PRODUCTS TO PROTECT YOURSELF
AGAINST ELECTRONIC HARASSMENT!

CLICK HERE!


 

Electronic Harassment.
Yes, it happens...

Special Solutions, Inc. performs Electronic Sweeping and Surveys, using the best possible Technical Surveillance Counter Measures (TSCM), to determine if you're being electronically harassed. We then proscribe the proper course of action to eliminate the electronic harassment threat.

What is Electronic Harassment?
 

If someone uses any electronic device to aid them in invading your person or property for the purpose of gathering information illegally, or for the purpose of causing harm, this is Electronic Harassment. Electronic Harassment comes in many forms and types. We'll try to explain what they are and what to do about them below.
  • Electronic Surveillance

    Electronic Surveillance is the imposed observation of a person's belongings, person or surroundings through the use of electronic listening devices, video recording or transmitting devices, spectral imaging through heat or infrared, sound or other radiation sources, and any other means of observing a person's actions, possessions or routines. Not all forms of surveillance use electronic devices and not all forms of surveillance are illegal or considered harassment.  Simply observing someone using ones eyes is certainly also considered surveillance and is not illegal in and of itself. Surveillance has become quite advanced and will become more pervasive as our society progresses in technology. Micro recorders, covert hidden video cameras (such as pinhole cameras), ultra tiny microphones, micro transmitters, and other bugging devices are easy to get by anyone at spy novelty shops and online stores--including EBay!

     
  • Electronic Sabotage/Interference (Jamming)

    Electronic sabotage or interference is any sabotage that is intentionally configuring personal property to either be destroyed or malfunction. Any intentional interference such as electronic noise generators, sound generators, light generators, spark gap disrupters, or any other form of EMI (electromagnetic interference) which either destroys, disrupts, causes malfunction or loss of resources is deemed to be electronic harassment.

     
  • Directed Harmful High Energy Devices

    This is the most dangerous form of electronic harassment and is quite easy to implement against a person. Directed harmful high energy microwave devices and weapons can include such devices and equipment that are easily available almost anywhere in the World where there are people. Microwave ovens can be modified to focus and direct up to 1200 watts or more, depending on the model, of microwave energy at a person or property and are easy to produce. The results of an attack by a high energy device can be lethal, they can kill or at the least disable a human being or other animals. Attacks from high energy microwave weapons leave blisters, cause internal bruising and/or bleeding, stimulate cancer, cause cataracts, encourage tumors to grow, generate boils, or leave red patches on the skin. Directed Harmful High Energy Weapons will have effective ranges from the point of contact to several hundred yards. Directed Harmful High Energy Weapons can be used to destroy electronic devices and cause severe interference in computers and alarm systems which can allow forced entry or destruction of vital data.
     

  •  

  • Radar guns are available from surplus stores most anywhere and can be obtained from ex-military sources or even police departments. Radar gun power outputs range from a two or three watts to 3 Megawatts! Portable radar guns range in size from small hand held devices to vehicle mounted long range high power models. These devices have very long ranges due to their greater power, higher frequencies and shorter wavelength. Radar guns emit long or short pulses of high energy capable of causing instant damage or death to living creatures. Semiconductor destruction or malfunction, brain damage & stopping vehicles are other uses for these devices. Other forms of directed harmful high energy include devices such as tasers, klystron guns (radar guns), ion beam guns, plasma pulse guns, soliton bombs, and many more devices.



