Radiation Effect on Humans
Microchips Everywhere-A Future Vision
Covert War Using Smart Grid
There is a silent civil war going on in America and the world - a quiet technological enslavement. You are being tracked, videoed and implanted. There are two sides to every technology, depending on how it is used. If you have been silently and covertly implanted with the Body Area Network, you are connected to the Internet of Things. You are already part of the Grid and you are now a technological slave. You are at war and there is no one to point your weapon at. You don't know how to protect yourself from the technology being used.
Slaves do not have control over their own bodies. Electronic slavery is an invasion into your physical personal space with electronic control over a person.
This page is about how technological slavery has been planned for the entire human race through the Smart Grid. Ubiquitous computing will dominate the global society under Agenda 21. There is a short summary of what Agenda 21 means to accomplish in the TI Handbook.
The convergence of political, financial and social technology has made it possible to connect every person, their family members, their home, vehicle and belonging via ubiquitous computing to a virtual electronic cloud tracked and controlled by unknown remote personnel.
The government paid for the infrastructure of HAARP, GWEN towers, Smart Meters and the internet. They plan to be able to control every human being by knowing everything about them, their needs, desires, capabilities and weaknesses via the surveillance system connected to the Smart Grid. Frequencies are being projected into buildings from home wiring and infrared microwave radar sensors and cameras which can see through materials and keep the government up to the minute in real time about ALL your activities, even the most private areas of your life, like bathing, using the bathroom and having sex.
The government has the ability to keep a person in pain constantly and retaliate with frequencies if they express words or ideas which are not approved, using the wireless body area network. This is how whistleblowers are being harassed and tortured all day long, every day. Some control can be done without implants but implants are the upcoming technology that will enslave everyone. A push of a button and you have a heart attack or brain aneurism. If the government can control your mind and your body, you are a slave.
Government contractors employ persons who sit at a console and view you in your home. They use choices on a computer screen to point frequencies at your body parts. These may be microwave, ultrasound (pressure), laser, white light, millimeter light as wave packets.
Misuse of the Grid and Smart Technology
SMART IMPLANTS CAN BE LOCATED AND STIMULATED USING THE COMMUNICATION TECHNOLOGY IN THE GRID.
This is a diagram of a smart grid concept. The thing they don't tell you is that you will also be "CONNECTED" into this grid. You will be tracked in your home with an RFID chip occupant location system.
You probably already have an RFID chip in you. If you have a high-pitched ring in your left ear and at times, your right, you have a 2-way radio implanted in or near your ear and brain connecting you to a computer with Artificial Intelligence. Your thoughts, emotions and dreams and be manipulated electronically with radio frequencies and focused ultrasound.
The government has convinced the medical community that everyone needs a Wireless Body Area Network in them so their health can be monitored. They aren't so interested in monitoring your heatlh as in controlling your thoughts, your body, what you think and how you act. If you get a blood test or go into the hospital, you will get chipped.
Notice the person in this diagram. They are connected with a device outside their body. Do you think the government would hesitate to implant devices in you? This system isn't for use outside your body. At least one-third of the population already is being monitored with RFID or chip implants of some kind.
Free-space laser communication systems have the potential to provide flexible, high-speed connectivity suitable for terrestrial long-haul satellite-to-ground and intersatellite links. Recent advances in fast, compact optical and electrooptical technologies can be leveraged to design and develop global wide-band fiber networks with multiple Tbit/sec capabilities that can eventually pave the pathway to establish all-optical broadband global Internet connectivity anywhere, anytime. This chapter describes the successful demonstrations of space-to-ground and airborne links for achieving high data rate free-space optical communications. Satellite (geosynchronous orbit and low earth orbit [LEO]), small satellites, unmanned air vehicle (UAV)/airplane, and high-altitude platforms (HAP) are considered, discussing different communication channel propagation characteristics for each of the scenarios. Space-to-ground free-space optical communications links have been successfully demonstrated from several platforms over the last two decades (Geolite, GOLD, NFire, Russian ISS, OPALS, OICETS, Spot, LLCD, etc.), culminating in an operational system deployed by ESA (AlphaSat). The challenges of link acquisition from fast slewing spacecraft in LEO configurations and beam break-up from atmospheric scintillation effects have been overcome in a variety of experiments that not only validates the hardware but also the concept of operations for moderate data rates of tens of Mbps up to several Gbps. The combined optical links of satellites, UAVs, and HAPs operating simultaneously can truly have the potential for establishing Internet connectivity worldwide.
Fundamentals and Potential Applications
2019, Pages 169-205
Chapter 6 - Demonstration of Successful LEO/GO/Small Satellites/UAV/Airplanes to Ground Optical Communication Experiments: Opening Future Potential for All-Optical Networks Around the World for Global Internet Connectivity
Scenario of RFID MALL TRACKING of people implanted with RFID chips
By Kenneth R. Foster and Jan Jaeger
Platform may enable continuous, low-cost, reliable devices that detect chemicals in the environment.
Jennifer Chu | MIT News Office
June 14, 2018
Satellite-based positioning systems: GPS, Galileo, >1m-15m
The accuracy of satellite-based systems depends on the service/technology being used. GPS is mostly used outdoors since the signals are generally too weak to be received inside buildings. Satellite signals can be jammed or the accuracy can be altered by the government in case of a military emergency.
Examples of systems in use: A-GPS, GPS.
Cell-based mobile Communication Networks: UMTS (3G), GSM (2G). 25m – 30km
Most mobile network-based positioning technologies only offer a limited accuracy with regard to the positioning of the mobile device. The accuracy depends on the size of the communication cell, the mobile device resides in. In city centres, the diameter of a cell can be approximately 300 metres, in rural areas much larger cells (diameter up to approximately 30 km) exist. Additional technologies, for example using triangulation, allow more accurate positioning. Examples of systems in use: E-OTD, Cell-ID.
Radio Frequency Identification (RFID), WiFi, Bluetooth <1m – 50m
These technologies use a similar approach as cell-based systems to determine the position of an entity. Several “base stations” are needed to perform the triangulation. However, the accuracy heavily depends on the technology and the amount of “base station” being present in the observed area è mostly these technologies are used indoors.
Sensor-based Systems: Optical sensors (infrared-based), biometrics (face recognition)
Close proximity: >10cm – several metres
Sensor-based systems resemble a conglomeration of different location technologies. Their accuracy and precision depends on the technology being used – also, the technologies themselves differ a lot in the way that they work (e.g. optical systems vs. wireless systems).
Hybrid Systems These technologies include systems that use combinations of different positioning technologies to offer a higher positioning precision.
Example: Assisted GPS (A-GPS), combining GPS technology with external sensors (e.g. tachymeter) or cell-based positioning technologies (mobile phones, etc.).
Satellite based location tracking needs at least 3 satellites to triangulate the position of a device or person.
Peer to peer versus stationary transmitter positioning (e.g. by radio or infrared beacons)
How do they find you?
Satellite based positioning information
Theoretically, the determination of someone’s position using satellites can be carried out all over the world. Satellite based positioning is characterised by a unilateral way of communication, as the mobile device only passively receives location information. The accuracy of satellite based positioning is between 1 and 15 meters depending on the used service / technology. The world-wide standard for satellite based positioning still is the Global Positioning System (GPS), established and controlled by the USA. The accuracy of the GPS can be altered in case of military emergency. W-LAN Access Points (esp. relevant in urban areas), peer-to-peer positioning or Radio Frequency Identification (RFID) are further relevant technologies / methods to determine users’ location.
Updated: 2008-01-27 15:50
"We've seen so many different uses of the technology," says Dan Mullen, president of
AIM Global, a national association of data collection businesses, including RFID, "and
we're probably still just scratching the surface in terms of places RFID can be used."
The problem, critics say, is that microchipped products might very well do a whole lot more.
With tags in so many objects, relaying information to databases that can be linked to credit and bank cards, almost no aspect of life may soon be safe from the prying eyes of corporations and governments, says Mark Rasch, former head of the computer-crime unit of the US Justice Department.
By placing sniffers in strategic areas, companies can invisibly "rifle through people's pockets, purses, suitcases, briefcases, luggage - and possibly their kitchens and bedrooms - anytime of the day or night," says Rasch, now managing director of technology at FTI Consulting Inc., a Baltimore-based company.
