CONTENTS :
INTRO , DODIN (GIG) , WHAT IS NET-CENTRIC WARFARE , STANDARDS , WIRELESS SENSOR NETWORKS (WSN),
WIRELESS BODY AREA NETWORKS , ELECTRONIC WARFARE , CEMA CYBER WARFARE , DRONE KILLS COMMUNICATIONS
BARRIE TROWER , MARK STEELE , LEN BER MD , ACTIVE DENIAL SYSTEM (ADS) , DIRECT ENERGY WEAPONS (DEW)
BILL BINNEY & KATHERINE HORTON , ELECTROMAGNETIC INTERFERANCE , ARTIFICIAL INTELLIGENCE (AI)
INTRO , DODIN (GIG) , WHAT IS NET-CENTRIC WARFARE , STANDARDS , WIRELESS SENSOR NETWORKS (WSN),
WIRELESS BODY AREA NETWORKS , ELECTRONIC WARFARE , CEMA CYBER WARFARE , DRONE KILLS COMMUNICATIONS
BARRIE TROWER , MARK STEELE , LEN BER MD , ACTIVE DENIAL SYSTEM (ADS) , DIRECT ENERGY WEAPONS (DEW)
BILL BINNEY & KATHERINE HORTON , ELECTROMAGNETIC INTERFERANCE , ARTIFICIAL INTELLIGENCE (AI)
Intro
The comparison between the Smart IoT infrastruture and Network-Centric Warfare (NCW) reveals distinctive parallels in technological application and strategic intent, raising questions about privacy, security, and ethical implications in our increasingly interconnected world. Both employs similar technologies for enhanced situational awareness, automation, interconnectivity, resource management, and data security, showcasing how civilian technologies can mirror or be adapted for military strategies and vice versa.
This revelation is pivotal to the Targeted Individual operation which is widely regarded a sham, yet the "netcentric-warfare" features that include reconnaissance, espionage, psychological operations, electronic warfare, directed-energy weapons (DEW), and target and kill, though intentional in its field, can covertly be applied to the civilian smart city framework which already possesses the technical capabalities to do so.
DODIN formerly ( The Global Information Grid G.I.G )
Department of Defense (DoD) Strategic Spectrum Plan
https://www.ntia.doc.gov/files/ntia/publications/dod_strategic_spectrum_plan_nov2007.pdf Global Information Grid https://en.wikipedia.org/wiki/Global_Information_Grid DoDIN Official https://www.jfhq-dodin.mil/ |
The DoDIN (Department of Defense Information Network), formerly known as the Global Information Grid (GIG), is essentially a vast, interconnected network that supports the U.S. Department of Defense's operations. It's a comprehensive system that includes all the military's communication and information capabilities, from computers to satellites, designed to share information across different branches and levels of command. Netcentric warfare relates to this by leveraging this network to enhance military operations through real-time information sharing, enabling forces to be more coordinated, responsive, and effective in combat situations. The principles of having a central communications system to facilitate command, control, intelligence, surveillance and reconnaissance (C4ISR) are implemented by Militaries worldwide to enhance operational effectiveness.
|
What is Netcentric-Warfare?
Netcentric warfare is a strategy where sharing information across a network is key to gaining an operational edge. It connects sensors, decision-makers, and engagement units ( infantry, armoured units, air combat units, naval units, "Special operations forces" etc ) providing a real-time, comprehensive view of the battlefield. This integration speeds up decision-making and enhances coordination, allowing for better situational awareness, quicker adaptation to changes, and more precise military actions. By linking all elements of the military through technology, netcentric warfare shifts from traditional command hierarchies to a dynamic, information-driven approach, where the rapid dissemination of knowledge directly impacts combat outcomes.
Special Operations Forces (SOF) are elite military units trained to conduct high-stakes, specialized missions that require precision, stealth, and strategic impact, often in environments where conventional forces are less effective. Their roles are diverse, encompassing direct action, intelligence operations, and support for allied forces, all aimed at achieving national security objectives with minimal footprint. Some of the Roles of Special Operations Forces:
Direct Action: Conducting raids, ambushes, and targeted strikes.
Special Reconnaissance: Gathering critical intelligence in hostile areas.
Unconventional Warfare: Supporting insurgencies or resistance movements against hostile governments.
Foreign Internal Defense: Training and advising foreign militaries.
Psychological Operations (PSYOP): Influencing enemy behavior or local populations.
Information Operations: Managing and exploiting information for strategic advantage.
Cyber Operations: Engaging in digital warfare.
Espionage: Gathering intelligence through covert means.
Counterintelligence: Protecting against enemy espionage and deception operations.
Direct Action: Conducting raids, ambushes, and targeted strikes.
Special Reconnaissance: Gathering critical intelligence in hostile areas.
Unconventional Warfare: Supporting insurgencies or resistance movements against hostile governments.
Foreign Internal Defense: Training and advising foreign militaries.
Psychological Operations (PSYOP): Influencing enemy behavior or local populations.
Information Operations: Managing and exploiting information for strategic advantage.
Cyber Operations: Engaging in digital warfare.
