Showing posts with label Space Based Weapons. Show all posts
Showing posts with label Space Based Weapons. Show all posts

Sunday, October 20, 2013

China Testing New Space Weapons



By Bill Gertz

China conducted a test of a maneuvering satellite that captured another satellite in space during what Pentagon officials say was a significant step forward for Beijing’s space warfare program.
The satellite capture involved one of three small satellites fitted with a mechanical arm that were launched July 20 as part of a covert anti-satellite weapons development program.
One official described the satellite-grabbing spacecraft as a “mobile satellite launch vehicle.”
“The United States Strategic Command’s Joint Functional Combatant Command for Space (JFCC-Space), consistent with its routine operations to maintain track of objects in space, has monitored these satellites since their launch and has noticed the relative motions of these satellites amongst each other and with respect to other space objects.” 
The Pentagon’s website Space-Track.org does not report on missions or functions of the hundreds of space objects it tracks, and Smith referred further questions to the Chinese government.
A Chinese Embassy spokesman did not return emails seeking comment on the ASAT test.
The satellites involved in the space warfare development program were identified by the Chinese as “scientific experimentation satellites,” according to a notice published July 24 in the online journal Space News.
They were identified as Chuangxin-3 (Innovation-3), Shiyan-7 (Experiment-7), and Shijian-15 (Practice-15). The spacecraft with the robotic mechanical arm that conducted the satellite capture experiment has not been authoritatively identified from among the three orbiters. However, space analysts suspect it is Shiyan-7.
Space News is published by the China Aerospace Science and Technology Corp. (CASC), which builds strategic missiles and space launchers, and China Aerospace Science and Industry Corporation (CASIC), China’s largest missile manufacturer.
The notice stated that the three satellites were launched atop a Long March-4C rocket on July 20 from the Taiyuan Satellite Launch Center in north central China.
“These three satellites are to be used for the observation of space debris and conducting scientific experiments in space maintenance techniques like space arm operations,” the statement said.
Space Track continues to identify the satellites as by their payload designations, rather than using the Chinese names.
Since no other satellites are in the same orbit as the three satellites and another satellite known as Shijian-7, “if the capture was last week, it didn’t involve any of these working together.” 
... that leaves the possibility that Payload B was captured by Payload C during a close flyby around Aug. 17.
“My actual calculations showed them getting closer than 500 meters but given the inherent error margins of the Space Track data, I stuck with a few hundred meters.”
Another possibility is that the test involved a detachable part of one satellite and its release into a separate orbit, and the subsequent recapturing of the component using the extension arm, Christy said.
“If the separation distance was small and the period of separated flight was short, then U.S. sensors are unlikely to have detected an extra object in orbit,” he said.
A third possibility is that the test involved completely different satellites that were not observed by non-government space trackers.
Christy’s analysis of the August activities revealed that the satellites conducted several experiments.
Since August, Payload C and Shijian-7 showed slight variations in orbit that are likely the result of thruster operation for position control, Christy stated in a recent blog post.
In August, Payload B, a non-maneuvering satellite, was positioned about 620 miles behind Payload C, a spacecraft that specialists say could be the craft with the manipulator arm, and Payload C gradually slowed to until is passed very close to the other satellite.
The robotic satellite may be part of efforts to develop China’s large space station set to be deployed around 2020.
However, Pentagon officials believe the small satellite activity is more closely associated with China’s secret ASAT program.
Little is known about the Chinese space warfare program, which is among the Chinese military’s most closely guarded secrets.
China conducted a direct ascent ASAT missile test in January 2007 that destroyed a Chinese weather satellite and created tens of thousands orbiting debris pieces that threaten both manned and unmanned spacecraft.
Chinese officials have told U.S. counterparts that the 2007 test was a one-time event and so far have not conducted further debris-causing satellite attack tests.
A U.S. official told the Free Beacon in August that the launch of the three satellites was part of Beijing’s covert anti-satellite warfare program.
The official said the craft with the robotic arm was viewed as the most threatening because U.S. satellites, vital strategic assets used by both the American military and civilian infrastructure, are vulnerable to kinetic or electronic disruption in space.
The official said the satellites are part of China’s “Star Wars” space weapon program that has been largely ignored by the Obama administration over concerns that pressing China to explain its space weapons would upset U.S.-China relations.
The ASAT program is a “real concern for U.S. national defense,” the official said.
Until the satellite capture, the mission of the spacecraft with the mechanical arm was unknown. It was thought that it could used to grab, gouge, or alter the orbits of other satellites.
The craft also could be used for maintenance and repair.
Rick Fisher, a Chinese military affairs specialist, said the robot-arm satellite that he believes is the Shiyan-7 is part of China’s dual-use space program that includes satellites for military close-surveillance and attack missions. Civilian applications include development of space manipulator arm technology.
“As an ASAT, a future version of the SY-7 could be used to take close-up images of U.S. satellites, to remove systems from those satellites and return them to China, to directly damage U.S. satellites or to plant ‘mines’ on those satellites or close nearby,” said Fisher, with the International Assessment and Strategy Center.
“An SY-7-like ASAT gives China the option to attack enemy satellites without creating a large cloud of debris that may also damage other Chinese satellites.”
Fisher said China recently hosted a major space conference and is seeking to position itself as a space “superpower” as a means to increase cooperation and technology acquisition from other countries.
At the conference, “Chinese officials made a deliberate appeal to Canada, which developed and built the manipulator arm used on the International Space Station and U.S. Space Shuttles,” Fisher said.
However, Fisher said China made every effort to conceal the People’s Liberation Army’s role in the space program and would probably deny any military role in the developing mechanical arm technology for offensive space operations.
“The ‘Canadarm’ [manipulator arm] was developed in Canada with Canadian funding and four were purchased by NASA for the U.S. Space Shuttle program,” he said.
China conducted a test launch of a new high-Earth orbit anti-satellite missile called the DN-2 in March, according to U.S. officials.

Sunday, December 09, 2012

New Weapons Systems Could Give Pentagon Unprecedented Power Over The Plane



Combining Biometrics, Cyberwarfare, and A Potential Future Aerospace Shield, The Pentagon Is Rushing Toward Uncharted Territory, and Domination.

By Alfred W. McCoy,
Courtesy Of "Alter-Net"

It’s 2025 and an American “triple canopy” of advanced surveillance and armed drones fills the heavens from the lower- to the exo-atmosphere.  A wonder of the modern age, it can deliver its weaponry anywhere on the planet with staggering speed, knock out an enemy’s satellite communications system, or follow individuals biometrically for great distances.  Along with the country’s advanced cyberwar capacity, it’s also the most sophisticated militarized information system ever created and an insurance policy for U.S. global dominion deep into the twenty-first century.  It’s the future as the Pentagon imagines it; it’s under development; and Americans know nothing about it.