In an RFID world, "You've got the possibility of unauthorized people learning stuff about who you are, what you've bought, how and where you've bought it ... It's like saying, 'Well, who wants to look through my medicine cabinet?'"
He imagines a time when anyone from police to identity thieves to stalkers might scan locked car trunks, garages or home offices from a distance. "Think of it as a high-tech form of Dumpster diving," says Rasch, who's also concerned about data gathered by "spy" appliances in the home.
"It's going to be used in unintended ways by third parties - not just the government, but private investigators, marketers, lawyers building a case against you ..."
Presently, the radio tag most commercialized in America is the so-called "passive" emitter, meaning it has no internal power supply. Only when a reader powers these tags with a squirt of electrons do they broadcast their signal, indiscriminately, within a range of a few inches to 20 feet.
Not as common, but increasing in use, are "active" tags, which have internal batteries and can transmit signals, continuously, as far as low-orbiting satellites. Active tags pay tolls as motorists to zip through tollgates; they also track wildlife, such as sea lions.
Retailers and manufacturers want to use passive tags to replace the bar code, for tracking inventory. These radio tags transmit Electronic Product Codes, number strings that allow trillons of objects to be uniquely identified. Some transmit specifics about the item, such as price, though not the name of the buyer.
However, "once a tagged item is associated with a particular individual, personally identifiable information can be obtained and then aggregated to develop a profile," the US Government Accountability Office concluded in a 2005 report on RFID.
Google wants to scan your clothing and listen to you brush your teeth. Welcome home.
Nov 17, 2018
A method and system for identifying and tracking persons using RFID-tagged items carried on the persons. Previous purchase records for each person who shops at a retail store are collected by POS terminals and stored in a transaction database. When a person carrying or wearing items having RFID tags enters the store or other designated area, a RFID tag scanner located therein scans the RFID tags on that person and reads the RFID tag information. The RFID tag information collected from the person is correlated with transaction records stored in the transaction database according to known correlation algorithms. Based on the results of the correlation, the exact identity of the person or certain characteristics about the person can be determined. This information is used to monitor the movement of the person through the store or other areas.
Today, it can be used to identify missing pets, monitor vehicle traffic,
track livestock to help prevent disease outbreaks, and follow
pharmaceuticals to fight counterfeit drugs. Many of us start our cars
using RFID chips embedded in the ignition key.
RFID chips, injected under the skin, can store a medical history or be
used to control access to secure areas. The next generation of passports
and credit cards are hotbeds for RFID. It could make bar codes obsolete.
However, hackers and analysts are exposing potentially serious problems. Hackers could disable a car's RFID anti-theft feature, swap a product's price for a lower one, or copy medical information from an RFID chip.
"The dark side of RFID is surreptitious access," said Bruce Schneier, a security expert with Counterpane Internet Security Inc., "When RFID chips are embedded in your ID cards, your clothes, your possessions, you are effectively broadcasting who you are to anyone ithin range," he said. "The level of surveillance possible, not only by the government but by corporations and criminals as well, will be unprecedented. There simply will be no place to hide."
The Mobile Self
The mobility of a subject may be observed by others including the deployment of tracking mechanisms with respect to biometric properties, e.g., by a comprehensive video surveillance.” (Müller et al., 2005). A Biometric device is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based on a physiological or behavioural characteristic. These characteristics include fingerprints, facial images, Iris prints and voice recognition. See http://www.fidis.net/resources/fidis-deliverables/mobility-and-identity/int-d111000/doc/20/
Tracking you in your Vehicle
SMART SENSOR IC called MAGNUS with antenna senses temperature, moisture, pressure and proximity without an outside power source.
Do you get targeted when sitting in a car seat? You may have occupant location sensors in your car seats that tell transmitters you are there.
The grid is used for surveilllance and operating the BAN.
A smart grid is an electrical grid which includes a variety of operational and energy measures including smart meters, smart appliances, renewable energy resources, and energy efficiency resources. Electronic power conditioning and control of the production and distribution of electricity are important aspects of the smart grid.
Smart grid policy is organized in Europe as Smart Grid European Technology Platform. Policy in the United States is described in 42 U.S.C. ch. 152, subch. IX § 17381.
