Page 138 - Elana Freeland - Under an Ionized Sky
P. 138
Key to understanding the turning point that the May 2015 “military exercise” known as
JADE Helm represents (Joint Assistant for Deployment and Execution at the helm) is to grasp
the fact that we the people are already NCW wired into AI and, by proxy, the Space Fence. As I
stressed in Chapter 3, “The Nano Assault,” nano-scale “situational awareness” sensors have
already been loaded into the environment and, by proxy, our lungs, bloodstreams, and brains.
Burghardt’s dynamic optical tag (DOT) sounds remarkably like quantum dots. Then there is
neural or smart dust, nanospheres, carbon nanotube transistors and integrated circuits,
electrochemical energy-storage nanos with anode-cathode nanowires inside polymer core shell
separators, etc. All are nanotechnology telemetric sensors released into our environment for us to
wear, breathe, and ingest, each sensor programmed to gather data that is then remotely accessed,
transmitted, and stored by AIs.
Berghardt called attention to the civilian version of Radar Responsive tags made in 2009 by
Gentag:
According to Gentag, “the civilian version. . .is a lower power technology suitable for commercial civilian
applications, including use in cell phones and wide area tracking.” Conveniently, “Mobile reader infrastructure can be
set up anywhere (including aircraft) or can be fixed and overlaid with existing infrastructure (e.g. cell phone
towers).” 41
Virginia-based Inkode developed tiny, low-power metal fibers that embed themselves “in
paper, plastic and other materials that radio frequency waves can penetrate.” Does “and other
materials” include lungs, blood, and skin? The fibers reflect radio waves back to the reader in a
“resonant signature,” and the reader of data flowing in from our sensor-armed environment is an
AI. Queralt in Wallingford, Connecticut invented “an integrated behavioral learning engine” to
“learn an individual’s or asset’s habits over time”:
The core of Queralt’s system is the behavioral engine that includes a database, a rules engine and various algorithms.
Information acquired by reading a tag on an asset or individual, as well as those of other objects or individuals with
which that asset or person may come into contact, and information from sensors (such as temperature) situated in the
area being monitored, are fed into the engine. The engine then logs and processes the data to create baselines or
behavioral patterns. As baselines are created, rules can be programmed into the engine; if a tag read or sensor metric
comes in that contradicts the baseline and/or rules, an alert can be issued . . . 42
Feeling secure yet?
May 2015 was the beginning not of just an NCW rollout but of a complete makeover of what
military war games and exercises are about. In the United States, it was called JADE Helm (i.e.,
JADE at the helm); in Estonia, Hedgehog 15; in Lithuania, Operation Lightning Strike; in
Norway, Dynamic Mongoose; in the Mediterranean Sea, Joint Sea 2015-I was run by the
43
Russians and Chinese. All exercises are “simulations” of network-centric operations (NCOs,
i.e., cyberwarfare) dependent upon the global information grid (GIG), once a key component of
the Project for the New American Century (PNAC) / Foreign Policy Initiative.
According to Raytheon’s BBN Technologies / DARPA Abstract in the 2001 Final Technical
Report “Joint Assistant for Development and Execution (JADE),” JADE 2 is AI quantum
computing technology capable of utilizing vast stores of NSA-collected data to produce a Human
Terrain Analysis (HTA) tool that will guarantee mastery over the Human Domain.
JADE (Joint Assistant for Deployment and Execution) is a knowledge-based mixed-initiative system that supports
force deployment planning and management. JADE uses case-based and generative planning methods to support the
development of large-scale, complex deployment plans in minimal time. JADE incorporates the technology of three