
Creative marketing meets corrupt practices
PDF Version
When every facet and microsecond of human existence is considered to be information of potential commercial value, human rights as we knew them can not endure. Humanity is a flock of blindfolded sheep being herded toward the precipice of a major paradigm shift. While the last Covid bastions shed their 'non surgical' masks, those who initiated the paradigm shift drool all over themselves with anticipation.
Opting out of cookie preferences and using adblockers might seem like a worthy approach, but it conceals a greater issue. Increasingly the mining of data caused by gaps in usage patterns is used to create profiling algorithms. The uninhibited avarice of commercial interests involved in 'big data' has brought us to a profoundly sinister place. Simply mining the data produced by humans is no longer profitable enough for the desires of the clandestine community. Our reality now consists primarily of granular psyops, ubiquitous street theatre, mass deception and illusory mind games. The future can hardly be considered bright if the past is any measure of progress.
The concept of exploiting the words and actions of uninformed populations has become a major industry. The potential for major commercial gain is highly attractive for those unelected, ill qualified and rightfully doomed who would consider themselves puppet-masters. The chances of the forces that shouldn't be backing away from their chosen user requirements can be represented by a mathematical constant of precisely zero point zero ... recurring.

There's a corresponding lack of value in the somewhat pedestrian activities of the vast majority of humans. This raises the question as to what exactly is the point of acquiring such endless gigabytes of seemingly irrelevant data. Unsurprisingly the answer lies in the core of the question itself. The smartphone revolution of the 21st century provided all the surveillance data that any clandestine group could ever hope to acquire. Manufacturers including but not limited to; Nokia, Samsung, Motorola, Apple, Microsoft and Google all acquiesced to the requirements of the surveillance state and facilitated the activities of numerous clandestine forces. Microsoft got severely lambasted by the European Union and other legal bodies for actively engaging in anti-trust sales practices, both with WindowsXP and Windows7. Google faced a similar backlash when they rigged all their Google StreetView vehicles to acquire the wifi passwords of any router in range. Google explained that it was all unintentional and that they had accidentally gained unauthorised access to some private networks. Somehow this blatant thumb biting at legal compliance was considered to be adequate and the whole thing was swept under the rug. Yet another case of 'too big to fail'.

The mass capture of seemingly worthless details has been ongoing since at least the arrival of analog mobile phones at the end of the 20th century. All electronic communication devices feature EULA's containing baffling legalese. They all go to massive lengths to obfuscate the fact that as soon as the user starts using the device, all data acquired by the microphone and other sensors is up for grabs. The EULA will detail how data captured does not belong to the individual and in fact belongs to the mobile operating system manufacturer. With the constant need for ROM updates, opting out of these totalitarian license agreements has become exceedingly difficult. Apple still go out of their way to prevent users from cooking their own ROMS. In the same way the EULA for OsX clearly states that you may not use their desktop operating system on any non Apple manufactured hardware. In a typical geek rebuttal, the technical community blatantly ignored such oppressive terms and conditions and started installing OsX on custom built 'Hackintosh' PC's and even XBoxes. Fortunately some of these geeks were highly capable and quickly had the measure of Google's leveraging of the Linux kernel. It wasn't long before the legendary 'Cyanogen Mod' ROM appeared. It endures to this day as 'Lineage OS'. Furthermore the cooking of Android ROMS became an arena of high functionality for the network security industry. Today it's possible to download completely non Google based ROMs for many handsets. These ROMs do not feature such alienating EULAs and instead contain numerous alterations intended to prevent the network provider from acquiring and forwarding unauthorised data.

In addition to these fundamentally altered (and thus improved) operating systems, there has been a rise in the popularity of apps which block microphones and other sensors. Crowd funded initiatives have commissioned bespoke devices from handset manufacturers. Most have been motivated by privacy increasing requirements. Many feature hardware switches which physically disable the microphone, network circuits and other inputs such as biometric capture (fingerprints & camera) and most suspiciously, the phone speaker. Exactly what the speakers of mobile phones are being used for by undisclosed 'clients' of the mobile networks is a matter of some concern. Many people have learned that they sleep much better when they switch their phone off. Some have gone further and banned mobile phones from their bedrooms. As covered in the article The Contemporary Enlightenment humans have a susceptibility to radio frequencies. Dr. Nick Begich goes to some lengths to detail how all the organs of the human body resonate at a specific frequency. Furthermore these organs can be targeted by directed energy to alter the frequency and manifest tangible effects in the subject. The emission of RF from a mobile phone speaker can be measured with a relatively cheap RF scanning device such as a HackRF One or a DB-TV SDR USB dongle.

