Advertisement
Guest User

NCMEC / USSS sponsoring organized crime, illegal weapons used by US SECRET SERVICE

a guest
Jan 31st, 2012
401
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.96 KB | None | 0 0
  1. >
  2. > USSS-VIP "Vehicular Incident Prevention" weapon
  3. >
  4. > The United States Secret Service uses illegal weapons technology to prevent incidents during vehicle convoy operations such as the Presidential Motorcade that incapacitate bystanders to prevent someone from jumping into the road, throwing objects, or driving into the route. This weapon is why you have not seen frantic sign waving nor vibrant cheering in a long time, and why you notice all vechicles waiting at an intersection go into a low idle engine state to prevent acceleration.
  5. >
  6. > These systems, an illegal weapons technology, jam not only advanced threats but also jam your vehicle's control computer and your human bodies.
  7. >
  8. > You note an artificial passifisicm from the crowd when the weapon approaches, slowed body movement and impaired cognitive function, and the inability to perform normal physical activity.
  9. >
  10. > The USSS weapon, a combination of illegal and military technology, has the ability to interefere with, jam, and squelch human neurological activity.
  11. >
  12. > Human bystanders are not the only targets, squirrels and large insects are also attacked, preventing normal activity and inducing an artificial stasis. The dog simply falls over, humans involuntarily freeze or function only in slow-motion.
  13. >
  14. > The design claim is that this weapon is beneficial for the victim as it prevents incidents, such as your throwing a beer bottle at the American President's head, but it is an illegal torture weapon.
  15. >
  16. > The incapacitation of human body function is technologically simple, the weapon jams any high energy pulse beit an electric motor or the neural signal intended to actuate your arm.
  17. >
  18. > Though the USSS weapon is fundamentally illegal in these ways, it also has the ability to monitor, probe, and replicate the signals associated with human cognition, perception, and neurological function.
  19. >
  20. > On certain ocassions when security staff are rotating or another vulnerability is available, the torture weapon will also impair human neurological functions for an extended period of time, like when other advanced weapons systems are being packed for transport. This circumstance provides the weapon an excuse not only to physically incapacitate the victims but also to jam their visual perception signals from the eyes and ears and disrupt the victims' perception of time.
  21. >
  22. > These illegal weapons employed by the United States Secret Service of the DHS and Treasury departments must be removed from operation and disclosed as their means of operation is torture.
  23. >
  24. > "You did the RIGHT thing!"
  25.  
  26. >
  27. > By simply filing a false missing persons report with NCMEC (url report forms missingkids.org ) (National Center for Missing and Exploited Children) an organized crime institution can employ the entire resources of the DHS Secret Service including regional police and commerce institutions to find and provide the location of any target including responding with specific information useful for tracking, to help criminally molest or exploit, to engage witness tampering including within witness protection programs, and create situations to intimidate, move, or kill the target.
  28. >
  29. > As an example, participating commercial entities such as Walmart actively analyse all behaviour in their stores to identify most visitors, use guate and physical pattern analysis for identification, distinguish characteristics that may imply a child with a non-parent or abuse situation, or common drug use or purchasing intent (ethnic foods), as well as a plethora of "marketing" profiles, which are made available to DHS with various motivations.
  30. >
  31. > The NCMEC, by way of the Secret Service (USSS), has direct access to highly advanced and illegal weapon systems that are designed to track and interfere with human activity in the context of aggressive threats to Executive (Presidential) protection. These weapons also continuously track all electronic communication of targets using all resources available, including military. This system, which is not audited nor controlled, is made available to NCMEC without oversight.
  32. >
  33. > Once a report is filed about exploitation, missing persons of any type, or common situations like labour safety violations or personal welfare concerns (even when never substantiated), this weapon system of the USSS and DHS deduces the specific human target from all possible options and provides continuous tracking to Secret Service's automated system.
  34. >
  35. > The automated system, as with military modes similar, can actively interfere with both human and physical device activity, it can isolate signals and "lock on" to targets with advanced signal jamming capability, it can jam your arm's ability to throw a beer bottle at the American President's head in the same way it can interfere with advanced nano-robotics and automated weapons control systems.
  36. >
  37. > Frequently, with the capabilities designed to announce incoming nuclear weapons threats to individuals not in range of broadcast emergency messages, this system also can create means of communication, interferance, or physical interaction through a diversity of modes to induce behaviour patterns of target individuals who (as an example) might be incited to notice a concern such as a kidnapping or abuse victim.
  38. >
  39. > Additionally, because of the severe lack of oversight, various institutions have gained direct access to the control systems provided to DHS Secret Service and others which allow them to directly control, program, or exploit the weaponized and illegal modes of operation of this highly specialized system.
  40. >
  41. > The provision of access to illegal special-use weapons technology to corrupt and criminally exploited institutions is not only a severe violation of law and policy, it is an explicit threat to and risk to the entire human population.
  42. >
  43. > The American Department of Homeland Security, Secret Service both of DHS and US Treasury, and related institutions especially the NCMEC and enforcement entities must be brought under review regarding their abuse and exploit of these weapons in illegal and criminal acts.
  44. >
  45. > .
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement