Radiation Effect on Humans
Microchips Everywhere-A Future Vision
Covert War Using Smart Grid
There is a silent civil war going on in America and the world - a quiet technological enslavement. You are being tracked, videoed and implanted. There are two sides to every technology, depending on how it is used. If you have been silently and covertly implanted with the Body Area Network, you are connected to the Internet of Things. You are already part of the Grid and you are now a technological slave. You are at war and there is no one to point your weapon at. You don't know how to protect yourself from the technology being used.
Slaves do not have control over their own bodies. Electronic slavery is an invasion into your physical personal space with electronic control over a person.
This page is about how technological slavery has been planned for the entire human race through the Smart Grid. Ubiquitous computing will dominate the global society under Agenda 21. There is a short summary of what Agenda 21 means to accomplish in the TI Handbook.
The convergence of political, financial and social technology has made it possible to connect every person, their family members, their home, vehicle and belonging via ubiquitous computing to a virtual electronic cloud tracked and controlled by unknown remote personnel.
The government paid for the infrastructure of HAARP, GWEN towers, Smart Meters and the internet. They plan to be able to control every human being by knowing everything about them, their needs, desires, capabilities and weaknesses via the surveillance system connected to the Smart Grid. Frequencies are being projected into buildings from home wiring and infrared microwave radar sensors and cameras which can see through materials and keep the government up to the minute in real time about ALL your activities, even the most private areas of your life, like bathing, using the bathroom and having sex.
The government has the ability to keep a person in pain constantly and retaliate with frequencies if they express words or ideas which are not approved, using the wireless body area network. This is how whistleblowers are being harassed and tortured all day long, every day. Some control can be done without implants but implants are the upcoming technology that will enslave everyone. A push of a button and you have a heart attack or brain aneurism. If the government can control your mind and your body, you are a slave.
Government contractors employ persons who sit at a console and view you in your home. They use choices on a computer screen to point frequencies at your body parts. These may be microwave, ultrasound (pressure), laser, white light, millimeter light as wave packets.
Misuse of the Grid and Smart Technology
SMART IMPLANTS CAN BE LOCATED AND STIMULATED USING THE COMMUNICATION TECHNOLOGY IN THE GRID.
This is a diagram of a smart grid concept. The thing they don't tell you is that you will also be "CONNECTED" into this grid. You will be tracked in your home with an RFID chip occupant location system.
You probably already have an RFID chip in you. If you have a high-pitched ring in your left ear and at times, your right, you have a 2-way radio implanted in or near your ear and brain connecting you to a computer with Artificial Intelligence. Your thoughts, emotions and dreams and be manipulated electronically with radio frequencies and focused ultrasound.
The government has convinced the medical community that everyone needs a Wireless Body Area Network in them so their health can be monitored. They aren't so interested in monitoring your heatlh as in controlling your thoughts, your body, what you think and how you act. If you get a blood test or go into the hospital, you will get chipped.
Notice the person in this diagram. They are connected with a device outside their body. Do you think the government would hesitate to implant devices in you? This system isn't for use outside your body. At least one-third of the population already is being monitored with RFID or chip implants of some kind.
Optical Wireless Communications for Broadband Global Internet Connectivity
Free-space laser communication systems have the potential to provide flexible, high-speed connectivity suitable for terrestrial long-haul satellite-to-ground and intersatellite links. Recent advances in fast, compact optical and electrooptical technologies can be leveraged to design and develop global wide-band fiber networks with multiple Tbit/sec capabilities that can eventually pave the pathway to establish all-optical broadband global Internet connectivity anywhere, anytime. This chapter describes the successful demonstrations of space-to-ground and airborne links for achieving high data rate free-space optical communications. Satellite (geosynchronous orbit and low earth orbit [LEO]), small satellites, unmanned air vehicle (UAV)/airplane, and high-altitude platforms (HAP) are considered, discussing different communication channel propagation characteristics for each of the scenarios. Space-to-ground free-space optical communications links have been successfully demonstrated from several platforms over the last two decades (Geolite, GOLD, NFire, Russian ISS, OPALS, OICETS, Spot, LLCD, etc.), culminating in an operational system deployed by ESA (AlphaSat). The challenges of link acquisition from fast slewing spacecraft in LEO configurations and beam break-up from atmospheric scintillation effects have been overcome in a variety of experiments that not only validates the hardware but also the concept of operations for moderate data rates of tens of Mbps up to several Gbps. The combined optical links of satellites, UAVs, and HAPs operating simultaneously can truly have the potential for establishing Internet connectivity worldwide.
