Page 138 - Elana Freeland - Under an Ionized Sky
P. 138

Key  to  understanding  the  turning  point  that  the  May  2015  “military  exercise”  known  as
               JADE Helm represents (Joint Assistant for Deployment and Execution at the helm) is to grasp
               the fact that we the people are already NCW wired into AI and, by proxy, the Space Fence. As I
               stressed  in  Chapter  3,  “The  Nano  Assault,”  nano-scale  “situational  awareness”  sensors  have
               already been loaded into the environment and, by proxy, our lungs, bloodstreams, and brains.
               Burghardt’s  dynamic  optical  tag  (DOT)  sounds  remarkably  like  quantum  dots.  Then  there  is
               neural  or  smart  dust,  nanospheres,  carbon  nanotube  transistors  and  integrated  circuits,
               electrochemical energy-storage nanos with anode-cathode nanowires inside polymer core shell
               separators, etc. All are nanotechnology telemetric sensors released into our environment for us to
               wear, breathe, and ingest, each sensor programmed to gather data that is then remotely accessed,
               transmitted, and stored by AIs.
                   Berghardt called attention to the civilian version of Radar Responsive tags made in 2009 by
               Gentag:

                     According  to  Gentag,  “the  civilian  version.  .  .is  a  lower  power  technology  suitable  for  commercial  civilian
                     applications, including use in cell phones and wide area tracking.” Conveniently, “Mobile reader infrastructure can be
                     set  up  anywhere  (including  aircraft)  or  can  be  fixed  and  overlaid  with  existing  infrastructure  (e.g.  cell  phone
                     towers).” 41


                   Virginia-based  Inkode  developed  tiny,  low-power  metal  fibers  that  embed  themselves  “in
               paper, plastic and other materials that radio frequency waves can penetrate.” Does “and other
               materials” include lungs, blood, and skin? The fibers reflect radio waves back to the reader in a
               “resonant signature,” and the reader of data flowing in from our sensor-armed environment is an
               AI. Queralt in Wallingford, Connecticut invented “an integrated behavioral learning engine” to
               “learn an individual’s or asset’s habits over time”:

                     The core of Queralt’s system is the behavioral engine that includes a database, a rules engine and various algorithms.
                     Information acquired by reading a tag on an asset or individual, as well as those of other objects or individuals with
                     which that asset or person may come into contact, and information from sensors (such as temperature) situated in the
                     area being monitored, are fed into the engine. The engine then logs and processes the data to create baselines or
                     behavioral patterns. As baselines are created, rules can be programmed into the engine; if a tag read or sensor metric
                     comes in that contradicts the baseline and/or rules, an alert can be issued . . . 42

                   Feeling secure yet?
                   May 2015 was the beginning not of just an NCW rollout but of a complete makeover of what
               military war games and exercises are about. In the United States, it was called JADE Helm (i.e.,
               JADE  at  the  helm);  in  Estonia,  Hedgehog  15;  in  Lithuania,  Operation  Lightning  Strike;  in
               Norway,  Dynamic  Mongoose;  in  the  Mediterranean  Sea,  Joint  Sea  2015-I  was  run  by  the
                                     43
               Russians and Chinese.  All exercises are “simulations” of network-centric operations  (NCOs,
               i.e., cyberwarfare) dependent upon the global information grid (GIG), once a key component of
               the Project for the New American Century (PNAC) / Foreign Policy Initiative.
                   According to Raytheon’s BBN Technologies / DARPA Abstract in the 2001 Final Technical
               Report  “Joint  Assistant  for  Development  and  Execution  (JADE),”  JADE  2  is  AI  quantum
               computing technology capable of utilizing vast stores of NSA-collected data to produce a Human
               Terrain Analysis (HTA) tool that will guarantee mastery over the Human Domain.


                     JADE (Joint Assistant for Deployment and Execution) is a knowledge-based mixed-initiative system that supports
                     force deployment planning and management. JADE uses case-based and generative planning methods to support the
                     development of large-scale, complex deployment plans in minimal time. JADE incorporates the technology of three
   133   134   135   136   137   138   139   140   141   142   143