They are still operating in another age.  “Our Navy is smaller now than at any time since 1917,” complained Republican candidate Mitt Romney during the last presidential debate.
With words of withering mockery, President Obama shot back: “Well, Governor, we also have fewer horses and bayonets, because the nature of our military's changed... the question is not a game of Battleship, where we're counting ships. It's what are our capabilities.”
Obama later offered just a hint of what those capabilities might be: “What I did was work with our joint chiefs of staff to think about, what are we going to need in the future to make sure that we are safe?... We need to be thinking about cyber security. We need to be talking about space.”
Amid all the post-debate media chatter, however, not a single commentator seemed to have a clue when it came to the profound strategic changes encoded in the president’s sparse words. Yet for the past four years, working in silence and secrecy, the Obama administration has presided over a technological revolution in defense planning, moving the nation far beyond bayonets and battleships to cyberwarfare and the full-scale weaponization of space. In the face of waning economic influence, this bold new breakthrough in what’s called “information warfare” may prove significantly responsible should U.S. global dominion somehow continue far into the twenty-first century.
While the technological changes involved are nothing less than revolutionary, they have deep historical roots in a distinctive style of American global power.  It’s been evident from the moment this nation first stepped onto the world stage with its conquest of the Philippines in 1898. Over the span of a century, plunged into three Asian crucibles of counterinsurgency -- in the Philippines, Vietnam, and Afghanistan -- the U.S. military has repeatedly been pushed to the breaking point.  It has repeatedly responded by fusing the nation’s most advanced technologies into new information infrastructures of unprecedented power.
That military first created a manual information regime for Philippine pacification, then a computerized apparatus to fight communist guerrillas in Vietnam.  Finally, during its decade-plus in Afghanistan (and its years in Iraq), the Pentagon has begun to fuse biometrics, cyberwarfare, and a potential future triple canopy aerospace shield into a robotic information regime that could produce a platform of unprecedented power for the exercise of global dominion -- or for future military disaster. 
America’s First Information Revolution 
This distinctive U.S. system of imperial information gathering (and the surveillance and war-making practices that go with it) traces its origins to some brilliant American innovations in the management of textual, statistical, and visual data.  Their sum was nothing less than a new information infrastructure with an unprecedented capacity for mass surveillance.
During two extraordinary decades, American inventions like Thomas Alva Edison’s quadruplex telegraph (1874), Philo Remington’s commercial typewriter (1874), Melvil Dewey’s library decimal system (1876), and Herman Hollerith’s patented punch card (1889) created synergies that led to the militarized application of America’s first information revolution. To pacify a determined guerrilla resistance that persisted in the Philippines for a decade after 1898, the U.S. colonial regime -- unlike European empires with their cultural studies of “Oriental civilizations” -- used these advanced information technologies to amass detailed empirical data on Philippine society.  In this way, they forged an Argus-eyed security apparatus that played a major role in crushing the Filipino nationalist movement. The resulting colonial policing and surveillance system would also leave a lasting institutional imprint on the emerging American state.
When the U.S. entered World War I in 1917, the “father of U.S. military intelligence” Colonel Ralph Van Deman drew upon security methods he had developed years before in the Philippines to found the Army’s Military Intelligence Division.  He recruited a staff that quickly grew from one (himself) to 1,700, deployed some 300,000 citizen-operatives to compile more than a million pages of surveillance reports on American citizens, and laid the foundations for a permanent domestic surveillance apparatus.
A version of this system rose to unparalleled success during World War II when Washington established the Office of Strategic Services (OSS) as the nation’s first worldwide espionage agency. Among its nine branches, Research & Analysis recruited a staff of nearly 2,000 academics who amassed 300,000 photographs, a million maps, and three million file cards, which they deployed in an information system via “indexing, cross-indexing, and counter-indexing” to answer countless tactical questions.
Yet by early 1944, the OSS found itself, in the words of historian Robin Winks, “drowning under the flow of information.”  Many of the materials it had so carefully collected were left to molder in storage, unread and unprocessed. Despite its ambitious global reach, this first U.S. information regime, absent technological change, might well have collapsed under its own weight, slowing the flow of foreign intelligence that would prove so crucial for America’s exercise of global dominion after World War II.
Computerizing Vietnam         
Under the pressures of a never-ending war in Vietnam, those running the U.S. information infrastructure turned to computerized data management, launching a second American information regime.  Powered by the most advanced IBM mainframe computers, the U.S. military compiled monthly tabulations of security in all of South Vietnam’s 12,000 villages and filed the three million enemy documents its soldiers captured annually on giant reels of bar-coded film.  At the same time, the CIA collated and computerized diverse data on the communist civilian infrastructure as part of its infamous Phoenix Program.  This, in turn, became the basis for its systematic tortures and 41,000 “extra-judicial executions” (which, based on disinformation from petty local grudges and communist counterintelligence, killed many but failed to capture more than a handfull of top communist cadres).
Most ambitiously, the U.S. Air Force spent $800 million a year to lace southern Laos with a network of 20,000 acoustic, seismic, thermal, and ammonia-sensitive sensors to pinpoint Hanoi’s truck convoys coming down the Ho Chi Minh Trail under a heavy jungle canopy.  The information these provided was then gathered on computerized systems for the targeting of incessant bombing runs. After 100,000 North Vietnamese troops passed right through this electronic grid undetected with trucks, tanks, and heavy artillery to launch the Nguyen Hue Offensive in 1972, the U.S. Pacific Air Force pronounced this bold attempt to build an “electronic battlefield” an unqualified failure.
In this pressure cooker of what became history’s largest air war, the Air Force also accelerated the transformation of a new information system that would rise to significance three decades later: the Firebee target drone.  By war’s end, it had morphed into an increasingly agile unmanned aircraft that would make 3,500 top-secret surveillance sorties over China, North Vietnam, and Laos. By 1972, the SC/TV drone, with a camera in its nose, was capable of flying 2,400 miles while navigating via a low-resolution television image.
On balance, all this computerized data helped foster the illusion that American “pacification” programs in the countryside were winning over the inhabitants of Vietnam’s villages, and the delusion that the air war was successfully destroying North Vietnam’s supply effort.  Despite a dismal succession of short-term failures that helped deliver a soul-searing blow to American power, all this computerized data-gathering proved a seminal experiment, even if its advances would not become evident for another 30 years until the U.S. began creating a third -- robotic -- information regime.
The Global War On Terror          
As it found itself at the edge of defeat in the attempted pacification of two complex societies, Afghanistan and Iraq, Washington responded in part by adapting new technologies of electronic surveillance, biometric identification, and drone warfare -- all of which are now melding into what may become an information regime far more powerful and destructive than anything that has come before. 
After six years of a failing counterinsurgency effort in Iraq, the Pentagon discovered the power of biometric identification and electronic surveillance to pacify the country’s sprawling cities.  It then built a biometric database with more than a million Iraqi fingerprints and iris scans that U.S. patrols on the streets of Baghdad could access instantaneously by satellite link to a computer center in West Virginia.
When President Obama took office and launched his “surge,” escalating the U.S. war effort in Afghanistan, that country became a new frontier for testing and perfecting such biometric databases, as well as for full-scale drone war in both that country and the Pakistani tribal borderlands, the latest wrinkle in a technowar already loosed by the Bush administration. This meant accelerating technological developments in drone warfare that had largely been suspended for two decades after the Vietnam War.
Launched as an experimental, unarmed surveillance aircraft in 1994, the Predator drone was first deployed in 2000 for combat surveillance under the CIA’s “Operation Afghan Eyes.” By 2011, the advanced MQ-9 Reaper drone, with “persistent hunter killer” capabilities, was heavily armed with missiles and bombs as well as sensors that could read disturbed dirt at 5,000 feet and track footprints back to enemy installations. Indicating the torrid pace of drone development, between 2004 and 2010 total flying time for all unmanned vehicles rose from just 71 hours to 250,000 hours. 
By 2009, the Air Force and the CIA were already deploying a drone armada of at least 195 Predators and 28 Reapers inside Afghanistan, Iraq, and Pakistan -- and it’s only grown since.  These collected and transmitted 16,000 hours of video daily, and from 2006-2012 fired hundreds of Hellfire missiles that killedan estimated 2,600 supposed insurgents inside Pakistan’s tribal areas. Though the second-generation Reaper drones might seem stunningly sophisticated, one defense analyst has called them “very much Model T Fords.” Beyond the battlefield, there are now some 7,000 drones in the U.S. armada of unmanned aircraft, including 800 larger missile-firing drones. By funding its own fleet of 35 drones and borrowing others from the Air Force, the CIA has moved beyond passive intelligence collection to build a permanent robotic paramilitary capacity.
In the same years, another form of information warfare came, quite literally, online.  Over two administrations, there has been continuity in the development of a cyberwarfare capability at home and abroad. Starting in 2002, President George W. Bush illegally authorized the National Security Agency to scan countless millions of electronic messages with its top-secret “Pinwale” database. Similarly, the FBI started an Investigative Data Warehouse that, by 2009, held a billion individual records. 
