Category Archives: Weather control

Reason for everything, BioAPI and Chemtrails Pt. 6 – Frequently Asked Questions

And BioAPI serie continues with now some most commonly asked questions…

1) What is a BioAPI?

In order to program your typical laptop computer you need an API. Application Programming Interface. This is simply how to talk to the computer so a programmer can tell it to do things, like read a DVD, recognize mouse movement, etc. A BioAPI is exactly the same thing, except instead of computer hardware a BioAPI interfaces with your body parts, specifically your neurons and synapses which control your body and mind. Also known as wetware, essentially the BioAPI in you consists of nano-implants. These implants are required because it’s simply not possible to influence, communicate or control any part of your body or mind with classical methods as a electromagnetic quantum signal has nothing to talk to, hence the requirement of a middleware (the nano-implants or wetware).

To summarize – chemtrails spray the entire planet with nano-fibers which you breathe in. These fibers contain (nano & micro) components which construct and install nano-implants which the aggregate of constitutes what is commonly known as a Biological Application Programming Interface allowing for the complete monitoring, control and extension of all body and mind functions in a given host (you, and everyone on the entire planet).

You are the base model surrogate.

2) Is a BioAPI bad?

No, it’s good.

3) Is a BioAPI good?

No, it’s bad.

4) So which is it?

When someone reaches for the bible to jusitify their acts you’re in big trouble. All throughout history man has tried to dream up reasons to punish another man and impose his will on him, possibly with a valid reason. When he cannot come up with a valid reason… out comes the bible. The best biblical example is Dixie in Daddy I’m a Zombie (2011) where she becomes targeted [a zombie] right after simply being jealous, because jealously is a sin. Another example is the “useless eater” is the one who dies in Toxic Skies (2008), because even if you try to protect yourself from all the judgement by doing nothing, they have a sin for that to, it’s called sloth. So now your guilty for doing something, or nothing. It’s your choice. The absolute absurdity of it all is also proven when a toddler is shown to take the pills [and thereby symbolically contracts phase 2] at the very end of the movie and clip for Zombex (2013); because after all we need to nano-attack and punish the child when it steals a cookie from the cookie jar right? Yes, that’s why it is being shown. On the other hand the positive possibilities are endless.

Men never do evil so completely and cheerfully as when they do it from a religious conviction.

Blaise Pascal


To clarify – they have engineered and released a nano-tech disease on humanity. Traditional symptoms such as coughing, pains and lesions are only occasionally used to symbolically represent the disease within the media such as shown here and here or with the clip for Contracted (2013). In real life the physical symptoms only surface when the nano-tech disease is first contracted (known as a phase 2) and I attempt to describe them here and here. After the nano-tech successfully installs itself across your body cavity the BioAPI becomes fully active and symptoms could then (depending on tests and subsequent judgment) be elevated to actual actions and events such as public/gang stalking, strange thoughts, mind reading and other nano-tricks including suspension & manipulation of memory. The possibilities then become endless as you are programmableyou are the robot.

So there are traditional and mostly temporary symptoms from the actual nano-tech at first; but then the diease elevates and becomes one of dishonor, judgment, harassment, confusion and nano-assault. There is a lot happening with the BioAPI, the scope is huge, and cannot all be described in one paragraph. If you exclude this disease aspect (phase 2) it becomes one of the greatest things to happen to humanity.

5) What is gang stalking?

Gang stalking, stalkers or other public/organized stalking is when random people you have never met before from the public stalk you (more accurately someone with phase 2) wherever you go. You may go to the bank, and a stalker will be there. This is definitely what it appears like. It is just another illusion as I have repeatedly said throughout this site; aka Black Limousine (2010). The purpose is to psychologically manipulate people who become targeted with phase 2 in an effort to destabilize them. In reality these people from the public are already close by and are simply mind controlled on demand (via suggestion) to be present or give acts or signs that they are there for you. They have no idea they are doing it, and the thoughts someone has to notice these so called stalkers are not even their thoughts to begin with. This is one of the many aspects of a large and complicated program that has been over engineered to accomplish and deliver the most impossible to believe things in an effort to confuse, monitor, judge, help and harm targeted individuals. It’s difficult to comprehend until you go through it. A good example and demonstration can be found in the review for Ultrasonic (2012).

6) So this is mind control right?

Yes, but the term mind control is so 1960. I picture a chimpanzee hooked up to electrodes. Its 2018, mind control technology has changed. Whenever I say ‘mind control‘ think of the word ‘convince‘, because that’s more like it, they simply convince someone mentally to do something by thinking for, or with, them in real time; it works very well because no one ever doubts the thoughts they are having are wrong or not theirs to begin with. And for extreme circumstances they can suspend your memory turning you into a mindless robot. It’s unstoppable. Also see Earthkiller (2011) for details on this convincing or suggesting.

Also remember mind control is only one aspect of the overall functionality provided by the greater BioAPI. Also see the John Hodgson video.

7) Why do they put everything in the movies?

It constitutes a warning and public notice. For example Gamer (2009). It’s hidden in plain sight, therefore you can’t see it because it’s outside of your sphere. That’s just how it works.

8) Why it this web site finally telling everyone the complete real truth?

To be clear, Data Asylum was released simply because one man, or a small group [the people behind phase 2, or moreso via BioAPI automation by a supercomputer] are physically attacking people with nano-technology who have not done a single thing to anyone ever. Their belief, viewpoint or what they “think” is used as justification to harm and assault another. This is the exact “sheep think” they hate. Where a mere point of view is used to harm another person. Therefore as you can conclude – they are the sheep they hate. That is the only reason this web site is live. I did not want to release this web site.

In fact, this is what they ironically think they are ultimately doing to targeted individuals. They believe they are exploiting the “sheep mind” of a targeted individual by leveraging the association of like events or statistical anomalies to construct illusions and false realities in which they hope said targeted individual will externalize against, believe in and care about what is happening and thereby act out and harm themselves in some way (see Black Limousine (2010)); or in the alternative harm someone else for no valid reason (aka the “sheep brain” in action) in which then justifies them (the people behind phase 2) in continuing to act against the targeted individual to harm and attack said individual even more or in some cases actually kill them if they “think” it’s justified.

Lots of sheep think going on you’ll notice. “I think x” therefore “I can hurt you“… where x is always false, merely an opinion, or a fictitious point of view. Always.

9) How does someone get phase 2? Is this legal?

Phase 2 is the full BioAPI. You have to do something specific to trigger this and get it. There are various triggers I call them placed throughout all of society. So actual nano-trigger-bots would be spiked within these products/events. A short list is below. Note not all of the following is spiked, a very small percentage of each one is. I’m sure there are many more triggers being released too. Once your body is infected it also becomes transmittable like a classic virus (hence kissing), but this vector can be disabled, as you become “programmable”. Most spiking of actual commercial products such as shampoo as shown in Metropia (2009) is done via upstream ingredient providers. A corporations right hand never knows what the left hand is doing.

  • Eating cheap red meat (Update: 2012-07-23 as clearly demonstrated in Doomsday Book (2012) and Harolds Going Stiff (2011)). Also cheap pork/bacon even know it is not red meat is also a valid trigger, assuming it is spiked.
  • Kissing specific people (via the tongue as shown in Telephone (Lady Gaga/2010) and the movie (not clip) The Adjustment Bureau (2011) and Order of Chaos (2010) and Earthkiller (2011); the fact that someone is contagious via kissing is switchable by a handler). Also see Dead Europe (2012) which puts phase 2 in the context of being this century’s version of HIV as HIV was originally created and targeted against the gay population; this also makes phase 2 a sexually transmitted disease to some degree.
  • Using specific corporate health care or beauty products (See Metropia (2009) Clip 2).
  • Drugs (eg. cocaine – see Evil Dead (2013), The Disco Exorcist (2011), and The Informers (2008) where she was using drugs then got morgellons (clip here). Also now see Woke Up Dead (2009) as some pharmaceuticals are included too. Also now see ZombeX (2013) which clearly connects corporate pharmaceuticals with phase 2. No clip provided, a couple triggers including meat and cocaine is shown in Pretty Dead (2013).Also includes synthetic or designer drugs (aka Bath Salts); hence the psychotic behavior in users over time. In fact the entire movie Bath Salt Zombies (2013) is a psy-op attempting to connect and reinforce bath salts and to a lesser extent synthetic drugs to extremely crazy behavior. If someone does these crazy [eg. biting the face off people] things they must be one of those bath salt junkies right? Wrong, it’s suspension of memory. They’re wired. Just like you.

    Also note not all drugs can be spiked. For example the marijuana supply for north america is far to home grown and the source(s) are extremely distributed across various smaller localized suppliers. Therefore there is not a single, or very few, point(s) of presence to manage this as a trigger. Plus marijuana is too insignificant, they would not care about it.

  • Some vaccines (for example 1% of the Swine Flu vaccine).
  • Specific corporate food products (probably .1% of energy drinks, some fast food, etc.). As these are less significant, these would probably require multiple cross-connecting trigger-bots to trigger phase 2; so you would have to do multiple things.
  • Etc., they [it] are always expanding to find different ways to judge people guilty for not doing anything to anyone. Although red meat should be cut back, that is their only valid point.

You can begin to get a picture of how they [it] are targeting the lower levels of society. They are trying (among other things) to force the bible onto people as mentioned here and in this clip. Remember the same people that created this also control the corporate super trusts (all corporations and governments are fictions and controlled ultimately by a small group via creditor/debtor based contracts or to a lesser extent implied cooperation) so they are allowed to do whatever they want with any of their public products (for example Diet Coca-Cola, Vaccines, etc.) or companies. Again, this is usually done silently via up-stream providers (via the ingredients sourced from third or fourth parties). So this is technically legal, but not lawful. To be judged guilty, at any time for anything, requires both your permission and a bona-fide complaining party. Both are not present when found guilty by the people behind phase 2; not to mention, your ability to honorably resolve the matter is ignored. Therefore phase 2, or more accurately becoming outright targeted, is completely unlawful.

To expand on the legal aspect it would more accurate to think of it this way – chemtrails and the BioAPI (phase 1 and 2) are legal or to a lesser extent are beyond a legality scope. From the law’s point of view phase 2 has a (very) slight presumption you agreed to it evidenced by your conduct in which you contracted it voluntarily – ‘contracts are express or implied. The express are manifested viva voce, or by writing; the implied are shown by silence, by acts [such as eating red meat], or by signs‘. Ultimately against your will = against the law. After all, your body is your property, the nano-implants is theirs. How about phase 1? Interestingly phase 1 (and chemtrails) are completely lawful. The only way one man can force his will onto another is if it is beneficial (even the benefit can be waived though); and the positive aspects of phase 1 are staggering but will not be realized for at least a couple generations, aka H+). For example it’s unlawful to hold someone up at gun point and take their money, but it is lawful to hold someone up at gun point and give them money (or something of value, in this case phase 1). This summarizes what they have done with phase 1 to all of humanity.

They [it] believe (as in one man’s biased point of view) they have caught you in dishonor first (aka Meeting Evil (2012)) hence the negative aspects of becoming targeted, or to a lesser extent phase 2 to begin with. The terms for the two stages can be used interchangeably, the difference is mostly in severity of the attacks and/or nano-tricks being forced onto you.

Also remember phase 2 does not immediately mean you are targeted. In the clip for Daddy, I’m a Zombie (2011) it’s hinted that red meat (the hot dog even know she does not eat it) is the trigger for phase 2, but extreme jealousy, a sin, is the reason Dixie became a zombie [targeted]. A simple flowchart can be found here. Interestingly, see the beginning of the movie Stalled (2013), no clip provided, where they show us three triggers for phase 2 just before the zombie apocalypse strikes. There has never been a movie referencing more than two triggers.

This web site is completely clear and 100% accurate – this is what they are doing (aka A Serious Man (2009)), this is how they do it (aka Metropia (2009)), this is the physical proof and this is how you free yourself (aka Rise of the Zombies(2012)). Plain and simple.

10) What happens when someone gets phase 2?

Phase 2 is the full BioAPI. Most nano-implants that encompass the BioAPI for phase 1 are limited to your brain/cranium and hearing & sight (as referenced in Surrogates (2009)), phase 2 targets the rest of the body as outlined in BioAPI page. For clarity you should also review the BioAPI phase distinctions here. Most people don’t even notice the new implants. After a while your number comes up and they then decide what to do with you. For example, they test you for some level of dishonor, then put into The Program for general harassment if warranted, or just monitor you, etc. Most of this is automated by a super-computer, it really is an API. They/it does need your dishonor to move against you, but a random excuse can just be made up as you would expect when man judges man.

Note – good things can happen too. But any help is typically more of a bad joke, they think they are reflecting you back on yourself. It could not be more pathetic and unreasonable.

11) Can the implants (phase 1 or 2) be reversed or otherwise stopped?

With nano-technology absolutely anything is possible; anything. So the short answer is yes, it’s possible to have this reversed. Long answer is no, not that I know of, I’ve seen nothing that suggests this is possible for the common man. The implants are all pervasive and impossible to stop (see the update below). In fact you can never stop or remove the nano-fibers at all. Keep in mind nano-fibers do not equal nano-implants, fibers deliver the implant components. Normal people with phase 1 (everyone) do not have to care that much, it’s largely benign and transparent to your everyday life. You may be mind controlled once in a while, but you will have no idea it happened.

If you have phase 2 and are aware your being monitored (or just generally screwed with) they may attempt to provide something that makes you think you have finally freed yourself. Like shielding or some other nonsense. This is just yet another illusion, another lie to mislead you. They want you to run to the internet telling everyone that x, y or z worked, or believe you’re free so they can monitor you more accurately. They need confusion so they will try to provide false solutions to people looking for them. Always remember, it’s always about the next nano-trick. Have we fooled you yet? How about now? Now? They are always trying to create some misdirection or false reality around this to keep people in the dark. This is covered in the new clip for Ultrasonic (2012).

[Update 2012-11-25]: A cure for this can be found in the review for Rise of the Zombies (2012) in which should turn off your BioAPI and stop this insanity once and for all. Unfortunately it seems to be very difficult to apply.

12) What if the Chemtrails were stopped? Would that help?

No, it’s too late. Everyone on the planet is now wired. It would not matter. The point of further nano-fiber propagation via Chemtrails is for newborns and children.

13) What about major world events?

You should be able to figure out how easily world events can now be engineered. If everyone on the planet is wired then a combination of pushing and pulling of thoughts, memory suspension and basic manipulation of a given environment to create a false reality makes is quite simple for a very small group of people to control, stage and ultimately direct individuals or groups (small or large) to believe anything they wish. Notice the timeframe for 911 matches up well within the timeframe of the BioAPI rollout of post 1999. I can’t prove the BioAPI was used in and for 911, but at same time you can’t prove it was not. That’s the point, your suppose to focus, think and say ‘wait a second, if x y and z are possible, then…

Whether you’re a terrorist, famous entertainer, government agency employee (eg. The President of the USA, CIA agent, etc.), Cleveland Brown or just some poor kid in the middle of India, everyone is being played, everyone is wired.


I’m wired too!


14) How does this all tie together time wise?

I should create a timeline but I’m too lazy. Chemtrail spraying started in a major way in about 1999 (existed as far back as 1995 I suspect on a trial basis). The first Morgellons cases appeared in 2001 or so. People being harassed or gang stalked (the myth of public organized stalking) started around 2002, major references in the movies started around 2001 and really became prevalent in 2007/2008 and onwards as demonstrated on this site. See a pattern? The rollout of phase 2 is also confirmed for us in Zombex (2013), clip provided.

15) Who is doing this?

This is difficult to answer. All I can say is the entire BioAPI is very compartmentalized. It is bigger than any one person or small group. In the trailer for H+ they clearly tell you @ 0:53 ‘there is a giant invisible hand that is gripping this very tightly…‘; this statement could not be more accurate or true. The people that designed it are not the scientists that engineered it, or the programmers who programmed the AI supercomputer. The people that released phase 1, for good, have nothing to do with phase 2, the nano-tech disease. The occasional people/handlers that harass you via nano-tech or at least watch to judge the hell out of you cannot tell the AI supercomputer what it will do or to stop what is happening. Only you can via the cure. The nutters who released phase 2 have nothing to do with the cure. Everything that is happening is always above any single group or person.

As a targeted individual part of the false reality being constructed around you includes something, and corresponding thoughts of it, to convince you it must be XXX because of YYY and they do it with ZZZ. Your suppose to fill in the blanks based on what you think you know because your belief structure has to be grounded to be real. For example it has nothing to do with the NSA, but you might believe that hence the news during 2013/2014. It must be them right? Only if you believe it.

The simplest explanation for who is behind phase 2 would be the same group or class of people who engineered and released HIV onto the gay populace in the 1980’s. As a side note, and the epitome of hypocrisy, these same people are now attempting to justify homosexuality within the media and movies via the gay agenda which is apparent everywhere you look anymore. Now I said the people behind phase 2, not the people who actually made it all. If you want to know exactly who made the BioAPI and phase 2, it’s you. Your neighbor, friends and family. It’s your brother the engineer working on random things for NASA, it’s your neighbor down the street who got a job working on new nano-technology stuff for the government. Due to the intentional compartmentalization of corporate and governmental infrastructure people never actually know exactly what they are developing or why in the end. Just tell people what they need to hear, science can be used evil just as easily as it can for good. As long as it pays the bills.


Reason for everything, BioAPI and Chemtrails Pt. 5 – The Program & Gangstalking

And the BioAPI serie continues. It is crucial to read all this info otherwise you don’t understand the meaning of chemtrailing…

The Gangstalking Myth (aka The Program)

What’s the point to all of this? I mean why spend billions of dollars to spray the entire world with nano-technology in order to create a BioAPI in everyone on the entire planet without anyone knowing? You can test yourself here. I mean if the technology is used for good people would line up for it. So why all the secrecy?

Once someone receives phase 2 a full BioAPI is installed (as opposed to a partial set of nano-implants which everyone on earth now has). Phase 2 is triggered by something a person did such as eating cheap red meat, using specific drugs (cocaine, some pharmaceuticals, designer/synthetic drugs, etc.), kissing someone (shown a lot in the movies), or using specific corporate beauty or health care products, prostitutes, some (.1%?) low quality food products (eg. fast food, diet cola, energy drinks), etc. These are called triggers (nano-trigger-bots if you will which are spiked within the given source), more accurately they are known as honeypots, a term used in security. There are many triggers place throughout society now, but these ones seem standard; specifically kissing. The target being the lower levels of society. One aspect is they are trying to account for biblical principles, typically the seven deadly sins. But it’s application is ultimately much broader than that. People who end up with phase 2 are considered bad people in their eyes or otherwise “caught” doing something. This is why some people are targeted and not others. During the installation (for lack of a better word) of phase 2 of the BioAPI there are temporary side effects. See the very bottom of this page for a short listing.

The (class) of people who design and fund programs such as this run the world (more accurately the governmental/money/commercial super trusts), and were previously content with passive concepts such as stealing (a poor word choice actually) money from everyone through taxation and harming society as a whole by doing things such as withholding free energy or approving cancer causing carcinogens for the food supply (eg. aspartame), which is all fine in my opinion – it all has its purpose and role. Unfortunately now, in order to feel happy these same class of people feel the need to actively and directly judge, control and most significantly hurt people. The idea sold to the people “in the know” is this technology will make the world better as told to us in Control Factor (2003) @ ~10:40 in the clip. It’s to “get those bad people” or “protect the public” or “get those sheep“. It has been directly demonstrated to myself first hand that this is absurd and the whole point is to simply harm as many people as possible, they just need a weak excuse to do it, hence the release of this web site. FAQ question #8 briefly summarizes the exact reason for this site and what they are doing, FAQ question #15 tries to explain generally who.

Therefore this section aims at helping people with phase 2 who have since become outright targeted by demonstrating exactly how they do everything. This information attempts to connect the BioAPI and nano-implants with what has become known as a “Targeted Individual“. Normal, average people such as yourself are physically assaulted using nano-technology everyday by people running what has become from what I understand as “The Program” (for lack of a better phrase). Once one understands how this is all accomplished they will have a much better picture on how to respond as it becomes more of a running joke or bag of stupid nano-tricks. It would actually be pretty cool if they we not so hell bent on trying to hurt and destroy average people so much. They think they caught you. To help understand why this is all legal see question #9 of the FAQs. You may have phase 2 and not even know it. The Program and chemtrails are worldwide but are more concentrated in the G5 countries.

The above image is a scene from The Adjustment Bureau (2011) where the women Damon is trying to pursue intentionally tries to make him angry by putting his Blackberry in his coffee. If you can wrap your head around the fact that Damon (lightly) portrays a targeted individual in this movie it becomes clear how people around a targeted individual can be mind controlled to harass or otherwise indirectly harm a targeted individual without even knowing it. Gangstalking is clearly demonstrated in Ultrasonic (2012) or Control Factor (2003); how it works (suggesting someone to do something) is summarized well with Earthkiller (2011). For additional information on phase 2 and the distinction between it and phase 1 can be found here. A cure or antidote to the nano-tech disease that makes all this possible can be found on the cure page. Everything expressed herein is also lightly summarized with Daddy, I’m a Zombie (2011) which is a very important clip.

