.


:




:

































 

 

 

 


By independently operating NSA personnel




Table of Contents

 

Cover Page

NSA Mission & Operations

Communications Intelligence

Signals Intelligence

Domestic Intelligence

Independently Operating Personnel Target Citizens

NSA's Domestic Electronic Surveillance Network

Signals Intelligence Remote Computer Tampering

Detecting EMF Fields in Humans for Surveillance

NSA Signals Intelligence Use of EMF Brain Stimulation

Capabilities of NSA operatives using RNM

NSA Signals Intelligence Electronic Brain Link Technology

Table: An example of EMF Brain Stimulation

NSA Techniques and Resources

Remote RNM Devices

Spotters and Walk-Bys in Metropolitan Areas

Chemicals and Drugs

Intelligence/Anti-Terrorist Equipment

Resources

Further Resources

Cover Page

 

Evidence for the Lawsuit filed at the US courthouse in Washington, D.C.

(Civil Action 92-0449)

John St.Clair Akwei vs. NSA Ft George G. Meade, MD

My knowledge of the National Security Agency's structure, national security activities, proprietary technology,and covert operations to monitor individual citizens.

 

Table of Contents

 

The NSA's mission and the NSA's domestic Intelligence operation.

 

Communications Intelligence (COMINT)

 

Blanket coverage of all electronic communication in the U.S. and the world to ensure national security. The NSA at Ft. Meade, Maryland has had the most advanced computers in the world since the early 1960's. NSA technology is developed and implemented in secret from private corporations, academia, and the general public.

 

Signals Intelligence (SIGINT)

 

The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies. Signals Intelligence is based on the fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves. The NSA/DoD has developed proprietary advanced digital equipment which can remotely analyze all objects whether man-made or organic that have electrical activity.

 

Domestic Intelligence (DOMINT)

 

The NSA has records on all U.S. citizens. The NSA gathers information on U.S. citizens who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent National Security Anti-Terrorist surveillance network in place. This surveillance network is completely disguised and hidden from the public.

 

Tracking individuals in the U.S. is easily and cost-effectively implemented with the NSA's electronic surveillance network. This network (DOMINT) covers the entire U.S., involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously. Cost effective implementation of operations is assured by NSA computer technology designed to minimize operations costs.

 

NSA personnel serve in Quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track. N.S.A. personnel in the community usually have cover identities such as social workers, lawyers and business owners.

 

Individual citizens occasionally targeted for surveillance

by independently operating NSA personnel.

 

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA's domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.

 

Table of Contents

 

NSA's domestic electronic surveillance network

 

As of the early 1960's the most advanced computers in the world were at the NSA, Ft. Meade. Research breakthroughs with these computers were kept for the NSA. At the present time the NSA has nanotechnology computers that are 15 years ahead of present computer technology.

 

The NSA obtains blanket coverage of information in the U.S. by using advanced computers that use artificial intelligence to screen all communications, irregardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists. These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the U.S. is a result of the NSA's Signals Intelligence (SIGINT) mission.

 

The NSA's electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF spectrum. This equipment was developed, implemented, and kept secret in the same manner as other electronic warfare programs.

 

With this technology NSA personnel can non-obtrusively tap into any communication device in existence. This includes computers, telephones, radio and video-based devices, printers, car electronics, and even the minute electrical fields in humans (for tracking individuals).

 





:


: 2015-11-05; !; : 800 |


:

:

,
==> ...

1800 - | 1713 -


© 2015-2024 lektsii.org - -

: 0.011 .