Under Presidents Bush and Obama, defensive digital surveillance has grown into an offensive “cyberwarfare” capacity, which has already been deployed against Iran in history’s first significant cyberwar. In 2009, the Pentagon formed U.S. Cyber Command (CYBERCOM), with headquarters at Ft. Meade, Maryland, and a cyberwarfare center at Lackland Air Base in Texas,staffed by 7,000 Air Force employees. Two years later, it declared cyberspace an “operational domain” like air, land, or sea, and began putting its energy into developing a cadre of cyber-warriors capable of launching offensive operations, such as a variety of attacks on the computerized centrifuges in Iran’s nuclear facilities and Middle Eastern banks handling Iranian money.
A Robotic Information Regime  
As with the Philippine Insurrection and the Vietnam War, the occupations of Iraq and Afghanistan have served as the catalyst for a new information regime, fusing aerospace, cyberspace, biometrics, and robotics into an apparatus of potentially unprecedented power. In 2012, after years of ground warfare in both countries and the continuous expansion of the Pentagon budget, the Obama administration announced a leaner future defense strategy.  It included a 14% cut in future infantry strength to be compensated for by an increased emphasis on investments in the dominions of outer space and cyberspace, particularly in what the administration calls “critical space-based capabilities.” 
By 2020, this new defense architecture should theoretically be able to integrate space, cyberspace, and terrestrial combat through robotics for -- so the claims go -- the delivery of seamless information for lethal action. Significantly, both space and cyberspace are new, unregulated domains of military conflict, largely beyond international law.  And Washington hopes to use both, without limitation, as Archimedean levers to exercise new forms of global dominion far into the twenty-first century, just as the British Empire once ruled from the seas and the Cold War American imperium exercised its global reach via airpower.
As Washington seeks to surveil the globe from space, the world might well ask: Just how high is national sovereignty? Absent any international agreement about the vertical extent of sovereign airspace (since a conference on international air law, convened in Paris in 1910, failed), some puckish Pentagon lawyer might reply: only as high as you can enforce it. And Washington has filled this legal void with a secret executive matrix -- operated by the CIA and the clandestine Special Operations Command -- that assigns names arbitrarily, without any judicial oversight, to a classified “kill list” that means silent, sudden death from the sky for terror suspects across the Muslim world.
Although U.S. plans for space warfare remain highly classified, it is possible to assemble the pieces of this aerospace puzzle by trolling the Pentagon’s websites, and finding many of the key components in technical descriptions at the Defense Advanced Research Projects Agency (DARPA). As early as 2020, the Pentagon hopes to patrol the entire globe ceaselessly, relentlessly via a triple canopy space shield reaching from stratosphere to exosphere, driven by drones armed with agile missiles, linked by a resilient modular satellite system, monitored through a telescopic panopticon, and operated by robotic controls. 
At the lowest tier of this emerging U.S. aerospace shield, within striking distance of Earth in the lower stratosphere, the Pentagon is building an armada of 99 Global Hawk drones equipped with high-resolution cameras capable of surveilling all terrain within a 100-mile radius, electronic sensors to intercept communications, efficient engines for continuous 24-hour flights, and eventually Triple Terminator missiles to destroy targets below. By late 2011, the Air Force and the CIA had already ringed the Eurasian land mass with a network of 60 bases for drones armed with Hellfire missiles and GBU-30 bombs, allowing air strikes against targets just about anywhere in Europe, Africa, or Asia.
The sophistication of the technology at this level was exposed in December 2011 when one of the CIA’s RQ-170 Sentinels came down in Iran.  Revealed was a bat-winged drone equipped with radar-evading stealth capacity, active electronically scanned array radar, and advanced optics “that allow operators to positively identify terror suspects from tens of thousands of feet in the air.”
If things go according to plan, in this same lower tier at altitudes up to 12 miles unmanned aircraft such as the “Vulture,” with solar panels covering its massive 400-foot wingspan, will be patrolling the globe ceaselessly for up to five years at a time with sensors for “unblinking” surveillance, and possibly missiles for lethal strikes. Establishing the viability of this new technology, NASA’s solar-powered aircraft Pathfinder, with a 100-foot wingspan, reached an altitude of 71,500 feet altitude in 1997, and its fourth-generation successor the “Helios” flew at 97,000 feet with a 247-foot wingspan in 2001, two miles higher than any previous aircraft.
For the next tier above the Earth, in the upper stratosphere, DARPA and the Air Force are collaborating in the development of the Falcon Hypersonic Cruise Vehicle.  Flying at an altitude of 20 miles, it is expected to “deliver 12,000 pounds of payload at a distance of 9,000 nautical miles from the continental United States in less than two hours.” Although the first test launches in April 2010 and August 2011 crashed midflight, they did reach an amazing 13,000 miles per hour, 22 times the speed of sound, and sent back“unique data” that should help resolve remaining aerodynamic problems.
At the outer level of this triple-tier aerospace canopy, the age of space warfare dawned in April 2010 when the Pentagon quietly launched the X-37B space drone, an unmanned craft just 29 feet long, into an orbit 250 miles above the Earth. By the time its second prototype landed at Vandenberg Air Force Base in June 2012 after a 15-month flight, this classified mission represented a successful test of “robotically controlled reusable spacecraft” and established the viability of unmanned space drones in the exosphere.
At this apex of the triple canopy, 200 miles above Earth where the space drones will soon roam, orbital satellites are the prime targets, a vulnerability that became obvious in 2007 when China used a ground-to-air missile to shoot down one of its own satellites. In response, the Pentagon is now developing the F-6 satellite system that will “decompose a large monolithic spacecraft into a group of wirelessly linked elements, or nodes [that increases] resistance to... a bad part breaking or an adversary attacking.” And keep in mind that the X-37B has a capacious cargo bay to carry missiles or future laser weaponry to knock out enemy satellites -- in other words, the potential capability to cripple the communications of a future military rival like China, which will have its own global satellite system operational by 2020.
Ultimately, the impact of this third information regime will be shaped by the ability of the U.S. military to integrate its array of global aerospace weaponry into a robotic command structure that would be capable of coordinating operations across all combat domains: space, cyberspace, sky, sea, and land. To manage the surging torrent of information within this delicately balanced triple canopy, the system would, in the end, have to become self-maintaining through “robotic manipulator technologies,” such as the Pentagon’s FREND system that someday could potentially deliver fuel, provide repairs, or reposition satellites.
For a new global optic, DARPA is building the wide-angle Space Surveillance Telescope (SST), which could be sited at bases ringing the globe for a quantum leap in "space surveillance.”  The system would allow future space warriors to see the whole sky wrapped around the entire planet while seated before a single screen, making it possible to track every object in Earth orbit.
Operation of this complex worldwide apparatus will require, as one DARPA official explained in 2007, "an integrated collection of space surveillance systems -- an architecture -- that is leak-proof." Thus, by 2010, the National Geospatial-Intelligence Agency had 16,000 employees, a $5 billion budget, and a massive $2 billion headquarters at Fort Belvoir, Virginia, with 8,500 staffers wrapped in electronic security -- all aimed at coordinating the flood of surveillance data pouring in from Predators, Reapers, U-2 spy planes, Global Hawks, X-37B space drones, Google Earth, Space Surveillance Telescopes, and orbiting satellites. By 2020 or thereafter -- such a complex techno-system is unlikely to respect schedules -- this triple canopy should be able to atomize a single “terrorist” with a missile strike after tracking his eyeball, facial image, or heat signature for hundreds of miles through field and favela, or blind an entire army by knocking out all ground communications, avionics, and naval navigation.
Technological Dominion Or Techno-Disaster?
Peering into the future, a still uncertain balance of forces offers two competing scenarios for the continuation of U.S. global power. If all or much goes according to plan, sometime in the third decade of this century the Pentagon will complete a comprehensive global surveillance system for Earth, sky, and space using robotics to coordinate a veritable flood of data from biometric street-level monitoring, cyber-data mining, a worldwide network of Space Surveillance Telescopes, and triple canopy aeronautic patrols. Through agile data management of exceptional power, this system might allow the United States a veto of global lethality, an equalizer for any further loss of economic strength.
However, as in Vietnam, history offers some pessimistic parallels when it comes to the U.S. preserving its global hegemony by militarized technology alone. Even if this robotic information regime could somehow check China’s growing military power, the U.S. might still have the same chance of controlling wider geopolitical forces with aerospace technology as the Third Reich had of winning World War II with its “super weapons” -- V-2 rockets that rained death on London and Messerschmitt Me-262 jets that blasted allied bombers from Europe’s skies. Complicating the future further, the illusion of information omniscience might incline Washington to more military misadventures akin to Vietnam or Iraq, creating the possibility of yet more expensive, draining conflicts, from Iran to the South China Sea. 
If the future of America’s world power is shaped by actual events rather than long-term economic trends, then its fate might well be determined by which comes first in this century-long cycle: military debacle from the illusion of technological mastery, or a new technological regime powerful enough to perpetuate U.S. global dominion.