Espionage: Gathering intelligence through covert means.
Counterintelligence: Protecting against enemy espionage and deception operations.
The Tactics reported by Targeted Individuals (TIs), such as covert surveillance, smear campaigns, gang stalking, electronic harassment with directed-energy weapons (DEWs), sabotage, and psychological manipulation, closely mirror the operational roles of Special Operations Forces (SOF), including reconnaissance, psychological operations (PSYOP), direct action-electronic warfare, cyber operations, espionage, and counterintelligence. While SOF employs military-grade tools and operatives, TI narratives describe similar mechanics executed by civilian actors, suggesting a parallel application of strategic methods.
Netcentric warfare https://en.wikipedia.org/wiki/Network-centric_warfare
Network-Centric Warfare: A New War Theory Emerging in the Information Age
https://www.unrevealedfiles.com/network-centric-warfare-a-new-war-theory-emerging-in-the-information-age/
INTRODUCTION TO SPECIAL OPERATIONS
https://irp.fas.org/agency/dod/socom/sof-ref-2-1/SOFREF_Ch1.htm
Special Operations https://en.wikipedia.org/wiki/Special_operations
Network-Centric Warfare: A New War Theory Emerging in the Information Age
https://www.unrevealedfiles.com/network-centric-warfare-a-new-war-theory-emerging-in-the-information-age/
INTRODUCTION TO SPECIAL OPERATIONS
https://irp.fas.org/agency/dod/socom/sof-ref-2-1/SOFREF_Ch1.htm
Special Operations https://en.wikipedia.org/wiki/Special_operations
STANDARDS
In today's globally interconnected world, standardization plays a vital role in ensuring compatibility, safety, efficiency, and innovation across various industries. Numerous international organizations are dedicated to creating, maintaining, and promoting standards that transcend national boundaries. These bodies work collaboratively to address the complex needs of technology, health safety, and environmental concerns. Here's an overview of some of the most influential global standardization organizations that work collaboratively to ensure standards meet global needs. Each has unique contributions to the standardization landscape:
ISO (International Organization for Standardization): ISO is perhaps the most widely recognized body for international standards, developing and publishing standards in nearly every industry from technology to food safety.
IEC (International Electrotechnical Commission): specializes in electrotechnology and electrical engineering standards, often in collaboration with ISO (forming ISO/IEC for joint standards).
ITU (International Telecommunication Union): A United Nations specialized agency for information and communication technologies, covering aspects like radio spectrum management, satellite orbits, and telecom standards.
IEEE (Institute of Electrical and Electronics Engineers): Focuses on electrical engineering, electronics, and related disciplines, with standards that often lead to widespread industry adoption.
IETF (Internet Engineering Task Force): An open standards organization that develops technical standards for the Internet, particularly focusing on protocols and architecture.
3GPP (3rd Generation Partnership Project): Develops standards for mobile telecommunications, including GSM, UMTS, LTE, and now 5G
ISO (International Organization for Standardization): ISO is perhaps the most widely recognized body for international standards, developing and publishing standards in nearly every industry from technology to food safety.
IEC (International Electrotechnical Commission): specializes in electrotechnology and electrical engineering standards, often in collaboration with ISO (forming ISO/IEC for joint standards).
ITU (International Telecommunication Union): A United Nations specialized agency for information and communication technologies, covering aspects like radio spectrum management, satellite orbits, and telecom standards.
IEEE (Institute of Electrical and Electronics Engineers): Focuses on electrical engineering, electronics, and related disciplines, with standards that often lead to widespread industry adoption.
IETF (Internet Engineering Task Force): An open standards organization that develops technical standards for the Internet, particularly focusing on protocols and architecture.
3GPP (3rd Generation Partnership Project): Develops standards for mobile telecommunications, including GSM, UMTS, LTE, and now 5G
Who is behind this agenda
https://www.biodigcon.com/who-s-behind-this-agenda
10 Standards Organizations That Affect You (Whether You Know It Or Not)
https://www.electronicdesign.com/technologies/communications/article/21796419/10-standards-organizations-that-affect-you-whether-you-know-it-or-not
Standards Organizations
https://www.informit.com/articles/article.aspx?p=24687&seqNum=7
https://www.biodigcon.com/who-s-behind-this-agenda
10 Standards Organizations That Affect You (Whether You Know It Or Not)
https://www.electronicdesign.com/technologies/communications/article/21796419/10-standards-organizations-that-affect-you-whether-you-know-it-or-not
Standards Organizations
https://www.informit.com/articles/article.aspx?p=24687&seqNum=7
Introduction to IEEE Internet of Things (IOT) and Smart Cities
https://standards.ieee.org/wp-content/uploads/import/documents/other/geps_07-iot_smart_cities.pd
https://standards.ieee.org/wp-content/uploads/import/documents/other/geps_07-iot_smart_cities.pd
Wireless Sensor Networks (WSNs) are ubiquitous in modern technology, seamlessly integrating into a vast array of applications. They consist of spatially distributed autonomous sensors that monitor physical or environmental conditions like temperature, sound, pollution levels, or motion.