    Directional Microwave EMP Rifle (PARTIAL KIT) Partial kit (shown above). This partial kit will include a 50,000W (yes it says 50KW) Watt X-band military microwave magnetron with complete spec sheets from two manufacturers and operational information to make it work (about 30 pages), EMP rifle plans (over 49 pages), and qty:3 (12KV @ 1A) rectifiers. A device such as this can be made the size of a super soaker water gun, it operates at 9.2GHz and with a properly tuned horn antenna will have an effective range of over 300 yards (possibly more with larger antenna). Such a device could possibly cause semiconductors to burn out, microprocessors to malfunction, inductors to counter induce and create CEMF, induce RF noise, cause ionization of air or gases, cause junction rectification and erase computer data on hard drives, disk and solid state device. Operating such a device may be in violation of State or Federal Laws, consult your Local authority before operating such a device. UPS GROUND SHIPPING ONLY DUE TO INTENSE MAGNETIC FIELD FROM MAGNETRON. Do not purchase this kit if it is illegal to own or operate in your area. (This kit is real and available on the internet. The above photo and description was taken directly from an internet website, but we will not tell you where to find it!)






     

PRODUCTS TO PROTECT YOURSELF
AGAINST ELECTRONIC HARASSMENT!

CLICK HERE!

 

 

MICRO-BOTS ARE HERE.
Yes, It's True...

European researchers are working on ways to mass produce tiny robots, (called "microbots") each about the size of a fly, to be used in surveillance, micromanufacturing, medicine and cleaning.

The project, called I-SWARM (intelligent small-world autonomous robot for micromanipulation) was inspired by swarming insects. Measuring less than 4mm square, the microbots are equipped with components that allow them to collect and relay data using a single circuit board.
 

A conductive adhesive is used to attach components to a double-sided flexible printed circuit board designed with surface mount technology. The circuit is folded in three and wraps around the application-specific integrated-circuit.

Atop the device, a solar cell generates 3.6V, which enables the microbot to walk on three vibrating legs; the fourth leg is used a a sensor.

Researchers from Sweden, Spain, Germany, Italy and Switzerland are working on the project, which is being coordinated by the University of Karlsruhe in Germany.

 

 

 

  • Directed energy weapon for "Active Denial" is now being deployed by the military. Voice/Data/Image induction

 

  • This form of electronic harassment causes an individual to think they are loosing their mind or that they have a mental illness. There are three known methods of imposing VDI induction.
     
  • Microwave Carrier ULF-UHF Induction Method. This method utilizes a modulated microwave signal with either an audio, video, or other form of signal or even data may be used. The microwave energy with the VDI (Voice/Data/Image) carrier signal is then directed to the target area or individual. The reaction to this modulated microwave energy from one individual to another will usually be slightly different making it very difficult to diagnose as electronic harassment. The Voice/Data/Image induction form of harassment causes victims to hear voices in their heads or see random images or lights. Similar technology was developed to enable communication between humans and dolphins or even was purported to be used by secret agencies for the purposes of mind reading and control. A device known as the wireless neurophone has been patented along with other such devices that perform similar functions. A microwave carrier ULF-UHF induction device can be placed at a targets location and operated and monitored remotely. Transmission locations can be concealed in the same ways that cell telephone transmission sites so that they cannot be identified easily. See Stealth for some examples of the way cell antennas can be hidden in plain sight.
     
  • Direct Contact Induction Method.

    This method requires direct skin contact of the subject. Voice/Data/Image induction (VDI) is induced through the skin, using the natural ability of the skin to conduct energy. The DCI method uses a simple high voltage D.C. carrier, which is modulated with the VDI signal and is coupled to the subject body using capacitive skin pads. The contacts need to contact any part of the skin anywhere on the body. The signal is received and interpreted by the nerves below the skin surface and sent to the brain which processes the information signals, causing the images or sounds or data to appear to the target without the actual use of their eyes or ears. A similar device is also known as the neurophone. There are many patents for similar devices. Evidence of unauthorized use on someone is two or more circular red marks on the skin or two or more blisters.
     
  • Magnetic Pulse Induction Method.

    The neurons within the nerves and human brain are very sensitive to magnetic fields. The MPI method uses an induction coil to induce a low to medium magnetic field in and around the brain causing the neurons to misroute, slow down or revert. This form of electronic VDI harassment is often diagnosed as EMI (electromagnetic interference) sensitivity, which is similar to someone getting headaches from prolonged usage of cellular phones or nausea from being around power lines for extended periods of time. Magnetic Pulse Induction Method may be employed by using a device implanted within the targets home or surroundings and can be operated remotely.
     
