The Red Echelon – NSA

Reblogged from: bibliotecapleyades.net

1.THE NSA’S MISSION AND DOMESTIC INTELLIGENCE OPERATION

Communications Intelligence (COMINT)

Blanket coverage of all electronic communications in the US and the world to ensure national security. The NSA at Ft Meade, Maryland has had the most advanced computers in the world since the early 1960s.

NSA technology is developed and implemented in secret from private corporations, academia and the general public.

Signals Intelligence (SIGINT)

The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and track persons with the electrical currents in their bodies. Signals Intelligence is based on fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves.

The NSA/DoD [Department of Defense] developed proprietary advanced digital equipment which can remotely analyze all objects whether manmade or organic, that have electrical activity.

Domestic Intelligence (DOMINT)

The NSA has records on all US citizens. The NSA gathers information on US citizen who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent national security anti-terrorist surveillance network in place. This surveillance network is completely disguised and hidden from the public.

Tracking individuals in the US is easily and cost-effectively implemented with NSA’s electronic surveillance network. This network (DOMINT) covers the entire US, involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously . Cost-effective implementation of operations is assured by NSA computer technology designed to minimize operations costs. NSA personnel serve in quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track.

NSA personnel in the community usually have cover identities such as social workers, lawyers and business owners.

Individual Citizens Occasionally Targeted for Surveillance by Independently Operating NSA Personnel
NSA personnel can control the lives of hundreds of thousands of individuals in the US by using the NSA’s domestic intelligence network and cover businesses.

The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen.

NSA DOMINT has the ability to assassinate US citizens covertly or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.

The above symptoms highlight a fraction of the vast array of
Neuro-Electromagnetic Frequency Assaults perpetuated by the Police and
Military Intelligence Agencies toward
Remote Mind Control Experiments, Behavioral Manipulation and Murder.

2. NSA’S DOMESTIC ELECTRONIC SURVEILLANCE NETWORK

As of the early 1960s, the most advanced computers in the world were at the NSA, Ft Meade. Research breakthroughs with these computers were kept for the NSA. At the present time the NSA has nanotechnology computers that are 15 years ahead of present computer technology. The NSA obtains blanket coverage of information in the US by using advanced computers that use artificial intelligence to screen all communications, regardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists.

These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the US is a result of the NSA’s Signals Intelligence (SIGINT) mission. The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF (electromagnetic frequency) spectrum.

This equipment was developed, implemented and kept secret in the same manner as other electronic warfare programs.

Signals Intelligence Remote Computer Tampering

The NSA keeps track of all PCs and other computers sold in the US. This is an integral part of the Domestic Intelligence network. The NSA’s EMF equipment can tune in RF (remote frequency) emissions from personal computer circuit boards (while filtering out emissions from monitors and power sup- plies).The RF emission from PC circuit boards contains digital information in the PC. Coded RF waves from the NSA’s equipment can resonate PC circuits and change data in the PCs. Thus the NSA can gain wireless modem-style entry into any computer in the country for surveillance or anti-terrorist electronic warfare.

Detecting EMF Fields in Humans for Surveillance

A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMFequipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance. NSA personnel can dial up any individual in the country on the Signals Intelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours a day.The NSA can pick out and track anyone in the US.

3. NSA SIGNALS INTELLIGENCE USE OF EMF BRAIN STIMULATION

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKULTRA program of the early 1950s, which included neurological research into radiation (non-ionizing EMF) and bioelectric research and development.

The resulting secret technology is categorized at the National Security Archives as “Radiation Intelligence“, defined as, “information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation”.

Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the US Government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyze electrical activity in humans from a distance. NSA computer generated brain mapping can continuously monitor all of the electrical activity in the brain continuously. The NSA records and decode individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for brain-to-computer link (in military fighter aircraft, for example).

For electronic surveillance purposes, electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex, thus allowing audio communications direct to the brain (bypassing the ears). NSA operatives can use this covertly to debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia.

