5. DOMINATION OF THE ELECTROMAGNETIC SPECTRUM - TERAHERTZ TECH

- THE STATE HAS FAILED THE PEOPLE -

THEIR GREATEST STRENGTHS, HAVE BECOME THEIR GREATEST WEAKNESS', THEY RELY TOO MUCH ON THESE WEAPONIZED TECHNOLOGIES....

IT CAN BE BROUGHT DOWN! 


 

Can you help me FIND the COUNTER-MEASURES to these weaponized technologies to SAVE the PEOPLE from the ABUSIVE WAYS in WHICH THESE ROGUE STATE and CORPORATE SPONSORED TERRORIST SEEK TO USE THEM...
ANYONE FOR MASS CROWD CONTROL and MASS SUBJUGATION? 

(see below - Radio Frequency Spectrum Chart - All Biometrics, Surveillance, Jamming, along with UAV, to include Spy and Weapons Drones run off a specific frequency range.  1. You must be able to detect that frequency when it is near, similar to a bug sweeper device, used like a smoke detector - 2. Upon finding out what FREQUENCY RANGE it these WEAPONIZED TECHS run off of - need to build a COURTER-FREQUENCY DEVICE that can SCRAMBLE their CAPABILITIES - AND TAKE CONTROL OVER THE WEAPONS away from the CONTROLLER on THE GROUND., PAY CLOSE ATTENTION TO TERAHERTZ CAPABILITIES, BECAUSE THE LATEST IN SURVEILLANCE DETECTION WILL BE RUNNING OFF OF THIS FREQUENCY RANGE)

I KNOW I AM NOT! ?


Domination of the Electromagnetic Spectrum. DOD now emphasizes maximum control of the entire electromagnetic spectrum, including the capability to disrupt all current and future communication systems, sensors, and weapons systems. This may include: (1) navigation warfare, including methods for offensive space operations where global positioning satellites may be disrupted; or, (2) methods to control adversary radio systems; and, (3) methods to place false images onto radar systems, block directed energy weapons, and misdirect unmanned aerial vehicles (UAVs) or robots operated by adversaries.16

For example, recent military IO testing examined the capability to secretly enter an enemy computer network and monitor what their radar systems could detect. Further experiments tested the capability to take over enemy computers and manipulate their radar to show false images.17

Electromagnetic Non-Kinetic Weapons. Non-kinetic weapons emit directed electromagnetic energy that, in short pulses, may permanently disable enemy computer circuitry. For example, an electromagnetic non-kinetic weapon mounted in an aircraft, or on the ground, might disable an approaching enemy missile by directing a High Power Microwave (HPM) beam that burns out the circuitry, or that sends a false telemetry signal to misdirect the targeting computer.  Also, at reduced power, electromagnetic non-kinetic weapons can also be used as a non-lethal method for crowd control.


As a Targeted Individual, for me it has not just been about the Deployment of Department of Defense Tactics, in human intelligence, and civilian recruits who are instructed by these Organized Terrorist Team/Teams to execute various Organized Stalking and Mobbing operations for them. 

There are other layers and protocols taking place in reference to my Targeting, and it has to do with Computer Network Exploitation and Attack, Electronic Warfare and Electronic Harassment, all of which Harness' the Electromagnetic Spectrum - to include all cutting edge future Surveillance, Recognition Software, and Neurotechnologies.

I have sustained several attacks to Electronic and Electrical Devices such as Television, DVD, Cordless Phone, Printers, Computers systems, Internet Modems and Wireless Routers, Cable Box, Shredders, and other Household Electric Devices that run off the electrical grid. 

The following United States Military description Verbiage from INFORMATION OPERATIONS ROADMAP, 2003. 