According to the work of Preston Nichols, the broadcast frequencies used to control peoples perception at a distance have been used by unacknowledged special access programs since the 1980's. In several interviews he goes into some depth as to how the 420 to 460 Mhz true pulse signals exhibit frequency hopping patterns which are largely structured around fractal based mathematics. The signals can be picked up as a sharp crack within this frequency range. However unless you have access to the PCM pattern, it's impossible to know exactly which frequency the next crack will be broadcast on. The security protocols applied to police forces radio communication networks worked in a similar way in the past. The signal packet division isn't tied to any specific frequency, but multiplexed between frequencies in a predefined pattern. The transmitting device and the receiving device both have a copy of the modulation pattern which could be likened to a rudimentary encryption key. This allows both to hop to the correct frequency at a predefined time in the packet transmission. Generally any packet switched communication is seamless for the end user and any signal degradation and or packet loss can be recognised on digital networks as a flanging or 'drainpipe' effect. However for any intercepting party, the individual packets will represent a limited value in terms of their duration. In this way, analog wireless broadcasts were partially secured against unauthorised monitoring. US police networks abandoned analog broadcasts after the 911 incident. The UK police moved to a full digital encryption solution to replace the previous packet based multiplexing method. It is still possible to intercept various emergency services transmissions, however with increasing encryption there is little value in the data acquired.
Targeted broadcasting of pulse code modulated signals can apparently override the natural resonant frequency of the brain and pushes the mind in specific directions. Prior to his death, Mr Nichols asserted that this wide scale EMF broadcast method was still very much occurring in the USA. Due in many ways to the challenging claims of Al Bielik and Duncan Cameron, the credibility of Preston Nichols has come into question. However, any RF enthusiast or radio ham can tell from his terminology that he definitely knows what he's talking about. He also exhibits the tell tale signs of someone who is concerned about the ramifications of mind control technology being operated by unaccountable people with no oversight whatsoever.

Some arguably Maverick property developers in the USA have enjoyed an uptake of pre sold units in the development of converted missile silos. Designed as bolt holes for wealthy preppers, these well appointed apartments have proven highly popular for weekend breaks and holidays from the city. One developer couldn't understand why so many of his customers were turning up at the weekend for no obvious reason, simply to enjoy a stay in their subterranean sanctuaries. Many residents reported that for some reason they always slept much better when they were in the complex overnight. Logically this regenerative experience refreshed them and allowed them to be more productive when they returned to the city. Casual analysis would indicate that this is nothing new. People have been heading out of the city for the weekend to get their head together since cities were first formed many thousands of years ago. However, the customers of these condominium conversions all reported that it was specifically the quality of sleep that kept them coming back....
The first comment we get from people that spend their first night here is like, 'did you guys drug me? What happened?' because they ended up having the best night's sleep of their lives.
Not the walking in the outdoors, not the hunting, shooting or fishing, not the open horizons and clear skies and not the quality time spent with their families. Instead the single most attractive aspect of these buildings is a feature intended to prevent missile silos from being knocked out of commission by any massive EMP blasts in the vicinity. With ISO standard shielding, these silos are completely dark in terms of subject to any ambient EMF pollution from wireless technologies. This also renders them completely invisible in terms of being MASINT scanned. This would logically inhibit any ELFINT input from external conduits. EMP shielding clearly prevents any electrical circuits from being compromised and or utilised by any inbound radio frequency based signals.

