The Burden of Proof Radio Microwaves Used on Texans for GOP Political Control

0
0 Flares Filament.io 0 Flares ×

Public Notice: Innocent people have been targeted by Texas Governor Rick Perry for political control

Update12/16/2013 Merry Christmas: Bio-lethal Weapons Testing Latinos in Texas George Bush By-passed Congress

http://www.burntorangereport.c…

Emperical Evidence FBI Artifacts http://www.ukessays.com/essays…

Sign The “We The People” Petition to Ban Mind Control Weapons

http://educationbalancedhealth…  

The CRS Report To Congress (Rl31787) Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues, Updated March 20, 2007. Explains a lot about what has transpired between January 2006 and now. In my opinion, these types of devices and technologies should have never been shared with civilians (the Republican GOP constantly refers to as the Private Sector).

Texas GOP Inside Trading: http://www.thefreelibrary.com/…

Corporations do not have the rights of a person when they have access to the DOD, NSA, CIA, FBI, or AISI Austin Fusion Center. Nor do corporations have the rights of a person when they are hired as a private militia for political control by the Governor of Texas!

citaion: http://tsmfi.blogspot.com/

The biggest problem we have is that Homeland Security makes decisions on any civilian that may be a threat to National Security, then the Military targets and attacks United States Citizens with Electronic Weapons. I call this era “The Kent State Electronic War On Texas Citizens!”

In Texas under RP EO8, Texas Governor Rick Perry is totally responsible and possibly triggers these events on Texas citizens, or assimilates a target that may be a political adversary, but well outside National Security threats.

Who these idiots are, that make such an assessment, need to be identified, because they have used lethal devices such as radio, microwaves, infrared, X-ray, and all other options for directed energy, on me and members of my family.

Senator Cornyn, Congressman Cuellar, The FBI, and The Secret Service were directly informed and failed to protect us. Nor did they check my file to see if I have technical knowledge of such devices. I may be the only living person that can stand before congress and deliver the burden of proof if need be.

I have a bother in a mental institution because of electronic attacks. I have been hospitalized for siezers and stroke. You have all been directly informed by me verbally, and in writing.  

Consider yourself  publicly notified that you better take care of this or arrange for my transportation and a time to stand before congress! Let me tell you again, innocent people have been targeted by Texas Governor Rick Perry for political control, and he must pay the price. Remove him from office for starters.

Gregory O'Dell You Know My Phone Number and My Address – I Am a known!

DOD Information Operations Core Capabilities

DOD identifies five core capabilities for conduct of information operations; (1)Psychological Operations, (2) Military Deception, (3) Operations Security, (4) Computer Network Operations, and (5) Electronic Warfare. These capabilities are interdependent, and increasingly are integrated to achieve desired effects.

DOD Information Operations

The current DOD term for military information warfare is “Information Operations” (IO). DOD information operations are actions taken during time of crisis or conflict to affect adversary information, while

defending one's own information systems, to achieve or promote specific objectives.3 The focus of IO is on disrupting or influencing an adversary's decision-making processes.

An IO attack may take many forms, for example: (1) to slow adversary computers, the software may be disrupted by transmitting a virus or other malicious code; (2) to disable sophisticated adversary weapons, the computer circuitry may be overheated with directed high energy pulses; and (3) to misdirect enemy sensors, powerful signals may be broadcast to create false images. Other methods for IO attack may include psychological operations such as initiating TV and radio broadcasts to influence the opinions and actions of a target audience, or seizing control of network communications to disrupt an adversary's unity of command.

Computer Network Defense (CND) is the term used to describe activities that are designed to protect U.S. forces against IO attack from adversaries. Part of CND  is information assurance (IA), which requires close attention to procedures for what is traditionally called computer and information security.

DOD places new emphasis on the importance of dominating the entire electromagnetic spectrum with methods for computer network attack and electronic warfare. DOD also emphasizes that because networks are increasingly the operational center of gravity for warfighting, the U.S. military must be prepared to “fight the net”.4

Because the recently declassified source document containing this phrase has some lines blacked out, it is not clear if “…net”means the Internet. If so, then this phrase may be a recognition by DOD that Psychological Operations, including public affairs work and public diplomacy, must be employed in new ways to counter the skillful use of the Internet and the global news media by U.S. adversaries [This does not mean political adversaries, but it has been used on peaceful Texas Citizens with contrary Repbulican GOP opinons (FBI ACLU Texas).]

Psychological Operations (PSYOP)

DOD defines PSYOP as planned operations to convey selected information to targeted foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals.5 For example, during the Operation Iraqi Freedom (OIF), broadcast messages were sent from Air Force EC-130E aircraft, and from Navy ships operating in the Persian Gulf, along with a barrage of e-mail, faxes, and cell phone calls to numerous Iraqi leaders encouraging them to abandon support for Saddam Hussein.