  • Radiation

    Radiation is a very common form of harassment. A potential harasser can easily buy an old x-ray gun from a surplus dealer and with only slight modifications use it to bombard a target with deadly amounts of x-ray radiation. Radiation devices can be battery powered and used for long periods of time. High exposure to x-ray radiation will cause tumors, brain disorders, mental illness, tremors, headaches, cataracts, seizures or even death. Radiation harassment is usually done over long periods of time, ranging from days to years, in order to induce harm. Radiation harassers can also get various radioactive materials such as thorium nitrate, plutonium oxide, uranium nitrate, and uranyl nitrite. Using radioactive materials a harasser can cause a terrible and agonizing death.
  • Implants (Science Fiction?) Guess again.
     

    Implants are without a doubt the most invasive form of harassment. Electronic implants consist of transmitters, ESF generators, micro-neurophonic transceivers, tracking devices and other micro sized devices designed to cause harassment by tracking or controlling movement and thought. The most common implant was designed many years ago and is still used to this day. It consists of a unit that is powered by bodily fluids and is capable of transmitting voice signals, high voltage pulses, emitting a small tracking beacon signal, or other unspecified uses (mind control).

     

     
      

     

      Newest version of a biochip implant. For more information about this chip go to: http://www.nasatech.com/Briefs
    //May99/ARC14280.html


     

    Millions may be carrying microchips in their bodies worldwide. The Safe Medical Devices Act, which became a law in 1990, requires USA manufacturers of implants and medical devices, to adopt a method for identifying and tracking their products permanently implanted in humans, and to keep track of the recipients, in case malfunctions arise. Breast implants, pacemakers, replacement heart valves and prosthetic devices implanted in millions worldwide are all to be tracked. And one of the methods used to track these devices is implanting microchips which store data about the manufacturer, the surgeon, the date of implant, etc.
     

  • Laser Harassment Devices

    The use of simple, easy to procure lasers to harass or "Dazzle" a subject is becoming more prevalent. Subjects of this type of harassment have reported seeing "little red dots" on their curtains, through their windows or on themselves. There have been numerous reports of people being momentarily blinded by red lights (red lasers) while they were driving in their cars. Some of these incidents have resulted in traffic accidents, although no permanent blindness has yet to be reported as a result of being "spotted".

     

    Laser gun sight, zoom rifle scope, 3-axis adjustable tripod head
    The parts that make this device can be purchased at any gun store
    and the tripod is a standard issue camera tripod.


    Hand-held unit with laser gun sight and golf scope

United States Patent 5,629,678
Gargano , et al. May 13, 1997

Personal tracking and recovery system

Abstract

Apparatus for tracking and recovering humans utilizes an implantable transceiver incorporating a power supply and actuation system allowing the unit to remain implanted and functional for years without maintenance. The implanted transmitter may be remotely actuated, or actuated by the implantee. Power for the remote-activated receiver is generated electromechanically through the movement of body muscle. The device is small enough to be implanted in a child, facilitating use as a safeguard against kidnapping, and has a transmission range which also makes it suitable for wilderness sporting activities. A novel biological monitoring feature allows the device to be used to facilitate prompt medical dispatch in the event of heart attack or similar medical emergency. A novel sensation-feedback feature allows the implantee to control and actuate the device with certainty.
Read The Complete Patent Information


This is one of 66 low-earth orbiting (LEO) satellites comprising the Iridium satellite system. The original company went bankrupt so the US Department of Defense assisted in making sure the system stayed in operation. The system is currently maintained by the Boeing Company.


 

This is a diagram of the planetary coverage of the Iridum system. This system has transmit and receive coverage of the entire planet. Each circle is a coverage sector.