Tuesday, October 23, 2012

The International Quantum Teleportation Space Race



By Adam Mann,

There is an international quantum teleportation space race heating up. Around the world, countries are investing time and millions of dollars into the technology, which uses satellites to beam bits of quantum information down from the sky and and could profoundly change worldwide communication.

This is not a maybe-sort-of-one-day quantum technology. Quantum teleportation has been proven experimentally many times over and researchers are now eyeing the heavens as their next big leap forward. Most of what remains are the nuts and bolts engineering challenges (and some more money) before it becomes a thing of the present.
Though it may be disappointing to hear, quantum teleportation is not about instantly sending a person or object between two places – this is no “Beam me up, Scotty,” or “Bampf!” Instead, the technique involves the perhaps even freakier task of separating a subatomic particle from its quantum state.
“Once you disembody the state of one of particle, you can then recreate the particle in remote copy,” said physicist and computer scientist Charles Bennett of IBM, who co-authored the first paper on quantum teleportation in 1993.
Though the team’s paper was purely theoretical at the time, scientists since then have done many experiments teleporting particles over longer and longer distances. In the past year, a team from Chinaand another in Austria set new records for quantum teleportation, using a laser to beam photons through the open air over 60 and 89 miles, respectively. This is many times farther than the previous record of 10 miles, set in 2010 by the same Chinese team. With scientists extending quantum teleportation to such distances, many are already considering the next step: zapping particles and information from an orbiting satellite to a relay station on Earth.
If developed, quantum teleportation satellites could allow spies to pass large amounts of information back and forth or create unhackable codes. Should we ever build quantum computers – which would be smaller and exponentially more powerful than modern computers, able to model complex phenomenon, rapidly crunch numbers, and render modern encryption keys useless – they would need quantum teleporters in order to be networked together in a quantum version of the internet.
China plans to launch a satellite with a quantum teleportation experiment payload in 2016 and the European, Japanese, and Canadian space agencies are hoping to fund their own quantum teleportation satellite projects in the coming years. Conspicuously, the U.S. is far behind the pack because of a bureaucratic reshuffling that left quantum communication research experiments without government support in 2008. Whoever loses this new competition could fail to capitalize on the promise of quantum communication altogether.