Any sufficiently advanced technology is indistinguishable from magic.

Arthur C. Clarke, “Profiles of The Future”, 1961 (Clarke’s third law)


Gangstalking Background

In order to get an overall feel for what is happening to someone who is entered into The Program it might be beneficial to review these MP3 audio’s. These podcasts are given by someone who is a targeted individual and accurately describes the possibilities and extent to which the BioAPI is leveraged to create false realities. Keep in mind the guy giving these talks is mostly a shill, he’s specifically attempting to cover up the connection between a targeted individual and phase 2 (the BioAPI via Chemtrail nano-fibers). Nonetheless, the audios give a good background on how people are being harassed and demonstrates the spectacular things that can be accomplished when one controls the brain and body like a laptop computer. Note do not focus too much on these downloads, they are very nano-trick centric; it would be a lot more beneficial to review and read this entire web site as you will end up with a much better understanding of what is actually happening.

For the people doing this, under most circumstances the compartmentalization of information must be maintained by the handler (a handler as reflected in Metropia (2009) and A Scanner Darkly (2006)). For example, when speaking with your friend a handler may quickly jump in and direct-to-speech them and have them say something significant to you (or just talk gibberish such as with Black Limousine (2010) to make you crazy), but what your friend says must typically be in a context of something that could be said anyway in that situation and means nothing to them. See the movie Wrong (2012/2013) which crystal clearly demonstrates this random mind controlling of people to say things they would never otherwise say; no clip provided. As for harassment in general, without your dishonor the harassment cannot be detrimental to your life. For example they cannot slash your tires when you need your car to desperately get to a job interview. It has to be non-consequential; also to be accurate you would have slashed your own tires. But they could/would mind control you to lock your keys in the car afterwards, or your handler would create an illusion that you did not get the job because he mind controlled the hirer to pass you over.

You might be wondering, if someone can be controlled like a robot why doesn’t a handler just control someone (you) to give the handler all of their money or something? This could happen, but what’s the difference between that and robbing you on the street at gun point? Nothing. Again, they need your dishonor, they need you to voluntarily out of your own free will do something by creating a conflict for you. Then it’s justified in their view. After all, you did it. They can then say “you’re doing it to yourself“, or “it’s all a fiction so it’s ok to hurt these sheep“. This of course is pathetic, it’s like repeatedly poking a wild animal in a cage which finally bites you – then say “look, the animal is dangerous and we have to put it down”.

The nano-technology or BioAPI aspect is told and demonstrated right to your face with Gamer (2009), the black basketball playing guy is representative of a gangstalker or other public/organized stalking, notice how he’s mind controlled on demand (to dance and then attack Butler) in the clip… this clip is important, and should be reviewed before continuing because it is completely real. It is also critical to see the new clip for Ultrasonic (2012) which clearly shows you gangstalking in action.

Test yourself for the BioAPI nano-implants here. More accurately your testing for what delivers the nano-components to make all this possible.

The original source of the downloads is here.

Audio Downloads

Gangstalking TS-465745.mp3
Accusations TS-499378.mp3
Disinfo TS-465732.mp3
GroupEfforts TS-465739.mp3
SlieghtMind TS-465735.mp3
TheCompanyYouKeep TS-499379.mp3


Real Time Gangstalker Selection

People who have phase 2 are often entered into The Program in which they are repeatedly harassed. The people who are doing this have gone to great lengths to create ridiculous terms and reasons to cover up how The Program or the technology in general actually works. Once one understands the nano-technology base and BioAPI in general the entire operation becomes more of a running joke.

There are countless absured terms on the internet related to this. People think they’re being microwaved, DEWs, voice to skull, etc. (I admit I’ve created some crazy terms too). This and the actual use of them is simply to create confusion for the public in an effort to help hide the BioAPI and how it’s used against people such as yourself and your family. It’s completely impossible to interface with the human body without some sort of middleware, hence the requirement of a nano-tech engineered BioAPI. The term gangstalking is a weak description of what targeted individuals (someone with phase 2 of the BioAPI) goes through when entered into The Program. As demonstrated in Ultrasonic (2012) it involves countless random people all day long harassing or stalking them. A targeted individual will go to a restaurant and the food will intentionally be delivered cold, or they will get crank calls all day long. How can everyone instantly be out to torment and harass a targeted individual? What one needs to understand, for example with a crank call, is the person accidently calling the targeted individual really is accidently calling them, the thought on what the caller wants to do or who to call is inserted in real time via the BioAPI and they act accordingly as if the thought was theirs. The most direct example of this in action is demonstrated in the Metropia (2009) clip. This clip is 100% real. Or the real life example here.

One of the false realities they try to convince a targeted individual to believe is everyone suddenly is in on it. The targeted individual is typically too lost to ever figure out how everyone they know seems to know everything about them all of a sudden. This site demonstrates how it happens. An entire infrastructure of misdirection and disinformation has been created to construct a false possibility that gangs of people are actually out harassing someone. This is simply a cover to misdirect people away from how it really works – nano-technology. The gangstalker concept is designed to warp the reality of a targeted individual and help destabilize them.

The movie Daddy, I’m a Zombie (2011) and The Adjustment Bureau (2011) is actually about this and gang stalking in general to a lesser extent. Matt Damon becomes a targeted individual (in a different context in the movie though) after kissing a random women at the start of the movie. The kiss was the trigger (she would be contagious for lack of a better word) which installs phase 2 of the BioAPI in Damon, then he’s monitored and harassed more or less. Because it’s a movie there has to be a real plot so it’s not an exact depiction.

Gang stalking proximity detection example

For example, in the sample image to the top right might be what a phase 2/targeted individual is looking at as they walk into a super market. The handler (a handler as reflected in Metropia (2009)) see’s the same thing as the individual because of the ocular implant, remember what Bruce Willis’s surrogate sees comes up on the screen in Surrogates (2009). As the targeted individual walks into and around the super market everyone around him comes up on a proximity detector (because everyone at least has phase 1) of the handler (symbolic example image to the right). The handler then simply selects someone such as demonstrated in the image (above) and controls the person accordingly, typically to harass the targeted individual via Direct-to-Speech or whatever. Handlers can roll through people’s minds like you roll through a rolodex – as shown briefly in Alter Ego (2012) @ 45:16 in the movie, no clip provided. (interestingly Alter Egos also shows how they can read people’s names right from their mind without someone even knowing). Note this process is mostly automated by a computer and people (handlers) are not even involved 99% of the time; they obviously do not the resources for that. Keep reading towards the bottom for details.

They clearly demonstrate zooming in on and selecting a subject for paralleling/mind control in the trailer for A Scanner Darkly (2006) at exactly the 0:12 and 0:38 second mark. This could be yourself as a targeted individual or a so called gangstalker that is within close proximity to you. Again the clip and review for Ultrasonic (2012) connects everything for us. The uncanny timing of the individual stalking events is mostly made possible through a combination of reading your thoughts and suspension of memory where people including you are ‘paused‘ to set up an event accurately.


The Purpose of Gangstalkin

The overall purpose of leveraging this technology directly against an unsuspecting, normal person such as yourself is to get you to act out in some way. They want you to externalize the events they are creating in and around your life. For example, the handler (or more accurately a supercomputer automating everything) is constantly controlling people around you such as family members to get them to suggest you have mental problems – the your crazy theme comes up a a lot as it works well against people who do not understand how everything is works. The people who have designed this are attempting to create a false reality around the targeted individual, the reality constructed is dependent on that targeted individuals situation. For example they attempt to find something that the targeted person does not like (eg. dogs?) and then everywhere a targeted individual goes there will be dogs there. The side effect is a targeted individual begins to draw unwarranted conclusions from the actions that are happening around them. If pushed to the limit the targeted individual may begin to go crazy which they will then amplify as shown in Black Limousine (2010). Another example is physical assault, they could hurt your body at the exact same time you hear a random car horn from the public; over time you psychologically connect the two events. They then hope you will subsequently act out against the public to harm someone you now perceive as bad or out to get you. This is then the dishonor (see Meeting Evil (2012) below) they need to move against you some more.

No matter how many people appear to be harassing or gangstalking a targeted individual, it’s only just one guy (or a very small group “doing their job”) in a data center controlling everyone and everything about and around a targeted individual. Most of it is actually automated and people (handlers) are not even involved much at all. Reality is always the opposite. For example the actor Michael Hall in the Gamer (2009) clip tells you he’s essentially a handler for lack of a better description. They want you to think or infer something that is not true.

In the end it’s just the BioAPI (using nano-implants) and one guy or a small team mind controlling everyone to create illusions, hoaxes and general nano-nonsense to get targeted individuals to harm themselves by amplifying what they do by destabilizing and gyrating the targeted individual’s life through psychological and unfortunately sometimes to a greater extent physical assault.

…you saw what it wants you to see!


You should also review the clip and description for Apocalypto (2006) for an overview and comments on the illusions they are trying to create for you and to a lesser extent everyone around you. Also see the second part to FAQ question #8.

Another high level psy-op of how they condition the public to think people who experience stuff like this must be crazy is the movie Sexy Evil Genius (2013). While you watch it remember Nikki is the crazy one. Everyone sits around the table and judges Nikki as being crazy. What attributes are connected to Nikki? Stalking, paranoia, blackouts, doing things but not remembering them (aka suspension of memory). Therefore if you experience any of this you must be crazy. Of course in reality no one is crazy, it’s just a lack of understanding.


What They Are Doing to Targeted Individuals

This movie is a high level symbolic reference to the implications of contracting phase 2, and demonstrates the actions and methods the people behind phase 2 use to create conflict resulting in the necessary dishonor required from a targeted individual needed to move against them.

In this movie Samuel L. Jackson plays a character that does nothing but hate people. Pure evil if you will. His sole purpose in the movie is to create conflict, look for any hint of dishonor and whenever possible, kill people because of it and to a lesser extent likes to kill useless eaters. Now the movie has nothing directly to do with the BioAPI, and the character played by Luke Wilson can’t directly be considered a targeted individual in the movie, but for all intents and purposes we can construe that to a some degree to help with clarity, at least for the first 3/4 of the film. Again, this film is very representative, but still may be considered another piece of the overall puzzle of what they are doing to people such as yourself in real life.

The movie starts off with Jackon requesting Wilsons help with moving his car shown from the start of the clip through 0:46. Notice the request for assistance is more of a test as Jackson is clearly looking for a reason to harm Wilson but backs off at the last minute when his daughter is seen. After befriending Wilson, Jackson and Wilson end up at a strip mall. Wilson needs to call someone but has no phone so asks for help from a cell phone shop at 0:48 thru 1:50. Notice how much of a bitch she is, and Wilson being the nice guy he portrays eventually leaves without getting any help. Then what happens? Not shown in the clip, Jackson, representing evil itself (hence the title ‘Meeting Evil‘) tries it after Wilson tells him about his troubles there. She gets it, you’ll see her bat in 1:50 thru 2:22 being held by Jackon. He killed her. They tell you clearly what Jackon (representing evil) is clearly looking for in 2:30 thru 2:47 by saying ‘I hate bad manners, I hate people that don’t give common courtesy, hippocrates and cowards.‘; essentially anyone in dishonor even slightly. Again, Jackon’s job is also to kill useless eaters as he tells you right to your face at 3:37 and show in the movie (not the clip) repeatedly. This is the same reference they show you in Toxic Skies (2008) when the only person that dies is the useless eater that watches TV. This is also clearly told to you in After.Life (2009) (no clip provided) towards the end when Liam Neeson is digging a grave and is talking to the little boy about how these people are already dead and he needs to bury them. They are telling you that they are killing people. It’s just being done transparently with nano-technology. After all, heart attacks and cancer happen right? So in this specific scope they are using nano-technology and the BioAPI you have in you to trick you into dishonor which thereby gives them the justification (more of an excuse actually) to act against you.

In the interrogation scene from 3:40 to the end of the clip touches on the idea that Jackson is a figment and isn’t real at 4:00 in the clip and thereby subtly suggests Jackson as a hidden hand [and therefore representing a handler manipulating people using the BioAPI now that you know the overall scope]. In the movie Jackson kills everyone in a gas station, but the witness(es) point to Wilson yet he did nothing. This is symbolic of the false reality they can create, getting people to kill each other (see The Collapsed (2011)) then have a witness point to you. They can do this in real life. The witness really will think you did it via manipulation of memory; memories can be given and removed from people on demand, this is shown very well in the movie Ruby Sparks (2012) and is very difficult to believe or comprehend and does apply to people with phase 1 which includes you.

[Update 2012-11-17] I’ve added a second clip for Meeting Evil to demonstrate just how high level the application of the BioAPI can be. In this second clip they clearly show a Minority Report (2002) style pre-crime in action which results in Wilson becoming a targeted individual. Let’s break it down. Wilson and his family are having money and marriage problems which results in stress wherein Wilson is shown to contemplate killing his wife (and possibly his family?) from 1:09 thru 1:48 in the clip. Now at this point in the clip and movie the murder angle is not apparent and is only loosely connected at the end of the movie. Notice how conflicted they show Wilson as he intensely concentrates in front of a giant whole in the ground with a shovel and ominous music/sounds. What’s he thinking? Why are they showing this? I mean it’s shown to you for like 40 seconds! This is why; your suppose to see the connection between the thoughts (which are being read or listened too in real time, aka Metropia (2009)) that are going through Wilson’s head which directly results in Jackson entering onto the scene and into Wilson’s life. The connection is evidenced by Jackson (aka evil) ringing the door bell right then at 1:42. Connect these otherwise insignificant events and we have Wilson finally deciding to kill his wife -> aka pre-crime -> Wilson then becomes a targeted individual and thereby entered into The Program; hence the door bell by Evil [Jackson] at that exact time. So Wilson more accurately could be construed as having phase 2 only and the thought to finally kill his wife was the trigger to make him outright targeted. The targeted individuals flow chart can be found below which might help clear this up for you. Concluding that Wilson really was contemplating killing his wife is referenced at the end of the movie (@ 2:16 thru the end of the clip). Jackson is asking Wilson, ‘why did I knock on your door?’ And telling him (actually you) to ‘put it together John!‘. What the director and Jackson are doing here is blurring the line between who was going to kill who; with Jackson ultimately accusing the wife. Your suppose to make the inverse connection, especially when Jackson is repeatedly asking Wilson why he knocked on his door. This concept is held in the exact same capacity as (the clip for) A Serious Man (2009) where he’s caught making the wrong decision and immediately gets the call from his doctor. Remember these movies still have a normal plot to maintain, they are not going to just roll out the red carpet for you; you have to ‘…put it together’.

So Meeting Evil repeatedly bounces back between a normal movie/plot and forth with BioAPI concepts with details that are being used against targeted individuals. This is very well done if you know what they are showing you. The people behind phase 2 of the BioAPI are therefore represented by Jackson in this film. Ironically Jackson mentions he hates cowards in the aforementioned line at 2:30 (clip 1). People who hide behind nano-technology would be considered cowards, not evil, in my opinion. You should watch the movie to get a better grasp of what is being described here.

This repeated attempt to get targeted individuals (or Wilson in the movie) into dishonor via conflict is the standard operating procedure of the program. Although it does not have to happen this way; the program is dynamic and complex. If you think you are going crazy they will run with and amplify that instead (for example Black Limousine (2010)). For normal people this is just the expected game plan. And don’t think you are immune and always honorable by knowning, like myself, that whatever you do must require a bona fide complaining party as per the law… they don’t care. Everyone has a bad day, everyone. And that’s all they need.


Targeted Individuals Facts to Remember

If you are a targeted individual and being gangstalked here are some hard facts to remember. Different people with phase 2 will receive different levels of harassment (and help for that matter) or nano-tricks. Not everything listed below may currently apply to you if you are targeted. In fact I expect only 20% of this web site to apply to any single person with phase 2, but a different 20% when compared to each other. Some people will receive completely unique false realities. Where you fall into the program is decided based on your actions and what you believe/think about it; this is how the movie Chosen (2013) to some degree is real in which targeted individuals (inferred) are selected to kill each other, no clip provided, because these selected individuals believe and use their false reality as justification to hurt or kill another. Also see 13 Sins (2014) for another interesting and completely realistic example. In other words, how much of their bullshit do you buy? If you buy enough of it to hurt someone, then they do the same to you by putting you in the same situation. The Box (2009) in general is about this because they took the money, so it was reflected back onto them and they we’re hurt as well. Another example is Oldboy (2013), listen to Samuel L. Jackson overtones to piece it together. Oldboy, at least in principle, is a “lightly inferred” BioAPI movie because of the very last scene/image. So it’s self reflective to a major degree and they count on your inability to see the forest for [from] the trees which leaves you in the dark most of the time. In its classical form The Program is more severe at the beginning in order to make a major impact or impression on your life, then it very slowly subsides over years. They/it counts on your “sheep mind” to psychologically extrapolate out the severity or iteration of the events as if it’s still happening in full force when it’s not.

• There are no gangstalkers. This is a myth. Gangstalking is the misdirection. There may be a very loose nit group of employees (The Box clip @ 0:21 seconds) that do run around a given city harassing many different targeted individual’s, but there is no organized group of public gangstalkers, this is ridiculous and fiscally impossible.

• The general public can be controlled on demand. So if you randomly walk up to someone, they might be immediately mind controlled to say something or act in some way making you think they, and absolutely everyone, is “in on it“, yet they know nothing. This is demonstrated in the trailer for A Scanner Darkly (2006) at exactly the 0:38 second mark, or in Metropia (2009) or better yet Ultrasonic (2012). This is what most targeted individual’s confuse with gangstalkers. Control Factor (2003) shows this very well too. There are multiple psychological reasons they are reaching for here, but the main one is externalization.

• It’s not the individual events, statistical anomalies, acts, signs or nano-tricks you see that matter, it’s the false reality or illusion they are attempting to construct that you should concern yourself with. The illusion or “engineered environment” will be partially unique to you and your life; which is why, other then gangstalking, there are very few common threads among targeted individuals. The soy sauce in the movie John Dies at the End (2012) is symbolic of the contraction of phase 2 and the extremely warped reality that can result from it; this is what the movie is really about, hence the mind reading angle. A unique false reality, in this case the crazy card, is shown in real life in this TED talk. Even knowing this entire web site and thereby the truth about everything is only one belief. Albeit the correct one, but nonetheless still just one belief of many realities you many choose to identify with and which will be reflected back onto you.

No one knows anything at all. No matter who you talk to, how many nonsense acts and signs you get, not a single person whether a stranger, friend or family member knows anything at all about any of your business or otherwise the bad act/dishonor you have done to get you targeted. All acts, signs and suggestions displayed by someone (via a handler, or automated by a computer you and everyone is hooked-up too) are to get you to think or infer something and then act out based on that false presumption to hurt yourself. In fact a handler does not even know what they want from you, they need you to do something (such as think you’re crazy, or find out it’s mind control, etc.), then they amplify that. They show you x, they hope your sheep mind externalizes, infers and extrapolates out x2 or x3.

• Everything is concocted by a few people at some command/data center pulling all the strings. These people are what I call handlers for lack of a better description. This is easily done because a targeted person has a nano-camera in their eye and a geolocation implant (and a every other implant under the sun). In fact everyone on the planet has a geolocation implant, including phase 1 people (this means you; as referenced in The Matrix (1999)). Most of the automated harassment is actually a computer as told to you by Android Insurrection (2013). Your on auto-pilot where no human handler actually watches or cares. The Program is actually more like a maze or script, picture a flowchart in which targeted individuals fall into the program based on what they know, do and believe. How you “perceive it” heavily determines your fate.

• If anything extreme happens to you (eg. if your raped, physically assaulted, etc.) it is 100% fake. For example women targeted individual’s often complain they are raped (see the news report clip below) yet never seen the guy and say they were drugged. This works because the handler actually controls the targeted individual to (slightly) assault herself (without her knowing by suspending her memory – see The Collapsed (2011)) to make it look like she was raped. She will experience vaginal pain to convince her of the rape via the BioAPI’s ability to light up pain receptors/neurons in her body, this does not damage the body at all. They think this level of harassment is acceptable because it’s fake. They honestly believe they are creating an illusion when they assault you, physically assault is now considered a trick. Keep in mind there is a greater psychological purpose and reason behind the fake rape/assault.

• Misdirection and disinformation cover the internet. There is a large network of paid shills specifically told to agree with you the targeted individual no matter what in an effort to amplify whatever it is you believe is happening. They need you to believe in x. Where x can be anything… it only works if you believe it. You need to buy one of the nano-cards they are trying to play. In fact a lot of the shills or targeted individuals on the internet/forums are just engineered characters or avatars controlled by the AI supercomputer. Even if you talk to a shill [presumed friend] over the phone in voice doesn’t mean they are a real human being. You are expected to think your problem/reality of x must be real, all these would be real people confirm it right? Wrong, they are fake, and a false environment is being engineered around you.

• Your handler(s), or mostly a super computer automating everything, is always attempting to create a conflict that involves you. This is then used as an excuse to act against you, for example you might then be arrested or something. They need your dishonor. The crazy stuff (gangstalking, strange happenings, hearing sounds/voices, etc.) being forced on you are just to gyrate and destabilize you mentally so you are more likely to identify with and act out against something specific and unique to your situation. You also must read FAQ question #8 for the final answer on what they attempting to do with this program. Contracted (2013) also covers this well.