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves.

NSA operatives can use this surreptitiously to put images into a surveillance subject’s brain while they are in REM sleep for brain-programming purposes.

Capabilities of NSA Operatives Using RNM There has been a Signals Intelligence network in the US since the 1940s. The NSA, Ft Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brains. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech, 3D sound and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears), and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods and motor control.Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.

The above is a simple flowchart of Nuero-Electromagnetic Frequency Assaults showing methods that can be perpetuated by the Police and Military Intelligence Agencies toward Remote Mind Control Experiments, Behavioural Manipulation and Murder.

4. NATIONAL SECURITY AGENCY SIGNALS INTELLIGENCE ELECTRONIC BRAIN LINK TECHNOLOGY

NSA SIGINT can remotely detect, identify and monitor a person’s bioelectric fields.

The NSA’s Signals Intelligence has the proprietary ability to monitor remotely and non-invasively information in the human brain by digitally decoding the evoked potentials in the 30-50 Hz, 5 milliwatt electromagnetic emissions from the brain.

Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 Hz, 5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called “evoked potentials”. Every thought, reaction, motor command, auditory event and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials”. The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain.

NSA SIGINT uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level).

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control.

Two-way electronic Brain Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes). The images appear as floating 2D screens in the brain.

Two-way electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote neural monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system.

It is used by a limited number of agents in the US Intelligence Community.

Advertisements

~ by blombladivinden on October 26, 2012.

4 Responses to “The Red Echelon – NSA”

  1. Two Dead Shot Down by Domestic Surveillance Helicopter. Stalked Down Like Texas Wild Feral Hogs! http://tsmfi.blogspot.com/2012/10/class-action-law-suit-texas-fusion.html   Nobody Saw This Comimg? Two Dead Shot Down by Domestic Surveillance Helicopter. Stalked Down Like Texas Wild Feral Hogs!  http://iamnotanonymousihaveaname.blogspot.com/2012/01/texas-governor-rick-perry-attacks-his.html

    • Greg – your comment below is blocked – and impossible to publish the ordinary way, so I do it this way instead.

      Take Care!

      Bain & Co. Mitt Romney Human Experimentation Electronic Political Control. Mitt Wins Means Back to the George Bush Futures “The Bible Says” Linguistic Biometric Profiles. “Suspensions are on the rise as Private Security Firms And Corporations who account for the majority of spending for National Security Intelligence (Mitt Romney Domestic Surveillance) could very well be bias to a point of retaliating against an Obama Administration that is working hard to build safeguards by regulating Wall Street from another Republican “Global Economic Crisis!” Certainly, you have heard the argument, when someone makes the statement; “The Bible Says” the counter is “The Bible is a book, incapable of saying anything.” These arguments are not helpful to intelligence operations, because they are surrounded with a mind field of linguistic determinants. This is why professional investigators of analytical expressions fail so often, and data applications built on their word schemas are totally inaccurate. Few people know, the turning point of war World II for the allies, was the decoding of a German Printed bible that was embedded with an 8 character alphanumeric code, which was identified and decoded in less than 24 hours by two allies living in the Punjab. http://educationbalancedhealthymeaningfullif.blogspot.com/2012/10/mitt-romney-electronic-political-control.html

  2. Reblogged this on msarroub.

  3. Do you really think that RNM technology is so advanced that you could actually do this?
    “Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves.”
    How? You would need to have a simulation of the visual cortex in the computer along with some other functions of the brain. All my research shows that you could not yet translate or broadcast the images from the brain. It doesn’t seem this would be yet possible to do. “NSA operatives see what the surveillance subject’s eyes are seeing.” Are they seeing what a person sees (the real time object), or what person sees with the mind’s eye? I can see the nice dress and envision this dress on my body or see the dress and envision slightly different design that would be better. So what do NSA operatives see, the real dress one is looking at or the dress that is bouncing around my thoughts with revisions–the dress modified with my mind’s eye?

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

 
%d bloggers like this: