{"id":23050,"date":"2020-01-28T22:01:20","date_gmt":"2020-01-28T22:01:20","guid":{"rendered":"http:\/\/dev.yogaesoteric.net\/unmasking-freemasonry-en\/about-perverse-masonic-manipulations-3480-en\/the-weaponization-of-wifi\/"},"modified":"2020-01-28T22:01:20","modified_gmt":"2020-01-28T22:01:20","slug":"the-weaponization-of-wifi","status":"publish","type":"post","link":"https:\/\/yogaesoteric.net\/en\/the-weaponization-of-wifi\/","title":{"rendered":"The Weaponization Of WiFi"},"content":{"rendered":"<p>\n    by Anthony Sconosciuto<br \/>\n    <\/p>\n<p>  This may sound like a work of science fiction, but, I assure<br \/>\nyou it is not. Before I begin, I wish to state that I am not a &#8220;conspiracy<br \/>\ntheorist.&#8221; The conclusions I make are the result of almost 4 years of investigation into a<br \/>\npersonal experience in which, I believe, I was the the subject of an experiment by a DARPA<br \/>\n(Defense Advanced Research Projects Agency) contractor named SARA Inc., involved in EM weapons<br \/>\nR&amp;D.<\/p>\n<p>    <img decoding=\"async\" src=\"\/all_uploads\/uploads5\/ianuarie 2020\/28\/22136_1.jpg\" align=\"center\" alt=\"\" \/><\/p>\n<p>  I also believe that there were many more victims of this<br \/>\nexperiment that we will never know about. Due to my extensive background (40+ years) in computer<br \/>\nand related technology, I was able to recognize the threat and defend against it. I will try in<br \/>\nthis writing to put things into perspective. I must state at this time that I wish to remain<br \/>\nanonymous and this information is for informative purposes only.<\/p>\n<p><\/p>\n<p>    <strong>About Me<\/strong><\/p>\n<p><\/p>\n<p>  First off, I am retired (since 2010), in good health,<br \/>\nmentally alert and informed about the technologies I spent 40 years working with. I am a low<br \/>\nprofile individual and have always been. I have no ego to feed and I require no recognition for<br \/>\nmy past accomplishments or failures. I do not use social media and I use my smart phone for<br \/>\ncalling and texting only.<\/p>\n<p><\/p>\n<p>  Since my retirement, I stay at home as a result of intensive<br \/>\ntravel during my working life. I refurbish laptops as a hobby and do some specialty work on them<br \/>\nby request. I have no reason to fear any sort of surveillance or reprisal from the government.<br \/>\nMany years ago, I had some obscure associations with DARPA through some of the project work I<br \/>\nwas involved with that has long ago slipped away to obsolescence.<\/p>\n<p><\/p>\n<p>    <strong>About DARPA<\/strong><\/p>\n<p><\/p>\n<p>  DARPA was created in 1958 (&#8220;ARPA&#8221; until a<br \/>\n&#8220;D&#8221; was added in 1972), by a Defense Department directive, in effort to utilize<br \/>\nrapidly emerging technologies to stay ahead of the USSR during the Cold War. They are involved<br \/>\nin all things that, even remotely, could contribute to defense research and national security.<br \/>\nMany of their projects do contribute to the betterment of humanity, but rest assured these<br \/>\ncontributions are only the side-effects of the real research objectives.<\/p>\n<p><\/p>\n<p>  These side-effects help to procure their public funding.<br \/>\nWhile publicly funded projects contribute to the agency&#8217;s public image, their primary<br \/>\nresearch is in &#8220;Black&#8221; projects leading to the development of super-secret<br \/>\ntechnology and applications that are always years ahead of any sort of public disclosure. These<br \/>\noperations are funded by the Black Budgets of the Pentagon, CIA, NSA and quite possibly other<br \/>\ngovernmental entities that are virtually unknown to the public.<\/p>\n<p><\/p>\n<p>    <strong>About SARA Inc<\/strong>.<\/p>\n<p><\/p>\n<p>  SARA (Scientific Applications and Research Associates) is an<br \/>\nemployee owned company that provides special applications and product development to the Defense<br \/>\nand Homeland Security industries as well as private companies. They specialize in all things<br \/>\nelectromagnetic. They are a high-level defense applications contractor. Their website:<br \/>\nhttp:\/\/sara.com<\/p>\n<p><\/p>\n<p>    <strong>The Incident<\/strong><\/p>\n<p><\/p>\n<p>  First Week of March 2012 (prior to incident):<br \/>\n  I started the Windows update procedure on 4 laptops with<br \/>\nfresh operating system installations. I have a very hi-speed internet and work space that limits<br \/>\nme to 4 machines at a time. This had never been a problem before, but this time all the machines<br \/>\nwere hung up. There are many things that can effect the update process, but, I had all the bases<br \/>\ncovered.