Categories
Biometric Surveillance Biowarfare Blog Corruption Cyber security Depopulation Environment Free Speech Freedom Military National Security NATO Propaganda War

The internet domain & the invisible war on your brain

July 31, 2023 | Information warfare is not something that we often think of while scrolling through internet feeds and surfing online. However, each of us is now a target of psychological warfare, designed specifically for us according to our preferences based on our unique online history – to alter our perceptions and change our behaviors.

Dividing and conquering the population and getting people to lose their minds, is a primary objective of cognitive warfare.

A 2022 NATO report titled “Cognitive Warfare”: The Advent of the Concept of “Cognitics” in the Field of Warfare, states:

“Cognitive warfare is now with us. The main challenge is that it is essentially invisible; all you see is its impact, and by then … it is often too late…

It operates on a global stage since humankind as a whole is now digitally connected. It uses information technology and the tools, machines, networks, and systems that come with it. Its target is clear: our individual intelligences, to be considered both individually and as a group.”

From PSYOP to MindWar: The Psychology of Victory

From PSYOP to MindWar: The Psychology of Victory 

 

We witnessed the success of cognitive warfare strategy achieved during the CV19 operation.

During the planned CV19 event, reasonable and rational people were fooled and coerced into collectivist compliance by means of government and social media propaganda. We were socially engineered to be terrified of an invisible enemy, that we later found out was just a bad flu made in a lab.

 

One aspect of information warfare that deserves more scrutiny is the role of RF/MW Radiation exposure on brain impairment. Effects of microwave radiation on brain energy metabolism and related mechanisms | Military Medical Research | Full Text (biomedcentral.com)

Effects of microwave radiation on brain energy metabolism and related mechanisms

Effects of microwave radiation on brain energy metabolism and related mechanisms • ZERO5G

 

The foundation of cognitive warfare is built on wireless communications infrastructures [satellite networks and interoperable microwave antenna systems, aka “+4G+5G+6G+”] toward an overarching Artificial Intelligence (AI).

 

Why You Should Destroy Your Smart Phone Now 

Cognitive warfare seeks to divide individuals and populations while inducing fear, doubt, confusion, violence, despair and defeat.

 

Keep in mind that the U.S. military may be operating under NATO command and that all NWO roads lead back to UN Agenda 2030.

 

The Amazing Deception 

The Amazing Deception

 

Counteracting cognitive warfare involves consciously unplugging ourselves from the internet and social media, continually questioning and scrutinizing information for accuracy, gaining local control of wireless infrastructures, while preferring and prioritizing wired connections to boost security.

 


 

U.S. Psychological Warfare and Civilian Targeting: Peace Review: Vol 22, No 3 

Link To Article HERE

 


 

“Cognitive Warfare”: The Advent of the Concept of “Cognitics” in the Field of Warfare – Archive ouverte HAL

Link To Full Article_NATO-CSO-Cognitive Warfare 2022-03-01 (US) Claverie DuCluzel

 


 

“Brain Science from Bench to Battlefield: The Realities – and Risks – of Neuroweapons”

August 29, 2017 | Lawrence Livermore National Laboratory |  Dr. James Giordano

Link To Video

 


 

Related

NATO and the Militarization of 5G

The Brain is the Battlefield: The Realities of Neuroweapons 

How electromagnetic weapons induce disease and mentally disable entire populations 

Psycho-Neurobiology and War 

A Cognitive Model for Exposition of Human Deception and Counterdeception

Attack on the Brain: Neurowars and Neurowarfare 

Method of and apparatus for inducing desired states of consciousness

Disconnecting from the UN Digital Prison 

Federal government ramps up research to manipulate the human brain and engineer DNA

COGSEC – The Ministry of Truth – by Spartacus 

Declassify and Ban Neuroweapons 

What is the impact of satellites covering the Earth with Radiation?

Defund and Exit the United Nations 

Depopulation is a UN Agenda 

 


Image source

 

JDfor2024.com

 


 

Categories
Biometric Surveillance Blog Cyber security

TSA Wants To Scan Your Face

The Transportation Security Administration (TSA) is rolling out facial recognition machines at 16 airports around the nation. Many people do not trust the technology so are choosing to opt out. Biometric surveillance and facial recognition technology is controversial and has already been banned in San Francisco based on civil rights and privacy issues. -JD

 


 

TSA Wants to Steal Your Face – You DO NOT Have to Let Them

December 9, 2022 | By

Facial scans planned to roll out nationwide and it WILL be a database (already is).

Link To Video

 


 

Link To Full Article HERE

 


 

Image Source

 

 

 

Categories
Blog Cyber security Legislation National Security

South Dakota Governor Bans TikTok

South Dakota State News

Governor Kristi Noem of South Dakota, signed Executive Order 2022-10 banning the social media platform TikTok for contractors, employees, and state agencies using state devices.

The Order is in response to the national security threat of TikTok with regard to personal data gathering operations potentially exploited by the Chinese Communist Party (CCP).

Gov. Noem stated,“Because of our serious duty to protect the private data of South Dakota citizens, we must take this action immediately. I hope other states will follow South Dakota’s lead, and Congress should take broader action, as well”.

-JD

 


 

Link To Source HERE

 


 

Link To Executive Order 2022-10

 


 

Categories
Blog Cyber security Law / Litigation National Security

Hundreds of Chinese-made drones detected over restricted DC airspace in recent months

According to recent reports, hundreds of Chinese-manufactured drones have been detected flying over restricted airspace in DC over the past few months. While the drones may not be directly controlled by China, the devices have surveillance capability with the potential to be used  for cyber attacks, espionage, or to be weaponized.

Florida Senator Marco Rubio has introduced two bills to regulate drones: one banning drones from accessing U.S. telecommunications, and another banning the U.S. government from buying drones made in China. Neither bill has gained traction.

The vulnerability of drones being taken over and controlled remotely or weaponized, including the possible release of biological weapons, makes strong regulation of these popular off-the-shelf devices, urgent for national security. -JD

 


 

 

Link To Full Article HERE

 


 

 

 

Link To Full Article HERE

 

 


 

Categories
Blog Constitution Cyber security

Montana Voters Approve Constitutional Amendment Adding 4th Amendment Protection to Digital Data

Montana Ballot measure C-48, the Search Warrant for Electronic Data Amendment, was overwhelmingly approved by voters on November 8th. The constitutional amendment, added to Article II Sec. 11 of the Montana State Constitution, treats electronic data as “persons, houses, papers, and possessions, requiring a search warrant to access electronic data or electronic communications.

The protection of personal data establishes the foundation to protect Montanans from the federal surveillance state, unwarranted data collection, and third party buying and selling of private information. The Amendment was modeled on Missouri Amendment 9 and New Hampshire Q2.  -JD

 


 

November 9, 2022 | By Mike Maharrey | Tenth Amendment Center | Source

“Practically speaking inclusion of electronic communications and data in the state’s constitutional prohibition on unreasonable searches and seizures means state and local police in Montana will be required to obtain a judicial warrant, supported by probable cause, before accessing cell phones and other electronic devices regardless of any legislative statute. It will also set the foundation to help prevent law enforcement from accessing private information through third parties.”

Link To Read Full Article HERE


Image Source