Only through inactive action does one become a victim; by exercising proactive action against evil one walks in their own power creating resistance to that which chooses to destroy humanity and the preciousness of life. Fight America; don't become a victim to the evil that is destroying our world! _Donald F. Truax (Tough times don't last, tough people do)
Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]
Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]
Cost of War to the United States
Is the NSA Conducting Electronic Warfare On Americans?
Harvard Journal of Law & Public Policy - National Security Archive FOIA Audit
Seymour Hersh on Obama, NSA and the 'pathetic' American media - IBM & "Death's Calculator"
What is the Hegelian Dialectic? - The Guardian's NSA Files - Church Committee Reports
The Hegelian Dialectic - U.S. Pavlovian Conditioning - NUREMBERG TRAILS PROJECT
Hegel for Beginners, by Llyod Spencer and Andrzej Krauze - Project MUSE - Operation Gladio
The Edward Bernays "Propaganda" Essays - SLHS Series
Free E-Book Download: Edward Bernays, "Propaganda"
Deconstructing Edward Bernays' 'Propaganda' (Part 1) - (Part 4) - (Part 7) - (Part 10)
Deconstructing Edward Bernays' 'Propaganda' (Part 2) - (Part 5) - (Part 8)
Deconstructing Edward Bernays' 'Propaganda' (Part 3) - (Part 6) - (Part 9)
Wednesday, November 4, 2009
RFID TeChNoLoGy AlLoWs YoU tO bE TrAcKeD
By invitation, I recently visited a remote facility in northern Virginia to see a demonstration of NOX – a new Intelligent Perimeter Defense system deployed by the FBI that uses covert Radio-Frequency Identification (RFID) technology to track people and assets without their knowledge.
That’s right, using RFID to track people without their knowledge. This system is exactly what the privacy advocates have long feared: Big Brother tracking us with spy chips. As Orwellian as this sounds, the undisputed fact is that this system catches thieves and does so at a fraction of the cost of traditional security solutions.
What makes the NOX system I saw different from traditional security systems is that it uses RFID for clandestine surveillance: RFID readers are hidden inside walls, floors, and ceilings; RFID tags are discretely placed; and only the security personnel know that the system is in place – until the thief gets caught. Then, all the thief knows is that he or she was caught in the act, on video. "It takes a criminal twelve seconds to defeat a lock or fence. Yet, we spend hundreds of thousands of dollars to create fences that only provide an illusion of security. NOX creates a virtual perimeter that tells us who is penetrating the perimeter, when they are doing it and, where it's happening. With this information, we can respond with the appropriate level of force and prevent further penetration."
A commander with the Naval Criminal Investigative Service (NCIS), who asked to remain anonymous for this article.
The NOX team has perfected dozens of methods of tagging people without their knowledge.
One of the more covert technologies they employ is ID-Dust, serialized dust particles that can be interrogated like a RFID tag. The NOX team can coat a person or object with it to track movement. ID-Dust can show if an item was handled or it can even be sprinkled on the floor. People unknowingly pick up the ID-Dust on their shoes as they travel through a dusted area. The software combines the video surveillance and RFID information to create an association between the ID-Dust and a person. The ID-Dust allows the person's movement to be tracked around a facility without the person ever knowing he or she is being tracked. While a criminal can easily defeat the motion sensors, the ID-Dust provides covert security with instant alerts when someone enters an area, plus a complete history of exactly where each person traveled and when.
All TIs clean the bottom of your shoes :(
Love "Light" and Energy
_Don
References:
Update: Inside the Military’s Secret Terror-Tagging Tech
http://www.wired.com/dangerroom/2009/06/inside-the-militarys-secret-terror-tagging-tech/
http://electronics.howstuffworks.com/cell-phone-jammer1.htm
http://www.nasm.si.edu/gps/work.html How GPS works
http://www.infowars.com/obama-and-acorn-gps-marking-every-front-door-in-america/
EPIC Urges Massachusetts High Court to Protect Drivers From Warrantless Tracking by Law Enforcement, Warns of "Pervasive Mass Surveillance"
http://www.scribd.com/full/14453086?access_key=key-1nkpcsksd0wtact9zmjs
Update: http://www.eff.org/deeplinks/2009/04/michigan-rep-calls-rfid-review
http://www.eff.org/cases/us-v-jones
http://www.iht.com/articles/2009/03/11/business/11target.php
http://www.theregister.co.uk/2008/10/08/darpa_project_gandalf/
http://books.google.com/books?id=cKqC8PPoxS0C
http://www.themasterofdisguise.com/glossary.html
http://www.themasterofdisguise.com/
Thanks goes out to Tony & Jonna Mendez for their profound insight.
TOPs Blogger Role
-
-
-
-
-
-
-
Hey! Unto You A Child Is Born!2 hours ago
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Jesus's Family Secrets3 days ago
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Never forget and never give up.3 months ago
-
-
Hello world!4 months ago
-
-
-
Bob Graham, 9/11, the FBI and me8 months ago
-
Hello world!10 months ago
-
-
LearningMusic1 year ago
-
-
-
-
-
-
My Farewell Announcement3 years ago
-
-
Hello world!3 years ago
-
-
-
Podcast: From Divorce to Besties4 years ago
-
FederalJack Update4 years ago
-
-
-
-
-
-
-
-
-
-
-
-
Hello world!7 years ago
-
The Blue State Model8 years ago
-
-
China ramps up charges against Zhou9 years ago
-
-
-
-
Reply to Jonathan Cook10 years ago
-
-
Amazing Pictures from around the world.11 years ago
-
-
Race for Iran Is Going to Tehran11 years ago
-
-
UK Parliament12 years ago
-
News13 years ago
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
No comments:
Post a Comment