<\/p>\n<p><\/p>\n<p>  I shutdown 3 of the machines, now running 1, to no avail. I<br \/>\nthen rebooted the single machine to begin the process over and again it was the same situation.<br \/>\nI then went to the living room where my cable modem and router are located. The ethernet<br \/>\nindicator light on the cable modem was on almost continuously. I thought that possibly the cable<br \/>\nmodem was hung or the cable company was doing some work on the system.<\/p>\n<p><\/p>\n<p>  I powered down the cable modem and shutdown the 1 machine I<br \/>\nhad running. I turned on my &#8220;Tech Computer&#8221; and logged in to my router to check<br \/>\nfurther. The log file seemed to indicate that I was under a massive DDOS (Distributed Denial Of<br \/>\nService) attack. I powered up my cable modem. Now, with only my &#8220;Tech Computer&#8221;<br \/>\nonline, the attack continued although it was less intense.<\/p>\n<p><\/p>\n<p>  DDOS attacks are generally directed toward businesses,<br \/>\norganization, media and government, not home networks. I decided to look at the log more<br \/>\nclosely. I then noticed a definite repeat pattern which was not the trademark of a DDOS attack.<br \/>\nI then looked up the IP numbers of all addresses involved. To my amazement they were all<br \/>\ngovernment addresses.<\/p>\n<p><\/p>\n<p>  The look up showed; DoD, NSA, SSA and IRS. Not going into the<br \/>\ntechnical details of how a DDOS attack is initiated, I found it hard to imagine that 4<br \/>\ngovernment systems would have been compromised to install the necessary malware to be used in<br \/>\nsuch an attack. During the following two days, this continued at a lesser intensity. I was able<br \/>\nto capture the communication with one of my network monitoring utilities and found out that<br \/>\nthere was 2-way communication with my machine responding to unique queries.<\/p>\n<p>    <img decoding=\"async\" src=\"\/all_uploads\/uploads5\/ianuarie 2020\/28\/22136_2.jpg\" align=\"center\" alt=\"\" \/><\/p>\n<p>  It was a data mining operation of some sort. As I said<br \/>\nearlier in this writing I have no fear of surveillance, however, I resent the interruption in<br \/>\nthe performance of my network. I then emailed each site&#8217;s abuse contact. The attacks<br \/>\nstopped on the 4th day and I finished the work I was doing on the 4 reconditioned laptops.<\/p>\n<p><\/p>\n<p>    <strong>Last week of March 2012 (prelude and<br \/>\nincident):<\/strong><\/p>\n<p><\/p>\n<p>  My wife is an avid user of Facebook which has a tendency to<br \/>\nclog up a computer with extraneous junk files after a period of time without maintenance. She<br \/>\nwas on her computer fairly early that Tuesday morning [March 27, 2012] and remarked to me that<br \/>\nher machine was extremely slow.<\/p>\n<p><\/p>\n<p>  I asked if she had used any of the maintenance utilities<br \/>\nlately. The answer was of course, &#8220;no.&#8221; I ran the utilities and cleaned out a lot of<br \/>\njunk and all seemed to be okay until she got on to YouTube and videos were difficult to play<br \/>\nwithout interruption. Later in the day, I noticed the internet was very slow which had never<br \/>\nhappened before the beginning of the month. I blew it off, not wanting to deal with it.<\/p>\n<p><\/p>\n<p>  The following day, my wife left early to go to work. I<br \/>\ngrabbed a cup of coffee and sat down in my chair in the living room, turned on my laptop and the<br \/>\ntelevision. Approximately 30 minutes after I had sat down, I began feeling very strange. I<br \/>\nbecame soaked with a cold sweat, my heart was racing and I was slightly dizzy with an<br \/>\nexcruciating headache.<\/p>\n<p><\/p>\n<p>  I sat there a few more minutes taking my pulse (over 150 bpm<br \/>\nwhen I lost count) and feeling worse by the minute. I decided I was having a heart attack. I was<br \/>\nprobably being stupid by deciding to drive myself to the hospital even though it is less than a<br \/>\nhalf mile from our condo. I got up, grabbed my car key, my coat and took off toward the building<br \/>\nexit.