• If they think you have committed a sin they use the BioAPI against your body. For example if you’ve committed the sin of gluttony they will turn off your taste buds. If you committed the sin of lust, they will turn off the endorphins released from your spine during an orgasm negating the effects of sex. If you were too vain they might trigger morgellons. These are just a few examples of what they can and are doing to people when you are judged guilty. No consideration whatsoever will be given for the circumstances leading up to your guilt; and the law in their eyes will be applied as technically as possible as that is obviously the easiest and fastest way to find someone guilty.

• They desperately need you to care about the nano-tricks and illusion being shown too you. They want you to chase some carrot for whatever random reason that might cross your mind.

• Once you read this entire site you will know how absolutely everything works, exactly. I can’t stress enough, it’s like a magic show. Once you know how it all works it’s a joke. It’s boring… nothing to see here, shows over. Phase 2 and what they are doing with it is the same thing – it’s just a magic show. They believe they are controlling you with fear and illusion. They believe they are reflecting you back onto yourself. They believe they are giving you what really want and deserve. As you can imagine in practice it is as pathetic as it sounds.

Phase 2 can be considered a disease of dishonor. When you contract it you are merely monitored at first. They need a reason to hate you, hence the nano-tricks. Once they think they got you (via your dishonor) you then become a targeted individual (aka Contracted (2013)). See the flowchart below details.

• If you are deep in the program and they are throwing everything at you they will/are trying to split your reality. In The Adjustment Bureau (2011) Matt Damon has two groups harassing him. One trying to stop him from doing what he wants (score the women), and the other group trying to help (also see the end of clip 2 of Metropia (2009) for another example). This concept is real and they leverage the manipulation of emotions via the BioAPI to assist in the amplification of it. In real life though you will never physically see/meet these people like they show in the movie, primarily because they are cowards hence the hiding behind nano-technology. More accurately it’s mostly a computer with AI as difficult as it is to believe. Again – the movie is mostly real, they are showing you what they are doing to people. They are nudging your life via mind control, hence the title ‘The Adjustment Bureau’, because they are adjusting you. In reality it’s physical assault with nano-tech; nothing more, nothing less. They just don’t show you how. In other words they/it is psychologically pulling you in a specific direction. Typically to drive you crazy, but you have to believe it for it to be real, so it is always looking for direction and beliefs from you to see where it should go with the harassment, nano-tricks and aggravation. You decide where you fall within the overall scope.

• There is a higher level purpose(s) that I haven’t mentioned for people deep in the program. It’s even more ridiculous then everything else – for example they are trying to make you choose between love and fear. Honestly, I can’t make this stuff up. It completely falls apart when you know how it all works and again simply becomes another running joke that never ends. Never believe in their absurd false dichotomies (where you have to choose one of two options). Especially some fear vs love nonsense. What do you choose when presented with option 1 or 2? Fear or love? Republican or Democrat? Coke or Pepsi? You always choose the third option – knowledge. Educate yourself.

Happy is the man that finds wisdom, and the man that gets understanding. For the merchandise of it is better than the merchandise of silver, and the gain thereof than fine gold. She is more precious than rubies: and all the things thou canst desire are not to be compared unto her.

Proverbs 3-13:15

• The program is very dynamic and over engineered. It will fool you on the highest level possible. They use the media to tell people what they are doing and how. You just need to know what to look for.

Think for yourself.


Gangstalking Remedy

This clip is interesting to say the least. Like everything else, clues, clips and information are embedded in the media as repeatedly shown throughout this site.

So to help us find out how to handle this otherwise difficult situation, we again can turn to the media for some help and insight. In this clip from The Simspons (Season 20, Episode 17), Skinner and Lisa represent the same person – a targeted individual. This is clearly shown when Skinner acts paranoid that people are doing strange things around him (in his case the thing with the magazine – but it could be anything). A few short scenes later it cuts to Lisa receiving the only real solution to their problem – to ignore absolutely everything.

I cannot stress enough how fake everything is. This is their justification. They believe they are not doing anything. They will jam so many stupid thoughts into a targeted individuals mind to get them to believe x, y or z. I realize it is difficult to ignore it when they physically assault you, they actually believe assault, forcing junk into your mind or otherwise directly acting on a targeted individual’s body is somehow part of the illusion. To repeat, they are constantly trying to get you to believe something, they don’t even know what, you have to show them which they then amplify.

[Update 2012-11-22]: I’m working on a real cure/solution to this nano-tech disease. Keep an eye on this page here.


The Gangstalking Myth by Example

The public stalking demonstrated by so called gangstalkers are at least partially unique to each targeted individual, and therefore is very difficult to describe what is actually happening. The best way to do this is by example. The following is list of events and examples that someone may go through when being harassed, publically stalked or otherwise targeted. The following may or may not apply to a given targeted person, each situation is unique. The point of the following is show the disparity between what a handler wants a targeted person to see and believe, and what is actually happening in reality. Over time I am sure there are going to be plenty more new nano-tricks coming. I am not claiming I have seen everything.

A targeted individual should understand that the entire point of the program is to test and trick you; and to an equal extent get you to externalize & act out against something they show you. Whether it’s to get angry at a stalker, or to run to the police or a lawyer complaining your being gangstalked, or to talk to your friends and family telling them they are being mind controlled so they can think you’re crazy – if you do not do anything, nothing will happen to you. This is part of their justification as “they are not doing anything – you are doing it to yourself” type of thing. They show you things that are right & wrong, if you choose wrong they judge you accordingly. The following examples are reserved for a targeted individual who knows what is happening to them with respect to the BioAPI and that a handler know’s the targeted individual is aware of the technology in some capacity such as yourself now that you have read this. All of the following has some subtle psychological purpose; specifically to amplify the association of statistically unlikely events (aka transference) in an effort to increase the probability a targeted individual will externalize against and believe in some false reality, typically to trick them into hurting themselves in some way.

Visible/Depicted Event Actual Event Purpose
A typical stalker will walk by you in some capacity. You know they are doing it specifically for you. You are expected to believe the stalker is real. The stalking could be anything they have convinced you to recognize or identify with, and includes anything such as people wearing a specific color (all black, red, etc.), taxi’s, police cars, people walking dogs, cyclists, etc. So any event that is unique to your environment and statistically improbable or impossible. The so called stalker has no idea he’s stalking you. He’s just walking by you because he thinks he wants too (the thought to walk by you is inserted into his head in real time to do it). The thought of you noticing the stalker might even be suggested (not your thought) to you by the handler too. Great real examples of this include Ultrasonic (2012) and Gamer (2009). How it happens is shown in Metropia (2009). Earthkiller (2011) is now important too. To perpetuate the gangstalking myth in an effort to get you (the targeted individual) to act out against the stalker. Attempt to create a conflict. Keep you in fear, destabilize you, confuse your view of reality, etc. The thoughts you are having to notice the stalkers are not actually your thoughts half the time.
You are sitting outside with some friends. A lawn mower or hedge trimmer is being used close by. It is very loud. The sound is being amplified for you alone. It’s actually not that loud for other people around you. Another example might be a crying baby in a restaurant. This is shown in the movie Growth (2010) when he contracts the worm bugs (a metaphor for phase 2) and then begins to hear things much louder and clearer than normal and has to put in ear plugs because of it. No clip provided. To make you angry for some reason. Start the handler’s process of warping your reality. Make you look crazy when you get angry, after all the sound is not loud at all (for everyone else). Attempt to create a conflict.
You buy something and mail a check to pay for it. They say the cheque never arrives. As soon as you go to pay again the first check arrives. You think they intentionally stopped the cheque or created the problem, the gangstalkers got you again. In some capacity the first cheque was delayed. To show that the handler is in control of your life and your helpless. In fact different problems may be constantly created for you every day as a way to make you believe that your world is completely controlled by the handler. It is not, this is part of one illusion and false reality they are trying to create. Another example is the garbage man will intentionally skip your house and not pick up your garbage. Again, a targeted individual will only get events similar to this if they know it’s mind control.

Different parts of the program are designed for different levels of knowledge and/or dishonor and/or age & gender and/or the method of phase 2 contraction to begin with. Thats why there is so much inconsistency everywhere.

Object’s in your house are randomly moved, or your property is damaged. For example your washing machine is broken. Your expected to think gangstalkers or even people you know are breaking into your house and doing this to you. You’re actually moving the objects yourself and damaging your own property. You just don’t know it. Picture someone sleepwalking, it would be a lot like that. Spooky actually. See The Collpased (2011) for a crystal clear example. General harassment, to perpetuate the gangstalking myth. To get you confused and angry. To get you to act out against who you think is doing it. To amplify the externalization factor of the program.
You’re physically assaulted by the handler/gangstalkers. For example if you are a women you think you we’re raped. Or a man might be hauled off to the hospital and given a tranquilizer. The women was controlled to assault herself (unconsciously; actually her memory was suspended) and the tranquilizer was fake (but the pain from the needle was real – created by the BioAPI). Everything is fake, absolutely everything. Again, this is important – to show that your handler(s) (aka gangstalkers) are in control of your life and you are helpless. This is part of the illusion and false reality they are trying to create. It’s to help ensure you will do what they want in the future. If you later do what they want under your own free will they feel justified. Also see the clip for Transforms 3 (2011).
An appliance in your house breaks. You call the repair man, he comes and fixes it and leaves. You memory was suspended and you broke your own appliance. Or someone was mind controlled to do the same. Usually it’s a washing machine or dryer such as with this lady in real life. They are testing you. Specifically the extent to which you believe the repair man had something to do with the broken appliance. The repair did not build, buy, sell or ship it. So for you to be rude to him or somehow blame him reflects how much of a sheep mind you have; and if this happens you are then elevated within the program and become outright targeted typically. This is a pre-targeted test. You will not know its happening. FAQ answer #8 explains how they are trying to process sheep.

If you’re already targeted they expect you to identify with the fact that gangstalkers somehow got you.

Many small problems are created for you by friends, family and people you know. They often hint using acts and signs that they are in on it. Your friends and family are mind controlled accordingly to create the problem, they have no idea they are doing it. The problem is always inconsequential for you, but wastes your time and life. To show you that everyone else, especially your handler, is controlling your life. You can’t do anything. You’re helpless. Then when a real problem happens, such as you go for a job interview and do not get the job, you then believe that the handler must have mind controlled the guy to not give you the job – this is false. They are trying to get you to believe “x” happened.
You’re cooking dinner. You blink your eyes and your instantly outside your house, a second later your instantly down the street. A second later, back in your kitchen. Enough to freak anyone out. Just like star trek teleportation. Suspending a targeted individual’s memory and simply mind controlling them to walk outside, then re-enabling their memory would simulate this scenario as the targeted individual would not remember walking outside at all and would seem to just appear there instantly. Typically might be used in later stages of attempting to drive someone crazy. If they did not know why or what was happening something like this would work well. For a clear example of how people speaking gibberish is used to drive someone crazy see the Black Limousine (2010) example.
You keep noticing insignificant things – certain people stand out when you are in public driving around such as someone walking a dog, or people wearing red hats, or specific sound events when your at home like sirens. They have got you to identify with something specific which is used in some way to indirectly harass you. You don’t actually really notice this stuff yourself, the thought is forced onto you by a handler to train you to recognize it and identify with it. Typically the events are accompanied with a manipulation of your emotions to make you scared and subsequently train you to be scared when these random things happen. Helps make you think you’re crazy.
You do or do not hold the door open for people, help a stranded motorist, help someone short of change when buying a ticket to park or something, you do or do not lie, etc. Your being tested. You may or may not not know it. If they find you in dishonor or do not like how rude you are (yes, it’s that pathetic) they use it as excuse to elevate the assault or torment via nano-tech. They are desperate to find a reason to judge you guilty.
You are dreaming very strange dreams, such as your teeth are falling out. Same as depicted event. Physical assault via nano-tech. To convince you to think something specific; such as you are helpless or powerless or crazy. See the review and clip for The Giant Mechanical Man (2012).
People you talk to possibly including friends and family either speak in tongues/gibberish, or outright say things to you that they cannot know about. For example your friend tell you right to your face ‘I know you stole that money, you have to go to the police‘. The person saying x or talking gibberish is being mind controlled to do so. They know what to say to you because a handler is/was watching you previously. Also the person has no idea they are saying x or talking gibberish. Yet another nano-trick, as the people behind the program need you to do everything, including in this example go to the police out of your own free will. Your friend may not have any clue he just said that to you as clearly demonstrated on the real life mind control examples page where the news anchors are talking nonsense but sometimes have no idea it’s happening.
Your body is being slightly and randomly hurt, possibly a pinching feeling. Or your face or other part of your body itches far too much. Same as depicted event. Physical assault via nano-tech. Only people deep in the program will possibly have this happen. The physical events vary in degree and over time thereby provide a physiological and mental impact to you which increases your likelihood of externalizing. For example your body is radomly but barely hurt, then slightly hurt, hurt, then heavily hurt. You sometimes question if they even did something. That’s the point, a pathway to externalization. Also see Transformers 3 (2011). It’s also shown in Flash of Genius (2008) when they show her typing and zoom in on her hand (@ 44:50 in the movie) when she itches it. She’s presumed to be a bad wife for leaving her husband (no clip is provided; screenshot here; you’ll have to read this whole site to understand this). Itching is also being intentionally inflected via the BioAPI as shown loosely A Scanner Darkly (2006) @ 0:44 in the clip/trailer. It’s also shown in Fast Zombies with Guns (2011); a screenshot is here. Or even Lay the Favorite (2012).

Some of this is covered on the Summary Page too.

To help demonstrate the false realities that can be constructed around people let’s take a look at four examples. Mary, Alice, Bob and Eleanor. All from different walks of life. Just normal people such as yourself.

Mary has been experiencing very strange events lately. Objects in her house are being moved even while she is home yet no one lives with her to move them. People talk gibberish around her, when she asks why they are doing that the person says ‘I’m not, I’m speaking normally‘. Mary is getting very distressed and thinks she might be going crazy. Friends and family start to make comments that she should see a doctor. Subtle events such as finding her toothbrush moved slightly in the morning when she wakes up or her glasses on the other nightstand yet she never leaves them there eventually push Alice to see a doctor. The doctor makes sure she starts to take medication. Over time the strange events get more severe, and even crazier things start to happen. She eventually ends up in a metal hospital. Her mind cannot cope with the ever increasing extreme nature of the impossible events happening to her.

Alice has a unique occupation. She’s a paranormal investigator. She likes to hunt ghosts. Kind of like those ghost hunting shows on TV where people run around thinking they heard/seen something. Alice really wants to see and capture ghosts on film to prove to everyone she has finally seen a ghost, but never seems to experience any paranormal activity ever. Eventually Alice gets her wish. Every time she goes to a so called haunted house now she experiences all kinds of paranormal events such as swings in temperature, hearing noises that can’t be real (for example children laughing but no children are anywhere close by) and she even sees ghosts but can’t seem to capture them on film. No matter what, Alice is 100% convinced she see’s real ghosts and paranormal activity.

Bob is just a normal guy. Eventually people in and around the public start to stalk Bob. Bob is confused and a little shocked at first and can’t explain what or why this is happening. His neighbors suddenly appear to be wherever Bob is going and giving him acts and signs that they are there specifically for him and him alone. For example Bob needs to withdraw $368 from the bank. He goes to the bank, before telling the teller he wants $368 the teller says ‘need $368 today bob?’ Everyone appears to know Bobs business. Bob reads on the internet that there are secret gangstalking cells that run around doing this to people. He gets mad, and becomes 100% convinced these public stalkers are out to get him. This is what Bob believes because this is what Bob sees. He cannot grasp the larger picture, as per Android Insurrection (2012), it’s ‘beyond his scope‘.

Eleanor lives a normal life like anyone else. One day, for no reason at all Eleanor beings to hear voices in her head. Right out of nowhere for no reason she hears voices in her head which torment her. She has no idea why, and like most people who can’t think for themselves concludes she must be going crazy. After all, only crazy people hear voices right? Wrong. Eleanor has a nano-tech disease, she just has no idea how or why. Eleanor’s story is a real, happens to countless people around the world every day and is outlined in this real life TED talk here.

In each of these scenarios all the people believe they are experiencing something completely unique and real. If you we’re to put them together to discuss what is happening they would not have any idea they were all experiencing the exact same thing. A nano-hoax. False realities constructed by a handler (could even be the same guy, actually its mostly a computer with AI, hence the automation of it all) to achieve an illusion to trick the individual to do something specific or act out in some way. It’s all smoke & mirrors as you can now see the uniqueness that can be created by the BioAPI and nano-implants. Suspension of memory can make you move objects you didn’t know you moved, hearing sounds & voices that are not real, the mind control of people close to someone (in this case Bob) to make it look like they are there for him and therefore stalking him in some capacity. Even seeing things (ghosts in Alice’s case) is possible. But the objects are typically of poor quality and low resolution due to the difficulty in interfacing with the visual cortex; the objects end up being more of a silhouette, perfect in Alices case for simulating ghosts. This is what the movie Shadow People (2013) is about, seeing shadows or silhouettes of people when they are not actually there. All these people only see what is shown too them, they believe what is happening to them is real because they cannot comprehend their own reality or the larger scope around them. They cannot grasp what is really happening. Note – like any API it can, and they are, always improving or upgrading it and they very well may achieve high-resolution images one day. Another great scenario is a fortune teller or psychic, you can imagine the field day they could have with that.

[Update 2013-05-08] – Also see Dark Skies (2013) in which summarizes many of the nano-tricks they are doing to people including suspension of memory. Also note the false reality (in this case The Grey’s/Aliens) they are constructing around the targeted family, because that is what they have identified with and believe, so that is what gets amplified. A targeted person/group needs to think they understand what is happening. ‘x‘ must be ‘grounded‘ psychologically to complete the false reality. The entire family becomes targeted after a red meat barbeque early in the movie, that’s why they show it.

Again, above all, they need you to believe. Believe what? They don’t know, you have to show them. If you think you are going crazy, then you are. After all, these strange events are impossible right? You must be going crazy.

There is no knowledge that is not power.

Ralph Waldo Emerson, Society and Solitude (1870)


Gangstalking & The Program News Clip

This real news broadcast shows the extent to which how lost the public is concerning the implications of nano-technology and the nano-implants or BioAPI. The women in the clip actually believes people are gangstalking her and is a real targeted individual. So the women would be the equivalent of Matt Damon in The Adjustment Bureau (2011) or Simon in Ultrasonic (2012) or the women in Contracted (2013).

After reviewing this entire site watch this video and you can see how it all comes together from a handler’s point of view. Let’s break some of it down.

• Clip position 0:30 thru 0:50 – Numerous break-ins at the address and damaged property. Yet nothing was stolen. It’s all psychological, what is really happening is the handler is trying force her to think she is helpless as there is nothing she can do protect herself (you can see her early in the clip pretty much saying this). She is the one (via a handler) that actually has damaged her own property, yet has no idea. This is also talked about in the BioAPI details page, or even the Men in Black III (2012) clip.

• Clip position 1:00 thru 1:10 – Again, they really, really, really need people to believe this is real. To believe in gangstalking or whatever else they are attempting to push onto a given targeted individual. Everything is a hoax. Everything is an illusion. Well, except when they physical assault a targeted individual which they do, which is the reason why this web site was released to the public after over a decade of confusion and misinformation.

• Clip position 1:30 thru 1:50 – Strange happenings are simply to warp the reality of the targeted individual (aka Black Limousine (2010)) and sometimes the people around a targeted individual too. In this case they are really attempting the support the gangstalking myth, this helps if other people see the stalkers, it lends creditability to the false scenario or reality.

• Clip position 1:55 thru 2:10 – Again, she raped (assaulted) herself. Notice how no one was caught or seen? Because no one did it. Just herself.

Again, no one can explain anything. Everyone is confused. They do mention mind control but can’t say anything else as they have no idea how it would work. Note the last half of this video is largely irrelevant.


Targeted Individuals Flowchart

Not all targeted individuals are treated the same. Some are merely monitored, some are stalked, some are given a part of the program such as only hearing voices, some receive everything. Where you start within the program depends heavily on how you got phase 2 to being with as well as what got you targeted afterwards. Are you being physically assaulted or just hearing voices in your head; are you forced to wake up 5 times a night or just stalked by the public. These differences are depended on several factors. But once targeted your position within the program becomes largely proportional to the knowledge you have about it, the level of dishonor demonstrated as you are tested, your age, and/or how much you believe the given false reality being shown to you. You also may be slotted for something completely unique, such as a whole separate false reality may be constructed around you which they will try to get you to believe in. For example if you are deeply religious they may try to trick you into thinking God is communicating with you or you are possessed by the devil.

Anything is possible, but the following is a blueprint. Actual people or handlers are typically only involved twice – during the decision process to make someone outright targeted, and to decide if an already targeted person is too much of a threat to the public and should be killed off or something extreme should be done. Picture the AI super computer that is monitoring you somehow red flagging you when something negative happens [when you’re in dishonor somehow] and a bunch of nutters [handlers] running over to a video monitor to see what happened with you so they can judge the hell out of you some more. Other than that it is largely automated by a super-computer with artificial intelligence that is programmed to do it all. This is partially because they obviously will not have the human resources to sit there watching everyone 24 hours a day. That’s impossible, yet it’s happening. Thanatomorphose (2012) shows how they can kill you slowly cell by cell if they thought you deserved it.