DOD policy prohibits the use of PSYOP for targeting American audiences. However, while military PSYOP products are intended for foreign targeted audiences, DOD also acknowledges that the global media may pick up some of these targeted messages, and replay them back to the U.S. domestic audience. Therefore, a sharp distinction between foreign and domestic audiences cannot be maintained..[It also means that domestic targets are fair game]8

However, the DOD Information Operations Roadmap, published October 2003, states that PSYOP messages intended for foreign audiences increasingly are consumed by the U.S. domestic audience, usually because they can be re-broadcast through the global media. The Roadmap document states that, “…the distinction between foreign and domestic audiences becomes more a question of USG (U.S. Government) intent rather than information dissemination practices (by DOD).”

42 This may be interpreted to mean that DOD has no control over who consumes PSYOP messages once they are re-transmitted by commercial media.[It also means that domestic targets are fair game]

Computer Network Exploitation (CNE).

CNE is an area of IO that is not yet clearly defined within DOD. Before a crisis develops, DOD seeks to prepare the IO battlespace through intelligence, surveillance, and reconnaissance, and through extensive planning activities. This involves intelligence collection, that in the case of IO, is usually performed through network tools that penetrate adversary systems to gain information about system vulnerabilities, or to make unauthorized copies of important files. Tools used for CNE are similar to those used for computer attack, but configured for intelligence collection rather than system disruption.

Computer Network Attack (CNA).

CNA is defined as effects intended to disrupt or destroy information resident in computers and computer networks. As a distinguishing feature, CNA normally relies on a data stream used as a weapon to execute an attack. For example, sending a digital signal stream through a network to instruct a controller to shut off the power flow is CNA, while sending a high voltage surge through the electrical power cable to short out the power supply is considered Electronic Warfare (However, a digital stream of computer code or a pulse of electromagnetic power can both be used to also create false images inadversary computers).

Electromagnetic Non-Kinetic Weapons.

Non-kinetic weapons emit directed electromagnetic energy that, in short pulses, may permanently disable enemy computer circuitry. For example, an electromagnetic non-kinetic weapon mounted in an aircraft, or on the ground, might disable an approaching enemy missile by directing a High Power Microwave (HPM) beam that burns out the circuitry, or that sends a false telemetry signal to misdirect the targeting computer.18

Also, at reduced power, electromagnetic non-kinetic weapons can also be used as a non-lethal method for crowd control. The Active Denial System (ADS), developed by the Air Force, is a vehicle mounted nonlethal, counter-personnel directed energy weapon. Currently, most non-lethal weapons for crowd control, such as bean-bag rounds, utilize kinetic energy. However, the ADS projects a focused beam of millimeter energy waves to induce an intolerable burning sensation on an adversary's skin, repelling the individual without causing injury. Proponents say the ADS is safe and effective at ranges between 50 and 1,600 feet. The nonlethal capabilities of the ADS are designed to protect the innocent, minimize fatalities, and limit collateral damage.19

The Pentagon reportedly has requested immediate deployment of at least 8 ADS devices to Iraq to assist Marines in guarding posts, countering insurgent snipers and protecting convoys. The ADS system would be the first operationally deployed directed-energy weapon for counter-personnel missions.20

New U.S.A.F. Cyber Command

Secretary of the Air Force Michael W. Wynne recently stated that the new mission of the U.S. Air Force is to “fly and fight in air, space, and cyberspace.” This means that military action in cyberspace now includes defending against malicious activity on the Internet, and anywhere across the entire electromagnetic spectrum (including the energy spectrum bands for radio, microwaves, infrared, X-ray, and all other options for directed energy), where national security is threatened.21

However, the DOD Information Operations Roadmap, published October 2003, states that PSYOP messages intended for foreign audiences increasingly are consumed by the U.S. domestic audience, usually because they can be re-broadcast through the global media. The Roadmap document states that, “…the distinction between foreign and domestic audiences becomes more a question of USG (U.S. Government) intent rather than information dissemination practices (by DOD).”42

This may be interpreted to mean that DOD has no control over who consumes PSYOP messages once they are re-transmitted by commercial media.

Citation:  Clay Wilson  Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division

“Information Operations, Electronic Warfare,and Cyberwar: capabilities and Related Policy Issues Updated March 20, 2007”

Link: http://www.scribd.com/doc/9081…

Share.

About Author

Leave a Reply

2015 © Skytop Publishing All Rights Reserved. Do not republish without express written permission.

Site designed and developed by well + done DESIGN

0 Flares Twitter 0 Facebook 0 Filament.io 0 Flares ×