Of course there are many other forms of electronic harassment not mentioned here, but the most common forms of electronic harassment that you may likely encounter have been covered. Please read Microwave Detection - Remote Mind Control Technology for more on this subject.

Symptoms of Electronic Radiation Exposure

Symptoms may include but are not limited to: Headache, eye irritation, dizziness, nausea, skin rash, facial swelling, weakness, fatigue, pain in joints and/or muscles, buzzing/ringing in ears, skin numbness, abdominal pressure and pain, breathing difficulty, irregular heartbeat, sexual stimulation and hearing voices (see Patent #4,858,612). Additional symptoms have been reported in some individuals such as paralysis, balance problems, body and/or muscle spasms, convulsions, confusion, depression, difficulty in concentrating, seizure, sleep disturbances, and memory difficulties.

What Can Be Done To Protect Against Electronic Harassment?

In a legal sense, there isn't too much that can be done. You could change your venue, relocate or move to avoid the harasser but this isn't usually a practical method for a variety of reasons.  For starters, the best thing to do is give us a call from a secure phone. We will conduct a sweep of the suspect areas to locate the source of the suspected harassment and then assist in a course of action to stop the harassment.


Natural obstacles are cheap and effective in blocking most X-rays and microwave or RF (could be a radar gun) signals that a harasser might use. Mountains, caves, desert areas, and large lakes or oceans offer excellent protection and can block or distort most forms of electronic harassment.


Shielding signals with Passive or Active shielding can be an effective measure.
If harassment is general to an area and not specifically directed to you, simply moving to another location is the easiest method to stop the harassment. If the harassment is specific to you, then you'll need to employ some sort of shield or cover, such as mountains or a cave. Shielding may be your only alternative to stop the harassment if you cannot employ natural obstacles or shields. Passive shielding is less expensive then Active shielding and consists of special metal materials designed to block high frequency RF energy, X-rays, etc. Active shielding uses sophisticated electronic equipment to jam, capture, redirect, distort or nullify the harmful energy.

It isn't legal for a private individual, a company or a corporation to use electronic harassment on you. The military and law enforcement, however, can use non-lethal weapons (see USC Title 50 Chapter 32 Section 1520a). Further, testing of electronic equipment; discovering unauthorized electronic surveillance; training of intelligence personnel by officers the United States is allowed. http://www4.law.cornell.edu/uscode/50/1805.html


Notwithstanding any other provision of this subchapter, officers, employees, or agents of the United States are authorized in the normal course of their official duties to conduct electronic surveillance not targeted against the communications of any particular person or persons, under procedures approved by the Attorney General.

Special Solutions, Ltd. is an experienced and knowledgeable professional private investigative agency with the ability to find and then help you to eliminate Electronic Harassment. Advanced Electronic Security Co. is also a specialist in electronic surveillance and counter-surveillance. We only utilize the best and latest technology and techniques to assist and support victims of Electronic Harassment.
 

NEED MORE HELP? FIND OUT THAT YOU MAY BE NOT ALONE!
CLICK ON THIS LINK BELOW:

http://www.freedomfchs.com/id12.html

PRODUCTS TO PROTECT YOURSELF
AGAINST ELECTRONIC HARASSMENT!

CLICK HERE!

 

NEED MORE INFO? READ ON!

Many fail to understand is that it’s not just the government. Private businesses like Aaron’s, as well as large corporate conglomerates, are themselves engaging in the surveillance of Americans with the development of products and services specifically for this purpose – and often without the consent of their customers, or, through terms of services agreements that include dozens of pages of unintelligible fine print.

As modern technology continues to advance at breakneck speeds, just as the merger of the corporations and the state are occurring within political circles, so to are they becoming more prevalent in the intelligence sphere.

Fellow Americans, everything you do is being monitored.

With respect to the government, it’s not by choice. However, when dealing with private businesses, we have readily accepted our own fate by accepting into our lives the very technologies that make it all possible.