Also a lot of the program is time based, I did not receive suspension of memory tricks until a year after I was targeted and they only latest a year and a half or so. You may not get them at all and may hear voices in your head instead. The program has variables.

Step 1 – Monitored

When you first receive phase two you are simply monitored. This could happen for years and you would have no idea it’s happening. The people doing this need your dishonor to move against you. So over time a handler(s), as clearly shown in Metropia (2009) or referenced in Gamer (2009), tests you with ridiculous scenarios to get you to act out against someone or something by mind controlling the people around you. You won’t even know it’s happening other then noticing how unreasonable someone such as a family member is acting all of a sudden (for example someone will give you something, you’ll throw it out and then they’ll want it back and throw a fit when they don’t get it). If they get your dishonor somehow, or otherwise find you guilty of something they do not approve of, you get elevated to the next step. Everything you do as soon as you receive phase 2 is recorded via your ocular implant, aka A Scanner Darkly (2006); but they are not necessarily watching 24×7 as they do not have the resources, or possibily the right, to watch everyone with phase 2. You need to become outright targeted first.

Step 2 – Gangstalked & Organized Harassment

In this step you become an outright targeted individual and are typically gangstalked or otherwise publically harassed because this is the most standard and automated form of psychological non-contact harassment. This is when a targeted individual thinks the general public is organizing against them and stalking them wherever they go. This is definitely what is appears like, but what is really happening is the public/gangstalkers are simply normal people who are already around a targeted individual and are actually being mind controlled to give some act or sign that they are stalking you. The public neither has the time, logistical skills, finances or motivation to do anything productive at all. So the whole idea there are teams of gangstalkers is the most absurd idea ever. Not to mention this just started roughly a decade ago – just in time with chemtrail nano-fibers by coincidence? I think not.

The idea in this step is to get a targeted individual to act out against and hurt a so called gangstalker and thereby into so much dishonor that a handler and the people running the program are justified in acting against (for example they may be arrested, which is the next step in this case) the targeted individual or otherwise ruin their life. The targeted individual will always lash out and blame the gangstalkers or public at large due to a lack of understanding. Also see FAQ question #8. Also see Ultrasonic (2012) for a cinematic example of gangstalking.

In the alternative, if a targeted individual does not understand what is happening and believes they are going crazy this instead will be amplified by the handler. Family members will suggest a targeted individual should see a doctor or has mental problems. Whenever a targeted individual does this or identifies with it, it will be amplified by a handler and will be a unique false reality for that specific targeted individual.

This is typically the game plan, but any unique scenario or false reality could be used against you. For example if you are a priest they may forego everything and try to trick you into thinking god is communicating with you. If you are a terrorist – Allah. You will believe it. You are also tested repeatedly in this step. Examples include if you hold the door open for people, do you help a stranded motorist, do you help someone who needs some spare change at like a parking ticket booth, did you lie about x, are you racist, etc. Think of any kind of insignificant test that gives them the reason they desperately seek to hate you.

Step 3 – The Full Program

If a targeted individual decides to educate themselves and figures out the gangstalkers are nonsense and everyone is being mind controlled the targeted individual gets elevated again to a final step/level. Sometimes a targeted individual is elevated to this step just for kicks.

In this step everyone, even a targeted individual’s friends and family are mind controlled to appear in on it. The purpose of this step is to get a targeted individual to think that their entire life is being controlled by the handlers. You better do what a handler is hinting you should do or else type of thing. They can completely control a targeted individuals life, but this is not what is happening. A handler(s) will constantly create non-consequential problems for a targeted individual. The point is to make a targeted individual think a handler is in control when a real problem or opportunity surfaces. For example a targeted individual doesn’t get a job after going for a job interview, it must have been the handler that mind controlled the guy not to give the targeted individual the job. This could very well happen. This is simply the illusion they want you to think is happening. Because it’s an illusion they believe it is justified.

In this step (and possibly step 2 also) they actually help you too. This idea of receiving help is confirmed by a presumed crazy person in this TED talk which should be reviewed now. For the harm being levied against you they use mind control to help you if you can wrap your head around it. For every problem created they must create an opportunity to help you too. They are trying to keep a balance, it is done very poorly. This concept of an alternative handler is shown in clip 2 for Metropia (2009) @ the 3:44 thru 4:10 mark and covered in The Adjustment Bureau (2011). This and everything being done is ultimately unlawful as Invito beneficium non datur (No one is obliged to accept a benefit against his consent). The help provided is never anything that would not happen eventually anyway, so a targeted individual in essence gets nothing of value at all.

In this stage a targeted individual is typically physically assaulted in various ways including sleep deprivation and having their body randomly hurt to increase instability and confusion.


The Strategy for Targeted individuals

Some thoughts on a conclusion can be found in the review for Rise of the Zombies (2012).


The Automation of Gangstalking

I’d like to take a moment and comment on how automated this program can be. The people running the program obviously only have limited resources and can’t watch a given targeted individual 24 hours a day. To help in harassment, a given individual can be put on an auto-pilot where a computer actually decides when to hurt or harass a given targeted individual at random or preset points in time. This probably only works for sound events and physical assault (hurting your body). For example, if nothing has happened for more than 4 hours a computer (probably with a basic level of artificial intelligence too) will decide what the best course of action is for a given targeted individual, which probably will result in a sound event being triggered which a targeted individual has previously identified with or possibly assault (slight physical harm being done). Or it could be emotion based – if the BioAPI senses emotion x from you its pre-programmed to do y. The point is its automated, and therefore there is no handler actually doing anything or even watching sometimes.

Also keep in mind everything a targeted individual says, sees and hears is being recorded for future reference. They are going to judge you (A Serious Man – 2009) and control you. That’s all it is about. They do try to help a targeted individual too, but nothing is done that would not otherwise happen anyway so the help is just a cruel joke, even more so then the actual assault and physical harm. Again, this concept of an alternative handler is shown in clip 2 for Metropia (2009) @ the 3:44 thru 4:10 mark and covered in The Adjustment Bureau (2011).

Also see A Scanner Darkly (2006) @ 0:07 thru 0:17 in the clip/trailer where Keanu Reeves tells you ‘whatever it is that’s watching… it’s not human’; because part of the program and phase 2, as I’ve described herein, is actually a supercomputer with basic level of AI that’s doing the assessing. When an event or something you do is flagged by the computer a person then decides what to do next. A Scanner Darkly is real, they are clearly showing you everything. Also note how compartmentalized they show the program being in A Scanner Darkly; where Reeves has no idea who the other people/handlers are when he goes to work. Everyone does their job only. That’s critical to understand the overall scope, if you care that much.

Also see the clip for Android Insurrection (2012), where the spider robot is simply telling you the truth about what is happening in which the spider robot itself, representing the super computer that everyone on earth is hooked up to, has a high level of AI. It’s telling you and showing you. It’s real. In real life it obviously does not look like a spider.


Gangstalking Disinformation

You might have read or noticed gangstalkers are sometimes caught. Or come clean in court. Or admin they were hired to gangstalk.

They really, really need people to believe in the gangstalking fraud. People who say they are gangstalkers are shills and they don’t even know it most of the time. It’s amazing, they really think they were hired by whoever (the government?) to gangstalk, but then convinced they need to come clean in court. They don’t even know they are being played as shills. It’s all a dog and pony show to justify the existence of gangstalkers. Its 100% pure mind control. In fact, every stupid thing you read on the entire internet about this stuff is disinformation, misdirection or confusion so you do not connect these final dot outlined on this web site.


Additional Side Effects

Some additional side effects are below for people who contract phase 2 or a variant of it. From experience this is mainly what happens when the full BioAPI is installed. If you have phase 2 but do not remember some or all of the following it very well could be because the side effect happened while you were asleep. It takes roughly two months for phase 2 to be completely installed and happens in stages. The ocular implant is preset after about 1 month. Many side effects and the physical implications of the contraction of phase 2 is covered in the new clip for Contracted (2013). It appears every sensory function of the body is suspended or turned off during encapsulation.

  • Temporarily loosening of the teeth. The subject can actually wiggle their teeth for a couple weeks. See Contracted (2013).
  • Permanent metallic taste in the mouth.
  • Probable temporary loss of taste. See Contracted (2013). I say probably because it may have happened to me and I just didn’t notice it because I did not eat that day or something.
  • Permanently, slightly altered ability to smell. For example exhaling quickly through the nose would smell like smoke or burning feathers. See Bandits (2001).
  • Temporary (20 minutes?) loss (about 80%) of sight. See Family Guy – It’s a Trap (2010). This happens because the nano-tech is wiring your visual cortex so it/they can make you see things, typically silhouettes, that are not there to help trick you.
  • Slight loss of dexterity (unnoticeable over time). Perception of what you are doing feels slightly different.
  • Large increase in gastric and intestinal fluids in the abdomen. Sounds like you are hungry all the time but you’re not. Doesn’t hurt at all. Dissipates about 4 months after the contraction of phase 2.
  • Permanent skin sensitivity issues. Skin feels slightly tingly in various spots.
  • Temporary (8-16 hours) skin sensitivity loss. A hot shower will feel cold. A complete loss of skin sensitivity as the skin’s neurons/synapses are encapsulated/bridged. This happens about 2 months after contracting/triggering phase 2. See Contracted (2013) for this in action.


A paranoid schizophrenic is someone who has figured out what’s going on.



Reason for everything, BioAPI and Chemtrails Pt. 4 – BioAPI Details

And now the next part to our BioAPI serie…

Your BioAPI

The BioAPI is extremely powerful and provides complete control over every man women and child on the planet. I understand it’s difficult to accept, I’m simply telling the way it is. The following table attempts to outline what is possible with the BioAPI depending on what phase you have. Very well demonstrated in the movie The Presence (2010) (no clip provided), the suggestive nature of phase 1 works very well, you just act out what your told too because no one would ever doubt the thought’s they are having are not their own. Combined with the fact that no one can think for themselves, even for a moment to begin with, the staggering irony of it all is obvious.

The primary difference between phase 1 and 2 is phase 1 targets your mind, hearing and basic sight only; where phase 2 encompasses your entire body. Phase 2 Both phases also provide the ability to have your memory suspended or manipulated allowing for very interesting events to occur (or more accurately appear to occur). The cogitation of phase 2 in the movies is typically reflected as a zombie. Zombie = phase 2 or to a greater extent outright targeted.


Technical Achievements

So how great is this technology? In one word its “unbelievable“. Its so epic the average person visiting this site won’t be able to even remotely accept its possibility. It’s a minimum one century ahead of its time. The following scenarios are all possible and have been witnessed firsthand by myself as well as any other targeted individual. With two different phases, some things are only possible with phase 1. Phase 1 is kind of limited and only encompasses the most amazing aspect of the technology; again, the easiest way to grasp it is the nano-implants for phase 1 target your head (excluding scent and taste), phase 2 targets the rest of the body. The following chart will try to split up the examples and where they apply. If you have trouble believing any of this you have not watched this video enough – watch it at least 25 times, it then might start to sink in. Remember, 99% of the planet’s population has phase 1, this includes you.

Interestingly enough, they have told you and demonstrated crystal clearly what is possible with the movie Gamer (2009) and to a lesser extent Technotise: Edit & I (2009). So don’t take my word for it, this is only what has already been told right to your face.

Applicable Phase Description Example
Phase 1 (Everyone) Direct-to-Speech: the ability to force (unknowingly) anyone at will to speak or say anything on demand. This is shown in real life on this page here, the people are clearly aware they are speaking gibberish but are unable to stop. Also when Bruce Willis talks through his test surrogate is a good representation of how this probably works in real life from a handler’s point of view. See the Surrogates (2009) clip (@ 1:20) or Black Limousine (2010) for a reference on how it is used to warp the reality of people such as yourself.

This is talking through someone is very well done in the clip for Control Factor (2003).

Phase 1 (Everyone) Suggest-to-Subconscious: the ability to insert a thought in real time into a subjects mind, in which most of the time they act out. Probably a subset of Paralleling or simply thinking with someone (see below). For example, you think to yourself you want to go outside and sit on the porch, so you get up and go. Was it you’re thought for real? This is extremely difficult to describe, believe or prove and is the most mind blowing part of the BioAPI. Everything else pales in comparison to this with the exception of suspension of memory. It’s 100% transparent, and works so well you would be stunned for months if you watched it happen right in front of you. It’s epic. The only references that I found that even remotely demonstrates this is in the movie Hanna (2011) and Metropia (2009). They also make fun of it in this clip from The Simpsons.

Update 2012-08-04: A great example of how simple this can be is shown in the nice dog scene for Ultrasonic (2012). Also see Earthkiller (2011) which is now very important.

It would probably involve the cerebral cortex, which is where the process of conscious thinking and decision making happens.

Phase 1 (Everyone) Visual: the ability to see what you see. Previously I was under the conclusion that only people with phase 2 would have their sight compromised. Over time the actions of random people from public when being mind controlled simply cannot be explained unless they have the ability to see what they see. Therefore the nano-camera implant for phase 2 subjects must merely be for a better high quality (HD if you will) signal due to the difficultly in mapping the visual cortex. Some more information on the ocular nano-implant is available.

There are several media examples that reference the ocular implant including Minority Report (2002), Order of Chaos (2010), End of Watch (2012) and The Box (2009) to name a few.

Phase 1 (Everyone) Paralleling: the ability to merge with a subjects mind for real time coordination and response. Or simply thinking for or with someone. This seems unreal but it’s not as difficult to believe as it sounds. When you speak or consciously think, the required neurons and generated EM waveforms in your brain are simply modulated/digitized (just like a computer modem) and transmitted in real time to a handler at a command center as clearly shown in A Scanner Darkly (2006) and Metropia (2009). This handler would connect to and receive the subject’s signal and essentially merge minds electromagnetically (it’s probably more advanced, such as quantum communication/entanglement instead) for lack of a better description – resulting in one signal, but two minds (or two CPU’s if you will). So in this capacity the handler would be able to think a thought and the subject would think the same thought in parallel, speak a phrase and the subject would then speak the same phrase. It is not 100% guaranteed action because the subject may ultimately decide not to say or do something, so paralleling is partially suggestive in nature. For phase 1, paralleling is restricted to the mind only, phase 2 extends the ability across the entire body as described below.

The best way to think of paralleling is a technical support guy connecting to laptop remotely to fix it. You can still use your computer, but so can he, so sometimes you fight for control over the mouse.

This is a crude example of how simple the mind’s EM waveform is. This guy is controlling a toy race car with his thought. Has nothing to do with the BioAPI, just basic EM inductance – total cost $25? Now imagine if you had all the resources in the world and we’re completely insane. What would you come up with? Everything on this web site, that’s what. Pontypool (2008) has some thoughts (pun intended) on this.

Here’s a site that references this as being accomplished in mainstream science (which is always 20 years behind the people doing this stuff).

Paralleling is exactly what is being clearly demonstrated to you in the movie The Speed of Thought (2011) which essentially is real (except for the age limitation part). No clip provided.

Paralleling is called drifting in Pacific Rim (2013), because its real.

Phase 2 Emotion Mirroring: the ability to monitor or push/write emotions in real time. This is trivial to understand as emotions are simply localized groups of neurons in different parts of the body. Simply encapsulate all of them and quantify the change, exactly what a BioAPI is for. For example if you get butterflies in your stomach of feel scared, the type and severity is transmitted back to the handler’s data center for assessment or at least recording (note they tell you in A Scanner Darkly (2006) – EVERYTHING YOU DO WILL BE RECORDED). This is also a subset of Paralleling, in which emotions can be pushed back making a subject feel a specific emotion too.

The South Park episode Insecurity (Season 16 Episode 10) is about the monitoring of people’s emotions. Specifically fear as one of the things they are trying to do is keep targeted individuals scared. Also see this TED talk where a women confirms in real life the reading of her emotions.

Phase 2 General Monitoring: the ability to monitor and influence countless body functions. Again, basic nano-technology here. Keep track of the subject’s heart rate, glucose levels, sleep pattern, etc. Any aspect of your mind and body can be easily measured, gauged and recorded by the BioAPI.
Phase 2
Phase 1 (Everyone)
Disable Short Term Memory: memory suspension. The part of the brain that deals with memory can be temporarily disabled. This is referenced in the Men in Black (III) (2012) movies, and is very effectively used by a handler to create false realities for someone by having them (you) do something without even knowing it. For example this poor lady (a targeted individual in real life) actually thinks she was raped, had her house damaged and was poisoned by organized stalkers. In reality she assaulted herself, kicked in her own wall and poisoned herself. She just doesn’t remember it. If you can imagine extreme cases of sleepwalking, it would be like that. It’s also very effective at simulating the manipulation of time.

Once your memory is suspended it’s simply a matter of a handler thinking for you (basic mind control) and you thereby become a mindless robot. See the clip for The Collapsed (2011) for a complete breakdown of how powerful this memory suspension can be.

Phase 2 Paralleling: the ability to completely merge with a subjects mind and body. Similar to phase 1 paralleling but includes the entire body. It can be forced, but then damage can occur to synapses which result in nose bleeds and internal neural damage, partially shown in The Crazies (2010). This is why memory suspension is almost always used so that a subject (you) do not know what is happening and therefore cannot fight it.

Also see The Ghastly Love of Johnny X (2012) where he controls the dead corpse, what you see there is real.

Phase 2
Phase 1 (Everyone)
Direct-to-Motor-Control: controlling someone remotely with or without their knowledge. This is reflected in countless movies including Surrogates (2009), Gamer (2009) and most accurately The Crazies (2010). If the subject is conscious he’s being controlled and fights it synapse damage will occur, I believe this is evidenced by the bloody nose shown in The Crazies. Real Steel (2011) demonstrates the reverse of this direct-to-motor-control. The clip for Technotise: Edit & I (2009) also shows this. Note forced & conscious motor control requires phase 2.
Phase 2
Phase 1 (Everyone)
Thought Reading: coherent thoughts can be read (and given), they listen to your thoughts like you listen to the radio. Examples demonstrating this includes this clip from Metropia, The Simpsons, Gamer (2009), etc. It’s simplistic when you think of it, your thought is just another EM waveform – so digitize/modulate and transmit it. Quite awesome actually. More accurately they are probably sampling which neurons light up when you think x, y or z. This is what the awesome move Pontypool (2008) is trying to show you; you just need to finally think for once.
Phase 2 Pushing Sounds: vocals, speech and sound effects. Speech and sound effects are easily transmitted and heard with crystal clarity. In fact the transmitted sound effects they send to me are better than my natural hearing. This would obviously be used to convince someone they are crazy when they hear voices in their head.
Phase 2
Phase 1 (Everyone)
Geolocation: your physical location is always a mouse click away. Similar to your cell phone’s GPS sensor, there’s a nano-sensor somewhere in your body which provides your real time location on demand. This is clearly shown in A Scanner Darkly (2006) (at exactly the 0:38 second mark of the trailer) and The Adjustment Bureau (2011), in fact its shown in the exact context of a targeted individual (Matt Damon) being harassed and trying to run away from The Program. Geolocation is also lightly referenced in The Matrix (1999) white rabbit scene.
Phase 2 Dreams: any dream they want can be beamed into your brain as you sleep. I wasn’t going to put this because its sounds even more unbelievable then everything else. But it happens to me every night so what the hell. They can push dreams into your brain at will. After all, dreams are just thoughts. It sounds amazing but simply boils down to another form of physical assault. This is usually accompanied with a set of emotions forced upon you at the same time as being forced to wake up (for example The Matrix (1999) white rabbit scene), which can simulate a nightmare. Like any other dream you typically don’t remember anything if you sleep through it. So they force you to wake up and manipulate your emotions at the same time for various reasons such as keeping you suspended in a state of slight shock and fear, send a message, convince (another nano-trick) you they are doing something they are not through mental images, etc.

Update 2012-10-12: Now see The Giant Mechanical Man (2012) for a great psy-op on dreams. Although only targeted individuals will understand it.

Phase 2 Physical Pain & Pleasure: typically pain. Any part of your body can be made to feel any amount of pain. Both used for subtle psychological reasons, and to create a false reality. For example women will think they were raped because that is what it feels like. In reality it is completely fake. Also see Transformers 3 (2011).


Grazy Talk

This web site has a lot of truth for someone to handle and don’t expect most people to be able to comprehend it. If 2% of the population thinks, 3% think they think, and 95% would rather die than think – which percentage are you in?

Remember, the world was flat at one time and you we’re insane if you thought otherwise.

Remember, if you told someone in the 1970’s they could have their body duplicated and copied they would call you insane. Yet today cloning is common knowledge.

Why is it so hard to imagine some creative nano-tricks? Especially when the proof is right in front you. It’s not so much how amazing the nano-technology is, it’s what they are doing with it that is equally stunning.

Let’s see what Dave has to say shall we?…


Reason for everything, BioAPI and Chemtrails Pt. 3 – references in the Media

And now continues the BioAPI series with references in the media. This is a hard topic to swallow and could be hard to comprehend, but this is very important thing to understand the situation we have on our hands today with chemtrails and nanotech.