In agriculture, WSNs optimize irrigation and crop health by collecting data on soil moisture and weather conditions. In smart homes, they manage lighting, temperature, and security systems.
Urban areas employ WSNs for traffic management, air quality monitoring, and disaster response.
In healthcare, they remotely track patient vitals for remote health monitoring.
Industrial settings use them for predictive maintenance, ensuring machinery operates efficiently by detecting anomalies in real-time.
In the military context, WSNs are crucial for battlefield surveillance, target acquisition, reconnaissance, and monitoring troop movements, providing strategic advantages through real-time data collection and analysis. However wireless sensor networks are vulnerable to various kinds of attacks like "node capturing", "eavesdropping in communication links" and the "man in the middle."
IEEE Security for wireless sensor networks in military operations
https://ieeexplore.ieee.org/document/6726654
IEEE Military Operations: Wireless Sensor Networks based Applications to Reinforce Future Battlefield Command System
https://ieeexplore.ieee.org/document/9318168
A review of wireless sensor networks and its applications
https://ieeexplore.ieee.org/document/6308240
Overview of Protocols and Standards for Wireless Sensor Networks in Critical Infrastructures
https://www.mdpi.com/1999-5903/16/1/33
Standards for Wireless Sensor Networks in Critical Infrastructures
https://encyclopedia.pub/entry/54228
In agriculture, WSNs optimize irrigation and crop health by collecting data on soil moisture and weather conditions. In smart homes, they manage lighting, temperature, and security systems.
Urban areas employ WSNs for traffic management, air quality monitoring, and disaster response.
In healthcare, they remotely track patient vitals for remote health monitoring.
Industrial settings use them for predictive maintenance, ensuring machinery operates efficiently by detecting anomalies in real-time.
In the military context, WSNs are crucial for battlefield surveillance, target acquisition, reconnaissance, and monitoring troop movements, providing strategic advantages through real-time data collection and analysis. However wireless sensor networks are vulnerable to various kinds of attacks like "node capturing", "eavesdropping in communication links" and the "man in the middle."
IEEE Security for wireless sensor networks in military operations
https://ieeexplore.ieee.org/document/6726654
IEEE Military Operations: Wireless Sensor Networks based Applications to Reinforce Future Battlefield Command System
https://ieeexplore.ieee.org/document/9318168
A review of wireless sensor networks and its applications
https://ieeexplore.ieee.org/document/6308240
Overview of Protocols and Standards for Wireless Sensor Networks in Critical Infrastructures
https://www.mdpi.com/1999-5903/16/1/33
Standards for Wireless Sensor Networks in Critical Infrastructures
https://encyclopedia.pub/entry/54228
1. Military WSN , 2. Enviromental WSN, 3. Home WSN
https://microcontrollerslab.com/wireless-sensor-networks-wsn-applications/
https://microcontrollerslab.com/wireless-sensor-networks-wsn-applications/
Wireless Body Area Networks (WBANs) are significant in modern healthcare for remote monitoring and managing patient health, but they come with significant security concerns. The primary issue is the vulnerability to data interception; since WBANs transmit sensitive health data wirelessly, there's a risk of this information being captured by malicious entities. This could lead to privacy breaches where personal health information is exploited. Additionally, because these devices often operate close to the body, they are susceptible to physical tampering or signal jamming, which could disrupt medical care or alter sensor data. Another concern is the potential for unauthorized access, where hackers might control or manipulate medical devices, leading to incorrect treatment, intentional maiming and harm.
IEEE Wireless Body Area Networks and Their Applications – A Review
https://www.researchgate.net/publication/367372277_Wireless_Body_Area_Networks_and_Their_Applications_-_A_Review
IEEE Wireless body area network security issues — Survey
https://ieeexplore.ieee.org/document/7987943
IEEE Wireless Body Area Networks and Their Applications – A Review
https://www.researchgate.net/publication/367372277_Wireless_Body_Area_Networks_and_Their_Applications_-_A_Review
IEEE Wireless body area network security issues — Survey
https://ieeexplore.ieee.org/document/7987943
1. Implanted sensors 2. Wban Communication Tiers Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications https://www.sciencedirect.com/science/article/pii/S1110866516300482 |
|
The Wireless body area networks (WBAN) has been around since 1995 and developing eversince. One can only speculate what state the technology is at today 2025.
|
1. WIRELESS BODY AREA NETWORK STARTED AROUND 1995 https://en.wikipedia.org/wiki/Body_area_network
2. IEEE SPECTRUM ARTICLE Wireless monitoring devices will improve hospital care and make way for continuous home monitoring. https://spectrum.ieee.org/fcc-gives-medical-body-area-networks-clean-bill-of-health |
There will always be vulnerabilities with the WBAN. It will be exploited and weaponized one way or another alongside emerging tech. It is electronic warfare and surveillance in the body.