This human compatibility with EMP shielding stands out as being quite anomalous. MASINT technology is designed for the scanning of electrical devices to create a detailed representation of a surveillance target. Once a clear picture of electrical circuitry is established, the physics of electrical engineering facilitates the tweaking of the electrical frequencies created within the circuit. Additionally, the effects of the external input can be measured by the variances in the returned data. This data can be retrieved from devices which have sensors included as part of the circuit. This constant feedback from the MASINT capture provides an effective means with which to create a machine to human codec. Once this electromagnetic bridge between the circuit and the target has been established, it facilitates the directing of specific frequency pulse modulation at organs including the brain. As is seen in the works of the Joint Photographic & Motion Picture Experts Group (JPEG & MPEG) a successful machine to human codec can provide an arena of high functionality and a platform for extensive market domination. Any questions of morality or ethics seems to have been overlooked in the application of wireless frequency targeting. The application is justified by the evidence of functionality and this provides further justification for further application... and so on. Due to the lack of enforcement in the RF industry in terms of unregulated near field usage methods, irresponsible operators face as many barriers as journalist phone hackers. If a radio ham transmits an AM signal that exceeds amplitude or frequency thresholds they can expect the authorities to come down on them like a ton of bricks. If same radio ham takes a redundant microwave and extensively modifies it to transmit millimetre waves at his Budgerigars , there's not going to be any official departments knocking on the door any time soon. This lack of regulation won't suddenly change just because he chooses to experiment on his unsuspecting neighbours instead of his unfortunate avian familiars.

AC power emits an ambient field which can influence any lifeforms in the vicinity. In addition AC power circuits and conduits also emits weaker harmonic frequencies whose EMF emission covers a greater radius. Much of what is pejoratively known as 'sick building syndrome' has been suspected of actually being a direct reaction to AC harmonic fields. Most lifeforms are (in various ways) vulnerable to EMF influences. The reality of humans being electromagnetic entities has been increasingly accepted by academia over the past century. As such it's probably safe to assume that human susceptibility to EMF was enthusiastically embraced by the clandestine community and furthermore this probably happened many years prior.

Extending this assumption, there comes into view an incredibly alarming perspective of our current reality. If clandestine forces are able to influence and manipulate human beings using the electrical circuits that surround them, then there's an ugly (yet inescapable) probability that they are in fact doing so. Examining the highly stratified differential between consumer technology and clandestine technology indicates that this capability has been available to these unaccountable forces for many, many years. In fact it's increasingly apparent that the unauthorised, unwanted and profoundly unethical practice of influencing humans remotely using electrical circuitry has been in effect for as long as electrical circuitry has been available.

This leads into the question of why these unaccountable forces would seek to remotely influence anyone. Population control is generally considered the purview of governments and police forces. Most sovereign nations have legislation preventing the military from waging war on their domestic populations. Unfortunately most nations also have an unspoken attitude of;
If they can't prove we're doing it, we're entitled to do it
It's feasible that many of these unaccountable forces co-exist in some form of uneasy, power sharing construct. While the average citizen will agree that it's quite important that government and police have the powers they need to protect the population, they would be unlikely to sign off on mass mind control. However the most concerning aspect of SIGINT, ELFINT and MASINT usage is the potential correlation with anti social activity. These RF emissions have been suspected by many researchers as forming part of the causality behind certain negative behaviours and societal dysfunction. Increasingly, these activists are claiming that they have evidence of targeted campaigns. Electronic and psychological warfare being applied for the purposes of mind control through a delivery vector of invisible hostility.

Governmental bodies and police forces are usually required to detail their budgetary requirements. As such there exists serious scope for creative marketing. In other words, if a department wants the same or larger budget next year, they need to show that there is a justifiable need for the allocation of funds. This perpetual malfeasance has been the bane of most taxpaying populations for longer than anyone can remember. Double page adverts have been printed in local newspapers motivating residents to inform the local police if they suspect that their neighbours have wealth that they can not account for. This clearly announces that these police forces don't have enough crime occurring within their jurisdiction to be confident in their budgetary allocations. The responsible path would be to downsize these municipal bodies to spare the burden on the public purse. However the nature of civil service philosophy does not extend to the conscientious acceptance of redundancies or decreases in salary.

When police and government have a requirement that can not be achieved within the confines of their mandate, many have historically sought to use external and most importantly unaccountable methods to secure their desired outcome. Therefore it's no great leap to state that the technology detailed above could well be being used today to artificially create a perception of need for greater powers and correspondingly greater budgets.
In addition there are frequent and disproportionate flash points of anti-social activity appearing in the media on a daily basis. Obviously these distressing events require a robust response from the authorities. In order to effectively combat such dysfunction, the governing bodies must surely be provided with the funds and resources that they require. All perfectly reasonable until the causality of the anti-social behaviour begins to look like something conspicuously manufactured. For any manufacturer to put a product to market, they require demand.
With increasingly militarised police forces becoming increasingly privatised, the reality of creative marketing has already become a matter of serious concern and threatens to eclipse the entire point of state based authority.