How It works

The trick to teleportation comes from a quirk of quantum mechanics that allows you to create two particles that are completely in tune with one another, which are known as an entangled pair.
Let’s say you have two entangled photons and you are measuring their polarization, or the direction in which they are oscillating. If one photon has a vertical polarization, you know the other one is going to be exactly the same. The trouble is that quantum mechanics works on probability – before you measure a particle’s polarization it is equally likely to be horizontal or vertical. According to the standard interpretation of quantum mechanics, particles exist in some strange simultaneous vertical/horizontal state until you make a measurement. With an entangled pair, you can just measure one particle, and no matter how far away the other one is from the first, it will instantly gain whatever property you measured.
“It’s like two people play dice and they always get the same result; it’s always random but they always get the same result,” said physicist Rupert Ursin of the Austrian Academy of Sciences in Vienna, who works with one team that set the recent distance record.
Of course, even with such dice, there’s no way to compose a signal or transfer information. You could give your friend one die and tell him to stand in another room, agreeing beforehand on a binary system where rolling an even number means 0 and an odd number means 1. But because the outcome of each roll is random, all your friend would end up doing is sending you a haphazard string of zeroes and ones.
To send a controllable signal, you need quantum teleportation. This requires three subatomic particles, say photons. Two of the photons are entangled with one another, and the third contains the bit of information you want to send. For a simple example of how this works, let’s say you place one photon from the entangled pair in L.A. and the other in New York.
In L.A., a scientist measures one of the entangled photons and the third particle at the same time. She doesn’t find out their exact properties but just their relative ones – if they are the same or opposite one another – and the particles get destroyed during this measurement. Let’s say she discovers that the particles are opposites and relays this information to her New York colleague. He then measures his entangled photon and knows that the opposite of that measurement is the bit of information he was meant to receive.
Another way to explain it involves a CIA-interrogation analogy that Charles Bennett, co-author of the first quantum teleportation study, likes to use. Imagine that a woman named Alice who lives in Seattle has uncovered information that the CIA desperately needs to thwart an attack. The CIA wants to interrogate her and they need to be able to do it at their headquarters in Washington D.C. Trouble is, Alice doesn’t want to come to D.C. and nothing will persuade her to do so. But the CIA happens to have a pair of magical twin agents named Romulus and Remus who always answer yes or no questions exactly the same way.
So the CIA sends agent Remus to Seattle, not to interrogate Alice, but just to learn if she gets along with Remus. The two meet and get to know each other. Alice discovers that she hates Remus. Every question that she would have answered yes to in life, he answers no. So now all Remus has to do is tell his boss back at headquarters that his and Alice’s answers are opposite. Now the CIA can simply question Romulus to get the information they need.
But just as Romulus and Remus started out together in D.C., quantum teleportation scientists usually don’t have entangled particle pairs just sitting around in two different locations. During an experiment, researchers will often generate an entangled pair in one place. They measure the state of one of the entangled particles and compare that to a third particle containing the bit of data to be sent. They then use a laser beam to send the information about the particles’ relative states, along with the second entangled particle, to another location.
Because subatomic particles are sensitive and small, they’re liable to get lost, meaning that experimenters have to be careful about their protocols. The first quantum teleportation experiments involved sending particles across small spaces, on the order of inches. Eventually, researchers figured out how to shoot a particle several feet, and then hundreds of feet.
“Now we want to show that this kind of communication might be useful on a global scale,” said physicistAnton Zeilinger of the University of Vienna, who led the Austrian quantum-distance team. “The method of choice is to use quantum communication via satellite,” he added, since photons can’t travel very far in glass fiber without getting absorbed.

The Race To Space

Being able to do this quantum satellite teleportation would provide many new advantages, in particular the ability to create cryptographic keys for sensitive information that would be stored in subatomic particles. If anyone were to measure the particle, they would change its properties so spy agencies would always know if they’ve been hacked. Someday in the future, James Bond and MI6 could be passing secret codes back and forth on a teleported light beam through space.
With this in mind, “there are now a couple of research groups considering how to build a quantum payload suitable for a satellite,” said physicist Thomas Jennewein of the University of Waterloo in Ontario, Canada. “There’s basically a race going on to get into space first with a quantum satellite.”
Though Japanese researchers are planning a small quantum experiment on a laser-communication satellite named Socrates that will launch in 2014, the only group with a scheduled satellite devoted to quantum communication is from China.
The Chinese satellite would show the feasibility of several technologies, including quantum key distribution, entanglement distribution, and quantum teleportation, said physicist Yu-Ao Chen of the University of Science and Technology of China in Shanghai, who worked with the Chinese team led by Jian-Wei Pan that set the recent distance record. The main obstacle is how to shrink down the large equipment used in their previous record-breaking teleportation experiment, he said.
The Chinese space agency has put $554 million toward funding five scientific satellites over the coming years, one of which will be used for quantum communication. This is a new direction for China, which has in the past launched more than 100 satellites, but until now only one for dedicated scientific experiments. While the exact figure for the quantum communication project is unknown, it could be on the order of $50 to 100 million, estimated Zeilinger. This stands in contrast to Europe and Canada, which have invested an order of magnitude less for their projects.
This has put China in an enviable position. Other teams are lining up for the chance to collaborate and use their satellite for quantum teleportation experiments. “We already have a deal with Austria to use it when it passes over Vienna,” said Chen. “Germany, Canada, Italy, and many other groups also want to be involved in this project.”
Absent from this tussle is the U.S., whose quantum communication programs have floundered in recent years. Much of this can be traced back to a programmatic reorganization that occurred when the newly created Intelligence Advanced Research Projects Activity (IARPA) – aka DARPA for spies – took over quantum computing research funding from the National Security Agency and National Institute of Standards and Technology in 2008. IARPA said that it would no longer be providing money to the various quantum communications projects because it didn’t want to fund other agencies’ research.
“One of the first things that happened was the quantum communication research program was put into a good deal of chaos, and largely ended,” said physicist Richard Hughes of Los Alamos National Laboratory in New Mexico. Many quantum communication researchers were upset, prompting them towrite an open letter to John Holdren, director of the White House Office of Science and Technology policy.
While in 2012 U.S. government agencies have shown renewed interest in such research, “there’s been a four-year gap and the world doesn’t stand still,” said Hughes. “It’s interesting how strong China has become in the last four or five years in the international science scene — they’ve really come along fast.”
In order to gain the high ground, all interested countries are racing forward with their technology development. In addition to shrinking the machines used for quantum teleportation to get them aboard satellites, engineers will have to make them usable during all hours. Currently, quantum teleportation experiments only happen at night, because during the day the sun’s light washes out whatever signal researchers are trying to send.
“The greatest challenge in making long-range quantum communication and quantum computing is getting good storage of quantum information,” said Bennett. Since photons are readily absorbed in most materials, it’s difficult to keep them around for much longer than a fraction of a second.
In the meantime, everyone is making sure they stay abreast of the latest developments going on around the world.
“We’re not anxious but definitely keeping our eyes open and talking to the various groups,” said Jennewein. “We have the sense that we have to keep moving if we want to be part of the early game.”
Ursin said that if his Austrian team had the funding, they could develop new experiments in about four or five years. Still, there is a ways to go before people are using quantum teleportation and communication routinely, said Hughes. The technology may feasibly be ready in as little as a decade, but not all new developments are immediately adopted. Cellphones were technically available 40 years ago, but only as unwieldy and relatively powerless devices – it was only in recent times that they became ubiquitous. But others in the field are ready for the next breakthrough.
“For us it’s not a question if these technologies will be used, it’s a matter of when, how, and where will we really use them in everyday life,” said Jennewien.
Images: 1) Schematic of quantum teleportation beaming particles from a satellite to two ground stations. 2) and 3) The Austrian team’s laser beam teleports photons between the Canary Islands of Tenerife and La Palma. IQOQI Wien