1. IEEE SPECTRUM ARTICLE Turning the body into a wire. The Vulnerabilities in the WBAN. N.Z white hat hacker Barnaby Jack. https://spectrum.ieee.org/turning-the-body-into-a-wire 2. Infamous Hacker Barnaby Jack dies before blackhat convention https://www.nbcnews.com/technolog/infamous-hacker-barnaby-jack-dies-black-hat-convention-6c10760881 |
|
The Different types of Radiation and its effects on the human body.
1. What are the Different Types of Radiation? https://letstalkscience.ca/educational-resources/backgrounders/what-are-different-types-radiation 2. Biological Effects and Mechanisms of Electromagnetic Radiation https://encyclopedia.pub/entry/26671 |
|
Electronic Warfare
|
The Invisible Battlefield: Electronic Warfare, Explained https://www.youtube.com/watch?v=2L_2ITqvRQA |
The Department of Defense (DOD) relies heavily on the electromagnetic spectrum (EMS) for a wide range of military functions, making it a cornerstone of modern warfare. The EMS supports everything from basic communications to sophisticated electronic warfare, ensuring command, control, and intelligence operations across various domains. The DOD's use of the EMS involves managing spectrum allocation, employing it in current military strategies like navigation warfare, and embracing emerging technologies such as 5G for enhanced connectivity, AI for smarter spectrum management, and directed-energy systems for both communication and defense against threats like unmanned aerial systems.
Overview of Department of Defense Use of the Electromagnetic Spectrum PDF
https://crsreports.congress.gov/product/pdf/R/R46564
1. DOD the largest user of the electromagnetic spectrum 2. DOD use of the radio spectrum 3. Spectrum used for DOD laser technologies 4. Military Applications of the spectrum 5. 5th generation (5g) Communications https://crsreports.congress.gov/product/pdf/R/R46564
Electronic Warfare – The Forgotten Discipline https://www.japcc.org/articles/electronic-warfare-the-forgotten-discipline/ As with the civilian smart grid and city infrastructure, the military uses similar or the same applications to create an interconnected enviroment i.e Cyberpsace enviroment, Geospatial and Geolocation technology, the Internet of Things Iot, Wireless sensor networks and ubuiquitous sensors, mobile networks, adhoc networks, artificial intelligence, unmanned aerial vehicles (UAV). |
Electromagnetic Operations in the Electromagnetic Environment.
|
Application of IoT in military operations in a smart city
https://ieeexplore.ieee.org/document/8398690
Application of IoT in military operations in a smart city
https://www.researchgate.net/publication/326047490_Application_of_IoT_in_military_operations_in_a_smart_city
The Internet Of Military Things (IoMT): How IoT Is Used In Warfare
https://indeema.com/blog/the-internet-of-military-things-iomt--how-iot-is-used-in-warfare
https://ieeexplore.ieee.org/document/8398690
Application of IoT in military operations in a smart city
https://www.researchgate.net/publication/326047490_Application_of_IoT_in_military_operations_in_a_smart_city
The Internet Of Military Things (IoMT): How IoT Is Used In Warfare
https://indeema.com/blog/the-internet-of-military-things-iomt--how-iot-is-used-in-warfare
IoT, AI, and the future battlefield
https://militaryembedded.com/ai/deep-learning/iot-ai-and-the-future-battlefield
https://militaryembedded.com/ai/deep-learning/iot-ai-and-the-future-battlefield
Cyber-Electro-Magnetic Activities (CEMA) represent the merging of cyber and electronic warfare into a cohesive strategy to gain military advantages:
1. Cyber Operations: These involve actions in cyberspace to either disrupt enemy systems or protect one's own. This includes hacking, deploying malware, or securing networks against cyber threats.
2. Electronic Warfare (EW): This encompasses using electromagnetic energy to:
- Attack: Jam or deceive enemy electronic systems.
- Protect: Safeguard friendly electronic systems.
- Support: Gather intelligence through the electromagnetic spectrum.
CEMA operates across all domains of warfare, making it a vital component of modern military strategy where both physical and digital battlefields are key. It's about using technology and tactics to dominate in both realms simultaneously.
Cyber and Electromagnetic Activities (CEMA) Integration
https://www.baesystems.com/en/digital/solutions/defence/cema-integration
Cyberwarfare
https://en.wikipedia.org/wiki/Cyberwarfare
CYBERWARFARE "7 Different types " 1. Espionage 2. Sabotage 3. (DOS) Denial of Service 4. Electrical Power Grid
5. Propaganda attacks 6. Economic disruption 7. Surprise attacks
https://www.imperva.com/learn/application-security/cyber-warfare/
1. Cyber Operations: These involve actions in cyberspace to either disrupt enemy systems or protect one's own. This includes hacking, deploying malware, or securing networks against cyber threats.
2. Electronic Warfare (EW): This encompasses using electromagnetic energy to:
- Attack: Jam or deceive enemy electronic systems.
- Protect: Safeguard friendly electronic systems.
- Support: Gather intelligence through the electromagnetic spectrum.
CEMA operates across all domains of warfare, making it a vital component of modern military strategy where both physical and digital battlefields are key. It's about using technology and tactics to dominate in both realms simultaneously.
