GEOINT And The Automated Battlefield, music: Winds of Fire From The Refuge CD by Eric Thor Karlstrom (7:25)
From 2 D.J. Welsh youtube interviews (2016) on GEOINT and the Purpose and Scope Jade Helm 15
DJ Welsh (Level 9 News): The Final Report of the 2014 GEOINT symposium, written by intelligence professionals… regarding multi-INTElligence persistent surveillance….. This is network centric warfare where each person is a human network node on the Global Information Grid (GIG).
Global data collection is being accelerated on every level. As far as this network centric-Artificial Intelligence system is concerned, you will be reduced to the sum total of the data collected on you. And that is the end game in the quest to control more than 7 billion people on the planet…… “Mastering the Human Domain.”
They’re collecting everything. Their customers are the proponents of global government. Their adversaries appear to be the unbridled masses of humanity.
This could also be considered gang stalking. From the perspective of intelligence and law enforcement agencies and corporations which use organized gang stalking as a secret and illegal weapon for subversion… the perfect operation in this context is one in which the target becomes progressively isolated, impoverished, emotionally degraded and eventually seeks what appears to be the only available outlet, suicide.”
The Force Management Model (developed by MITRE Corps.): Government now perceives the American people as its greatest threat. Patriots will be classified as terrorists, and the terrorist government will be deemed patriots. PARKA- can handle complex queiries against large data dumps.
Jade Helm II computer software is part of much a larger command and control system that goes beyond military applications. It’s called GEOINT; It’s global in scope- and everything regarding the internet, social platforms. ….. If something has the word smart in front of it, for example, smart grid, smart cities, smartphone, smartTV, smartappliances- all of these are plugged into the GIG (Geographic Information Grid).
GEOINT is a tool for the proponents of global government in order for them to cast a neural net over humanity. How do you control 7 billion people? If you control the environment they live in, you can control them. GEOINT is a complete, all-encompassing Command and Control system. When people are used as physical geo-located nodes on a network on a human terrain system. How do you remove that? Individuals can be removed as nodes. Just disconnect them. Erase their data and eliminate their connectivity to the GIG. Remove their relationships, communications, and earnings capability.
Moderator (John B. Wells): This is like Stalin on steroids. They’d go into the home and take everything- and effectively erase them from existence.
D.J. Welsh: Where’s the central point for data collection? The GIG (Geographic Information Grid). And these NSA data dump centers in Bluffdale, UT-
Threat assessment centers are global and an integral part of this program. ABI (Activity Based Intelligence) gathered from open source data (facebook, linkedin, internet, cloud computing, cloud storage)- activities, transactions (physical and virtual), vulnerabilities and capabilities of individuals and groups across all domains of the operational environment. All collected data- is geo-located to a specific spot on the earth- and tied to you, the node.
The concept of humanity being managed and enslaved by an elite technocratic society is no longer a future vision. The network centric global A.I. system for human command and control is here.
A subheading in their document states: “The process of sense making in complex human endeavors:” “This approach uses a set of cognitive constructs that translates tacit knowledge to the focal knowing of the objective world.”
How are they accomplishing this? They are mapping your mind. They are creating these maps with all of the information that’s being collected on everyone regarding every aspect of their lives. The macro-cognition component of the system is the process of dissecting the human domain.
Jade II AI computer software- it’s all network topography to optimize communication and data transfers. Everything, communications, everything, is tied in to the GIG.
The software is being used now. Another command and control problem is this system is designed to handle is:
“The enemy has always been able to adapt to a rapidly changing environment to hide itself from exposure. In order to adapt itself to combat this problem the kill chain had to be compressed from hours to seconds. The system removes the administrative delay in the kill chain. It has no moral compass, no empathy, or regrets.” (It’s a computer program.)
“The system is designed to achieve dominance in cyberspace, cyber-power, and cyber-strategy. This capability will continue to evolve even though key technical, social, and information trends begin to stabilize. It will capitalize on social engineering for offensive military and civilian operations.”
In other words, this is a technical approach to the (gang stalking) tactics employed in Nazi Germany by the Stasi, the Brown Shirts, and the SS. This is just a technological version of those social engineering tactics they used then.
“It’s a self-organizing, vision-capable, expectation-capable, recognition-capable, situationally-aware, emotionally-intelligent, goal-oriented system. The system thinks, plans, and executes.”