Sunday, February 11, 2024

Human Experimentation - The Nuremberg Code

Please see here about laws that are being violated in Canada --- all of this is being covered up. 

Wednesday, November 29, 2023

Targeted Individual Program is US Special Operations Command’s “Continuous Clandestine Tagging, Tracking, and Locating Hostile Forces


Click on Links Below to Read the
 Government Documents


The following seven power point presentations made by and for US Special Operations Command (USSOCOM) and their military and corporate partners clearly describe and detail the “technology,” systems, and personnel behind the “organized stalking-electronic torture program." 

These power point presentations indicate that this new form of unconventional warfare/low intensity conflict being covertly waged against civilians placed on the Terrorism Watch List under the pretext of the so-called “War on Terrorism” is actually “multi-domain warfare.”

The following terms and technologies, depicted in these power point presentations, strongly suggest that so-called “Clandestine Tagging, Tracking, and Locating (CTTL)”, later termed “Hostile Forces- Tagging, Tracking, and Locating (HF-TTL), is the USAP (Unacknowledged Special Access Project) commonly referred to as the Targeted Individual Program/Organized Stalking-Electronic Harassment. 

Furthermore, TIs are obviously the expendable guinea pigs/test subjects for development of these technologies:

1) Tagging, Tracking, and Locating Human (High-value) targets aka “hostile forces” to support the Global War On Terrorism (GWOT)
2) Technologies include:
Nanotechnology (including Quantum Dot and Self-assembled Photonic Antenna)
Biotechnology (including “biomimetic devices for detection and identification at long distances” and “Taggants for Biological Signature Amplification, Translation,”)
Chemistry (including “signature enhancing Taggants” and “chemical/biochemical sensors for natural signatures”)
3) Participating agencies include: DARPA, Army Research Lab, NSA, DIA, CIA, Homeland Security, FBI,  Air Force Research Lab, DOE, and Industry
4) Human signature detection via skin spectral emissivity's, thermal fingerprints at long distance
5) fieldable “bio-electronics”
6) bio-engineered signature translation and bio-reactive taggant (implant)
7) self-assembled photonic antennae
8) biometrics and tactical site exploitation (forensics)
9) Operation “Silent Dagger” 
10) Ground SIGINT (Signals Intelligence) Kit (GSK)
11) Joint Threat Warning Systems from the Air, Land, and Sea
12) RF (radio-frequency) and non-traditional (eg., optical/multi-band) Tags and R/Xs
13) “synchronize acquisition of signals intelligence (SIGINT) capabilities across the air, ground and maritime (warfare) domains”
14) SPECIAL RECONNAISSANCE, SURVEILLANCE, AND EXPLOITATION
15) Blue Force Tracking (BFT)
16) Special Operations Tactical Video Systems (SOTVS)
17) Sensitive Site Exploitation (SSE)
18) tiny satellites that keep tabs on targets from above (SpaceX rocket carrying the CubeSats—inexpensive satellites so small they can fit in the palm of your hand)
19) tracking satellites are part of the growing Special Operations focus on “high-value target” missions
20) tracking tags on enemies including radio frequency identification devices, quantum dots that could be used to track a singe molecule, and tagging measures such as insect pheromones
To acquire the high-value human “targets” needed to test and develop these clandestine weapons systems, the US government, through the FBI-DHS Fusion Centers and Neighborhood Watch Programs among others, has mislabeled innocent citizens as “terrorists” and “hostile forces.” Thus, ALL involved in these operations are complicit in “crimes against humanity,” “war crimes,” murder, attempted murder, torture, terrorism, and TREASON. These individuals and institutions are the real terrorists and they are TRAITORS!

These programs are funded via American tax dollars and deploy regular and irregular (citizen-based agents) forces as well as special forces against innocent citizens.

I. US Special Operations Command: Continuous Clandestine Tagging, Tracking, and Locating (CTTL)


by Doug Richardson SOAL-T WSO, Sept. 5, 2007

Also at: Continuous Clandestine Tagging, Tracking, and Locating (CTTL) Mr. Doug Richardson SOAL-T WSO5 September 2007 US Special Operations Command

Mr. Doug Richardson SOAL-T WSO 5 September 2007. The overall classification of this briefing is: UNCLASSIFIED and Locating (CTTL) The Ability to Locate, Track, and Identify Human Beings.

Highlights From PPT:

p. 3: Continuous Clandestine Tagging, Tracking, and Locating (CTTL)

– The Ability to Locate, Track, and Identify Human Beings and Other Important Targets

- Directly Supports DoD’s Ability to Prosecute the Global War on Terrorism (GWOT)

- Forces Require an Ability to Apply and Monitor Tags

- Detect and Identify Targets Based on Their Unique Observable Characteristics Without Undue Exposure of Personnel to Risks and With Devices That are Sufficiently Clandestine to be Effective.

p. 4: Partnership between Assistant Secretary of Defense for Special Operations and Low Intensity Conflict (ASD SO/LIC), USSOCOM, and U.S. Army

- Objective: Conduct a Collaborative Effort to Develop New Capabilities for Clandestine Tagging, Tracking, and Locating in Response to Priorities Established in a Quick-look Capability-based Assessment Conducted in Response to the Findings of the QDR