Cyber and Electromagnetic Activities (CEMA) Integration
https://www.baesystems.com/en/digital/solutions/defence/cema-integration
Cyberwarfare
https://en.wikipedia.org/wiki/Cyberwarfare
CYBERWARFARE "7 Different types " 1. Espionage 2. Sabotage 3. (DOS) Denial of Service 4. Electrical Power Grid
5. Propaganda attacks 6. Economic disruption 7. Surprise attacks
https://www.imperva.com/learn/application-security/cyber-warfare/
1. Electronic Warfare EW major subfields 2. Cyber EW payloads 3. CEMA is the combination of EW and Cyber warfare.
4. Similarities between Electronic Warfare and Cyber warfare
https://www.emsopedia.org/entries/electronic-warfare-aka-electromagnetic-warfare/
4. Similarities between Electronic Warfare and Cyber warfare
https://www.emsopedia.org/entries/electronic-warfare-aka-electromagnetic-warfare/
"Drone kill communications" net illustrated article below discusses how a UK network connection is part of a U.S. military system used for drone operations, which has resulted in civilian deaths.
The article illustrates how the UK network connects to the U.S. Defense Information Systems Network (DISN) and the Global Information Grid (GIG), crucial for communicating with drones. The DISN/GIG has evolved, becoming vital as the demand for drone imagery intelligence grew beyond what satellite and terrestrial networks could handle.
Civilian Impact : There's an acknowledgment of civilian deaths due to drone operations, underscoring the human rights concerns associated with the targeted killings facilitated by this network infrastructure.
Drone kill communications net illustrated
Dhttps://www.computerweekly.com/blog/Public-Sector-IT/Drone-kill-communications-net-illustrated
Defense Information System Network
https://en.wikipedia.org/wiki/Defense_Information_System_Network
DOD Unmanned systems Integrated Roadmap Pdf
https://apps.dtic.mil/sti/pdfs/AD1059546.pdf
The article illustrates how the UK network connects to the U.S. Defense Information Systems Network (DISN) and the Global Information Grid (GIG), crucial for communicating with drones. The DISN/GIG has evolved, becoming vital as the demand for drone imagery intelligence grew beyond what satellite and terrestrial networks could handle.
Civilian Impact : There's an acknowledgment of civilian deaths due to drone operations, underscoring the human rights concerns associated with the targeted killings facilitated by this network infrastructure.
Drone kill communications net illustrated
Dhttps://www.computerweekly.com/blog/Public-Sector-IT/Drone-kill-communications-net-illustrated
Defense Information System Network
https://en.wikipedia.org/wiki/Defense_Information_System_Network
DOD Unmanned systems Integrated Roadmap Pdf
https://apps.dtic.mil/sti/pdfs/AD1059546.pdf
1. The aim of GIG 2. The network was meant to make drone weapons 3. Network Targeting 4. They joined the DISN
5. Drone Net Dhttps://www.computerweekly.com/blog/Public-Sector-IT/Drone-kill-communications-net-illustrated
6. DISN transport of the future 5g, LTE, LIFI https://disa.mil/-/media/Files/DISA/News/Events/Symposium/3---Osborn_-DISN-An-Essential-Weapon_approval-FINAL.pdf
5. Drone Net Dhttps://www.computerweekly.com/blog/Public-Sector-IT/Drone-kill-communications-net-illustrated
6. DISN transport of the future 5g, LTE, LIFI https://disa.mil/-/media/Files/DISA/News/Events/Symposium/3---Osborn_-DISN-An-Essential-Weapon_approval-FINAL.pdf
Barrie Trower is a former microwave weapons expert for the Royal Navy and the British Secret Service. He has a deep knowledge of the many harmful effects that microwaves can cause in the human body and psyche. Barrie Trower: Microwaves in weapons and wireless telecommunication https://www.youtube.com/watch?v=k3QeSOU8qC0 (Longer interview )Dangers and Lethality of Microwave Technology (Dr Barrie Trower 2010) https://www.youtube.com/watch?v=jdFzJd-QcDk&list=PLkea2LffFGPZjXeBZrGZiYdX1fPT9kV35&index=7 |
|
|
Mark Steele is an electronic weapons expert, a scientist, a 5g expert, and all round freedom-fighting. Samantha Edwards Reports: 5G Weapon Systems with Mark Steele. https://banned.video/watch?id=644a0403e8e6717e5e7a8b7d |
Mark Steele Electronic assault weapons 5g Led Killers In the video clip, Mark takes apart a standard Council street lamp and reveals weapon technology in the casing. He gives a step by step explanation with each component. https://rumble.com/v5kh0jv-electronic-assault-weapons-5g-led-killers.html?e9s=src_v1_upp |
|
Len Ber MD is a Global Medical Leader for Targeted Justice, Inc., a non-profit 501(c)(3) organization for Civilian Victims of "Havana Syndrome". Dr. Ber is the first civilian on disability due to "Havana Syndrome" aka NKBI (Non-Kinetic Brain Injury). He advocates for the recognition of this type of brain injury in civilians, which is grossly underreported, under-diagnosed, and under-treated, while presenting serious growing public health concern
CNN Interviews Top Neurologist Dr. James Giordano Over Havana Syndrome
https://www.youtube.com/watch?v=G1Jn38taMfs
Helping Physicians to Understand "Havana Syndrome" and a Novel Method of Managing AHIs
https://www.researchgate.net/publication/387030679_HELPING_PHYSICIANS_TO_UNDERSTAND_HAVANA_SYNDROME_AND_A_NOVEL_METHOD_OF_MANAGING_AHIS
Havana Syndrome evidence suggests who may be responsible for mysterious brain injuries
https://www.youtube.com/watch?v=JdPSD1SUYCY
CNN Interviews Top Neurologist Dr. James Giordano Over Havana Syndrome
https://www.youtube.com/watch?v=G1Jn38taMfs
Helping Physicians to Understand "Havana Syndrome" and a Novel Method of Managing AHIs
https://www.researchgate.net/publication/387030679_HELPING_PHYSICIANS_TO_UNDERSTAND_HAVANA_SYNDROME_AND_A_NOVEL_METHOD_OF_MANAGING_AHIS
Havana Syndrome evidence suggests who may be responsible for mysterious brain injuries
https://www.youtube.com/watch?v=JdPSD1SUYCY
|
"Bringing Understanding to “Havana Syndrome” and Anomalous Health Incidents" - by Len Ber MD https://www.youtube.com/watch?v=3dZTp7oeLjI |
The Active Denial System (ADS) is a non-lethal directed-energy weapon developed by the U.S. military, designed for area denial, perimeter security and crowd control. Informally, the weapon is also called the heat ray since it works by heating the surface of targets, such as the skin of targeted human beings.
A long-range acoustic device (LRAD), acoustic hailing device (AHD) or sound cannon is a specialized loudspeaker that produces sound at high power for communicating at a distance. It has been used as a method of crowd control, which has caused permanent hearing damage, having an extremely high decibel capacity (up to 160 dB measured at one meter from the device).
Revealed: Police used sound cannons against Parliament protesters
https://www.nzherald.co.nz/nz/revealed-police-used-sound-cannons-against-parliament-protesters/PIBFZEHRIOEADS7SK4Y4SWM464/
LRAD Long Range Acoustic Device
https://en.wikipedia.org/wiki/Long-range_acoustic_device
Active Denial System
https://en.wikipedia.org/wiki/Active_Denial_System
Directed energy weapons shoot painful but non-lethal beams: Are similar weapons behind Havana syndrome?
https://phys.org/news/2021-09-energy-weapons-painful-non-lethal-similar.html
A long-range acoustic device (LRAD), acoustic hailing device (AHD) or sound cannon is a specialized loudspeaker that produces sound at high power for communicating at a distance. It has been used as a method of crowd control, which has caused permanent hearing damage, having an extremely high decibel capacity (up to 160 dB measured at one meter from the device).
Revealed: Police used sound cannons against Parliament protesters
https://www.nzherald.co.nz/nz/revealed-police-used-sound-cannons-against-parliament-protesters/PIBFZEHRIOEADS7SK4Y4SWM464/
LRAD Long Range Acoustic Device
https://en.wikipedia.org/wiki/Long-range_acoustic_device
Active Denial System
https://en.wikipedia.org/wiki/Active_Denial_System
Directed energy weapons shoot painful but non-lethal beams: Are similar weapons behind Havana syndrome?
https://phys.org/news/2021-09-energy-weapons-painful-non-lethal-similar.html
Non-Lethal Weapon: Active Denial System (ADS) https://www.youtube.com/watch?v=kzG4oEutPbA |
|
Directed-energy weapon (DEW) is a ranged weapon that damages its target with highly focused energy without a solid projectile, including lasers, microwaves, particle beams, and sound beams. Potential applications of this technology include weapons that target personnel, missiles, vehicles, and optical devices.
DOD, U.S. Army Weapons-Related Directed Energy (DE) Programs: Background and Potential
Issues for Congress
https://crsreports.congress.gov/product/pdf/R/R45098
Directed-energy weapon
https://en.wikipedia.org/wiki/Directed-energy_weapon
DOD, U.S. Army Weapons-Related Directed Energy (DE) Programs: Background and Potential
Issues for Congress
https://crsreports.congress.gov/product/pdf/R/R45098
Directed-energy weapon
https://en.wikipedia.org/wiki/Directed-energy_weapon
|
Directed Energy: The Time for Laser Weapon Systems has Come https://www.youtube.com/watch?v=jMx1-yaRLyQ |
Targeted Individuals, Bill Binney ( NSA Whistle Blower ) and his wife Katherine Horton ( Oxford-educated particle physicist and systems analyst ) share a wealth of Knowledge of the illegal directed energy weapon attacks (DEW) they experience on a daily basis. Bill Binney - Directed Energy Weapons, 4664 https://www.youtube.com/watch?v=vl-HVt702LI |
|
|
Katherine Horton ( Oxford-educated particle physicist and systems analyst ) getting attacked by DEWs while measuring and collecting data at the same time. MAIMING CONTINUES - Live shots to the head (Targeted Individuals) (Stop 007) https://www.youtube.com/watch?v=XrAJA5uOrmY Katherines youtube channel https://www.youtube.com/@Stop007/videos |
Electromagnetic interference (EMI) and electromagnetic pulses (EMPs) represent a spectrum of disruptions caused by electromagnetic energy, impacting both civilian and military spheres with varying degrees of severity.