Saturday, April 14, 2012

Ascent - Commemorating The Space Shuttle

Posted By "CavalierZee"



This is absolutely sensational

Photographic documentation of a Space Shuttle launch plays a critical role in the engineering analysis and evaluation process that takes place during each and every mission. Motion and Still images enable Shuttle engineers to visually identify off-nominal events and conditions requiring corrective action to ensure mission safety and success. This imagery also provides highly inspirational and educational insight to those outside the NASA family.

This compilation of film and video presents the best of the best ground-based Shuttle motion imagery from STS-114, STS-117, and STS-124 missions. Rendered in the highest definition possible, this production is a tribute to the dozens of men and women of the Shuttle imaging team and the 30yrs of achievement of the Space Shuttle Program.

The video was produced by Matt Melis at the Glenn Research Center.
Finally PAO uploaded a 720p version, not sure if we will get 1080p like you wanted, but at least we are making progress.

"Best of the Best" Provides New Views, Commentary of Shuttle Launches

Tuesday, January 10, 2012

Weather Weapons and Earthquake Bombs

World Leaders Condemn Britain and America’s Secret Arsenal 

By T.J. Coles 
Friday, Jan 6, 2012 
Courtesy Of "Axis Of Logic"


“Over earth and ocean with gentle motion
This pilot is guiding me.”
P.B. Shelley, The Cloud

After the Haiti earthquake in 2010, which the US used as yet another excuse to militarise the tortured country’s aid relief, Hugo Chavez bravely quoted a Russian Northern Fleet document suggesting that America’s huge array of electromagnetic and acoustic weapons (which have been stranding poor dolphins and whales for decades) were used to trigger the earthquake.1 The Western media had a good chuckle at Chavez, keeping silent about the fact that official sources reveal the existence of such weapons, some of which have been around since the 1930s.

World Leaders Speak Out


In 2011, Iran’s President Mahmoud Ahmadinejad told Western powers to stop causing droughts in his country. “European countries are using special equipment to force clouds to dump [their water],” he said.2 The “special equipment” refers to the Airborne Laser, which was designed for weather modification;as well as NASA’s “beaming satellite-based microwaves at hurricanes as a means of redirecting them” (Wilson Quarterly)ground-based ionisers; chemtrails; and classic old silver iodide (see below).



Ionisers used in the UAE. (Daily Mail)

In 2010, following unprecedented heat-waves in Russia, which pushed food prices sky-high and subsequently triggered the Arab Spring, it was reported in Radio Free Europe online that a leading Russian Scientist, Andrei Areshev, published an article in Russia’s major journalForeign Policy naming America’s X-37B space shuttle, launched in 2010, as the culprit. Media reports at the time said it was as if the heat-wave’s path of destruction was being guided. The X-37B has a payload capability which the US refuses to disclose, meaning that it is probably a laser.5 UK Ministry of Defence papers, cited below, suggest that the US has plans to use space platforms for weather control.


The X37-B. What is this thing carrying? (NASA)

In 2010, Pakistan and Iran were warned by the US not to go ahead with a pipeline which would have transported affordable Iranian fossil fuels to much needed areas of Pakistan, and possibly into India. As a relatively powerful country, India was given a sweetener, namely the US enabled it to continue working on its nuclear programme. As a weak state, Pakistan was simply threatened. Less than a month after the commencement of the pipeline deal, Pakistan was hit with its worst-ever flood. Its newspaper,The Nation, stated that:
We witnessed that when one flood flow passed us by, the meteorological authorities would predict a second storm system developing over the area and warned the nation of subsequent floods of the same or increased intensity. This happened over and over. Then the rumours started spreading. It was alleged that our classic and reliable friend - the United States of America - is manipulating the weather over Pakistan … [H]ad it been a natural monsoon phenomenon, rains would be widespread not over the same area again and again.6
In 1997, US Air Force studies revealed that China’s military was convinced of US weather modification operations in Chinese territory.7 This was hardly a radical assumption given what the leaked Pentagon Papers revealed about America’s weather weapon operations in Vietnam (Operation Popeye).8 In 2008, Vanity Fair reported that Xinjiang Province—where most of China’s oil happens to be, and where US-sponsored counter-government activities are strong—is the source of tension between the provinces because it is seeding clouds and “stealing” its neighbours’ rainwater.9


In late 2010, the Middle East experienced unprecedented snowstorms. The Daily Mail reported that “Fifty rainstorms were created” that year in the United Arab Emirates “using technology designed to control the weather.” The newspaper explained that Western scientists “used ionisers to produce negatively charged particles [which] are then carried up from the emitters by convection.”10 Earlier in the year, the British Ministry of Defence announced in their thirty-year trends study that “Weather modification will continue to be explored” for military purposes: and not for the first time.11





The Dark History of Weather Weapons


In 1952, the Royal Air Force flooded an entire village in Devon (England) with ninety million tonnes of water, killing 35 people, by using cloud seeding technology.12 Today, microwave lasers are used in place of dry ice and silver iodide. As far back as 1945, Britain and America created a tsunami bomb, according to the declassified records, which was successfully tested in New Zealand’s waters, and designed for use in the post-WWII era.13Japan’s hydrokinetic press, designed in 1933, laid the basis for the bomb’s design.14 Like flood and drought creation, the technology has moved on since then and has now been replaced with microwave pulses.



Lynmouth village, Devon UK, flooded after RAF rainmaking experiments (BBC)



In 1997, US Defense Secretary William Cohen admitted that the Pentagon’s environmental warfare specialists were “intensifying our efforts” to “alter the climate, set off earthquakes, volcanoes remotely through the use of electromagnetic waves.”15 The media failed to report this rather important story, and have consistently refused to discuss the giant ionospheric heater in Alaska, High-frequency Active Auroral Research Programme (HAARP), which has been condemned by the European Parliament for its “manipulation of global weather patterns”, making it “a serious threat to the environment.”16


A Ministry of Defence study predicts refugee crises and the rise of shantytowns out to 2036. “This is particularly true in areas susceptible to volcanic and seismic activity and in low-lying coastal regions where extreme weather events and inundation are likely to occur with increasing frequency” (emphasis in original).17 Given that weather and seismic activity are notoriously difficult to predict, the question is how do they know? Perhaps it is because BAE Systems built the HAARP machine?18 The same Ministry of Defence document also stated that America may put up space platforms “to harness climatological features in the support of military or strategic advantage.”