- Approach: Transition Existing State-of-the-Art Technologies in Nanotechnology, Chemistry, and Biology to Operational Systems Through the USSOCOM Acquisition Process and Conduct RDT&E From Basic Research Through Prototyping to Provide Continuous Improvements in the CTTL Technology Available for Transition to the Operators. Specific Capability Projections Are Classified.

p. 7: CTTL– Key Enabling Technologies

- Nanotechnology

Clandestine Devices
High Functional-density Devices
Self-organizing, Self-deploying Devices
Processing and Communications
Energy Harvesting

Biotechnology

Biomimetic Devices for Detection and Identification (ID) at Long Distance Bio-based Devices for Detection and ID at Long Distance Taggants for Biological Signature Amplification, Translation Natural Signature Detection and ID

Chemistry

Signature Enhancing Taggants
Chemical/Biochemical Sensors for Natural Signatures

p. 8: CTTL– Partnership for Transition–

- DDR&E and USSOCOM AE Executive Sponsorship and Oversight
- USSOCOM Transition

PEO-Special Projects
PEO-Intelligence and Information Systems

- Collaborative Execution of S&T

DoD Service Laboratories
Defense Advanced Research Projects Agency (DARPA)
ASD(SO/LIC) Coordinated Investments
Intelligence Community Research Organizations
DOE Laboratories

p. 13: CTTL — Human Signature Detection

- Skin Spectral Emissivity's Measured
- Thermal Fingerprints Determined
- “Target” Reacquired 90 Minutes Later

Goal: Verification of Capability and Operational Value Within 2 Years

Human Thermal Fingerprint at Long Distance

p. 14: CTTL –Human Signature Detection —

Goal: Demonstration of Fieldable “Bioelectronics” Within 5 Years

Synthetic Dog’s Nose Sensor


p. 15: CTTL — Signature Amplification/Translation

Bioengineered Signature Translation Bio-reactive Taggant
Goal: Move Basic Research to Advanced Development in 3 Years

Current Capability – Bioengineered Signature Translation

p. 16: CTTL — Nano-scale Devices

Quantum Dots
Goal : Micro-scale in 12 Months, Nano-scale in 4 to 5 Years
Self-assembled Photonic Antenna

II. UNCLASSIFIED Mr. Douglas Richardson Program Executive Officer SPECIAL RECONNAISSANCE, SURVEILLANCE, AND EXPLOITATION

III. SPECIAL RECONNAISSANCE Mr. David Breede, Program Executive Officer SPECIAL OPERATIONS FORCES INDUSTRY CONFERENCE EXPANDING THE COMPETITIVE SPACE

We are Hackable Animals

There you go. No more rights. Here is the wikipedia of the guy that is featured in the top video below.  In the bottom video is Sergey Brin, the co-founder of Google along with Klaus Schwab, the founder of the World Economic Forum. Have you ever seen the movie the Circle, which is loosely based upon Google? Remember the Google Chrome circle? Do you remember in the movie how they were following the guy around? This is organized stalking

The guy in the top video is Dr Yuval Noah Harari, see interviews with him herehere, and here with James Altucher. I have written previously about James Altucher herehere, and here, The video proves what I am saying. James is a computer scientist, Yuval isn't, but he knows about this. (It is worth mentioning, James is not the only one covering this up.)


Hacking Humans

Watch video below, see past videos from this same hacker here. Also, see the screenshot of his company below the video. He works with Homeland Security, so the US government should probably know about this technology.  He also works with Honeywell, a major military contractor that is involved with augmented cognition




Dr Yuval Noah Harari WE CAN HACK INTO PEOPLE - THEY ARE DOING IT NOW!

See past video here with Dr Yuval Noah Harari. Remember, this video is from the World Economic Forum. They are doing this now... end of story, this is real. No more lying. 

 

Tuesday, November 28, 2023

Nanotechnology: Hacking Humans, Its Potential, and Real Risks

See here for more about nanotechnology. (Scroll down and read all the articles.) This is also what I have been saying about using viruses to get this in your body. (Also see here.) It has become so sophisticated it can also be introduced with dust. See the movie "Gamer" when they talk about this. Also, see this video about injecting a brain-computer interface into your body through your leg (starting at 4:32 into the video,) also see here

Neural Dust Implanted in the Body Without Surgery Could Monitor or Stimulate Internal Muscles, Organs, Nerves or Brain in Real-Time






Neuroscientist Dr James Giordano. Neuro-Weapons. Directed Energy Weapons. Brain Implants

See here for more about smart dust, see here for more about nanotechnology and the brain. 

Latest Articles On Torturing People With Technology That is Covered Up- David Salinas Flores- Faculty of Medicine Universidad Nacional Mayor de San Marcos, Peru

Below are three interesting articles, read them all. Also, watch this documentary about experimenting on people with classified technology. Pure evil. The intelligence agencies and many police officers of the western world are very aware of this technology. See here for more about Homeland Security. This is how truly sick our countries are. They rule over us and they work with criminals.

2. The secret of neuroscience boom: are there secret human experiments in Latin América?
3. Transhumanism: the big fraud-towards digital slavery

Also, read this past article here:  Slavery By Satellite - Must Read Article From Academics