The interplay of intentional and unintentional effects underscores their role in modern conflicts and daily life, where reliance on technology makes societies and armed forces vulnerable to both random interference and calculated electromagnetic assaults.
Unintentional EMI - is the background noise of a tech-heavy world. It comes from things like power lines, radio transmitters, or even a microwave oven interfering with your Wi-Fi. It can degrade or disable electronic systems and cause static on your radio.
Intentional Electromagnetic Interference (IEMI) is when electromagnetic energy is deliberately used to disrupt or disable electronic systems. It’s a calculated move and plays out differently depending on the context.
In military applications, IEMI ties directly into Electronic warfare (EW) and leverages the electromagnetic spectrum to disrupt adversarial operations. IEMI can be a weapon used to jamm signals, and disrupt enemy communications, sensors, or weapons. This deliberate interference integrated with cyber attacks and kinetic assaults are designed to undermine an opponent’s command, control, and coordination infrastructure.
In civilian life, IEMI is less common but can still happen. While rare and often illegal, it exploits the same principles as bigger disruptions, just on a smaller scale
EMP or electromagnetic pulse, is a sudden, intense burst of electromagnetic energy that can disrupt or destroy electronic devices and systems. When it hits, it overloads circuits, potentially frying anything with a microchip or wiring, For civilians, this could mean disrupted communications i.e. cell phones, internet, radio, and disable vehicles or appliances with electronic components—basically, anything plugged into the modern world depending on its strength and range.
Electromagnetic interference
https://en.wikipedia.org/wiki/Electromagnetic_interference
Electromagnetic pulse
https://en.wikipedia.org/wiki/Electromagnetic_pulse
Brief historical review and bibliography for Intentional Electromagnetic Interference (IEMI)
https://ieeexplore.ieee.org/document/6929517
Modern Electromagnetic Spectrum Battlefield
https://ndupress.ndu.edu/Portals/68/Documents/prism/prism_9-3/prism_9-3_122-139_Ricciardi-Souque.pdf?ver=UQX3LAq2ZJtNwy7J6fs4fg%3d%3d
The interplay of intentional and unintentional effects underscores their role in modern conflicts and daily life, where reliance on technology makes societies and armed forces vulnerable to both random interference and calculated electromagnetic assaults.
Unintentional EMI - is the background noise of a tech-heavy world. It comes from things like power lines, radio transmitters, or even a microwave oven interfering with your Wi-Fi. It can degrade or disable electronic systems and cause static on your radio.
Intentional Electromagnetic Interference (IEMI) is when electromagnetic energy is deliberately used to disrupt or disable electronic systems. It’s a calculated move and plays out differently depending on the context.
In military applications, IEMI ties directly into Electronic warfare (EW) and leverages the electromagnetic spectrum to disrupt adversarial operations. IEMI can be a weapon used to jamm signals, and disrupt enemy communications, sensors, or weapons. This deliberate interference integrated with cyber attacks and kinetic assaults are designed to undermine an opponent’s command, control, and coordination infrastructure.
In civilian life, IEMI is less common but can still happen. While rare and often illegal, it exploits the same principles as bigger disruptions, just on a smaller scale
EMP or electromagnetic pulse, is a sudden, intense burst of electromagnetic energy that can disrupt or destroy electronic devices and systems. When it hits, it overloads circuits, potentially frying anything with a microchip or wiring, For civilians, this could mean disrupted communications i.e. cell phones, internet, radio, and disable vehicles or appliances with electronic components—basically, anything plugged into the modern world depending on its strength and range.
Electromagnetic interference
https://en.wikipedia.org/wiki/Electromagnetic_interference
Electromagnetic pulse
https://en.wikipedia.org/wiki/Electromagnetic_pulse
Brief historical review and bibliography for Intentional Electromagnetic Interference (IEMI)
https://ieeexplore.ieee.org/document/6929517
Modern Electromagnetic Spectrum Battlefield
https://ndupress.ndu.edu/Portals/68/Documents/prism/prism_9-3/prism_9-3_122-139_Ricciardi-Souque.pdf?ver=UQX3LAq2ZJtNwy7J6fs4fg%3d%3d
|
|
1. Module 8.1 - Intentional Electromagnetic Interference or IEMI - 1 2. IEMI could aim at Critical Infrastructure
https://www.youtube.com/watch?v=ZZri6XWW0sY&t=2124s
https://www.youtube.com/watch?v=ZZri6XWW0sY&t=2124s
Intentional Electromagnetic Interference (IEMI) Effects in Cyber-Physical Systems pdf
https://www.researchgate.net/publication/299231375_Intentional_Electromagnetic_Interference_Effects_in_Cyber-Physical_Systems
https://www.researchgate.net/publication/299231375_Intentional_Electromagnetic_Interference_Effects_in_Cyber-Physical_Systems
1. IEMI Effects 2. Jamming radio signals 3. GPS Jamming 4. GPS Spoofing 5. Spoofing Examples 6. Back-Door and Front Door Coupling https://www.researchgate.net/publication/299231375_Intentional_Electromagnetic_Interference_Effects_in_Cyber-Physical_Systems
Artificial intelligence is revolutionizing military operations for major powers like the United States, China, Russia, and Israel, enhancing speed, precision, and decision-making. It’s applied in targeting, surveillance, and autonomous systems.