Roll-out of smart grid technology also implies a fundamental re-engineering of the electricity services industry, although typical usage of the term is focused on the technical infrastructure.
The main components of a Smart Grid (Figure 1) are electric power generators, electric power substations, transmission and distribution lines, controllers, smart meters, collector nodes, and distribution and transmission control centers
Networks, are now using IP based, interconnected networks to transmit Supervisory Control and Data Acquisition (SCADA) messages. SCADA protocols were not designed with security in mind. Therefore, in order to enhance security, access control and risk mitigation, operators need detailed and accurate information about the status, integrity, configuration and network topology of SCADA devices. This paper describes a comprehensive system architecture that provides situational awareness (SA) for SCADA devices and their operations in a Smart Grid environment. The proposed SA architecture collects and analyzes industrial traffic and stores relevant information, verifies the integrity and the status of field devices and reports identified anomalies to operators.
A smart meter is an electronic device that records consumption of electric energy and communicates the information to the electricity supplier for monitoring and billing. Smart meters typically record energy hourly or more frequently, and report at least daily. Smart meters enable two-way communication between the meter and the central system. Such an advanced metering infrastructure (AMI) differs from automatic meter reading (AMR) in that it enables two-way communication between the meter and the supplier. Communications from the meter to the network may be wireless, or via fixed wired connections such as power line carrier (PLC). Wireless communication options in common use include cellular communications (which can be expensive), Wi-Fi (readily available), wireless ad hoc networks over Wi-Fi, wireless mesh networks, low power long range wireless (LORA), ZigBee (low power low data rate wireless), and Wi-SUN (Smart Utility Networks).
Home automation or domotics is building automation for a home, called a smart home or smart house. A home automation system will control lighting, climate, entertainment systems, and appliances. It may also include home security such as access control and alarm systems. When connected with the Internet, home devices are an important constituent of the Internet of Things.
A home automation system typically connects controlled devices to a central hub or "gateway". The user interface for control of the system uses either wall-mounted terminals, tablet or desktop computers, a mobile phone application, or a Web interface, that may also be accessible off-site through the Internet.
While there are many competing vendors, there are very few worldwide accepted industry standards and the smart home space is heavily fragmented. Manufacturers often prevent independent implementations by withholding documentation and by litigation.
The home automation market was worth US$5.77 billion in 2013, predicted to reach a market value of US$12.81 billion by the year 2020.
Building automation is the automatic centralized control of a building's heating, ventilation and air conditioning, lighting and other systems through a building management system or building automation system (BAS). The objectives of building automation are improved occupant comfort, efficient operation of building systems, reduction in energy consumption and operating costs, and improved life cycle of utilities.
Building automation is an example of a distributed control system – the computer networking of electronic devices designed to monitor and control the mechanical, security, fire and flood safety, lighting (especially emergency lighting), HVAC and humidity control and ventilation systems in a building.
BAS core functionality keeps building climate within a specified range, provides light to rooms based on an occupancy schedule (in the absence of overt switches to the contrary), monitors performance and device failures in all systems, and provides malfunction alarms to building maintenance staff. A BAS should reduce building energy and maintenance costs compared to a non-controlled building. Most commercial, institutional, and industrial buildings built after 2000 include a BAS. Many older buildings have been retrofitted with a new BAS, typically financed through energy and insurance savings, and other savings associated with pre-emptive maintenance and fault detection.
A building controlled by a BAS is often referred to as an intelligent building, "smart building", or (if a residence) a "smart home". Commercial and industrial buildings have historically relied on robust proven protocols (like BACnet) while proprietary protocols (like X-10) were used in homes. Recent IEEE standards (notably IEEE 802.15.4, IEEE 1901 and IEEE 1905.1, IEEE 802.21, IEEE 802.11ac, IEEE 802.3at) and consortia efforts like nVoy (which verifies IEEE 1905.1 compliance) or QIVICON have provided a standards-based foundation for heterogeneous networking of many devices on many physical networks for diverse purposes, and quality of service and failover guarantees appropriate to support human health and safety. Accordingly, commercial, industrial, military and other institutional users now use systems that differ from home systems mostly in scale. See home automation for more on entry level systems, nVoy, 1905.1, and the major proprietary vendors who implement or resist this trend to standards integration.