<\/p>\n<p><\/p>\n<p>  By the time I exited the building, I was feeling better. I<br \/>\ncontinued to walk to my car, thinking I would still go to the hospital. I reached the car, got<br \/>\nin, sat there and took my pulse again. My pulse was in the normal range at 65 bpm, I felt fine,<br \/>\nno cold sweat and no more headache. I then drove to the ER parking lot and sat there with the<br \/>\ncar running and thinking it might come back. I sat there for about 40 minutes and still felt<br \/>\nfine. I decided that I would not go in to the ER, as they would think I&#8217;m crazy old man,<br \/>\nsince nothing is wrong and it would also be a big expense. I then went home, still feeling<br \/>\ngreat.<\/p>\n<p><\/p>\n<p>  When I got home, I went into the living room and sat down to<br \/>\ncontemplate what happened to me and see if I could get some idea from the Mayo Clinic website. I<br \/>\npicked up the laptop and ran the web browser which took over 10 seconds to come upon my home<br \/>\npage. I went to the Mayo site and looked up all the possible symptoms of a heart attack. I<br \/>\ncontinued reading the related information on heart attacks.&#160;<\/p>\n<p><\/p>\n<p>  Moving around on the website was very slow. I had been<br \/>\nsitting there for about a half hour and was starting to feel strange again, with the same things<br \/>\nhappening inside my body. I decided that maybe I should go to the ER after all. I put my coat<br \/>\non, walked out the door, got outside the building exit and I was feeling better. I walked to my<br \/>\ncar and stood beside it for a few minutes thinking about what is happening to me. I felt fine<br \/>\nagain. I thought for a moment that maybe something in the house is making this happen.<\/p>\n<p><\/p>\n<p>  I knew it could not be a gas leak as everything in the<br \/>\nbuilding is electric. I noticed no odors that would indicate some sort of toxic chemical in the<br \/>\nbuilding While I was standing there, my neighbor, who shares the same living room wall with my<br \/>\ncondo, walked up by me on the way to his car. We greeted each other, and I asked him if he<br \/>\nnoticed anything inside that was making him feel ill. He told me he has had no problems.<\/p>\n<p><\/p>\n<p>  I decided I would stay out of the house for a while and see<br \/>\nif the symptoms I was experiencing would return. I went to a local restaurant, had something to<br \/>\neat and kill a little time. I was gone about 3 hours before returning home. I still felt<br \/>\nfine.<\/p>\n<p><\/p>\n<p>  Upon returning home, I went to the living room and picked up<br \/>\nmy laptop to see if I could diagnose why my internet connection was so slow the last couple of<br \/>\ndays. I started running 3 of my network monitoring utilities as well as watching the news on TV.<br \/>\nAfter 20 minutes or so, I decided to look at my router logs. I discovered that I was under<br \/>\nattack from a single IP (DOS not DDOS).<\/p>\n<p><\/p>\n<p>  I looked up the IP registration and discovered it was a<br \/>\ncompany named SARA Inc. I then searched for the company website. I was home now for close to a<br \/>\nhalf an hour and I felt the cold sweat starting. I found the SARA Inc. website.<\/p>\n<p><\/p>\n<p>  Now I was starting to feel really bad. I read SARA&#8217;s<br \/>\nhome page that stated the types of research that they were pursuing for the DoD and that they<br \/>\nwere involved with DARPA. Having briefly read the types of research they were involved with, my<br \/>\ninstinct said they were performing some sort of a test using the wireless RF [radio frequencies.<br \/>\nI was not thinking clearly enough to analyze all the implications of what that test may be for.<br \/>\nI was now almost ready to run out the door again when I turned the power off to my cable modem.<br \/>\nWithin a couple of minutes I notice my heart rate going down and the pounding headache<br \/>\ndissipating.