Fundamentals and Potential Applications
2019, Pages 169-205
Chapter 6 - Demonstration of Successful LEO/GO/Small Satellites/UAV/Airplanes to Ground Optical Communication Experiments: Opening Future Potential for All-Optical Networks Around the World for Global Internet Connectivity
Why Low-Earth Orbit Satellites Are the New Space Race
Scenario of RFID MALL TRACKING of people implanted with RFID chips
RFID InsideThe murky ethics of implanted chips
By Kenneth R. Foster and Jan Jaeger
MIT engineers configure RFID tags to work as sensors
Platform may enable continuous, low-cost, reliable devices that detect chemicals in the environment.
Jennifer Chu | MIT News Office
June 14, 2018
Satellite-based positioning systems: GPS, Galileo, >1m-15m
The accuracy of satellite-based systems depends on the service/technology being used. GPS is mostly used outdoors since the signals are generally too weak to be received inside buildings. Satellite signals can be jammed or the accuracy can be altered by the government in case of a military emergency.
Examples of systems in use: A-GPS, GPS.
Cell-based mobile Communication Networks: UMTS (3G), GSM (2G). 25m – 30km
Most mobile network-based positioning technologies only offer a limited accuracy with regard to the positioning of the mobile device. The accuracy depends on the size of the communication cell, the mobile device resides in. In city centres, the diameter of a cell can be approximately 300 metres, in rural areas much larger cells (diameter up to approximately 30 km) exist. Additional technologies, for example using triangulation, allow more accurate positioning. Examples of systems in use: E-OTD, Cell-ID.
Radio Frequency Identification (RFID), WiFi, Bluetooth <1m – 50m
These technologies use a similar approach as cell-based systems to determine the position of an entity. Several “base stations” are needed to perform the triangulation. However, the accuracy heavily depends on the technology and the amount of “base station” being present in the observed area è mostly these technologies are used indoors.
Sensor-based Systems: Optical sensors (infrared-based), biometrics (face recognition)
Close proximity: >10cm – several metres
Sensor-based systems resemble a conglomeration of different location technologies. Their accuracy and precision depends on the technology being used – also, the technologies themselves differ a lot in the way that they work (e.g. optical systems vs. wireless systems).
Hybrid Systems These technologies include systems that use combinations of different positioning technologies to offer a higher positioning precision.
Example: Assisted GPS (A-GPS), combining GPS technology with external sensors (e.g. tachymeter) or cell-based positioning technologies (mobile phones, etc.).
Satellite based location tracking needs at least 3 satellites to triangulate the position of a device or person.
Peer to peer versus stationary transmitter positioning (e.g. by radio or infrared beacons)
How do they find you?
Satellite based positioning information
Theoretically, the determination of someone’s position using satellites can be carried out all over the world. Satellite based positioning is characterised by a unilateral way of communication, as the mobile device only passively receives location information. The accuracy of satellite based positioning is between 1 and 15 meters depending on the used service / technology. The world-wide standard for satellite based positioning still is the Global Positioning System (GPS), established and controlled by the USA. The accuracy of the GPS can be altered in case of military emergency. W-LAN Access Points (esp. relevant in urban areas), peer-to-peer positioning or Radio Frequency Identification (RFID) are further relevant technologies / methods to determine users’ location.
Microchips everywhere: A future vision
Updated: 2008-01-27 15:50
"We've seen so many different uses of the technology," says Dan Mullen, president of
AIM Global, a national association of data collection businesses, including RFID, "and
we're probably still just scratching the surface in terms of places RFID can be used."
The problem, critics say, is that microchipped products might very well do a whole lot more.
With tags in so many objects, relaying information to databases that can be linked to credit and bank cards, almost no aspect of life may soon be safe from the prying eyes of corporations and governments, says Mark Rasch, former head of the computer-crime unit of the US Justice Department.
By placing sniffers in strategic areas, companies can invisibly "rifle through people's pockets, purses, suitcases, briefcases, luggage - and possibly their kitchens and bedrooms - anytime of the day or night," says Rasch, now managing director of technology at FTI Consulting Inc., a Baltimore-based company.