You are about to embark on the most interesting read of your life; an accumulation of movie clips and real life examples that will for sure make you recognize that something has changed. Figuring out exactly what has changed is the purpose of this web site.

The movies obviously contain many clips to condition the audience to believe or not believe something (for example to smoke cigarettes). Some call this marketing, others refer to it as a form of brainwashing over time. Sometimes it’s obvious and right in your face, other times its extremely high level and so subtle you cannot even begin to catch it if you do not know what and why you are looking for it. The examples below attempt to tie your BioAPI nano-implants together with the movies while showing the possible outcomes and possibilities the implants can provide once installed. Again, many concepts are specific in nature (eg. to discredit a side effect) while others are broad in nature (as in what is happening in general). There are also a few more media examples on the Direct-to-Speech (real life mind control examples) page. Each clip by itself could be dismissed, in aggregate you will see they cannot.

The clips for Gamer (2009) and Ultrasonic (2012) are now a must watch. And a cure/antidote is covered in the review for Rise of the Zombies (2012) as well as End of Watch (2012).

Bandits (2001)

There are a few side effects associated with phase 1 and especially phase 2. In order to condition the public to dismiss health oriented side effects as inconsequential anomalies they use the movies like always.

One significant but not serious side effect of phase 2 is when the scent neuron’s get encapsulated they alter the ability to smell slightly. In fact the encapsulation of any neuron/synapse for any organ involved in sensing (skin, tongue, scent, etc.) will be slightly compromised in some capacity.

Typically people will say they smell a burning (feathers or smoke) smell. This clip demonstrates how they condition the public, specifically connecting anyone who smells burning, in this case feathers, with someone who must be crazy. It’s spread out through the whole movie and is the purpose of the entire movie itself. Notice the movie shows Billy Bob Thornton thinking he smells burning feathers, then clearly shows him (towards the end of the move and clip) acting crazy and stupid flopping around on the floor. The audience obviously takes away from that burning smell = crazy person. Classic movie psyop. Keep in mind all movie psyop’s like this are subtle, you have to keep the larger picture in mind to recognize what’s actually happening which in this case is the fact that they are trying to discount the side effects associated with contracting the nano-tech disease (phase 2).

Contracted (2013) provides a complete and excessive overview of the contraction of phase 2 and the implication of the physical side effects there from.

Toxic Skies (2008)

Toxic Skies is a poor quality chemtrail propaganda movie. It’s specifically about chemtrails but you have to look closer to see what the outcome of the patients are to figure out what is happening. It reflects that they are trying to kill people (or who they – not the doctors – decide are useless eaters). As in all movies such as this it starts off as a plague or biological threat. Four or five people from various walks of life are presented as patients in the movie who contract the unknown disease. The only one that dies is the one that simply watches TV and is presumed not to care about life. Therefore people who understand what is happening will see chemtrails = kill useless eaters. Everything else in the movie is irrelevant.

So in an overview the people running The Program are deciding who gets to live and who gets to die. This is happening every day right in front of you.

See the clip for A Serious Man (2009) for another example on how they are judging you as they see fit. Also see Meeting Evil (2012). Also see Control Factor (2003).

The Crazies (2010)

This movie holds back nothing. Some clips show an overall high level meaning and you have to look for, The Crazies slaps you right in the face.

In this clip at the beginning of the movie a so called crazy person comes out of the bush with a shot gun. Not knowing what to do the cop has to shoot the guy, no one questions even for a second what happened, I mean it was clearly the guy was drunk right? Wrong.

This is what I call Direct-to-Motor-Control, or to a greater extent Paralleling. A handler is actually controlling the guy like a robot. The nose is bleeding because the guy is trying to fight it or at least the mind control is getting to extensive resulting in synapse damage. He doesn’t want to raise the shot gun so there’s conflict within whatever cortex controls motor functions resulting in synapse damage. Ultimately the BioAPI wins and the guy has to do what the handler is forcing on him. This forced and conscious motor control is only possible with phase 2 of the BioAPI. The nose bleeding is also shown in The Box (2009). The Box (2009) is purely about the BioAPI and the implications of being tested and judged. Another aspect of the BioAPI allows the subjects memory to be suspended first which is extremely effective because now the subject now has no idea what he is doing and thereby cannot fight it at all.

Then to prove the point the scene jumps to a satellite/command center style clip which is a reference that everything is controlled from a single command center, then of course the final dot – chemtrails. More or less, this clip is real, and is the only clip or movie reference in existence (Update 2012-08-04: also see Ultrasonic (2012) which also connects all three dots – in Ultrasonic’s case concentrating on mind control delivered by chemtrails as opposed to body control as shown with The Crazies). In the clip it flashes this satellite style reference, this is only symbolic, it is not a satellite that does the controlling of people. The actual communication with the BioAPI/implants is much more advanced and may involve quantum entanglement. This is beyond the scope of this site and is unnecessary to understand what is happening.

Greenberg (2010)

Greenberg is a movie that specifically references phase 2. Some of the side effects demonstrated in the media show people who get phase 2 have sores on their skin or feel sick in some way. Also see the Family Guy clip for another example of this. This is true but in varying degrees, and is useful to demonstrate what is happening to people in the know.

In this clip Ben Stiller has the chance to run off to Australia with some hotties. But as he’s leaving they clearly show the one blonde slut is sick. She’s coughing and has a sore on her skin, so Ben Stiller immediately bolts. This is a direct reference of someone with phase 2 and therefore the entire BioAPI in the movies.

About 5 minutes before this scene Ben Stiller also makes a reference to hurting people, he says it twice for no reason (@ about 1:33:00 in the movie, not the clip). Why? I mean teams of writers pour over these movie scripts before they are finalized and all they come up with is “hurt people, hurt people“? It’s easy to understand when you see the big picture.

Also see the page on morgellons with the clip for The Informers (2008). Also see the clip for Transformers 3 (2011).

Hanna (2011)

This movie is the only movie I can find that shows what I call Direct-to-Speech in action, or to a lesser extent suggesting something so someone’s subconscious. A handler (the women behind the glass) dictates to the other women (the one talking to the girl) what to say. Now everyone that watches this clip will say of course, the second women talking to the girl has an electronic earpiece in her ear – that’s just it, she doesn’t (note that in the context of the movie she might as well have an earpiece in, but that’s not what we’re looking at here, we’re looking for the double meaning). Note you should look at the real life mind control examples to put this in a better context.

Now this is partially symbolic and very high level, but does demonstrate what can and is happening to phase 1 individuals (such as yourself). The amazing part is the second women is not aware she’s being told what to say or do. This is the most amazing aspect of the BioAPI, everything else pales in comparison to this and is extremely difficult to accept or comprehend. So the thoughts the second women (talking to the girl) is having are not her thoughts. What she’s saying to the girl is suggested or inserted into her mind in real time, which she believes are her own thoughts and acts or talks accordingly. They make fun of this in The Simpsons clip here.

There’s actually a lot happening in this scene. For example to show the two women are connected somehow (for example paralleling, or simply thinking with someone including talking for/through them as in a direct-to-speech concept) they show both women having red hair. Coincidence? Not if you know what to look for. Note how they zoom in on her mouth @1:04 when she says ‘just arrived from Prague‘, they are trying to reflect it’s not necessarily her voice speaking it, is being echoed through her.

Also see the clip for Metropia (2009). Or for that matter the recently added nice dog scene in Ultrasonic (2012) for another demonstration on exactly how it works in (would be) real life.

Update: This clip has been largely superseded by Control Factor (2003).


…these are not the droids you’re looking for…


Doomsday Book (2012)

This clip is new as of July 24, 2012 and put here because I’m running out of space on the other pages. The clip quality might be a little degraded, I’m trying to keep these clip files small for bandwidth reasons now.

Previously on the FAQ page I listed several triggers which install phase 2. One of them was red meat. I gave no reference, proof or evidence whatsoever. Now over 8 months later this movie is the missing puzzle piece for red meat (also see Harolds Going Stiff (2011) below) . Just because something might not add up or lacks evidence on this web site does not mean it’s wrong, it simply means we have not found that piece of the puzzle yet as I will now demonstrate.

This movie is out of South Korea and is not one single movie, instead it is three separate short films with each short being roughly forty minutes in length. What they have done here is brilliant. The first short is a typical bad zombie apocalypse movie. The second short is about the morals of robots as people, the third is largely irrelevant. The key is the first short and more importantly its immediate connection with the unrelated second one. I’ll explain more below. During a normal day an apple for whatever reason biodegrades wrong and spawns a virus which turns everyone into zombies. That’s the movie; ridiculous on its surface. Now let’s take it apart…

In the beginning of the movie and clip they focus on an apple as it rots. He throws it out with the trash as expected (@ 0:30) and the apple degrades wrong (@ 1:00 in and around). Humorous zombie apple now. They show the apple becoming feed for livestock (shown in the movie but not shown in the clip much other then @ 1:12). They then focus heavily, very heavily on red meat (@ 1:18 thru 3:29) as people eat it. Specifically as disgusting as possible complete with a cow being slaughtered at 1:14. This is intentional. Notice at 2:26 he pulls an apple peel out of his mouth. Why? Keep reading. People then get sick (examples @ 3:30 thru 4:00) as they turn into zombies from eating the red meat contaminated by the zombie apple; I mentioned before what they are doing is partly biblical, they love to throw the bible out as an excuse to hurt people, even if you have never harmed a fly in your entire life. Then at 4:10 the zombie apocalypse strikes. The two main characters as zombies now find each other wandering around (@ 4:30). Then they drive it home – the apple as a metaphor (remember when he pulled the apple peel out of his mouth @ 2:26) and contaminant for red meat becomes symbolic for the trigging of phase 2 through the eating of red meat. Why? How? She gives the apple to him (@ 5:29) and he eats it. It’s intentionally disgusting, you are supposed to be turned off by it [Update: this is a critical concept to explore so I’ve elaborated on it below in the Sidebar – Subtle Distraction Psyops]. Then right after he eats the apple they zoom right in on her or a zombie eye – what do they show you? What’s in her eye (@ 6:10 thru 6:14)? A chemtrail nano-fiber. They are clearly showing you. This is the end and climax of the movie too which doesn’t make sense unless you know why. And it’s not even the kicker…

The first short then ends (@ 6:33) and in the movie (not the clip) they show a biblical quote (screenshot here) which essentially translates to God telling Adam not to eat the apple. Because again, from the movie, the apple becomes symbolic of red meat and is thereby telling you eating the apple [and therefore red meat by metaphor] is bad [and now via nano-tech will turn you into a robot]. The second short starts, and is about robots. What a coincidence – because very early in this second short (within 30 seconds) the technician from the robot corporation is walking down the hall with the monk and they clearly and intentionally show his corporate logo on his uniform (@ 6:55 thru 7:04). The corporation name is UR (Robotics). Get it? [You] [are] the robot. They mention the corporation name a few times in the short and show it on his briefcase too (@ 7:12). Only people that know what is happening will see and bridge the connection from the first short (zombie’s representing phase 2 via nanotech spiked red meat) to the second short (turning you into a complete robot) like this. The fact that they are back-to-back but independent (as in separate) short films is intentional and a brilliant idea. Note the cover image (screenshot here) on the front page of this web site, the robot from the second short has “UR” stamped right on it.

To summarize, consuming (probably cheap) red meat can (will) turn you into a robot by the installation of phase 2. That is what this movie(s) is telling you. Note you already are a robot with phase 1, but phase 2 is the full BioAPI and allows for extended functionality such as manipulation of feelings, direct-to-motor control, etc. Also notice the parallel between this clip and Vexille (2007). Both clearly show you a nano-fiber then shortly after tell you that you are the robot (in the Vexille clip @ 1:26 – ‘the virus [cyber-virus/nano-tech] gradually progresses through the body until it finally reaches the brain; at that point we become perfect androids…’). I’ve said it a few times throughout this site, stay focused, because you are the base model surrogate.

Sidebar – Subtle Distraction Psyops
It is important to note the significance of how disgusting the apple eating was in this clip @ 6:04. Why would they do that? What is the point? It is psychological. The purpose of instances such as this are to discount the significance of something else during or immediately after what you see. To be clear – you are disgusted by what you see and remember it. You focus on that because that is what is most prevalent. Your attention is captivated to some degree and you are distracted and thereby unable to notice the significance of what is truly important which in this clip is the nano-fiber(s) in her eye shortly after. So the viewers perception is being split, most people will give their attention to the apple eating, a few (self thinkers) will not and wonder what the strange white fibers in her eye are all about. This is the 99% vs. 1% being playing out right in front of eyes. This is the knowledge over ignorance paradigm.Another accurate example is how Leonardo DiCaprio mentions insects in the brain in the Shutter Island (2010) clip; your mind immediately focuses on how disgusting that concept is and thereby discount the clicking in the brain comment. Then when a clicking sound is heard/felt in your cranium you are much more likely to dismiss it.

Another example is in the movie (not clip) for Black Limousine (2010). At roughly 1:20:27 in the movie they show Arquette looking out his window watching a very hot women undress (screenshot here) for a few seconds. Then very shortly after they show the talking gibberish scene. It is the same principal in action, your mind obviously focuses on the women, even well after the camera pans away; and your attention thereby becomes diminished when they (in this case) show an example of what they can do in real life which is make people talk gibberish using the BioAPI/nano-implants.

Another less significant example is in the clip for Ultrasonic (2012). In the nice dog scene the dog only has three legs. Why? What? They couldn’t find a normal dog? Again, it’s intentional to pull your attention away from the scene in general because it could be one of the most important scenes in a decade if you know why.

An extreme example can also be seen in Rise of the Zombies (2012) with the baby stomping scene.

Textually, spelling mistakes and insults accomplish the same psychological effect; your simple sheep mind is turned off by speling mstakes and again discount the relevance and accuracy of the overall message. Most people cannot get by a single spelling mistake whether it’s intentional or an honest mistake. Ironically the smarter someone is the better it works on them.

Harolds Going Stiff (2011)

Harolds Going Stiff (2011) is a humorous zombie movie where people are going stiff and then turning into zombies. This British movie provides us with another direct reference connecting phase 2 with the consumption of red meat such as with the above clip for Doomsday Book (2012). In fact the first short for Doomsday Book (2012) and this movie are the same movie.

In the movie an old guy named Harold was the first to contract a zombie disease. About half way through the movie they simply tell you people are turning into zombies because they are eating a meat product called meat-a-rino as shown in the screenshot to the right. Harold is also shown to be eating them. It’s not a hidden reference at all, if you watch the movie they are outright talking about it. The guy in the screenshot to the right is being interviewed about it.

No clip is provided, but notice how Harold’s facial orifices are slightly bleeding as he turns into a zombie in the same capacity as Earthkiller (2011) @ roughly 0:55 in the clip and cover image. Also notice how Harold symbolically picks the red meat out of his sandwich and throws it away @ roughly 58:30 in the movie. This throwing away of the red meat is the equivalent of the biblical quote (screenshot here) from Doomsday Book (2012) above where God tells Adam not to eat the apple (apple = red meat by metaphor). Everything is clearly being told to you repeatedly.

A Little Bit Zombie (2012)

This movie is the Canadian version of Harolds Going Stiff (2011) above. As with Harold, a main character (Steve) is turning into a zombie after getting bit by a zombie mosquito. Eventually Steve wants to eat brains because he is a zombie, so they go to the meat shop. Notice the letters ‘EAT MEAT‘ are clearly and intentionally visible in the name of the shop.

Now the actually connection or metaphor connecting zombies with red meat is not as stark as with Harolds Going Stiff (2011) or Doomsday Book (2012) above, but it’s there. As they enter the meat shop they look up to show this completely out of context and irrelevant sun burst, if you watch the movie you’ll be like ‘why‘? ([Update 2012-11-17] I’ve added a clip to the right of the sunburst and crEATive MEATs sign) It’s the same principal outlined in the above Subtle Distraction Psyops, but the inverse. It’s like a red flag for the 1%. Then in the red meat shop the butcher serves both red meat and brains. Red meat & brains (for zombies as in phase 2) are thereby subtly connected, if anything because they are buying red meat and eating brains at the butcher [red meat] shop. So red meat = brains [and thereby zombie -> phase 2].

Note how the zombie killer is eating red meat, in this case bacon, through the whole movie, and also notice who the actor is (Stephen McHattie from Pontypool (2008)). Both Harolds Going Stiff (2011) and this movie are cinematically terrible, that’s not the point. Your suppose to understand that. They are released to communicate this message. And the sign does say EAT MEAT as opposed to NOT EAT MEAT. Your suppose to have the intelligence to catch the inverse when applicable and apply it when presented with additional information or movies that reflect the same related theme as I’ve shown. In this case EAT MEAT = Zombie. And zombies are typically placed in the context of phase 2 as shown on the cure page.

Reason for everything, BioAPI and Chemtrails Pt. 2 – Physical Nano-Fiber/BioAPI Examples

Now we add another chapter to this important serie of documents. If you want proof you got it…

Physical Nano-Fiber/BioAPI Examples

This web sites not bother with the scientific details or patents behind the actual nano-tech. I, like yourself I’m sure are not a nano-tech engineer. If you want details you can read for the next ten years if you want. Patents are easily found for all of this. They want and need you to focus on the super technical nonsense, look past it; the closer you look, the less you will see.

To summarize from the FAQ page – chemtrails spray the entire planet with nano-fibers which you breathe in. These fibers contain (nano) components which construct and install nano-implants which the aggregate of constitutes what is commonly known as a Biological Application Programming Interface allowing for complete monitoring & control of all body and mind functions in a given host (you, and everyone on the entire plant). Below are the basics, which is all that’s required for a broader understanding of these nano-fibers. The first few examples show an actual payload within a fiber (which would be used in the installation of a nano-implant for example). The colored fibers are just examples of what else can be seen, and the last example is a petri dish of nano-fibers from an average person such as yourself. The fiber images are about 200x magnification, any standard microscope will let you see these fibers. You can view these fibers yourself right now if you want. They are all around you, you are even breathing them in as you read this. Some fibers move on their own, they sort of wiggle, yet have no organelles proving they are not organic or biological in nature.

All of these fibers are in your body and brain. All fibers and constructs are viewable with the naked eye (just barely) under a proper wavelength of blacklight. For more information on the nano-fibers and how to extract them from your body refer to the bottom of this page for nano-fiber extraction details.

For an impressive prologue to this you can refer to the Gamer (2009) clip in which you are told exactly what they are doing and demonstrates it for all to see. I like the Technotise: Edit & I (2009) clip too.

Nano-fibers are now directly shown and referenced in clips for Doomsday Book (2012) and Vexille (2007). Chemtrails as the source of mind control is shown in Ultrasonic (2012) and The Crazies (2010).

Also see The Host (2013), where they outright show you a pretty good representation of the nano-fibers. See the last sample of nano-fiber images below for the picture of this in real life.

This is the most amazing picture you’ll see in your life. This is a phase 2 subject with a nano-camera in the left eye. Only viewable with the proper wavelength of blacklight. Everyone on the planet has a basic set of nano-implants that allows them to be tracked and mind controlled on demand; people who contract what I call a phase 2 will have additional implants that allows them to be body controlled as well as a whole host of other functions. Your body is turned into a robot against your knowledge and against your will. The aggregate of these nano-implants constitutes what is commonly known as a Biological Application Programming Interface. Check the media page for upcoming references concerning the ocular implant, specifically the Order of Chaos (2010) clip, or even the Minority Report (2002) description for that matter. [Update – you could review the Minority Report description, I’ve expanded on these eye references]

Note the pink circle referencing the implant in the large image is not actually the camera, it’s just a side effect (fibers and implants glow under UV light) of the camera implant installation for this individual. The camera is too small (micro-size) and can’t be seen, but it can be felt – some more thoughts and information on the ocular nano-implant are available.

Interestingly they demonstrate this ocular implant in action and show exactly how they see what you see in Surrogates (2009) at about the 11:00 minute mark of the movie (the movie, not the clip – see the last cover image on the front page of this site). A monitor beside Bruce Willis shows a video cam of what his surrogate is seeing after he gives himself a glass of water. It’s real. This is how EVERYTHING YOU DO WILL BE RECORDED is true from A Scanner Darkly (2006).

In Warm Bodies (2013) they actually reference the exact location of the ocular implant when she is scanned at roughly 58:00 into the movie to see if she is infected or a zombie. The scanner hovers at and around this exact location. They even used the correct eye (left) for the scan.

Also now shown in World War Z (2013). The more mainstream a movie is the briefer the reference; this is the best example of that due to the fact that it stars Brad Pitt. As they come into the hanger at ~40:50 in the movie they quickly scan his eye to see if they are zombies. Correct idea, but wrong application – in real life the proper wavelength of light is elaborated on here.


This first example shows a fiber that was found in pond water if I remember correctly. This is the typical fiber you would breathe in while jogging or something. Notice the payload which seemed to shrink to nothing. It started to shrink as soon as I looked at it, or it sensed the light from the microscope. Seen at roughly 200x magnification in late 2010. The contraction timeframe was about 300 seconds.


A fiber with another payload. The next image is a larger version of this.


This example shows another payload, this time with some color for some reason.