HAARP Alaska, built by BAE Systems. (US Defense Department)



Today, the British-financed and armed Indian Army is being used to clear populations to make way for multinational corporations and extractive industries (as Arundhati Roy and others have documented).19 The same is true in Colombia and Bolivia, where US mercenary firms such as Blackwater and DynCorp are employed to spray chemicals on the populations under a counter-narcotics pretext.20


But this technique is messy, PR-unfriendly, and has led to massive resistance. A cheaper alternative is to drive the people out with extreme weather which, as a US Air Force document subtitled “Owning the Weather” recommended, could be blamed on nature.21 The people can then be forced into what the UN calls “habitat areas.”22 The electromagnetic waves mentioned by Cohen and pulsed in order to achieve this, are created by HAARP and similar ionospheric heaters.



Official slide: HAARP injects power into the atmosphere which is amplified upon re-entry (Wired Magazine)

The HAARP monstrosity is a 40-acre phased array antenna, designed and built with US taxpayer money.23 It should worry us that the ionisers used in the UAE created storms, hailstones, and lightning with limited amounts of power. HAARP is a 180-anntenna array which pulses 4.5 billion watts into the polar regions giving it the ability to disrupt the Jet Stream, thereby enabling the machine to cause droughts and floods. This is all in violation of the UN’s ENMOD Convention (1977),24 which sought to prevent this kind of behaviour. HAARP also to amplifies the electromagnetic energy of the Earth in order to do as Cohen suggested.



HAARP’s ionizers. Western scientists working in the Middle East were able to cause storms with smaller ionizers: HAARP boasts 180 over a 40 acre area.

Covert Warfare


HAARP Alaska is just one such heater. In 2002, the Russian State Duma revealed another two: one in Norway and one in Greenland (where the ice sheets just happen to be melting faster than anywhere else).25 The Ministry of Defence’s paper on weather modification mentioned its use in “disrupting lines of communications”, which is what HAARP can do according to the Russian State Duma. Communications can be broken in conjunction with chemtrails, which are vapour-like aerosols being sprayed daily across the world by unmarked and military jets (possibly drones, too).26


A SPACECAST 2020 paper advocated “modifying the ionosphere through insertion of gaseous compounds … [which] can also be enhanced by shooting a high energy laser, microwave, or particle beam … [thereby] having a jamming effect on the enemy’s radiowave propagation.”27 This gives the Pentagon Full Spectrum Dominance over communications.28According to Russia Today (RT, broadcast 24 November 2011), America’s “research facility in Alaska”—which must have been a reference to HAARP—had been interfering with Russia’s Mars probe, suggesting that HAARP is one of the many ground-based apparatus involved in the weaponisation of space.



HAARP’s Full Spectrum Dominance (Wired Magazine)

The purpose of weaponising the weather is simple, and was explained in Navy documents dating back to the nineteen fifties,29 namely to ruin crops and infrastructure to cause economic damage. 


The Navy recommended ionising the atmosphere,30 which they, and others, now have the technology to do, and are doing via private companies in the UAE and in Alaska with HAARP (as noted above). The elite can destroy the middle classes of the world by engineering fiscal collapses (as they did in 2007-8), and in countries not so tied to the US economy (such as Australia), or in emerging economies that boast significant natural resources not yet under Anglo-American control (such as BRIC), “natural” devastation can be used in place of conventional warfare. This also enables plausible deniability.


Evermore psychopathic science is being explored in order to make sure the victim-nations never recover, namely DARPA’s insect-machine hybrid programme, which was candidly admitted by the British Ministry of Defence. It is a shocking indictment of the media and intellectual culture that such documents can enter the public sphere and elicit no commentary:
Environmental warfare will be capable of exploiting the delivery and spread of plant and human pathogens through the release of remote controlled insect-machine hybrids or insects, in order to cause physical, and subsequently, financial damage. Such methods may be used as incapacitants or as lethal pathogens to attack humans. [The add-on that “terrorists” will have the ability to use insect-machines is too ridiculous to discuss.]31
From the psychopathic elite’s perspective, another good thing about causing/triggering environmental destruction is that populations can be traumatised by relentless media coverage of disasters to the point where irksome human tendencies, such as compassion, are driven out of people’s minds. As a result, there will be fewer resistance to war and fewer relief pledges. The Ministry of Defence explained that out to 2036, “Humanitarian fatigue may grow in proportion to the number of crises that emerge and the ability of governments and individuals to pay”—again, unless they are planning to generate these crises, how do they know? (Emphasis in original).32


Weather weapons and earthquake bombs are a fraction of America’s commitment to achieving Full Spectrum Dominance by 2020. We need to be responsible and realise that taxes have paid for decades of secret research into these fields which, in our time, are coming to fruition. We need to show the courage of Chavez and Ahmadenijad and speak out against this—particularly those journalists and academics who have access to public platforms and are keeping quiet.


We also need to take seriously the likelihood that Mother Earth herself—specifically the ionosphere and troposphere (with daily chemtrail spraying)—has been turned into a weapon. Generally, those responsible are cowardly men hiding away in Command and Control centres, using modern science in order to fulfil their outdated genetic impulses for power and domination: impulses which should have been left in the Stone Age—and if we keep letting them damage the ionosphere, that is an era to which most of us may be returning.33



Author: "What the hell are they spraying?" (Amateur footage, 2011)

That this is not vapour can be seen: the substance has come out of two separate tanks, the southern material is some kind of foam. Notice at the sticky trail on the far right where the spray engine has switched off: it doesn’t even match the upper foam.


Chemtrails from space (NASA) According to NASA, they are “contrails (not chemtrails).” Water vapour doesn’t last that long; it doesn’t spread out and form clouds; nor do commercial jets crisscross in such a manner.


Chemtrails in Cornwall, UK (Youtube.com/alyncurtis)


Declassified film of British Royal Air Force chemical spray plane.(Crown Copyright, 1950s)


Chemtrails in the 1940s


Notes


1. Fox News, “Chavez Mouthpiece says U.S. Hit Haiti With ‘Earthquake Weapon’”, 21 January, 2010. Also, YouTubeExcerpts of the document are cited in Lisa Karpova, “Haiti: The U.S. Created the Earthquake in Haiti?”,Pravda, 24 January, 2010.



2. Telegraph, “Mahmoud Ahmadinejad says Europe ‘stealing Iran’s rain’”, 21 May, 2011.


3. Arnold A. Barnes, “Weather Modification: Test technology Symposium ’97: Session B: Advanced Weapons/Instrumentation Technologies”, Johns Hopkins Applied Physics Laboratory, United States Air Force, Air Force Phillips Laboratory, Air Force Materiel Command, 19 March, 1997.