<\/p>\n<p>    <img decoding=\"async\" src=\"\/all_uploads\/uploads5\/ianuarie 2020\/28\/22136_3.jpg\" align=\"center\" alt=\"\" \/><\/p>\n<p>  I logged in to my router and blocked SARA&#8217;s complete IP<br \/>\naddress range. Within 5 minutes I was feeling great again. I powered-on my cable modem and<br \/>\ndecided I would get a new router in case they had installed some sort of hook that would enable<br \/>\nthem to bypass the IP block in the future. This attack never happened again. By my analytical<br \/>\nnature I had to find out the possible ways they had accomplished this and what the possible uses<br \/>\nmight be. I printed the router log and the saved data from my network monitoring<br \/>\nutilities.<\/p>\n<p><\/p>\n<p>  I started to look over the print offs to see if all the lines<br \/>\nwere legible, when something seemed to jump off the pages of the router log. I noticed that the<br \/>\nattack began 2 minutes before my computer connected to the router. The logs also showed that<br \/>\nafter 35 minutes the attack stopped for a period of 48 minutes, began again continuing for<br \/>\nanother 28 minutes, stopped for 2hrs 52min, then resumed for a period 25 minutes when I killed<br \/>\nthe power on the cable modem. These start and stop times fit with my presence and absence in the<br \/>\nproximity of my wireless router.<\/p>\n<p><\/p>\n<p>  How was my presence being detected when the attack began 2<br \/>\nminutes before I turned my computer on?<\/p>\n<p><\/p>\n<p>  Could the sensing discriminate between individuals or just<br \/>\nanyone within proximity? I had many more questions.<\/p>\n<p><\/p>\n<p>    <strong>Brief Analysis of The Incident and<br \/>\nConclusions<\/strong><\/p>\n<p><\/p>\n<p>  Initial Assessment: (Subjectively based on knowledge of<br \/>\nsimilar projects.)<\/p>\n<p><\/p>\n<p>  1. SARA is an R&amp;D company with a commission to develop a<br \/>\ncovert weapon using existing wireless technology for the purpose of sensing, identifying and<br \/>\nkilling a targeted individual in such a manner that it would appear to be a natural death (i.e.:<br \/>\nAssassination).<\/p>\n<p><\/p>\n<p>  The sensing mechanism would, therefore, have the ability to<br \/>\nprovide positive identification of the targeted individual or it would be useless in a targeted<br \/>\nstrike. It must be compact enough to be loaded on the ROM in the target router and have only<br \/>\nminimal interaction with an external control program. This mechanism would use the<br \/>\nrouter&#8217;s wireless radio I\/O in much the same way as a combination of radar and MRI<br \/>\ntechnologies. The external control program would use information from the target&#8217;s profile<br \/>\nbased on current medical records (example; Height, weight, body mass index, etc.) to identify<br \/>\nthe individual.<\/p>\n<p><\/p>\n<p>  This mechanism appeared to be fully developed.<\/p>\n<p><\/p>\n<p>  2. SARA had developed a viable strike mechanism that has the<br \/>\nability to detect, synchronize and alter the unique heart rhythm of a targeted individual. While<br \/>\nthis mechanism works, it is very primitive because it requires an external control program to<br \/>\naccess the analog I\/O of target router&#8217;s wireless radio. This mechanism was not fully<br \/>\ndeveloped and required a constant data stream that looked like a DOS attack on the router<br \/>\nlog.<\/p>\n<p><\/p>\n<p>  Though it was not a DOS attack, to the router it accomplished<br \/>\nthe same effect (tying up communication). If this had been a fully developed mechanism, most of<br \/>\nthe functions would be loaded on to the router&#8217;s ROM, which would only require minimal<br \/>\ninteraction with an external control program and therefore not perceived by the router as a DOS<br \/>\nattack.<\/p>\n<p><\/p>\n<p>  3. SARA, in all likelihood, was behind schedule and suffering<br \/>\ncost overruns in their development of this weapon, which prompted DARPA to require a statistical<br \/>\nmilestone to justify further funding. This suggests a test sample of at least 100 subjects.<br \/>\nWhatever the failure rate DARPA had established would have to be shown and could not be done<br \/>\nwith a single test subject. (i.e.: me. Failure rate = 100%)<\/p>\n<p><\/p>\n<p>  4. DARPA defined the criteria for test subjects. The NSA then<br \/>\naccessed information from various government and private systems to provide a list of viable<br \/>\ntest subjects. This would be given to SARA as to construct a target&#8217;s profile to be used<br \/>\nin the test.