Almost all multi-story green buildings are design to accommodate a BAS for the energy, air and water conservation characteristics. Electrical device demand response is a typical function of a BAS, as is the more sophisticated ventilation and humidity monitoring required of "tight" insulated buildings. Most green buildings also use as many low-power DC devices as possible. Even a passivhaus design intended to consume no net energy whatsoever will typically require a BAS to manage heat capture, shading and venting, and scheduling device use.
Smart highway and smart road are terms for a number of different proposals to incorporate technologies into roads for generating solar energy, for improving the operation of autonomous cars, for lighting, and for monitoring the condition of the road.
A smart city is an urban area that uses different types of electronic data collection sensors to supply information which is used to manage assets and resources efficiently. This includes data collected from citizens, devices, and assets that is processed and analyzed to monitor and manage traffic and transportation systems, power plants, water supply networks, waste management, law enforcement, information systems, schools, libraries, hospitals, and other community services. The smart city concept integrates information and communication technology (ICT), and various physical devices connected to the network (the Internet of things or IoT) to optimize the efficiency of city operations and services and connect to citizens. Smart city technology allows city officials to interact directly with both community and city infrastructure and to monitor what is happening in the city and how the city is evolving.
ICT is used to enhance quality, performance and interactivity of urban services, to reduce costs and resource consumption and to increase contact between citizens and government. Smart city applications are developed to manage urban flows and allow for real-time responses. A smart city may therefore be more prepared to respond to challenges than one with a simple "transactional" relationship with its citizens. Yet, the term itself remains unclear to its specifics and therefore, open to many interpretations.
Small satellites, miniaturized satellites, or smallsats, are satellites of low mass and size, usually under 500 kg (1,100 lb). While all such satellites can be referred to as "small", different classifications are used to categorize them based on mass. Satellites can be built small to reduce the large economic cost of launch vehicles and the costs associated with construction. Miniature satellites, especially in large numbers, may be more useful than fewer, larger ones for some purposes – for example, gathering of scientific data and radio relay. Technical challenges in the construction of small satellites may include the lack of sufficient power storage or of room for a propulsion system.
•Smart antennas more directional than omnidirectional antennas
•Smart antennas are able to focus their energy toward the intended users
•(base stations can be placed further apart)
•Smart antenna systems is security
•Smart antenna beam forming is computationally intensive, which means that smart antenna base stations must be equipped with the very powerful digital signal processing
•Smart antennas have sensor necessary for human ear.
•(Humans the ears transducers that convert acoustic waves into electrochemical impulse, antenna elements convert electromagnetic waves to electrical impulse)
This is a great place to add a tagline.
What is a smart meter? Smart meters are computerized electric meters that transmit electricity and gas usage to the utility using radio-frequency (RF) communication.
These are the same waves that cell phones emit, but smart meters broadcast 24/7 at a power density 100 to 160 times that of a cell phone. Smart meters are also known as advanced meters, and companies like DTE insist on using this term because of the negative publicity smart meters have gotten ever since they started making people sick. They call the installation of a smart meter a “meter upgrade.”
Smart meters can record your electrical usage in fine detail. Because of this, smart meters generate dirty electricity (line noise), which is as harmful to health as the wireless radiation the meters emit.
Misuse of the Smart Phone
This is a great place to add a tagline.
Tell customers more about you. Add a few words and a stunning pic to grab their attention and get them to click.
This space is ideal for writing a detailed description of your business and the types of services that you provide. Talk about your team and your areas of expertise.
A smartphone is a handheld personal computer with a mobile operating system and an integrated mobile broadband cellular network connection for voice, SMS, and Internet data communication; most, if not all, smartphones also support Wi-Fi. Smartphones are typically pocket-sized, as opposed to tablet computers, which are much larger. They are able to run a variety of software components, known as “apps”. Most basic apps (e.g. event calendar, camera, web browser) come pre-installed with the system, while others are available for download from official sources like the Google Play Store or Apple App Store. Apps can receive bug fixes and gain additional functionality through software updates; similarly, operating systems are able to update. Modern smartphones have a touchscreen color display with a graphical user interface that covers the front surface and enables the user to use a virtual keyboard to type and press onscreen icons to activate "app" features. Mobile payment is now a common theme amongst most smartphones.