  • What You Do Online Is No Secret: As you sit in the perceived privacy of your own home reading this article, a log of your surfing habits and preferred reading or video viewing subjects is being created. Your IP address, that unique identifier the points specifically to the broadband line connected to your home modem, is time stamped with every web site you visit. Everything you watch at video web sites, everything you download online, and even your search queries are logged. You don’t even have to have an account with a major online service provider – your IP is sufficient – but that user account you create is used to further improve your personal profile and characteristics.
  • We can see you. We can hear you. Not only are your actions logged, but if you were deemed a person of interest for whatever reason, that little camera staring back at you on top of your monitor or that microphone built directly into your PC can be flipped on for remote surveillance at any time. While Aaron’s furniture or the local school district may need to install special software to remotely view what you’re doing in your bedroom, public sector intelligence groups operating on equipment that is technologically advanced compared to the consumer products of today is perfectly capable of entering your ‘secure’ home network and turning on those video and audio features – and you’d have absolutely no clue it’s going on.
  • Your cell phone is a mobile monitoring device. Much like your computer, all modern day cell phones come with cameras. And they all have a microphone. It is no secret that law enforcement agencies have the ability to easily tap these devices and listen and watch anything that’s going on. This capability is essentially hard-wired right into the phone. In fact, it has been reported that even if your cell phone is turned completely off, the microphone can still be remotely activated. The only known solution is to remove the battery if you want to ensure complete privacy. Sounds pretty far-fetched doesn’t it? Up until two weeks ago, so did the notion that Apple and Android phones could track and log everywhere you go. We now know that this is exactly what’s happening, and literally, every movement you make is tracked within inches of your location. A log of everywhere you have been has been logged if your cell phone was in your pocket.
  • Phone Conversation and Email Analysis. If you haven’t guessed yet, phones can be dangerous to your personal privacy. In the 1990′s, the few alternative media web sites on the internet often discussed a little know operation in Europe called Echelon. It was hard core tin foil conspiracy type stuff. You know, the kind where intelligence agencies were plugged into the entire phone, fax and email grids and had computers analyzing conversations in multiple languages looking for keywords and keyword strings. If you said a specific word, your conversation was immediately red-flagged and distributed to appropriate intel desks. As sci-fi as this may sound, it turns out that the ‘conspiracy theorists’ were 100% correct about Echelon. Its existence has been confirmed by the US government. Of course, no such system could possibly exist here domestically.
  • Your pictures are not private. When you snap those photos of the kids in the front yard and subsequently post those pictures on your favorite social network, guess what? That’s right, an inquiring viewer on your social networking account can track exactly where that picture was taken. Remember that location logging thing with your cell phone? It turns out that every single picture you take with most newer model cell phones will be tagged with specific GPS coordinates. When you upload that picture anywhere online, that location information becomes publicly available. So anyone who wants to know can now track down exactly where it is your kids were when the picture was taken, or, where exactly you were if you happened to engage in an activity that may be deemed illegal.
  • The social network. For many, it’s fun to spend every waking hour updating the rest of the world on what we’re doing. We publish our thoughts. We upload our pictures. We even click a like button at the end of articles like this one to let people know what we’re into and what they should be reading. As social networking becomes bigger, connecting hundreds of millions of people across the world, so to does the profiling of members of these networks. Have you agreed with what a certain person has said in a recent post? If they’re a person-of-interest for whatever reason, then guess what? You’ve just become one too. Did your friend recently take a picture of you at a party getting rowdy? Once that hits the social network, facial recognition technology will identify you and publish your name for all the world to see, including current or future employers. It’s a social network, and its purpose is to learn everything about you. Perhaps this is why key U.S. intelligence agencies made no effort to hide their $5 billion investment in the largest network in the world recently. Social networking is a critical tool in the struggle to categorize every person on earth.
  • Toll tags and license plates. Even if you’ve given up the cell phone and prefer to go without for privacy reasons, when you drive around town you may have noticed those little intersection cameras – at least four of them – on every major (or more regularly now, minor) intersection. While most of them may not be tied to the computer processing systems yet, some, and especially those in sensitive areas and toll booths can automatically read your license plate. Like your cell phone, your position can be logged on a regular basis with either your toll tag or simply, your license plate. Impossible? Not really. Especially when you consider that the information required to track your personal movements are nothing but a few data bytes. All anyone really needs to keep extensive records is a bigger hard drive.