In an RFID world, "You've got the possibility of unauthorized people learning stuff about who you are, what you've bought, how and where you've bought it ... It's like saying, 'Well, who wants to look through my medicine cabinet?'"
He imagines a time when anyone from police to identity thieves to stalkers might scan locked car trunks, garages or home offices from a distance. "Think of it as a high-tech form of Dumpster diving," says Rasch, who's also concerned about data gathered by "spy" appliances in the home.
"It's going to be used in unintended ways by third parties - not just the government, but private investigators, marketers, lawyers building a case against you ..."
Presently, the radio tag most commercialized in America is the so-called "passive" emitter, meaning it has no internal power supply. Only when a reader powers these tags with a squirt of electrons do they broadcast their signal, indiscriminately, within a range of a few inches to 20 feet.
Not as common, but increasing in use, are "active" tags, which have internal batteries and can transmit signals, continuously, as far as low-orbiting satellites. Active tags pay tolls as motorists to zip through tollgates; they also track wildlife, such as sea lions.
Retailers and manufacturers want to use passive tags to replace the bar code, for tracking inventory. These radio tags transmit Electronic Product Codes, number strings that allow trillons of objects to be uniquely identified. Some transmit specifics about the item, such as price, though not the name of the buyer.
However, "once a tagged item is associated with a particular individual, personally identifiable information can be obtained and then aggregated to develop a profile," the US Government Accountability Office concluded in a 2005 report on RFID.
The Next Data Mine Is Your Bedroom
Google wants to scan your clothing and listen to you brush your teeth. Welcome home.
Nov 17, 2018
Identification and tracking of persons using RFID-tagged items
A method and system for identifying and tracking persons using RFID-tagged items carried on the persons. Previous purchase records for each person who shops at a retail store are collected by POS terminals and stored in a transaction database. When a person carrying or wearing items having RFID tags enters the store or other designated area, a RFID tag scanner located therein scans the RFID tags on that person and reads the RFID tag information. The RFID tag information collected from the person is correlated with transaction records stored in the transaction database according to known correlation algorithms. Based on the results of the correlation, the exact identity of the person or certain characteristics about the person can be determined. This information is used to monitor the movement of the person through the store or other areas.
Today, it can be used to identify missing pets, monitor vehicle traffic,
track livestock to help prevent disease outbreaks, and follow
pharmaceuticals to fight counterfeit drugs. Many of us start our cars
using RFID chips embedded in the ignition key.
RFID chips, injected under the skin, can store a medical history or be
used to control access to secure areas. The next generation of passports
and credit cards are hotbeds for RFID. It could make bar codes obsolete.
However, hackers and analysts are exposing potentially serious problems. Hackers could disable a car's RFID anti-theft feature, swap a product's price for a lower one, or copy medical information from an RFID chip.
"The dark side of RFID is surreptitious access," said Bruce Schneier, a security expert with Counterpane Internet Security Inc., "When RFID chips are embedded in your ID cards, your clothes, your possessions, you are effectively broadcasting who you are to anyone ithin range," he said. "The level of surveillance possible, not only by the government but by corporations and criminals as well, will be unprecedented. There simply will be no place to hide."
The Mobile Self
The mobility of a subject may be observed by others including the deployment of tracking mechanisms with respect to biometric properties, e.g., by a comprehensive video surveillance.” (Müller et al., 2005). A Biometric device is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based on a physiological or behavioural characteristic. These characteristics include fingerprints, facial images, Iris prints and voice recognition. See http://www.fidis.net/resources/fidis-deliverables/mobility-and-identity/int-d111000/doc/20/
Tracking you in your Vehicle
SMART SENSOR IC called MAGNUS with antenna senses temperature, moisture, pressure and proximity without an outside power source.
Do you get targeted when sitting in a car seat? You may have occupant location sensors in your car seats that tell transmitters you are there.
The grid is used for surveilllance and operating the BAN.
A smart grid is an electrical grid which includes a variety of operational and energy measures including smart meters, smart appliances, renewable energy resources, and energy efficiency resources. Electronic power conditioning and control of the production and distribution of electricity are important aspects of the smart grid.
Smart grid policy is organized in Europe as Smart Grid European Technology Platform. Policy in the United States is described in 42 U.S.C. ch. 152, subch. IX § 17381.
Roll-out of smart grid technology also implies a fundamental re-engineering of the electricity services industry, although typical usage of the term is focused on the technical infrastructure.