For whatever reason some fibers are red or blue in color.


A red fiber.


This is an example of the most common fibers found. It’s transparent, longer and seems kind of benign. All fibers can be seen with standard cheap microscopes. Some fibers even move by themselves, they sort of twitch if you watch long enough.


The connecting proof of chemtrail nanofibers and your body being the target is this test here. Rinsing ones mouth out with red wine will extract the fibers from the oral cavity of the person. Viewing the extraction under a microscope and you’ll see the same fiber structure as fibers found in pond water or randomly elsewhere. 100% saturation. Note – a quick rinse doesn’t work, you have to let the acidity of the red wine soak into your mouth for a bit. The wine stains the fibers. Gargle, repeat a few times and you’ll start to see them. This image is in a petri dish.

This is exactly what they are referring/showing to you in The Host (2013), screenshot here. Also shown in Ender’s Game (2013), screenshot here.

Clifford Carnicom has pioneered the research (going as far back as 2003) connecting nano-fibers with Chemtrails, merely compare the structure of what comes out of your mouth with what is found outside in rain water. It’s the same thing. See below for a test you can conduct for yourself.


It’s not what you look at that matters, it’s what you see.

Henry David Thoreau

Nano-Fiber Extraction Test

I’d like to take a moment and expand on what someone should see if they actually wish to test themselves for this nano-disease. To make any connection at all you must recognize these Chemtrail nano-fibers as coming from your body which in a normal environment is completely impossible.

Everyone knows red wine stains absolutely everything. It’s a nightmare to clean. It should be no surprise that when dealing with co-polymer nano-fibers this red wine principal is no different. The test is basic. The purpose is to simply allow the red wine’s acidity to saturate your mouth and the nano-fibers will slowly be extracted and then stained by the wine. Why this actually happens is unknown by myself.

To being simply get a bottle or red wine as shown in the image to the left.
Poor a little into the sink. See anything? No. Of course not. It’s just red wine. Nothing to see here. Also check your mouth if you care, it’s clean. If not just brush your teeth.
Sip a little red wine, swish it around in your mouth for a bit, maybe gargle. Spit it out. What do you see? Some people will see nothing at first, the red wine has to saturate the oral cavity. Some people will immediately see small strange specs or fibers as shown. Now think for the first time in your life, I thought the wine and your mouth were pure and clean? Therefore this must be impossible right?
After repeating this test a few times, specifically gargling, you should start to see large globs of nano-fibers come out. They never stop. You can do this test for hours and more and more fibers will come out of your mouth.
A little disgusting yes, but necessary for demonstration purposes. Look at your tongue. Nano-fibers get caught in your tongue’s hairs (your tongue has hair obviously).

There you have it. Chemtrail’s spray nano-fibers. You breathe, eat and ingest these nano-fibers. It’s impossible not to. Could you put these nano-fibers from your mouth under a microscope? You could but it’s not realistic because they are all stained. It’s much better to get a sample of pond water or water from the street or sewer drain or leave a small dish of water outside for a while to get nano-fibers that are falling from the lower atmosphere after some chemtrail spraying.

Now what do they do? Why? Why on earth would this be happening? Brace yourself, you still have to think, I know it’s difficult but hang in there. Nano-fibers deliver nano-components as reflected above. These nano-components encapsulate neurons and bridge synapses throughout your body or to a greater extent install nano-implants. Again, for what? Why? To control you (for example Gamer (2009)). That’s why. To read your mind, thoughts, see what you see and hear what you hear. Essentially turn you into a cyborg, in standard computer science circles this would be called a BioAPI or wetware. It’s for mind control. Plain and simple. They even show you examples of what they can do in every day life, so continue on for several awesome media examples and real life mind control references. It’s all real, they did it all.

Thoughts on a possible cure can be found in the review for Rise of the Zombies (2012).

> Possible Cure

> Media References


Reason for everything, BioAPI and Chemtrails Pt. 1

Now I start a series that I found I think is crucial info. It is about so called BioAPI, chemtrails, nano-fibers and how they are used to turn us into biological mind-controlled robots. Transhumanism to the core. So here is the part 1:


What the hell is happening… you must be thinking that, as well as being dazed and confused in the least which is the purpose of this web site. Your unfortunate lack of critical thinking skills leaves you without the ability to see the unseeable. You watch, but you fail to see. Fear not my less informed friend – whether your being chemtrailed, body/mind controlled, hearing voices or stalked by the public, this web site connects the final high level dots concerning this otherwise complicated puzzle of insanity currently before you. ‘Logic and proportion have fallen sloppy dead, and the White Knight is talking backwards’. This is what they are doing to you and your family, and this is how they do it.

Complete, high dexterity remote control of every single synapse and neuron for every person on the face of the earth and the greatest revelation in human history… your BioAPI.


In 1999 the world changed. The money trust, the law (commerical code/contract law, applicability of public/statutory presumptions, etc.), technology (nano-tech), and the general direction of the planet completely changed. In order to even remotely grasp what is happening you must disconnect your mind from the last century’s way of thinking. Failure to change the way you think will preclude you from seeing reality accurately. There is no money anymore, taxes are a thing of the past and no written law applies to you.

So what we now have is a real brave new world. The purpose of this site is to simply show the extent at which they have leveraged nano-technology directly on you, how they control everyone on demand with it, and end the confusion around the subject of chemtrails and how they fit into the larger picture while showing how the media and movies are conditioning the mind of the general public.

The Reason For Everything

Let’s just get right to it. Forget everything you know. Here it is, the epitome of reality. This video is the best example that summarizes what’s happening or has happened in your body already. This is the most prevalent secret in the whole world because it has been forced onto everyone unknowingly.


What you see here is a nano-bot encapsulating a neuron or synapse (for example your purkinje neurons) or other nerve ending/bridge. It’s only a simulation, but accurately summaries everything that has happened in the past decade. This allows complete control of the host (your body) remotely as demonstrated repeatedly in the movies (for example Metropia (2009), Ultrasonic (2012)). A more sophisticated set of nano-bots would and very well has subsequently allowed for a complete and full BioAPI to be installed without the host (you) even knowing it. If you want to get technical your neurons have been encapsulated, your synapses have been bridged.

The basic idea consists of a set of nano-wires tethered to electronics in the main catheter such that they will spread out in a “bouquet” arrangement into a particular portion of the brain’s vascular system. Such arrangement could support a very large number of probes (in the millions). Each n-wire would be used to record, very securely, electrical activity of a single or small group of neurons without invading the brain parenchyma.

What is the purpose of chemtrails

Chemtrails are a huge logistical operation. Larger than the hoover damn, trans-alaska pipeline or moon landing. It’s large. And expensive. The biggest mistake one can make is assuming there is only one reason for chemtrails. There are about five or six reasons and possibly more. The top six are listed below with a brief summary. This web site is concerned with the last. A visual overview may help by reviewing a flowchart here.

  • Blocking the Sun: This is the standard reason given to fools in the government. We need to secretly stop global warming, so keep it a secret that we’re spraying. Global warming is the catch all con for everyone in the government. If you’re smarter than this they’ll give you a better reason.
  • Blocking the Sun (Again): A reduction in sun light across the planet works well to decrease or manipulate crop yields slightly. This is part of the requirement to engineer a food crisis and bring in a famine. You can dismiss this.
  • Superheating the Atmosphere: In order to create earthquakes and steer hurricanes (for example hurricane Katrina in New Orleans) the atmosphere needs to be more conductive for electricity so installations such as HAARP (HAARP is just what they want you to see, HAARP has nothing to do with anything) can work their magic. So the chemtrails spray barium and aluminum among other things to create a more conductive upper atmosphere. In The Phoenix Rises (2012) they tell you exactly this @ exactly ~16:00 in the movie as they specifically talk about chemtrails. For your information barium has nothing to do with the BioAPI, nano-fibers or nano-tech at all.
  • Health Erosion: As a side effect everyone’s health and immune systems become slightly compromised. This is usually not an issue for most healthy people. Older people on average will now die sooner and any health complication is slightly more likely to be fatal. This is both a side effect of spraying and intentional.
  • Climate Modification: To help or hurt crops, keep skies clear for a major event (like the Olympics), cause a typhoon, steer super storms, etc.
  • Nano-fiber Propagation: To universally install a BioAPI in everyone they need to spray nano-fibers. These fibers cannot be put into the food supply or given in some other way, the uptake across the population would take forever and not propagate very effectively. It’s much easier just to spray everyone like an insect; and because it’s happening to everyone the universal herd mentality of the unwashed masses then justifies it.

Nano-fiber basics

Nano-fibers specifically are a transport mechanism. Nothing more. They hold a payload for delivery. A payload that would otherwise be compromised by the sun or atmosphere or not make it to its destination (your body). Such as viral RNA code, metals such as aluminum, nano-components, etc. The fibers are (surprisingly) quite harmless as everyone has them. Examples of these fibers can be found all over the internet or in the physical examples section of this site. The fibers must be independently sprayed, if they we’re added to the jet fuel the extreme heat would destroy the payload.

So it’s not the fiber that is critical, it’s the payload.


This is a complicated question. The people creating and doing this are trying to force biblical principles onto the populace (including themselves) through technology. For example the seven deadly sins. They take a basic human requirement (food, sex, a specific emotion) and quantify it (within the BioAPI). If the result is to extreme (for example you eat too much) or you do something not approved of then they decide that you’re not worthy of life or judge you accordingly. In the alternative your are added to a program. The possibilities for the BioAPI or nano-tech in general is endless. Therefore you should not focus on any one reason as being the end all purpose. It’s too dynamic. It’s to complex. As I mentioned on the top of page 5 of the media references – ‘the BioAPI is the greatest revelation in human history‘. For example see the last paragraph of the description for Vexille (2007), specifically the trailer for H+ mentioned in it. Data Asylum is only giving you one angle of the BioAPI – the nano-tech disease and all the implications that encompass it.

Also see question #9 of the frequently asked questions for a brief explanation on how this (and chemtrails) are (mostly) lawful.


The same group of people that brought humanity HIV in the late 1970’s. Also see FAQ question #15.

BioAPI Phases

There are essentially two phases involved with the installation of the BioAPI. I categorize it as phase 1 and phase 2. If you can imagine a new laptop computer, all it has is the operating system like Windows, so it’s kind of useless. This would be the equivalent to phase 1. So a new computer can be remotely controlled (aka phase 1, see Surrogates (2009)) by your IT tech support guy, but that is all. There are no programs installed (provided by phase 2) to do much else with it. These names of a phase 1 and 2 are not necessarily just random nonsense I made up, see the clip and movie for Control Factor (2003) in which they use these exact names in the exact same context; because they are telling you everything.

  • Phase 1: Everyone on the planet is affected and involved in this phase. Everyone to some extent has the nano-fibers within their body cavity, and therefore wired [‘I’m wired too.’ – Michael Hall, Gamer (2009)]. Side effects include a clicking sound from within the skull and basic annoying body complications like aching joints. This phase provides complete remote control of your speech and thought patterns through suggestion (partially subconsciously). I guess about 99% of the populace of the entire planet has this phase complete.

    Phase 1 could be construed as positive and beneficial to you, at least in the future. See John Hodgman (2012) for more information. You should also see question 9 of the FAQs.

  • Phase 2: This phase must be triggered (by nano-trigger-bots) and is extreme. It completely compromises your health and can do anything from kill you to simply monitor you. This phase cannot be forced onto you like phase 1 (technically it can but they don’t do that yet). This involves multiple nano-sensors from ocular to heart and everything in between. I figure about 2% of the population has gone through this phase. If this phase is triggered in you they consider you evil as shown within the media examples page of this site. You must do something to trigger this phase, including eating cheap red meat, kissing specific people, using specific corporate health care/beauty products, etc. The objective they are (partially) reaching for here is to connect each event with a deadly sin of some sort. For example morgellons would be connected with vanity because your skin goes to hell. Ultimately this phase provides complete remote control of your body and mind, including the monitoring of your emotions, thoughts, body functions and everything in between. Phase 2 then can be considered a nano-tech disease (as clearly shown in the Family Guy clip) in which the contagious aspect can be switched on and off. For example I have phase 2, but I am not contagious, but I can be if they decide to make me contagious in some way – typically kissing. This allows them to completely control the transmission/vector or spreading of the nano-disease. If you want to get specific, the nano-tech or nano-implants that compose phase 2 of the BioAPI is actually just the vehicle they use to monitor, torment, test and hurt people. The disease itself is actually one of dishonor. The more dishonor you demonstrate, the more they hate you, the worse things get for you. They do not want people to figure that out. See Meeting Evil (2012) for clear details. Phase 2 can or is definitely detrimental to your life. That is the point of it. A cure can be found in the review for Rise of the Zombies (2012).

    You can 100% confirm if you have phase 2 or not by seeing an eye doctor and asking him to look for anomalies exactly where the ocular implant is located. The implant is still a camera and therefore must conform to the laws of physics and optics still so it must, just like your eye has, have a concave lens which it does. You might be able to slightly feel it at night when your falling asleep when your eyes are dryer and you move your eyeball around with your eyes closed. More information on the implant’s location is available here.

    Also see the clip for Contracted (2013) which specifically covers the contraction of phase 2 and the physical side effects there from. Pretty Dead (2013), no clip provided, also does a good job at covering multiple aspects of the contraction of the nano-tech disease and BioAPI in general, both good and bad. They show a couple triggers (meat and hard drugs) which makes her sick, complete with heavy zombie overtones. They also show a possible positive aspect such as accelerated healing. The entire movie, every scene, becomes like a documentary.

Nano-fiber and Side Effects

Of course with something as extreme as nanotech being installed within people’s body’s you would assume there would be health implications and side effects. This is correct and covered on this site. The approach to handle these side effects has been one of “embrace and extend” it’s called. There are several examples in the media section that show how the specific side effects listed below are recognized and then associated with something ridiculous or stupid which then discounts the authenticity in the mind of the viewer. In effect convincing the viewer to dismiss a real side effect as being something that’s too crazy to be real. Each side effect is dealt with in a media example. Additional technical possibilities are also talked about in the BioAPI details section. Additional side effects related to phase 2 are covered in the clip for Contracted (2013).

  • Phase 1 & 2 – Cranium Clicking/Screeching: A phase 1 side effect goes back as early as 2001. Exactly what is happening is not completely known but involves some sort of nano-chip being installed/operated in the cranium (your head) of the host. This is probably the equivalent of a CPU of some sort. The actual clicking/screeching sound observed is usually at night on average once a month and only lasts for a few seconds. Completely painless and easily ignored or passed off by the person. The entire purpose of the movie Shutter Island (2010) is to discount this. The nano-implant that is specifically and clearly responsible for this side effect is symbolically referenced in the second clip for Surrogates (2009). I suspect over time they have improved this side effect.
  • Phase 1 & 2 – Aching Joints, Headaches, Fatigue, etc.: The saturation of nano-fibers has different effects on different people. The sheer numbers involved results is a random combination of health implications. Most people will not notice anything, or pass any slight symptom off as getting older. Other people who have more of a reaction will go to the doctor and get diagnosed with fibromyalgia. Fibromyalgia is a catch all disease that was created about a decade ago to give doctors something to tell the patient when they complained. The doctors can’t accurate diagnose or understand what or why a patient is feeling a certain way, so the corrupt medical establishment gives them this nonsense to spew. These side effects are primarily phase 1 but are a constant problem across the board. Notice the root word of fibromyalgia is fib[e]r, it’s not a coincidence. This Family Guy clip indirectly references Fibromyalgia.
  • Phase 2 – Itching: For whatever reason they may force harsh itching on you when they do not agree with what you are doing or how you are behaving. You probably will have no idea it is phase 2 at the beginning. This is shown in Flash of Genius (2008) when they show her typing and zoom in on her hand (@ 44:50 in the movie) when she itches it. She’s presumed to be a bad wife for leaving her husband (no clip is provided; screenshot here; you’ll have to read this whole site to understand this). The exact same concept is shown in Lay the Favorite (2012) where Bruce Willis itches his forearm clearly and intentionally after referencing it a few seconds earlier (screenshot here). Why? Why would they put that in? I mean millions of dollars are spent on these scripts and production thereto. This happens in real life to countless people around the world all day long, he’s being warned. Why? Because in the movie he’s thinking about cheating on his wife with the hot blonde that just walked in. In people with phase 2, the BioAPI is monitoring thought and emotional patterns which if conflict triggers an itch; it’s automated. For example lust + guilt (because he’s married) do not go together. Think Pontypool (2008). So they are judging you (or more accurately people with phase 2 who are pre-targeted). Itching is also shown in Fast Zombies with Guns (2011), as they turn into zombies [contract phase 2 in real life] they itch a lot. Again, why show this? Because it’s real. Most targeted individuals will understand the extremely itchy forearm. So itching is not a side effect in the common sense of the term; it is instead intentionally inflected via the BioAPI as reflected in the aforementioned references as well as loosely shown in A Scanner Darkly (2006) @ 0:44 in the clip/trailer.
  • Phase 2 – Burning Smell: Phase 2 encapsulates the person’s ability to smell, so they can read/write scents. It’s used to help warp the reality of someone they have specifically targeted (aka Black Limousine (2010)). When inhaling or specifically exhaling quickly its often a burning/smoke smell that is noticed. This is an unwanted side effect – or more accurately to encapsulate any neuron in the body involved in sensing (for example, smell, taste, etc.) there ends up being be some minor side effect. Interestingly when I cry the smell is amplified and it smells like buttered popcorn of all things. An example of how the media discounts this is demonstrated in the movie Bandits (2001).
  • Phase 2 – The Left Eye: One of the concepts they push in the movies is the left eye is evil for some reason. Or to a lesser extent use the eye as a gateway to demonstrate functionality such as with Technotise (2009) or Gamer (2009). In phase 2 an actual nano-camera will be installed in the left eye. People with this might comment on how they feel like there’s a small bump in their eye under slightly drier conditions such as when going to sleep at night. This is documented in the physical example page. Note if you figure out you have a camera in the left eye they will probably install something in the right eye too. Clips referencing this concept are now available here, here and here and now also Doomsday Book (2012).
  • Phase 2 – Permanent Metallic Taste: Some people will comment on a metallic taste in the mouth. Typically when going to sleep it becomes prevalent. In the alternative, the temporary compromising of taste buds is shown in the clip for Contracted (2013) @ 2:18. It is not a side effect of medication, that’s the typical response a doctor will give you. If you are not on medication and otherwise completely healthy and all of a sudden have a permanent metallic taste in your mouth, you are being recorded (but not watched) 24/7 as per the trailer for A Scanner Darkly (2006).
  • Phase 2 – Morgellons: Morgellon’s can strike anyone. It’s a direct problem from the nano-fibers, whether intentional or accidental. The body’s immune system can’t see or recognize the fibers at all. So when the body can’t accept the fibers anymore it beings to push them out through the skin. But the skin is a barrier because the fibers are too large. So the skin breaks up which is why people get lesions. Note that technically everyone has morgellons (nano-fibers), the actual mogellon’s symptoms are when the person’s body tries to get rid of them the only way possible. Some more conclusions can be seen here and examples within media references including this.

Chemtrails Nano-fiber Examples & Evidence

Ultimately you need some proof. This is very difficult, as we all don’t exactly have nano-tech labs in our basements. The only thing possible at this point in time is to put out the physical evidence that is known and back it up with media/movie supporting clips. A complete list of unbelievable things this technology can do is listed here, also make sure you see the real life body & mind control examples in Media References.

> Physical (BioAPI) Proof

> Media References


Chemtrails – Total Control Part 2

Miniseries of chemtrails continues…:

Covert aerosol spraying (chemtrails) and electromagnetic operations (HAARP)

Environmental modification (weather war), geophysical operations (earthquake war)

Four of the seven applications include:

  1. HAARP, directed energy scalar weapons, weather warfare and tectonic warfare.
  2. Electromagnetic Operations, including HAARP directed mind control weapons applications
  3. Environmental modification and weather wars. Mr. Carnicom stated he has concluded that the covert aerosol-spraying program has transformed the atmosphere of the planet into plasma capable of sustaining weaponized applications since its acceleration in 1999
  4. Geophysical operations, including tectonic (earthquake) warfare

The HAARP-Atmosphere Plasma weapons system

There are reportedly up to 14 HAARP-like facilities around the planet, including,

One independent scientist notes:

“I identified the HAARP sites two years ago. They left some key ones out: Chile (HAARP earthquake as President was sworn in), Cyprus (Black Sea Storm), Dushanbe Tajikistan (Tien Shan gold belt), and ANTARCTICA – the most important one. Plus, they forgot all the Russian installations – more than any other country.”

Covert aerosol spraying (chemtrails) have transformed the Earth’s atmosphere into a plasma that is used for HAARP directed energy scalar weapons, mind control, weather warfare, and tectonic (earthquake) warfare weapons applications.

There is prima facie evidence that chemtrails and HAARP has in fact been used in each of these applications as directed energy scalar weapons, mind control, weather warfare, and tectonic (earthquake) warfare weapons.

HAARP is an exotic weapons system that is part of the weaponization of space, using “scalar wave interferometry” – a technology first discovered by scientist Nicola Tesla in the early 1900’s.