- The United States leverages AI through Project Maven to analyze imagery and tag targets, while the Sea Hunter warship operates autonomously for months. The Replicator program aims to field thousands of AI-enabled drones by 2026, and “loyal wingman” drones support piloted jets. Human oversight remains a policy for lethal actions, balancing innovation with control.
- Chinas PLA pursues “intelligentized warfare,” integrating AI into Caihong drones and Sharp Claw ground vehicles for autonomous targeting. AI accelerates strike decisions and powers swarming tactics, while surveillance systems like Hikvision cameras bolster regional influence, particularly near Taiwan and the South China Sea.
- Russia embeds AI in Altius drones and the S-70 Okhotnik-B UAV, aiming for swarm operations with Su-57 jets. The Bylina system jams enemy signals autonomously, and AI drones have seen action in Ukraine, though resource limits hinder broader deployment.
- Since 2023, Israel’s IDF has used AI extensively in Gaza and Lebanon. Lavender identifies targets with a scoring system, “The Gospel” generates up to 100 strike targets daily, and “Where’s Daddy?” tracks phones for precision hits. AI-driven drones like the Golden Eagle strike autonomously, supported by cloud platforms (Project Nimbus with Google and Amazon), despite criticism over civilian casualties.
AI’s key roles include pinpointing targets, processing vast surveillance data, and enabling semi-autonomous weapons. It offers unmatched efficiency but struggles with accuracy—like Israel’s 10% error rate—and accountability, fueling a race among powers with little global regulation.
Artificial intelligence arms race
https://en.wikipedia.org/wiki/Artificial_intelligence_arms_race
AI, Autonomy, and Arms Race: The Evolving Role of Autonomous Weapons
https://moderndiplomacy.eu/2024/10/19/ai-autonomy-and-arms-race-the-evolving-role-of-autonomous-weapons/
Artificial Genocidal Intelligence: how Israel is automating human rights abuses and war crimes
https://www.accessnow.org/publication/artificial-genocidal-intelligence-israel-gaza/
- The United States leverages AI through Project Maven to analyze imagery and tag targets, while the Sea Hunter warship operates autonomously for months. The Replicator program aims to field thousands of AI-enabled drones by 2026, and “loyal wingman” drones support piloted jets. Human oversight remains a policy for lethal actions, balancing innovation with control.
- Chinas PLA pursues “intelligentized warfare,” integrating AI into Caihong drones and Sharp Claw ground vehicles for autonomous targeting. AI accelerates strike decisions and powers swarming tactics, while surveillance systems like Hikvision cameras bolster regional influence, particularly near Taiwan and the South China Sea.
- Russia embeds AI in Altius drones and the S-70 Okhotnik-B UAV, aiming for swarm operations with Su-57 jets. The Bylina system jams enemy signals autonomously, and AI drones have seen action in Ukraine, though resource limits hinder broader deployment.
- Since 2023, Israel’s IDF has used AI extensively in Gaza and Lebanon. Lavender identifies targets with a scoring system, “The Gospel” generates up to 100 strike targets daily, and “Where’s Daddy?” tracks phones for precision hits. AI-driven drones like the Golden Eagle strike autonomously, supported by cloud platforms (Project Nimbus with Google and Amazon), despite criticism over civilian casualties.
AI’s key roles include pinpointing targets, processing vast surveillance data, and enabling semi-autonomous weapons. It offers unmatched efficiency but struggles with accuracy—like Israel’s 10% error rate—and accountability, fueling a race among powers with little global regulation.
Artificial intelligence arms race
https://en.wikipedia.org/wiki/Artificial_intelligence_arms_race
AI, Autonomy, and Arms Race: The Evolving Role of Autonomous Weapons
https://moderndiplomacy.eu/2024/10/19/ai-autonomy-and-arms-race-the-evolving-role-of-autonomous-weapons/
Artificial Genocidal Intelligence: how Israel is automating human rights abuses and war crimes
https://www.accessnow.org/publication/artificial-genocidal-intelligence-israel-gaza/
|
|
1. You haven’t heard of US project Maven. Its AI warfare. 2.'Lavender': How Israel's AI is killing Palestinians in Gaza
https://www.youtube.com/watch?v=WGE4QQy0iqw https://www.youtube.com/watch?v=EkgexnnzKt0
https://www.youtube.com/watch?v=WGE4QQy0iqw https://www.youtube.com/watch?v=EkgexnnzKt0