A smart city uses information and communication technologies (ICT) to enhance quality, performance and interactivity of urban services, to reduce costs and resource consumption and to improve contact between citizens and government.
Sectors that have been developing smart city technology include government services, transport and traffic management, energy, health care, water and waste. Smart city applications are developed with the goal of improving the management of urban flows and allowing for real time responses to challenges.
A smart city may therefore be more prepared to respond to challenges than one with a simple 'transactional' relationship with its citizens.
Major technological, economic and environmental changes have generated interest in smart cities, including climate change, economic restructuring, the move to online retail and entertainment, ageing populations, and pressures on public finances.
The Smart City will carry out the Agenda 21.
WHAT IS AGENDA 21?
Agenda 21 is one of several global agendas designed to create a coalition of government, business, and non-governmental organizations (NGO’s) under the auspices of the United Nations.
When fully operational, this system of Global Governance, will command a One World Court, a One World Army, a One World Media, One World Religion, etc. all working in lock-step to gain total control over all human activity and all of the Earth’s wealth.
It was at the Rio Summit in Rio de Janeiro in 1992 that President George H.W. Bush, with the other 178 heads of state, signed agreement to Agenda 21. They all had a party on Prince Charles' yacht to solidify their relationships.
Agenda 21 is the “How To” document for Sustainable Development to be implemented through every level of government. Non-Governmental Organizations (NGO’s), such as the Nature Conservancy, The Sierra Club, the World Resources Institute, and the National Wildlife Federation worked directly with the United Nations to craft Agenda 21, and put Agenda 21 policies into every single agency in the U.S. Federal Government.
The United Nations created the 3 E’s: Social Equity, Economic Justice, and Environmental Justice. The logo below is used to represent Sustainable Development dogma. The area right in the center of the three circles, where all three circles overlap, represents the Triple Bottom Line, and that also represents “sustainability”.
Social Injustice, means that a person cannot move freely to meet his needs (i.e. they have no access to transportation or means to immigrate to another country), a person has ill-health, so cannot meet their needs, a person does not have access to good housing and a person does not have access to quality food. Using those examples, social equity
can be defined as the right and opportunity of all people “to benefit equally” from the resources afforded us by society and the environment. Solutions like mass transit, open borders, Obama Care, low-income housing, food stamps, and free lunch programs in the schools are all part of the Sustainable Development equation because they create “Social Justice”.
Economic Injustice occurs when a person’s gender, ethnicity, religious affiliation or a handicap places a limitation on their chances of success in the workplace, a person’s socioeconomic status prevents them from receiving higher education, a person’s socioeconomic status prevents them from moving up in the workplace, certain countries, through a wealth of natural resources, prosper over other less fortunate countries. Using those examples, Economic justice can be defined as the equal ability of the individual or countries to gain wealth. In the workplace, college scholarships for the low-income student, and redistribution of wealth from the wealthier countries to the poorer countries, sometimes through outright monetary “gifts” and sometimes through treaties and agreements that work to the U.S.’s disadvantage, are part of the formula of Sustainable Development because they create “Economic Justice.”
Environmental Injustice is when man pollutes the air, land, or water, man causes species to go extinct, man fills in a swamp, man causes the climate to warm, or change, whichever claim the environmentalists are making this week. Using those examples, Environmental Justice says that man is responsible for all of nature’s woes. The presence of man on this planet is an Environmental Injustice. Consequently, it is critical that all of man’s activities be severely controlled, of course, by the government, in order to protect the environment.
Environmental Justice is used to effectively convince Americans that in order to save their planet they must give up their individual rights for those of the collective. In other words, the 3 E’s are a way to be sure no one has more than anyone else (unless you are a member of the elite), even if you are smarter, worked harder, took more risks, made all the right decisions, and sacrificed. Your very success is a social injustice. Further, God may have given Man dominion over the Earth, but apparently big government feels it has veto power over God.
For a Sustainablist, a regulation that manages to create social equity, economic and environmental justice all in one fell swoop is the ideal regulation or policy. That regulation is said to have achieved the Triple Bottom Line (=sustainability).