  • We know your underwear size. Admittedly, we sometimes have a hard time remembering what size pants or shirts we need to purchase. But while our memory may be failing, private data aggregators have plenty of it, and the processing power to boot. Everything you have ever bought with a credit card or membership club card is sent off for processing and aggregation to centralized data centers. While you may use a Visa card at one store, a Mastercard at another, and pay cash with a grocery membership card somewhere else, it’s as easy as finding your name and cross referencing that on your cards – and your entire shopping profile can be created. The purpose, we’re told, is to better improve our shopping experience and provide market data to companies so that they can improve their advertising. We can only guess at who else has access to this information, which happens to be very easily accessible and widely available for a small fee.
  • Radio Frequency Identification. Say you’ve decided to scrap cell phones, internet surfing and electronic payment or membership cards. And, you choose to walk everywhere you go. Not a problem for enterprising surveillance technologists. Large retail distributors have already begun implementing RFID technologies into every major product on store shelves. For now, most of the RFID tracking is limited to transportation and inventory control and is designed to track products on the pallet level. Tracking capabilities are improving, however, and are quickly being implemented on the individual product level. That means when you buy a soda at your local grocery store, an RFID monitoring station will be capable of tracking that soda across the entire city, with the goal eventually being whether or not you put that aluminum can in a trashcan or a recycle bin once you were finished drinking it.
  • One day, you may be issued a ticket by a law enforcement computer autmatically for failing to dispose of your trash properly. Again, it’s simply an issue of hard drive space and processing power – and technology will soon get over that hurdle. All electronics, clothing, food packaging, and just about everything else will soon contain a passive RFID chip.
  • Ripping Data Off Your Private, Secure, chip-enhanced personal identification cards. Passports, driver’s licenses, credit cards, cell phones – they all store data. Personal data like banking information, birth date, social security numbers, pictures, phone books – basically everything you’ve ever wanted to keep private. As storage technology further integrates into our daily lives, and everything from our passports to our health insurance cards contains a digital chip that stores our private information, it will become much easier to rip that data from your purse or wallet without ever touching you. A recent report indicated that local law enforcement officials now have devices that, when you’re pulled over, can remotely pull all of the data on your cell phone. This demonstrates how simple it is for anyone, be it law enforcement or criminals, to gain access to everything about you – including you personal travel habits.
  • Eye in the sky. We’ve previously reported about domestic drone programs in Houston and Miami. Local and state law enforcement agencies are increasingly adding Federal and military technologies to their surveillance arsenals. Drones have the capability of flying quietly and at high altitude, while monitoring multiple targets simultaneously. It’s been reported that domestic drones can not only monitor in the visible light spectrum, but night vision and infrared. That means they can ‘see’ what you’re doing in your home behind closed doors. Incidentally, there have been reports of roaming ground patrols with similar infrared technology, capable of seeing right through your walls. This is not science fiction – this is reality right now. Combine this with real-time spy agency satellites and interested parties have the ability to see and hear you, even when you’re locked indoors with computers and cell phones disabled.
  • Security cameras. We’ve already discussed traffic cams. But cameras are not limited to just the government. Residences, retailers and even day cares are now interconnecting camera security systems with online web browsing. And, as we pointed out earlier, these are easily subject to unauthorized access. Certain cities in the US are now allowing residents to register their personal or business camera systems with the city to allow for local police monitoring. The government doesn’t need to push the technology on us. The people willingly accept the technology en masse in exchange for a sense of being more secure.
  • I See Something! When all else fails, the last bastion of surveillance is human intel. It’s been used by oppressive regimes for millennia. The Nazis used it. The Communists used it (and do to this day). It was very effective. And now, we’re using it. Remember, if you See Something, Say Something. Even if what someone sees is not accurately represented because of mis-perception, you can be assured that when they say something rapid response units will be on the scene to diffuse the situation.