The following is a list of Electronic Devices, which have either been replaced and/or repaired due to Signal Interferences, Shorted Out, all the way to complete destruction of the Electronic Devices - ALL ELECTRONIC TARGET PRACTICE by these State and Corporate Sponsored Terrorist's:

POSSIBLE PORTABLE DEVICE USED TO JAM OR DESTROY ELECTRONICS
http://www.bombjammer.com/

http://www.ndr-resource.com/solutions.asp?id=3

Personal Computer
Desktop Monitor
Logic Board of MAC Laptop
to include Two DVD Drives from same Laptop
Three Printers
Home DVD Player
Two Cordless Phones
Four Cell Phones
Two Shredders
Five Cable Modems
One Wireless Router
Three Cable Boxes

In addition to the following -


In less than four years the following has taken place in reference to internet and cable issues:
At three different residential locations -

Local 3 - Comcast has had to drop new lines from ground/pole back to building.  The last drop/pole run - also included the Public Utilities company - whereby, ELECTRICITY was COURSING through the CABLE LINE - the Utility Company had to come out to run new electrical lines from the main feed pole to the BUILDING,  the next day - the Cable company came out to also run new cables lines from the same main feed pole back to the building, due to the electricity running though the Comcast cable lines.  
Local 2 - At another local, once again, a new drop was necessary due to continued signal interference, from the ground to the building had completely new wiring

Local 3 - Once again, continued signal interference, to complete loss of signal, whereby Cable Box and Modem needed to be replaced.   Comcast had to send a technician, who then called another technician, who had to climb the pole to find in the main line feed from the pole across the street.  It ended up being a burnt out connector on the main feed box, up the pole.
 

What this also does is to Identify who would have access, and ability to do so much damage to my private property FIRING cutting edge  weaponzied technologies at my property and person.


Electronic Warfare (EW)

EW is defined by DOD as any military action involving the direction or control of electromagnetic spectrum energy to deceive or attack the enemy. High power electromagnetic energy can be used as a tool to overload or disrupt the electrical circuitry of almost any equipment that uses transistors, micro-circuits, or metal wiring.  Directed energy weapons amplify, or disrupt, the power of an electromagnetic field by projecting enough energy to overheat and permanently damage circuitry, or jam, overpower, and misdirect the processing in computerized systems. The Electronic Warfare Division of the Army Asymmetric Warfare Office has responsibility for creating electronic warfare policy, and for supporting development of new electromagnetic spectrum concepts that can be translated into equipment and weapons.

Domination of the Electromagnetic Spectrum. DOD now emphasizes maximum control of the entire electromagnetic spectrum, including the capability to disrupt all current and future communication systems, sensors, and weapons systems. This may include: (1) navigation warfare, including methods for offensive space operations where global positioning satellites may be disrupted; or, (2) methods to control adversary radio systems; and, (3) methods to place false images onto radar systems, block directed energy weapons, and misdirect unmanned aerial vehicles (UAVs) or robots operated by adversaries.16

For example, recent military IO testing examined the capability to secretly enter an enemy computer network and monitor what their radar systems could detect. Further experiments tested the capability to take over enemy computers and manipulate their radar to show false images.17

Electromagnetic Non-Kinetic Weapons. Non-kinetic weapons emit directed electromagnetic energy that, in short pulses, may permanently disable enemy computer circuitry. For example, an electromagnetic non-kinetic weapon mounted in an aircraft, or on the ground, might disable an approaching enemy missile by directing a High Power Microwave (HPM) beam that burns out the circuitry, or that sends a false telemetry signal to misdirect the targeting computer.  Also, at reduced power, electromagnetic non-kinetic weapons can also be used as a non-lethal method for crowd control.





Computer Network Exploitation(CNE). CNE is an area of IO that is not yet clearly defined within DOD.  Before a crisis develops, DOD seeks to prepare the IO battlespace through intelligence, surveillance, and reconnaissance, and through extensive planning activities. This involves intelligence collection, that in the case of IO, is usually performed through network tools that penetrate adversary systems to gain information about system vulnerabilities, or to make unauthorized copies of important files. Tools used for CNE are similar to those used for computer attack, but configured for intelligence collection rather than system disruption.

Computer Network Attack (CNA). CNA is defined as effects intended to disrupt or destroy information resident in computers and computer networks. As a distinguishing feature, CNA normally relies on a data stream used as a weapon to execute an attack. For example, sending a digital signal stream through a network to instruct a controller to shut off the power flow is CNA, while sending a high voltage surge through the electrical power cable to short out the power supply is considered Electronic Warfare (However, a digital stream of computer code or a pulse of electromagnetic power can both be used to also create false images in adversary computers).




