implants into Food, Water, & Air,” February 28,
2008. www.whale.to/b/palit.html. Palit’s website exoticwarfare.com is no longer.
49 See more on coupling in Chapter 11.
50 Robert Duncan, Ph.D., The Matrix Deciphered (self-published, 2006). Duncan has also written Project: Soul Catcher: Secrets of
Cyber and Cybernetic Warfare Revealed (Amazon, 2010) and How To Tame A Demon: A short practical guide to organized
intimidation stalking, electronic torture, and mind control (January 2014). He claims to have been tortured and programmed by the very
technologies he worked on for the Department of Defense, U.S. Navy, and NATO. Documentation of his background is elusive.
51 Daniel Ehyaie, “Novel Approaches to the Design of Phased Arrays.” Doctoral dissertation in Electrical Engineering, University of
Michigan, 2011.
52 In 1990, the 2.4GHz frequency was released for unlicensed use in short-range wireless (three hundred feet).
53 Magda Havas, “Is White Space Super WiFi dangerous?” September 24, 2010. www.magdahavas.com/
54 “WikiLeaks founder solicited U.S. secrets: court-martial witness.” Reuters, June 11, 2013.
55 Dan Roberts and Spencer Ackerman, “Edward Snowden’s explosive NSA leaks have US in damage control mode.” The Guardian, 10
June 2013. Note: Apple was a holdout until Steve Jobs’ death.
56 Swift, Mike. “Facebook to assemble global team of ‘diplomats’.” Mercurynews.com, May 22, 2011.
57 In-Q-Tel is a venture capital firm of the now-corporate CIA.
58 Spencer Ackerman, “CIA Chief: We’ll Spy on You Through Your Dishwasher.” Wired, March 15, 2012.
59 A children’s TV show (1966–2001) in which Fred Rogers played the gentle father in the studio home that “latchkey” American children
longed for.
60 Helen Knight, “New system uses low-power WiFisignal to track moving humans—even behind walls.” MIT News, June 28, 2013.
61 Electron guns capable of generating, mirroring, and guiding EM waves to targets.
62 Patented in 1963 by Texas Instruments Defense Systems and Electronics Division, now owned by Raytheon, previous holder of
HAARP patents.
63 Andrew Michrowski, Ph.D. “Emerging phenomena with smart meters imposed in Quebec.” See his article “Electromagnetic fields:
High-level microwave technology concerns,” The Planetary Association for Clean Energy, Inc., media.withtank.com/42391c31ef.pdf.
64 Then-President George W. Bush to a joint session of Congress, September 20, 2001.
65 Jim Stone, “Mind control via electronic manipulation,” June 14, 2012. www.jimstonefreelance.com/cells.html.
66 “The NYPD is using X-ray vans that can see into cars and homes.” Business Insider, October 14, 2015.
67 David Kravets, “An Intentional Mistake: The Anatomy of Google’s WiFi Sniffing Debacle.” Wired, May 2, 2012. When confronted by
the FCC about its war driving, Google maintained that it had broken no laws because “the data was flowing, unencrypted, over open air
waves.” And where have those specially rigged-out Street View cars gone?
68 Frank Jones, “The vulnerability of CRTs CPUs, and peripherals to TEMPEST monitoring in the real world,” 1996,
www.parallaxresearch.com/dataclips/pub/infosec/emsec_tempest/info/TEMPESTMonitor.txt.
69 Simon Black, “Digital Privacy Black Paper.” www.commieblaster.com/dl/NSA-Black-Paper.pdf
70 Shaunacy Ferro, “Laser Time Cloak Hides The Fact That An Event Ever Happened.” Popular Science, June 6, 2013.
71 Col. Ann Wright, “America’s Drones Are Homeward Bound.” Truthdig.com, July 17, 2012.
72 Title III of the Omnibus Crime Control and Safe Streets Act of 1968.
73 G.J. Daniel, “The Malware That Can Spy on You Through Your Own Smartphone.” IntelliHub, July 15, 2013. FinSpy’s creator
Gamma Group is “a British company owned by a shell corporation in the British Virgin Islands.”
74 “Government Cameras In Your Car?” MSNBC, October 14, 2011.
75 Nick Farrell, “Apple patents tech to let cops switch off iPhone video, camera and wi-fi.” Techeye.net, 7 August 2013.
76 “Skype with care — Microsoft is reading everything you write.” heise Security, 14 May 2013.
77 Kim Zetter, “California Police Used Stingrays in Planes to Spy on Phones.” Wired, January 27, 2016.
78 Bob Sullivan, “Pricy ‘stingray’ gadget lets cops track cell phones without Telco help.” NBC News, April 3, 2012. Arizona police paid for
their Stingray ($244,195) with a $150,000 grant from the State Homeland Security Program, plus RICO monies. For a fee, wireless carriers
will track cell phone signals back to cell towers.
79 Sriram Srinivasan and Sangeetha Kandavel, “Facebook is a surveillance engine, not friend: Richard Stallman, Free Software
Foundation.” The Economic Times, February 7, 2012.
80 Jonathan Matthew Smucker, “What Facebook Is Hiding From You.” AlterNet, May 29, 2011.
81 British version listed under The Filter Bubble: What the Internet Is Hiding From You. Penguin Books, 2012.
FAIR USE NOTICE
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. As a journalist, I am making such material available in my efforts to advance understanding of artistic, cultural, historic, religious and political issues. I believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law.
In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. Copyrighted material can be removed on the request of the owner.
No comments:
Post a Comment