Fusing It All Together

What is the purpose ? It depends who you ask.

Local law enforcement will tell you it’s to protect the safety of the public. Federal law enforcement and intelligence agencies say it’s to prevent terrorism. Apple and Android tells us it’s so that they can produce better mobile products and services. Retailers want more customer data so they can improve advertising and marketing.

Whatever the case, it’s clear that almost everything we do, whether it’s in the privacy of our own homes or on public streets, can be tracked, monitored, and logged.

As technology improves and the internet interconnects even more nodes, the information collected by the public, private and personal sectors will be further aggregrated, cross referenced and analyzed. Your personal profile will become more detailed, including your shopping habits, hobbies, likes, dislikes, political affiliation, reading preferences, friends, and potentially your psychological and emotional status.

All of this information will eventually be fused into one large database. In fact, the government has already setup well over fifty fusion centers around the nation. What goes on in these centers is kept strictly confidential, and there doesn’t seem to be any agency in charge of them, but we know they exist, and we know that their purpose is to acquire, aggregate and act on whatever information they have available to them. These are fairly new, appearing just over the last several years. But be assured that as processing power and software technology improves, so too will the surveillance capabilities of fusion like facilities, whether they belong to government, private industry or criminal industry.

History has shown what tends to happen in surveillance societies. Often times, that surveillance is forced upon the people by tyranical government. We won’t argue that this is not the case today, as governments the world over are not hiding the fact that they want to know what everyone is doing. The odd thing is, we the people don’t seem to care a whole lot. What we’re seeing is that the surveillance state is expanding in concert with the definitions for what is criminal or terrorist-like activity – and that’s scary. Every year, more people are finding themselves on no-fly lists, no-work lists, or other terrorist watch lists. We’ve facetiously noted in a previous commentary that at this rate, the terrorist watch list will exceed the U.S. population by 2019. While we were, for the most part, trying to put a humorous spin on an otherwise very important issue, the fact is, that as surveillance expands, more and more people will become enemies of the state or persons-of-interest. That’s just how these things tend to work with these types of things.

In today’s world, the private sector is ready and willing to help government achieve these goals of total control and involvement in our personal lives. In fact, it is at times becoming difficult to distinguish between government and private industry.

But if we are to lay blame on anyone here, it must be ourselves. We need only take a look into the mirror and we’ll see who makes these technologies possible. It’s the American consumer who willingly adopts the technologies into his or her daily life, often standing in lines a quarter mile long to acquire the latest in digital monitoring.

While our votes at the ballot box account for something, how we vote with our pocket books will ultimately determine the direction of our country. We have empowered the corporation to lobby Congress and further erode our own freedoms, whether it’s with the surveillance technologies we choose to integrate into our lives, the food we buy, the cheap Chinese goods we’ll stampede children over, or the gas we pump into our vehicles.

 

 

 

PRODUCTS TO PROTECT YOURSELF
AGAINST ELECTRONIC HARASSMENT!

CLICK HERE!

 

 

 

 

John C. Frycek

John C. Frycek, LPD, PPS, CIS

Director of Operations

 

 

There are fine Cigars and cheap Cigars, but there are 
no fine cheap Cigars....
Winston Churchill

 

SPECIAL SOLUTIONS, LTD.
1508 Miner Street
Des Plaines, Illinois 60016
(847) 803-6922 Fax: (847) 803-9022
www.specialsol.com E-mail:  info@specialsol.com

 Link



Hit Counter