TERAHERTZ TECHNOLOGY SCANNERS -
POSSIBLE WITH THIS TECHNOLOGY TO DETECT ILLEGAL HUMAN IMPLANTS AT THE NANO-SEMICONDUCTOR SCALE

DoD Novel Terahertz Source-
http://www.sbir.gov/sbirsearch/detail/192129


OTHER RESEARCH ON TERAHERTZ TECHNOLOGIES -

A new model of the way the THz waves interact with DNA explains how the damage is done and why evidence has been so hard to gather

Great things are expected of terahertz waves, the radiation that fills the slot in the electromagnetic spectrum between microwaves and the infrared. Terahertz waves pass through non-conducting materials such as clothes , paper, wood and brick and so cameras sensitive to them can peer inside envelopes, into living rooms and “frisk” people at distance.

EXAMPLE - FULL BODY SCANNERS CURRENTLY IN AIRPORT -

WHAT TARGET'S NEED is A HAND=HELD SCANNER SLIGHTLY MORE POWERFUL THAN THE FULL BODY SCANNERS - THAT CAN PICK UP ON RADIO FREQUENCIES - THAT RUN WITHIN THE TERAHERTZ RANGE -
Read more: http://www.darkgovernment.com/news/terahertz-scanner-waves-damage-dna/#ixzz1eGQHdxuK


http://www.ist-world.org/ProjectDetails.aspx?ProjectId=348ec15e6ba94c34ab5fb9bffe1796a8

INFARED CAMERAS ARE DESIGNED TO BE ABLE TO DETECT TERAHERTZ FREQUENCIES -

Components we are developing for our THz platform technology include high performance detectors based on nitride-based high electron mobility transistors (AlN/GaN HEMTs) and, a sophisticated camerafocal plane arrays. These components will be incorporated into systems such as hybrid THz microfluidic on-chip biosensors, advanced spectroscopy and imaging systems for biochemical and tissue analysis, and scanning near-field microscopy that provides high spatial and spectral resolution for studying different physical properties of nanostructure surfaces.


A variety of promising applications exist across a range of industries, including:
Enhanced cancer diagnostics, both for shallow/surface cancers and biopsied tissue Real-time detection and identification of disease biomarkers, DNA, pathogens, toxins and chemical toxins Enhanced safety and quality control, such as detecting surface defects in materials, impurities in pharmaceuticals and traces of explosive elements and identifying concealed objects (for example, airport security)


http://www.physnews.com/physics-news/cluster87533652/


ċ
HOWTOBUILDASCANNINGDEVICETerahertz(THz)TechnologiesforMedicalImagingandMolecularDetection--AdvancedDiagnosticsandTherapeutics--UniversityofNotreDame”.zip
(148k)
aldamysteriosa1,
Nov 20, 2011, 9:48 AM
ċ
LawandNeuroscienceFactSheetParticipatingUniversities.zip
(115k)
aldamysteriosa1,
Nov 22, 2011, 6:10 PM
ċ
RFSPECTRUMCHART.zip
(126k)
aldamysteriosa1,
Dec 6, 2011, 3:07 PM
ċ
TERAHERTZSCANNINGTECHNOLOGY.zip
(280k)
aldamysteriosa1,
Nov 20, 2011, 9:48 AM
ċ
THz-BRIDGEFinalReport.pdf.zip
(1905k)
aldamysteriosa1,
Nov 20, 2011, 9:48 AM
ċ
THzBRIDGEProjectSummary_final.pdf”.zip
(129k)
aldamysteriosa1,
Nov 20, 2011, 9:48 AM
ċ
TerahertzDetectorsCouldSeeThroughYourClothesFromaMileAway|WiredScience|Wired.com”.zip
(541k)
aldamysteriosa1,
Nov 20, 2011, 10:24 AM
ċ
TerahertzRemoteSensingDetectors-ScienceFictionintheNews”.zip
(458k)
aldamysteriosa1,
Nov 20, 2011, 10:16 AM
ċ
Terahertzdetectsfromadistance.zip
(400k)
aldamysteriosa1,
Nov 20, 2011, 10:25 AM
ċ
Terahertzhelpsdetection|HomelandSecurityNewsWire”.zip
(246k)
aldamysteriosa1,
Nov 20, 2011, 9:49 AM