Two or more longitudinal, ultra-low frequency waves are “aimed” at an intersecting point, at which time they interact in a very unique way, “tapping” into the limitless plenum of energy surrounding the planet, and weaponizing this scalar energy.

HAARP has 3 major weapons-system components

  1. Space-based component (Ionosphere): HAARP weaponizes the Earth’s Ionosphere, the uppermost layer of the atmosphere before outer space.
  2. Atmosphere-based component (Atmospheric Plasma): HAARP uses aerosol-enhanced (chemtrails) atmosphere plasma as a plasma-based weapons system, and as a binary bio-warfare weapons system against the human population.
  3. Ground-based component (Disguised as research facility): HAARP ground stations disguised as “research facilities “energize HAARP” in at least 14 locations around the globe.

    HAARP – Reported electromagnetic and plasma weapons functions

  • SDI (Strategic Defence Initiative) Radiofrequency weapon
  • Environmental warfare – Weather & earthquake warfare
  • Space Warfare System
  • Missile Defense System
  • Scalar energy warfare against land and population targets, including cities, industrial sites, buildings, populations and individuals
  • ELF weapon with electromagnetic harassment and mood manipulation of target populations and individuals
  • Biological & Binary Weapons against populations (with chemtrails component)

The HAARP-atmospheric plasma weapons system is a weapon of mass destruction
The death toll of two recent probable Environmental Warfare attacks by HAARP is on the scale of the Hiroshima atomic bomb attack.

  • The estimated death toll of the May 3, 2008 Weather Warfare Myanmar Cyclone is 78,000 dead + 56,000 missing as of May 29, 2008.

  • The death toll of the May 12, 2008 Tectonic Warfare China Earthquake is 68,000 as of May 29, 2008, and expected to rise to 80,000.

Official Japanese figures at the time put the Hiroshima death toll at 118,661 civilians. But later estimates suggest the final toll was about 140,000 dead.

The death toll of the Haiti HAARP Earthquake tectonic warfare attack of January 10, 2010 was 230,000 dead, almost twice the size of the Hiroshima death toll.

HAARP-atmospheric plasma weapons system and tectonic (earthquake) warfare
There is prima facie evidence that HAARP and covert global aerosol spraying (chemtrails) were employed in the above tectonic (earthquake) warfare attacks as weapons of mass destruction.

Examiner readers can listen to the following 4 science-based radio programs on how the HAARP-atmospheric plasma weapons system of mass destruction was employed to create the Haiti earthquake of January 12, 2011 and the Chile earthquake of February 27, 2010.

All of these tectonic warfare attacks were by weapons of mass destruction and undertaken for covert economic, financial and political reasons on behalf of an international war crimes racketeering organization that controls the international HAARP-chemtrails network of installations and operations:

>> Radio shows can be found on this site

The evidence set out in the radio programs establishes prima facie that the HAARP-Atmospheric plasma weapons system was used in a weapons of mass destruction attack on Haiti in order to secure the enormous gold and petroleum deposits under and adjacent to the island of Hispaniola belonging to the government of Haiti, which was resisting exploitation of the same by companies controlled by the Rothschild family.

The radio programs and accompany program notes can be accessed at

Likewise, the evidence set out in the radio programs establishes prima facie evidence that the HAARP-Atmospheric plasma weapons system was used in a weapons of mass destruction attack on the Chile in a February 27, 2010 earthquake as part of a strategic power play to keep petroleum deposits discovered under the Falklands Islands in the possession of the U.K. and not Argentina.

HAARP-atmospheric plasma weapons system and weather warfare
There is prima facie evidence that the HAARP-atmospheric plasma weapons system as has been used a weapon of mass destruction to create or steer weather events such as cyclones and hurricanes to create catastrophic outcomes.

Readers can listen to the following science-based radio programs on how the HAARP-atmospheric plasma weapons system of mass destruction was employed to create weather warfare events ranging from the Katrina Hurricane in New Orleans of August 29, 2005 to the Myanmar cyclone of May 2-3, 2008:

>> Radio shows can be found on this site

HAARP-atmospheric plasma weapons system and electromagnetic scalar warfare

Electromagnetic Operations

The global covert aerosol spraying program (chemtrails) has also permitted electromagnetic operations, including HAARP directed energy scalar weapons, using the atmospheric plasma created by chemtrails spraying for the operation of the scalar electromagnetic weapons of the HAARP system.

There is prima facie evidence that the HAARP-atmospheric plasma weapons system has been used as a weapon of mass destruction in electromagnetic scalar warfare against human populations.

Scientist – Directed energy weapons turned World Trade Center into nanoparticles on 9/11

Evidentiary sample

Directed energy weapons & WTC buildings

One researcher draws on Dr. Judy Wood’s work and sets out a sample of documentary and witness evidence sufficient to conclude that an advanced directed energy weapon was used on the World Trade Center (WTC) buildings on 9/11.

9/11 documentary evidence of use of directed energy weapons at WTC

  1. Seismic Record:
    • “The energy budget recorded in the seismic record on the day of 9/11 and the collapse of the WTC buildings did not reflect the mass of building materials involved in the collapse, nor the nearly freefall of the collapsing buildings. The seismic record demonstrates an event on the scale of a quarry blast. Where was the thud [that would have accompanied a WTC building collapse]?”
  2. Kinetic Energy:
    • “Two robust WTC buildings with very robust steel beam reinforcement would release a sizeable amount of kinetic energy from the buildings falling – that would be all of the energy that went into the construction of the WTC buildings. The release of that amount of kinetic energy is not reflected in the physical evidence on the seismic record. Into what physical process did that kinetic energy go?”
  3. Molecular Dissociation:
    • “The collapse of the WTC buildings produced the highest mass per volume of very fine particles (nanoparticles) ever measured in an air sample in the United States. It takes a tremendous amount of energy to dissociate or break the molecular bonds of steel, concrete and other building materials that were “powdered” into very fine particles during the collapse of the buildings. The largest mass per volume of metals ever measured in an air sample in the US were reported by Dr. Thomas Cahill who did air monitoring for 5 months. Metal is used in buildings because it is very strong – and would require large amounts of energy to reduce it to nanoparticles. Chemical explosives do not release enough energy to produce that volume of very fine particles. A much more energetic process was involved such as laser or beam energy which releases focused and concentrated energy as complex waveforms necessary to cause molecular dissociation.”
  4. Physical Evidence of Buildings Collapsing:
    • “In videos of the collapses on 9/11 the WTC buildings erupted into emulsion like a drinking fountain, and the rubble did not hit the ground. Even on tape huge pieces of aluminum building siding vaporized as they were freefalling, and never hit the ground.”
  5. Controlled Demolition:
    • “The [collapse of the WTC buildings] was not a ‘controlled demolition’ for the following reasons:
      • WTC Detritus Pile – “Should have been 1/3 the height of the WTC buildings. The 100+ story WTC buildings were about 1 story high when the collapse of the buildings ended. A fireman on one of the news videos said the antenna that had been on the top of WTC Building 1 was on the top of a pile of rubble about one story high. The rubble pile should have been 35 stories if it was a conventional controlled demolition.”

WTC Rubble Never Hit the Ground – “This defies gravity, where did the rubble go?”

  • Footprints“Geometrically Round Holes: contiguous round holes 24’ in diameter were in the footprints of the WTC buildings 1 and 2, and a 60’ deep geometrically round hole was in the middle of Liberty Street near the WTC. This is evidence of beam weapons. There was no debris inside the footprints of the two WTC buildings, only bare dirt with circles in the dirt.”
  • Dust“In videos of the collapse larger particles fell and cascaded down from the buildings under the forces of gravity, but before they hit the ground they vaporized and suddenly went up into the atmosphere like an antigravity demonstration. Nanoparticles are so tiny that they are not subject to the forces of gravity, so molecular dissociation occurred on the larger particles as they were freefalling, reducing them into nano-particles (0.1 microns in diameter and smaller) that suddenly obeyed other physical laws of quantum mechanics. More evidence of [directed energy weapon or] HAARP/beam weapon technology applied during collapse.”
  • 9/11 Satellite photos“[9/11 satellite photographs showed] dust going into upper atmosphere – which had to be nanoparticles and may have been enhanced by other technology because most very fine particles/dust would stay in the Troposphere and be rained out in 2 months as we know from depleted uranium particulate releases from battlefield already.”
  • 1400 Toasted Cars“Located blocks from the WTC buildings, with door handles missing, engine blocks missing, blistering on some parts of the car finish, strange rust patterns on the bodies of the cars.”
  • Paper Around Cars Not Burned“Whatever ‘vaporized’ the engine blocks and the door handles on 1400 cars did not ignite fragile and flammable paper lying all over the ground around the cars. If engine blocks and door handles selectively vaporized, why didn’t body of car vaporize?”
  • Pile of Cars Spontaneously Combusted“In a news video, the entire pile of cars started burning spontaneously at the same time with no visible cause, it was not a fire that started in one car and spread to others.”
  • Rust Occurred Immediately“On cars and trucks, and in FEMA photos there was heavy rust on steel beams – steel does not rust, and it is a slow oxidation process that results in rusting of iron. This rusting happened immediately.”
  • Basements of WTC Buildings Undamaged“Stuffed mannequins in the basement of WTC with clothing on were carried out of the basement undamaged. If a 100+-story WTC building collapsed into its basement and left a 35-story rubble pile, there would be nothing left in the basement. Even streetcars underground at the WTC were pulled out after the collapse and had no damage.”
  • Prof. Cahill Air Monitoring Samples“The hardest and most durable materials vaporized (steel, concrete etc), and the most fragile materials (paper) cascading out of WTC windows and all over the ground for blocks were undamaged.”
  • Truckloads of Potting Soil“Right after the WTC disaster, the ground was “fuming”, and sequential FEMA aerial photos show 130 dump trucks full of soil (filled almost to the top of the dump truck space) covered with tarps so that the dirt in the trucks was not visible to onlookers on the street, coming into the WTC area, dumping the soil and going out for more. This happened even before the rescues or cleanup started and it continued for some time. The piles of soil were left for a week and got higher each day in sequential photos. The soil ‘fuming’ lasted until March 2002 (8 months).”
  • Boots Disintegrated“Boots on emergency responders disintegrated after 2 hours. They had to get new boots every 2 hours – an effect of molecular dissociation. It was not from burning, their skin would have been damaged.”
  • No Ground Fuming During Rain“For 99 days the “burning” (fuming) continued at the WTC site, but when it rained there was no fuming. If it had been fires burning, the rain would have caused steam from heating rainwater.”
  • USGS – Iron versus Steel“The USGS analyzed the mineral form of the rust on steel beams and iron objects at the WTC. They did not address the ‘steel does not rust’ issue, but dodged it by referring to the rusted steel beams in the rubble pile as ‘iron beams’ and gave mineral analyses of iron minerals produced by oxidation.”
  • Official Sample Data Not Reliable“Spectral absorption images at the WTC indicated average particle size was about 1 micron, which is subjected to gravity and would have fallen with the collapsed buildings. USGS did not collect many dust samples and collecting samples by other different agencies did not agree with each other. No samples were taken at the toasted cars.”
  • Directed Energy Weapon Evidence“Evidence of use of a directed energy weapon was present at the top of the WTC buildings as ‘lathering up’ started before buildings started coming down. ‘Lathering up’ in videos preceded the collapse of all buildings, even Building 7 which supposedly Larry Silverstein when he said, ‘Pull it’ to firefighters meant controlled demolition. Color alteration and modification in news videos compared to other photos/videos at tops of buildings indicates “doctoring” of images. When the Seattle Dome was destroyed with controlled demolition, the dust created by the destruction did not get any higher than the top of the building. The WTC dust got into the upper atmosphere almost immediately – which indicates very tiny atmospheric dust sized particles (0.1 micron and smaller), in fact smaller than atmospheric dust that stays mainly in the Troposphere.
  • “Lathering Up” Incriminating“WTC Building 7 ‘lathered up’ even before WTC Building 2 went down. WTC Building 7 not damaged at all by WTC Building 2 going down – right next to each other.”
  • Freon tanks“Very odd, large tanks were removed from WTC building and OSHA made bogus statement about what and why they were removed. Was freon used in WTC takedown? A NYC cop whom the researcher met with Cindy Sheehan said he was injured in WTC Building 7 and removed on a gurney, but his eyes were covered so he could not see anything as they left the building. He reported he was able to see dead bodies lying all over the floor as he was being carried out – before building 7 had collapsed. Was this due to Freon asphyxiation put through ventilation system like in a recent Russian submarine disaster?

See: Four U.S. Black Ops in 9/11: Antigravity UFO – Tesla Time Travel – Directed Energy Weapon – Mini-Nukes


Weather control – Air Force 2025

If you are interested about chemtrails and what could be the agenda behind them. Here’s again some information, but as always you decide:

Image Source

Weather Control

A Research Paper Presented To…
Air Force 2025

Weather as a Force Multiplier

Owning the Weather in 2025
by Col. Tamzy J. House
Lt. Col. James B. Near, Jr.
LTC. William B. Shields (USA)
Maj Ronald J. Celentano
Maj David M. Husband
Maj Ann E. Mercer
Maj James E. Pugh

Source: Air Force 2025
August 1996

Table 1 – Operational Capabilities Matrix

Precipitation Enhancement Precipitation Avoidance
– Flood Lines of Communication – Maintain/Improve LOC
– Reduce PGM/Recce Effectiveness – Maintain Visibility
– Decrease Comfort Level/Morale – Maintain Comfort Level/Morale
Storm Enhancement Storm Modification
– Deny Operations – Choose Battlespace Environment
Precipitation Denial Space Weather
– Deny Fresh Water – Improve Communication Reliability
— Induce Drought – Intercept Enemy Transmissions
Space Weather – Revitalize Space Assets
– Disrupt Communications/Radar Fog and Cloud Generation
– Disable/Destroy Space Assets – Increase Concealment
Fog and Cloud Removal Fog and Cloud Removal
– Deny Concealment – Maintain Airfield Operations
– Increase Vulnerability to PGM/Recce – Enhance PGM Effectiveness
Detect Hostile Weather Activities Defend against Enemy Capabilities


Current technologies that will mature over the next 30 years will offer anyone who has the necessary resources the ability to modify weather patterns and their corresponding effects, at least on the local scale.

Current demographic, economic, and environmental trends will create global stresses that provide the impetus necessary for many countries or groups to turn this weather-modification ability into a capability.

In the United States, weather-modification will likely become a part of national security policy with both domestic and international applications. Our government will pursue such a policy, depending on its interests, at various levels. These levels could include unilateral actions, participation in a security framework such as NATO, membership in an international organization such as the UN, or participation in a coalition.

Assuming that in 2025 our national security strategy includes weather-modification, its use in our national military strategy will naturally follow. Besides the significant benefits an operational capability would provide, another motivation to pursue weather-modification is to deter and counter potential adversaries.

In this paper we show that appropriate application of weather-modification can provide battlespace dominance to a degree never before imagined. In the future, such operations will enhance air and space superiority and provide new options for battlespace shaping and battlespace awareness.1

“The technology is there, waiting for us to pull it all together;”2 in 2025 we can “Own the Weather.”

Chapter 1


Scenario: Imagine that in 2025 the US is fighting a rich, but now consolidated, politically powerful drug cartel in South America. The cartel has purchased hundreds of Russian-and Chinese-built fighters that have successfully thwarted our attempts to attack their production facilities. With their local numerical superiority and interior lines, the cartel is launching more than 10 aircraft for every one of ours. In addition, the cartel is using the French system probatoire d’ observation de la terre (SPOT) positioning and tracking imagery systems, which in 2025 are capable of transmitting near-real-time, multispectral imagery with 1 meter resolution. The US wishes to engage the enemy on an uneven playing field in order to exploit the full potential of our aircraft and munitions.

Meteorological analysis reveals that equatorial South America typically has afternoon thunderstorms on a daily basis throughout the year. Our intelligence has confirmed that cartel pilots are reluctant to fly in or near thunderstorms. Therefore, our weather force support element (WFSE), which is a part of the commander in chief’s (CINC) air operations center (AOC), is tasked to forecast storm paths and trigger or intensify thunderstorm cells over critical target areas that the enemy must defend with their aircraft. Since our aircraft in 2025 have all-weather capability, the thunderstorm threat is minimal to our forces, and we can effectively and decisively control the sky over the target.

The WFSE has the necessary sensor and communication capabilities to observe, detect, and act on weather-modification requirements to support US military objectives. These capabilities are part of an advanced battle area system that supports the war-fighting CINC. In our scenario, the CINC tasks the WFSE to conduct storm intensification and concealment operations. The WFSE models the atmospheric conditions to forecast, with 90 percent confidence, the likelihood of successful modification using airborne cloud generation and seeding.

In 2025, uninhabited aerospace vehicles (UAV) are routinely used for weather-modification operations. By cross-referencing desired attack times with wind and thunderstorm forecasts and the SPOT satellite’s projected orbit, the WFSE generates mission profiles for each UAV. The WFSE guides each UAV using near-real-time information from a networked sensor array.

Prior to the attack, which is coordinated with forecasted weather conditions, the UAVs begin cloud generation and seeding operations. UAVs disperse a cirrus shield to deny enemy visual and infrared (IR) surveillance. Simultaneously, microwave heaters create localized scintillation to disrupt active sensing via synthetic aperture radar (SAR) systems such as the commercially available Canadian search and rescue satellite-aided tracking (SARSAT) that will be widely available in 2025. Other cloud seeding operations cause a developing thunderstorm to intensify over the target, severely limiting the enemy’s capability to defend. The WFSE monitors the entire operation in real-time and notes the successful completion of another very important but routine weather-modification mission.

This scenario may seem far-fetched, but by 2025 it is within the realm of possibility. The next chapter explores the reasons for weather-modification, defines the scope, and examines trends that will make it possible in the next 30 years.

Chapter 2

Required Capability

Why Would We Want to Mess with the Weather?

According to Gen Gordon Sullivan, former Army chief of staff, “As we leap technology into the 21st century, we will be able to see the enemy day or night, in any weather- and go after him relentlessly.”3 A global, precise, real-time, robust, systematic weather-modification capability would provide war-fighting CINCs with a powerful force multiplier to achieve military objectives. Since weather will be common to all possible futures, a weather-modification capability would be universally applicable and have utility across the entire spectrum of conflict. The capability of influencing the weather even on a small scale could change it from a force degrader to a force multiplier.

People have always wanted to be able to do something about the weather. In the US, as early as 1839, newspaper archives tell of people with serious and creative ideas on how to make rain.4 In 1957, the president’s advisory committee on weather control explicitly recognized the military potential of weather-modification, warning in their report that it could become a more important weapon than the atom bomb.5

However, controversy since 1947 concerning the possible legal consequences arising from the deliberate alteration of large storm systems meant that little future experimentation could be conducted on storms which had the potential to reach land.6 In 1977, the UN General Assembly adopted a resolution prohibiting the hostile use of environmental modification techniques. The resulting “Convention on the Prohibition of Military or Any Other Hostile Use of Environmental Modification Technique (ENMOD)” committed the signatories to refrain from any military or other hostile use of weather-modification which could result in widespread, long-lasting, or severe effects.7 While these two events have not halted the pursuit of weather-modification research, they have significantly inhibited its pace and the development of associated technologies, while producing a primary focus on suppressive versus intensification activities.

The influence of the weather on military operations has long been recognized. During World War II, Eisenhower said,

[i]n Europe bad weather is the worst enemy of the air [operations]. Some soldier once said, “The weather is always neutral.” Nothing could be more untrue. Bad weather is obviously the enemy of the side that seeks to launch projects requiring good weather, or of the side possessing great assets, such as strong air forces, which depend upon good weather for effective operations. If really bad weather should endure permanently, the Nazi would need nothing else to defend the Normandy coast!8

The impact of weather has also been important in more recent military operations. A significant number of the air sorties into Tuzla during the initial deployment supporting the Bosnian peace operation aborted due to weather. During Operation Desert Storm, Gen Buster C. Glosson asked his weather officer to tell him which targets would be clear in 48 hours for inclusion in the air tasking order (ATO).9 But current forecasting capability is only 85 percent accurate for no more than 24 hours, which doesn’t adequately meet the needs of the ATO planning cycle. Over 50 percent of the F-117 sorties weather aborted over their targets and A-10s only flew 75 of 200 scheduled close air support (CAS) missions due to low cloud cover during the first two days of the campaign.10 The application of weather-modification technology to clear a hole over the targets long enough for F-117s to attack and place bombs on target or clear the fog from the runway at Tuzla would have been a very effective force multiplier. Weather-modification clearly has potential for military use at the operational level to reduce the elements of fog and friction for friendly operations and to significantly increase them for the enemy.

What Do We Mean by “Weather-modification”?

Today, weather-modification is the alteration of weather phenomena over a limited area for a limited period of time.11 Within the next three decades, the concept of weather-modification could expand to include the ability to shape weather patterns by influencing their determining factors.12 Achieving such a highly accurate and reasonably precise weather-modification capability in the next 30 years will require overcoming some challenging but not insurmountable technological and legal hurdles.