The main components of a Smart Grid (Figure 1) are electric power generators, electric power substations, transmission and distribution lines, controllers, smart meters, collector nodes, and distribution and transmission control centers
Networks, are now using IP based, interconnected networks to transmit Supervisory Control and Data Acquisition (SCADA) messages. SCADA protocols were not designed with security in mind. Therefore, in order to enhance security, access control and risk mitigation, operators need detailed and accurate information about the status, integrity, configuration and network topology of SCADA devices. This paper describes a comprehensive system architecture that provides situational awareness (SA) for SCADA devices and their operations in a Smart Grid environment. The proposed SA architecture collects and analyzes industrial traffic and stores relevant information, verifies the integrity and the status of field devices and reports identified anomalies to operators.
A Situational Awareness Architecture for the Smart Grid
January 2012, Anastasia Mavridou, Mauricio Papa
A smart meter is an electronic device that records consumption of electric energy and communicates the information to the electricity supplier for monitoring and billing. Smart meters typically record energy hourly or more frequently, and report at least daily. Smart meters enable two-way communication between the meter and the central system. Such an advanced metering infrastructure (AMI) differs from automatic meter reading (AMR) in that it enables two-way communication between the meter and the supplier. Communications from the meter to the network may be wireless, or via fixed wired connections such as power line carrier (PLC). Wireless communication options in common use include cellular communications (which can be expensive), Wi-Fi (readily available), wireless ad hoc networks over Wi-Fi, wireless mesh networks, low power long range wireless (LORA), ZigBee (low power low data rate wireless), and Wi-SUN (Smart Utility Networks).
Home automation or domotics is building automation for a home, called a smart home or smart house. A home automation system will control lighting, climate, entertainment systems, and appliances. It may also include home security such as access control and alarm systems. When connected with the Internet, home devices are an important constituent of the Internet of Things.
A home automation system typically connects controlled devices to a central hub or "gateway". The user interface for control of the system uses either wall-mounted terminals, tablet or desktop computers, a mobile phone application, or a Web interface, that may also be accessible off-site through the Internet.
While there are many competing vendors, there are very few worldwide accepted industry standards and the smart home space is heavily fragmented. Manufacturers often prevent independent implementations by withholding documentation and by litigation.
The home automation market was worth US$5.77 billion in 2013, predicted to reach a market value of US$12.81 billion by the year 2020.
Building automation is the automatic centralized control of a building's heating, ventilation and air conditioning, lighting and other systems through a building management system or building automation system (BAS). The objectives of building automation are improved occupant comfort, efficient operation of building systems, reduction in energy consumption and operating costs, and improved life cycle of utilities.
Building automation is an example of a distributed control system – the computer networking of electronic devices designed to monitor and control the mechanical, security, fire and flood safety, lighting (especially emergency lighting), HVAC and humidity control and ventilation systems in a building.
BAS core functionality keeps building climate within a specified range, provides light to rooms based on an occupancy schedule (in the absence of overt switches to the contrary), monitors performance and device failures in all systems, and provides malfunction alarms to building maintenance staff. A BAS should reduce building energy and maintenance costs compared to a non-controlled building. Most commercial, institutional, and industrial buildings built after 2000 include a BAS. Many older buildings have been retrofitted with a new BAS, typically financed through energy and insurance savings, and other savings associated with pre-emptive maintenance and fault detection.
A building controlled by a BAS is often referred to as an intelligent building, "smart building", or (if a residence) a "smart home". Commercial and industrial buildings have historically relied on robust proven protocols (like BACnet) while proprietary protocols (like X-10) were used in homes. Recent IEEE standards (notably IEEE 802.15.4, IEEE 1901 and IEEE 1905.1, IEEE 802.21, IEEE 802.11ac, IEEE 802.3at) and consortia efforts like nVoy (which verifies IEEE 1905.1 compliance) or QIVICON have provided a standards-based foundation for heterogeneous networking of many devices on many physical networks for diverse purposes, and quality of service and failover guarantees appropriate to support human health and safety. Accordingly, commercial, industrial, military and other institutional users now use systems that differ from home systems mostly in scale. See home automation for more on entry level systems, nVoy, 1905.1, and the major proprietary vendors who implement or resist this trend to standards integration.
Almost all multi-story green buildings are design t