<\/p>\n<p><\/p>\n<p>  Criteria for test subjects in all likelihood would have been<br \/>\nsimilar to the following:<\/p>\n<p><\/p>\n<p>  -Low Visibility;<br \/>\n  -Different Localities;<br \/>\n  -Age 62 to 67;<br \/>\n  -Excellent Health;<br \/>\n  -Wireless Internet;<br \/>\n  -Expendable;<br \/>\n  -No Large Ins Policy;<br \/>\n  -No Large Bank Accounts;<br \/>\n  -No Large Investments;<br \/>\n  -Not Active politically;<br \/>\n  -Not Active on Social Media;<\/p>\n<p><\/p>\n<p>  These criteria would limit the potential for investigation of<br \/>\ndeath beyond a natural cause.<\/p>\n<p><\/p>\n<p>  5. Information on the success of the target&#8217;s<br \/>\ndestruction would be readily available via several sources (i.e.: Obituary, coroner<br \/>\nreport).<\/p>\n<p><\/p>\n<p>    <strong>Scientific Research Brief<\/strong><\/p>\n<p>    <img decoding=\"async\" src=\"\/all_uploads\/uploads5\/ianuarie 2020\/28\/22136_4.jpg\" align=\"center\" alt=\"\" \/><\/p>\n<p>  In my effort to verify, in my own mind, that my initial<br \/>\nassessment was fairly accurate, I began searching research papers that could have contributed to<br \/>\nthe development of such a weapon. I found many from various academic institutions and tech<br \/>\ncompanies. Looking at little pieces of many studies I saw how they could be assembled to achieve<br \/>\nmany technical aspects of my initial assessment.<\/p>\n<p><\/p>\n<p>  There was also the possibility of developing many other<br \/>\napplication with the bits and pieces of information from these studies. This was a long process<br \/>\nthat I worked on from the time of the incident in March 2012 to November 2013.<\/p>\n<p><\/p>\n<p>  Since the beginning of 2014 several studies for directly<br \/>\nrelated technologies have hit the scientific and tech journals using the WiFi router to ID an<br \/>\nindividual, lip read, detect people through walls and monitor life signs of an identified<br \/>\nindividual. The purpose of these studies was of course, to provide applications with benevolent<br \/>\npurposes. Yes, these technologies could be used for home security, monitoring the sick or<br \/>\nelderly, or integrated into an automated household.<\/p>\n<p><\/p>\n<p>  They also have many potential weapon and surveillance<br \/>\napplications over and above killing a targeted individual.<\/p>\n<p><\/p>\n<p>    <strong>Conclusion<\/strong><\/p>\n<p><\/p>\n<p>  The use of wireless technologies as a covert weapon system is<br \/>\nvery real. If this application can monitor, synchronize and alter a heart rhythm, with<br \/>\nmodification it could be used to alter brain waves or other anatomical functions.&#160;<\/p>\n<p><\/p>\n<p>  In 2016 I have conclude that DARPA had a fully functional<br \/>\nweapon, as well as some derivatives, by 2013. Remember, DARPA is always ahead of any publicly<br \/>\nreleased hints at related technology, which in this case was in late 2013.<\/p>\n<p><\/p>\n<p>    <strong>yogaesoteric<\/strong><\/p>\n<p>    <strong>January 28, 2020<\/strong><\/p>\n<p>  &#160;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Anthony Sconosciuto This may sound like a work of science fiction, but, I assure you it is not. Before I begin, I wish to state that I am not a &#8220;conspiracy theorist.&#8221; The conclusions I make are the result of almost 4 years of investigation into a personal experience in which, I believe, I [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[980],"tags":[],"class_list":["post-23050","post","type-post","status-publish","format-standard","hentry","category-about-perverse-masonic-manipulations-3480-en"],"_links":{"self":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/23050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/comments?post=23050"}],"version-history":[{"count":0,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/23050\/revisions"}],"wp:attachment":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/media?parent=23050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/categories?post=23050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/tags?post=23050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}