4. James R. Fleming, “The Climate Engineers: Playing God to Save the Planet”, Wilson Quarterly, Spring, 2007. The idea that such technologies would be used to “save the planet” is too ridiculous to discuss.


5. Ashley Cleek, “Russian Scholar Warns of ‘Secret’ U.S. Climate Change Weapon”, Radio Free Europe, 30 July, 2010.


6. A.R. Jerral, “Weather Manipulation”, The Nation, 14 September, 2010,Subsequently removed, but quotes and extensive sources can be found in my “Weather Weapons,” Lobster Magazine, Issue 62.


7. Maj. Barry B. Coble, Benign Weather Modification, United States
Air Force School of Advanced Airpower Studies, March 1997, Alabama:
Air University Press.



8. See, among other sources, US Military, “Case Study 2: Weather Modification: The Evolution of an R&D Program into a Military Operation”, undated.


9. William Langewiesche, “Stealing Weather”, Vanity Fair, May, 2008.


10. Daily Mail, Have scientists discovered how to create downpours in the desert? .3 January, 2011.


11. Developments, Concepts and Doctrine Centre, “Strategic Trends Programme: Global Strategic Trends – Out to 2040”, Ministry of Defence, 9 February 2010 (4th edition), p. 156.



12. See BBC News Online, “Rain-making link to killer floods”, 30 August, 2001, ; John Vidal and Helen Weinstein, “RAF rainmakers ‘caused 1952 flood’”, Guardian, 30 August, 2001, ; Sally Pook, “Deadly flood blamed on RAF rainmakers”, Telegraph, 31 August, 2001, ; for chemtrailing across the world, see “Don’t Talk About the Weather.”

13. Eugene Bingham, “Tsunami bomb NZ’s devastating war secret”, New Zealand Herald, 25 September, 1999, ; Also see Eugene Bingham, “Devastating tsunami bomb viable, say experts”, New Zealand Herald, 28 September, 1999.



14. T.D.J. Leech, “The Final Report Project “Seal””, Department of Science and Industrial Research, 18 December, 1950, Wellington: Government Printer.


15. William Cohen, “Cohen address 4/28 at Conference on Terrorism: Weapons of Mass Destruction, and U.S. Strategy”, Sam Nunn Policy Forum, University of Georgia, 28 April, 1997.


16. Maj Britt Theorin (Rapporteur), “Report on the environment, security and foreign policy”, Committee on Foreign Affairs, Security and Defence Policy, European Parliament, 14 January, 1999, Resolution A4-0005/99, DOC_EN\RR\370\370003 PE 227.710/fin.



17. Developments, Concepts and Doctrines Centre, “The DCDC Strategic Trends Programme: 2007-2036”, Ministry of Defence, 23 January, 2007 (3rd edition).


18. BAE Systems, “BAE Systems completes world’s premiere facility for ionospheric physics research”, news release, Ref. 209/2007, 27 June, 2007.


19. Arundhati Roy, 2008, Listening to Grasshoppers: Field Notes on Democracy, London: Penguin.


20. See Jeremy Scahill, 2008, Blackwater: The Rise of the World’s Most Powerful Mercenary Army, London: Serpent’s Tail, pp.448-9.


21. Col. Tamzy J. House, Lt. Col. James B. Near, Jr., LTC William B. Shields, Maj. Ronald J. Celentano, Maj. David M. Husband, Maj. Ann E. Mercer, Maj. James E. Pugh, “Weather as a Force Multiplier: Owning the Weather in 2025”, Air Force 2025, August, 1996.



22. UN, “The Habitat Agenda.”


23. US Air Force and Navy, “Program Purpose”, HAARP Website, undated.



24. United Nations, “Convention on the Prohibition of Military or Any Other Hostile Use of Environmental Modification Techniques” (ENMOD Convention 1977), Geneva, 18 May, 1977, The original Annex, cited in my “Weather Weapons”, includes prohibition of altering the Jet Stream.


25. Federation of American Scientists, “Russian parliament concerned about US plans to develop new weapon”, No. FBIS-SOV-2002-0808, 8 August, 2002.


26. Besides being listed in Kucinich’s Space Preservation Act (2001), , chemtrails were also mentioned by name by David Drew (MP) in the British Parliament after reports of commercial pilot and passenger sickness (i.e., the pilots are forced to take paths polluted with chemtrails [see Nick Owens, Daily Mirror, “Pilots Grounded by Poisonous Fumes”, 11 November, 2007, ). Sonoma State University’s Project Censored listed chemtrails as one of the most underreported stories of 1999. 


On the use of drones, see “Weather as a Force Multiplier” (note 19 above), which discussed in 1996 the possibility of using drones for weather weaponisation. 1996 is the year that global citizens first reported chemtrails, according to the US Air Force(which denies their existence; though declassified photographs show thatthey have existed since the 1940s: In 2008, Live Science reported that 60% of the troposphere is now covered in previously undiscovered particles. What a coincidence.



27. SPACECAST 2020, Space Weather for Communications, circa 2000.


28. US Space Command, “Vision for 2020”, February, 1997.


29. Noah Shachtman, “Navy Research Paper: ‘Disrupt Economies’ with Man-made ‘Floods’ and ‘Droughts’”, Wired, 11 February, 2008.


30. US Military, “Case Study 2: Weather Modification: The Evolution of an R&D Program into a Military Operation”, undated.


31. Developments, Concepts and Doctrine Centre, “Strategic Trends Programme: Global Strategic Trends – Out to 2040”, Ministry of Defence, 9 February 2010 (4th edition).



32. Developments, Concepts and Doctrines Centre, “The DCDC Strategic Trends Programme: 2007-2036”, Ministry of Defence, 23 January, 2007 (3rd edition).


33. NASA is predicting major solar flares at the end of 2012, and their probes have discovered holes in the ionosphere (which shields us from such flares) between the North Pole and Equator, which is where the Defense Department has been setting off atomic bombs since the 1950s and is now blasting with HAARP pulsations. Consequently, the super-wealthy have built themselves hundreds of subterranean survival bunkers in preparation for the worst. Former Minnesota Governor, Jesse Ventura, approached the following construction companies for information on underground bunkers built for elites, and not one would discuss the topic: Hensel Phelps, PLC/Harbert, PLC, Weitz-Cohen, Interstate Highway Construction, Sturgeon Electric, Intermountain Electric, RK Mechanical, Ludvik Electric, TARCO, Kiewit, FCI, HB Zachary, MA Mortenson, Ames, and Ball, Ball and Brosamer. 

© Copyright 2011 by AxisofLogic.com

This material is available for republication as long as reprints include verbatim copy of the article in its entirety, respecting its integrity. Reprints must cite the author and Axis of Logic as the original source including a "live link" to the article. Thank you!