Technologically, we must have a solid understanding of the variables that affect weather. We must be able to model the dynamics of their relationships, map the possible results of their interactions, measure their actual real-time values, and influence their values to achieve a desired outcome. Society will have to provide the resources and legal basis for a mature capability to develop. How could all of this happen? The following notional scenario postulates how weather-modification might become both technically feasible and socially desirable by 2025.

Between now and 2005, technological advances in meteorology and the demand for more precise weather information by global businesses will lead to the successful identification and parameterization of the major variables that affect weather. By 2015, advances in computational capability, modeling techniques, and atmospheric information tracking will produce a highly accurate and reliable weather prediction capability, validated against real-world weather. In the following decade, population densities put pressure on the worldwide availability and cost of food and usable water. Massive life and property losses associated with natural weather disasters become increasingly unacceptable. These pressures prompt governments and/or other organizations who are able to capitalize on the technological advances of the previous 20 years to pursue a highly accurate and reasonably precise weather-modification capability. The increasing urgency to realize the benefits of this capability stimulates laws and treaties, and some unilateral actions, making the risks required to validate and refine it acceptable. By 2025, the world, or parts of it, are able to shape local weather patterns by influencing the factors that affect climate, precipitation, storms and their effects, fog, and near space. These highly accurate and reasonably precise civil applications of weather-modification technology have obvious military implications. This is particularly true for aerospace forces, for while weather may affect all mediums of operation, it operates in ours.

The term weather-modification may have negative connotations for many people, civilians and military members alike. It is thus important to define the scope to be considered in this paper so that potential critics or proponents of further research have a common basis for discussion.

In the broadest sense, weather-modification can be divided into two major categories: suppression and intensification of weather patterns. In extreme cases, it might involve the creation of completely new weather patterns, attenuation or control of severe storms, or even alteration of global climate on a far-reaching and/or long-lasting scale. In the mildest and least controversial cases it may consist of inducing or suppressing precipitation, clouds, or fog for short times over a small-scale region. Other low-intensity applications might include the alteration and/or use of near space as a medium to enhance communications, disrupt active or passive sensing, or other purposes. In conducting the research for this study, the broadest possible interpretation of weather-modification was initially embraced, so that the widest range of opportunities available for our military in 2025 were thoughtfully considered. However, for several reasons described below, this paper focuses primarily on localized and short-term forms of weather-modification and how these could be incorporated into war-fighting capability. The primary areas discussed include generation and dissipation of precipitation, clouds, and fog; modification of localized storm systems; and the use of the ionosphere and near space for space control and communications dominance. These applications are consistent with CJCSI 3810.01, “Meteorological and Oceanographic Operations.”13

Extreme and controversial examples of weather modification-creation of made-to-order weather, large-scale climate modification, creation and/or control (or “steering”) of severe storms, etc.-were researched as part of this study but receive only brief mention here because, in the authors’ judgment, the technical obstacles preventing their application appear insurmountable within 30 years.14 If this were not the case, such applications would have been included in this report as potential military options, despite their controversial and potentially malevolent nature and their inconsistency with standing UN agreements to which the US is a signatory.

On the other hand, the weather-modification applications proposed in this report range from technically proven to potentially feasible. They are similar, however, in that none are currently employed or envisioned for employment by our operational forces. They are also similar in their potential value for the war fighter of the future, as we hope to convey in the following chapters. A notional integrated system that incorporates weather-modification tools will be described in the next chapter; how those tools might be applied are then discussed within the framework of the Concept of Operations in chapter 4.

Chapter 3

System Description

Our vision is that by 2025 the military could influence the weather on a mesoscale (<200 km2) or microscale (immediate local area) to achieve operational capabilities such as those listed in Table 1. The capability would be the synergistic result of a system consisting of

(1) highly trained weather force specialists (WFS) who are members of the CINC’s weather force support element (WFSE);

(2) access ports to the global weather network (GWN), where worldwide weather observations and forecasts are obtained near-real-time from civilian and military sources;

(3) a dense, highly accurate local area weather sensing and communication system;

(4) an advanced computer local area weather-modification modeling and prediction capability within the area of responsibility (AOR);

(5) proven weather-modification intervention technologies; and

(6) a feedback capability.

The Global Weather Network

The GWN is envisioned to be an evolutionary expansion of the current military and civilian worldwide weather data network. By 2025, it will be a super high-speed, expanded bandwidth, communication network filled with near-real-time weather observations taken from a denser and more accurate worldwide observation network resulting from highly improved ground, air, maritime, and space sensors. The network will also provide access to forecast centers around the world where sophisticated, tailored forecast and data products, generated from weather prediction models (global, regional, local, specialized, etc.) based on the latest nonlinear mathematical techniques are made available to GWN customers for near-real-time use.

By 2025, we envision that weather prediction models, in general, and mesoscale weather-modification models, in particular, will be able to emulate all-weather producing variables, along with their interrelated dynamics, and prove to be highly accurate in stringent measurement trials against empirical data. The brains of these models will be advanced software and hardware capabilities which can rapidly ingest trillions of environmental data points, merge them into usable data bases, process the data through the weather prediction models, and disseminate the weather information over the GWN in near-real-time.15 This network is depicted schematically in figure 3-1.

Evidence of the evolving future weather modeling and prediction capability as well as the GWN can be seen in the national oceanic and atmospheric administration’s (NOAA) 1995-2005 strategic plan. It includes program elements to “advance short-term warning and forecast services, implement seasonal to inter-annual climate forecasts, and predict and assess decadal to centennial change;”16 it does not, however, include plans for weather-modification modeling or modification technology development. NOAA’s plans include extensive data gathering programs such as Next Generation Radar (NEXRAD) and Doppler weather surveillance systems deployed throughout the US. Data from these sensing systems feed into over 100 forecast centers for processing by the Advanced Weather Interactive Processing System (AWIPS), which will provide data communication, processing, and display capabilities for extensive forecasting. In addition, NOAA has leased a Cray C90 supercomputer capable of performing over 1.5×1010 operations per second that has already been used to run a Hurricane Prediction System.17

Applying Weather-modification to Military Operations

How will the military, in general, and the USAF, in particular, manage and employ a weather-modification capability? We envision this will be done by the weather force support element (WFSE), whose primary mission would be to support the war-fighting CINCs with weather-modification options, in addition to current forecasting support. Although the WFSE could operate anywhere as long as it has access to the GWN and the system components already discussed, it will more than likely be a component within the AOC or its 2025-equivalent. With the CINC’s intent as guidance, the WFSE formulates weather-modification options using information provided by the GWN, local weather data network, and weather-modification forecast model. The options include range of effect, probability of success, resources to be expended, the enemy’s vulnerability, and risks involved. The CINC chooses an effect based on these inputs, and the WFSE then implements the chosen course, selecting the right modification tools and employing them to achieve the desired effect. Sensors detect the change and feed data on the new weather pattern to the modeling system which updates its forecast accordingly. The WFSE checks the effectiveness of its efforts by pulling down the updated current conditions and new forecast(s) from the GWN and local weather data network, and plans follow-on missions as needed. This concept is illustrated in figure 3-2.

WFSE personnel will need to be experts in information systems and well schooled in the arts of both offensive and defensive information warfare. They would also have an in-depth understanding of the GWN and an appreciation for how weather-modification could be employed to meet a CINC’s needs.

Because of the nodal web nature of the GWN, this concept would be very flexible. For instance, a WFSE could be assigned to each theater to provide direct support to the CINC. The system would also be survivable, with multiple nodes connected to the GWN.

A product of the information age, this system would be most vulnerable to information warfare. Each WFSE would need the most current defensive and offensive information capabilities available. Defensive abilities would be necessary for survival. Offensive abilities could provide spoofing options to create virtual weather in the enemy’s sensory and information systems, making it more likely for them to make decisions producing results of our choosing rather than theirs. It would also allow for the capability to mask or disguise our weather-modification activities.

Two key technologies are necessary to meld an integrated, comprehensive, responsive, precise, and effective weather-modification system. Advances in the science of chaos are critical to this endeavor. Also key to the feasibility of such a system is the ability to model the extremely complex nonlinear system of global weather in ways that can accurately predict the outcome of changes in the influencing variables. Researchers have already successfully controlled single variable nonlinear systems in the lab and hypothesize that current mathematical techniques and computer capacity could handle systems with up to five variables. Advances in these two areas would make it feasible to affect regional weather patterns by making small, continuous nudges to one or more influencing factors. Conceivably, with enough lead time and the right conditions, you could get “made-to-order” weather.18

Developing a true weather-modification capability will require various intervention tools to adjust the appropriate meteorological parameters in predictable ways. It is this area that must be developed by the military based on specific required capabilities such as those listed in table 1, table 1 is located in the Executive Summary. Such a system would contain a sensor array and localized battle area data net to provide the fine level of resolution required to detect intervention effects and provide feedback. This net would include ground, air, maritime, and space sensors as well as human observations in order to ensure the reliability and responsiveness of the system, even in the event of enemy countermeasures. It would also include specific intervention tools and technologies, some of which already exist and others which must be developed. Some of these proposed tools are described in the following chapter titled Concept of Operations. The total weather-modification process would be a real-time loop of continuous, appropriate, measured interventions, and feedback capable of producing desired weather behavior.

Chapter 4

Concept of Operations

The essential ingredient of the weather-modification system is the set of intervention techniques used to modify the weather. The number of specific intervention methodologies is limited only by the imagination, but with few exceptions they involve infusing either energy or chemicals into the meteorological process in the right way, at the right place and time. The intervention could be designed to modify the weather in a number of ways, such as influencing clouds and precipitation, storm intensity, climate, space, or fog.


For centuries man has desired the ability to influence precipitation at the time and place of his choosing. Until recently, success in achieving this goal has been minimal; however, a new window of opportunity may exist resulting from development of new technologies and an increasing world interest in relieving water shortages through precipitation enhancement. Consequently, we advocate that the DOD explore the many opportunities (and also the ramifications) resulting from development of a capability to influence precipitation or conducting “selective precipitation modification.” Although the capability to influence precipitation over the long term (i.e., for more than several days) is still not fully understood. By 2025 we will certainly be capable of increasing or decreasing precipitation over the short term in a localized area.

Before discussing research in this area, it is important to describe the benefits of such a capability. While many military operations may be influenced by precipitation, ground mobility is most affected. Influencing precipitation could prove useful in two ways. First, enhancing precipitation could decrease the enemy’s trafficability by muddying terrain, while also affecting their morale. Second, suppressing precipitation could increase friendly trafficability by drying out an otherwise muddied area.

What is the possibility of developing this capability and applying it to tactical operations by 2025? Closer than one might think. Research has been conducted in precipitation modification for many years, and an aspect of the resulting technology was applied to operations during the Vietnam War.19 These initial attempts provide a foundation for further development of a true capability for selective precipitation modification.

Interestingly enough, the US government made a conscious decision to stop building upon this foundation. As mentioned earlier, international agreements have prevented the US from investigating weather-modification operations that could have widespread, long-lasting, or severe effects. However, possibilities do exist (within the boundaries of established treaties) for using localized precipitation modification over the short term, with limited and potentially positive results.

These possibilities date back to our own previous experimentation with precipitation modification. As stated in an article appearing in the Journal of Applied Meteorology, early all the weather-modification efforts over the last quarter century have been aimed at producing changes on the cloud scale through exploitation of the saturated vapor pressure difference between ice and water. This is not to be criticized but it is time we also consider the feasibility of weather-modification on other time-space scales and with other physical hypotheses.20

This study by William M. Gray, et al., investigated the hypothesis that “significant beneficial influences can be derived through judicious exploitation of the solar absorption potential of carbon black dust.”21 The study ultimately found that this technology could be used to enhance rainfall on the mesoscale, generate cirrus clouds, and enhance cumulonimbus (thunderstorm) clouds in otherwise dry areas.

The technology can be described as follows. Just as a black tar roof easily absorbs solar energy and subsequently radiates heat during a sunny day, carbon black also readily absorbs solar energy. When dispersed in microscopic or “dust” form in the air over a large body of water, the carbon becomes hot and heats the surrounding air, thereby increasing the amount of evaporation from the body of water below. As the surrounding air heats up, parcels of air will rise and the water vapor contained in the rising air parcel will eventually condense to form clouds. Over time the cloud droplets increase in size as more and more water vapor condenses, and eventually they become too large and heavy to stay suspended and will fall as rain or other forms of precipitation.22 The study points out that this precipitation enhancement technology would work best “upwind from coastlines with onshore flow.” Lake-effect snow along the southern edge of the Great Lakes is a naturally occurring phenomenon based on similar dynamics.

Can this type of precipitation enhancement technology have military applications? Yes, if the right conditions exist. For example, if we are fortunate enough to have a fairly large body of water available upwind from the targeted battlefield, carbon dust could be placed in the atmosphere over that water. Assuming the dynamics are supportive in the atmosphere, the rising saturated air will eventually form clouds and rainshowers downwind over the land.23 While the likelihood of having a body of water located upwind of the battlefield is unpredictable, the technology could prove enormously useful under the right conditions. Only further experimentation will determine to what degree precipitation enhancement can be controlled.

If precipitation enhancement techniques are successfully developed and the right natural conditions also exist, we must also be able to disperse carbon dust into the desired location. Transporting it in a completely controlled, safe, cost-effective, and reliable manner requires innovation. Numerous dispersal techniques have already been studied, but the most convenient, safe, and cost-effective method discussed is the use of afterburner-type jet engines to generate carbon particles while flying through the targeted air. This method is based on injection of liquid hydrocarbon fuel into the afterburner’s combustion gases. This direct generation method was found to be more desirable than another plausible method (i.e., the transport of large quantities of previously produced and properly sized carbon dust to the desired altitude).

The carbon dust study demonstrated that small-scale precipitation enhancement is possible and has been successfully verified under certain atmospheric conditions. Since the study was conducted, no known military applications of this technology have been realized. However, we can postulate how this technology might be used in the future by examining some of the delivery platforms conceivably available for effective dispersal of carbon dust or other effective modification agents in the year 2025.

One method we propose would further maximize the technology’s safety and reliability, by virtually eliminating the human element. To date, much work has been done on UAVs which can closely (if not completely) match the capabilities of piloted aircraft. If this UAV technology were combined with stealth and carbon dust technologies, the result could be a UAV aircraft invisible to radar while en route to the targeted area, which could spontaneously create carbon dust in any location. However, minimizing the number of UAVs required to complete the mission would depend upon the development of a new and more efficient system to produce carbon dust by a follow-on technology to the afterburner-type jet engines previously mentioned. In order to effectively use stealth technology, this system must also have the ability to disperse carbon dust while minimizing (or eliminating) the UAV’s infrared heat source.

In addition to using stealth UAV and carbon dust absorption technology for precipitation enhancement, this delivery method could also be used for precipitation suppression. Although the previously mentioned study did not significantly explore the possibility of cloud seeding for precipitation suppression, this possibility does exist. If clouds were seeded (using chemical nuclei similar to those used today or perhaps a more effective agent discovered through continued research) before their downwind arrival to a desired location, the result could be a suppression of precipitation. In other words, precipitation could be “forced” to fall before its arrival in the desired territory, thereby making the desired territory “dry.” The strategic and operational benefits of doing this have previously been discussed.


In general, successful fog dissipation requires some type of heating or seeding process. Which technique works best depends on the type of fog encountered. In simplest terms, there are two basic types of fog-cold and warm. Cold fog occurs at temperatures below 32oF. The best-known dissipation technique for cold fog is to seed it from the air with agents that promote the growth of ice crystals.24

Warm fog occurs at temperatures above 32 degrees F and accounts for 90 percent of the fog-related problems encountered by flight operations.25 The best-known dissipation technique is heating because a small temperature increase is usually sufficient to evaporate the fog. Since heating usually isn’t practical, the next most effective technique is hygroscopic seeding.26 Hygroscopic seeding uses agents that absorb water vapor. This technique is most effective when accomplished from the air but can also be accomplished from the ground.27 Optimal results require advance information on fog depth, liquid water content, and wind.28

Decades of research show that fog dissipation is an effective application of weather-modification technology with demonstrated savings of huge proportions for both military and civil aviation.29 Local municipalities have also shown an interest in applying these techniques to improve the safety of high-speed highways transiting areas of frequently occurring dense fog.30

There are some emerging technologies which may have important applications for fog dispersal. As discussed earlier, heating is the most effective dispersal method for the most commonly occurring type of fog. Unfortunately, it has proved impractical for most situations and would be difficult at best for contingency operations. However, the development of directed radiant energy technologies, such as microwaves and lasers, could provide new possibilities.

Lab experiments have shown microwaves to be effective for the heat dissipation of fog. However, results also indicate that the energy levels required exceed the US large power density exposure limit of 100 watt/m2 and would be very expensive.31 Field experiments with lasers have demonstrated the capability to dissipate warm fog at an airfield with zero visibility. Generating 1 watt/cm2, which is approximately the US large power density exposure limit, the system raised visibility to one quarter of a mile in 20 seconds.32 Laser systems described in the Space Operations portion of this AF 2025 study could certainly provide this capability as one of their many possible uses.

With regard to seeding techniques, improvements in the materials and delivery methods are not only plausible but likely. Smart materials based on nanotechnology are currently being developed with gigaops computer capability at their core. They could adjust their size to optimal dimensions for a given fog seeding situation and even make adjustments throughout the process. They might also enhance their dispersal qualities by adjusting their buoyancy, by communicating with each other, and by steering themselves within the fog. They will be able to provide immediate and continuous effectiveness feedback by integrating with a larger sensor network and can also change their temperature and polarity to improve their seeding effects.33 As mentioned above, UAVs could be used to deliver and distribute these smart materials.

Recent army research lab experiments have demonstrated the feasibility of generating fog. They used commercial equipment to generate thick fog in an area 100 meters long. Further study has shown fogs to be effective at blocking much of the UV/IR/visible spectrum, effectively masking emitters of such radiation from IR weapons.34 This technology would enable a small military unit to avoid detection in the IR spectrum. Fog could be generated to quickly, conceal the movement of tanks or infantry, or it could conceal military operations, facilities, or equipment. Such systems may also be useful in inhibiting observations of sensitive rear-area operations by electro-optical reconnaissance platforms.35


The desirability to modify storms to support military objectives is the most aggressive and controversial type of weather-modification. The damage caused by storms is indeed horrendous. For instance, a tropical storm has an energy equal to 10,000 one-megaton hydrogen bombs,36 and in 1992 Hurricane Andrew totally destroyed Homestead AFB, Florida, caused the evacuation of most military aircraft in the southeastern US, and resulted in $15.5 billion of damage.37 However, as one would expect based on a storm’s energy level, current scientific literature indicates that there are definite physical limits on mankind’s ability to modify storm systems. By taking this into account along with political, environmental, economic, legal, and moral considerations, we will confine our analysis of storms to localized thunderstorms and thus do not consider major storm systems such as hurricanes or intense low-pressure systems.

At any instant there are approximately 2,000 thunderstorms taking place. In fact 45,000 thunderstorms, which contain heavy rain, hail, microbursts, wind shear, and lightning form daily.38 Anyone who has flown frequently on commercial aircraft has probably noticed the extremes that pilots will go to avoid thunderstorms. The danger of thunderstorms was clearly shown in August 1985 when a jumbo jet crashed killing 137 people after encountering microburst wind shears during a rain squall.39 These forces of nature impact all aircraft and even the most advanced fighters of 1996 make every attempt to avoid a thunderstorm.

Will bad weather remain an aviation hazard in 2025? The answer, unfortunately, is “yes,” but projected advances in technology over the next 30 years will diminish the hazard potential. Computer-controlled flight systems will be able to “autopilot” aircraft through rapidly changing winds. Aircraft will also have highly accurate, onboard sensing systems that can instantaneously “map” and automatically guide the aircraft through the safest portion of a storm cell. Aircraft are envisioned to have hardened electronics that can withstand the effects of lightning strikes and may also have the capability to generate a surrounding electropotential field that will neutralize or repel lightning strikes.

Assuming that the US achieves some or all of the above outlined aircraft technical advances and maintains the technological “weather edge” over its potential adversaries, we can next look at how we could modify the battlespace weather to make the best use of our technical advantage.

Weather-modification technologies might involve techniques that would increase latent heat release in the atmosphere, provide additional water vapor for cloud cell development, and provide additional surface and lower atmospheric heating to increase atmospheric instability. Critical to the success of any attempt to trigger a storm cell is the pre-existing atmospheric conditions locally and regionally. The atmosphere must already be conditionally unstable and the large-scale dynamics must be supportive of vertical cloud development. The focus of the weather-modification effort would be to provide additional “conditions” that would make the atmosphere unstable enough to generate cloud and eventually storm cell development. The path of storm cells once developed or enhanced is dependent not only on the mesoscale dynamics of the storm but the regional and synoptic (global) scale atmospheric wind flow patterns in the area which are currently not subject to human control.

As indicated, the technical hurdles for storm development in support of military operations are obviously greater than enhancing precipitation or dispersing fog as described earlier. One area of storm research that would significantly benefit military operations is lightning modification. Most research efforts are being conducted to develop techniques to lessen the occurrence or hazards associated with lightning. This is important research for military operations and resource protection, but some offensive military benefit could be obtained by doing research on increasing the potential and intensity of lightning. Concepts to explore include increasing the basic efficiency of the thunderstorm, stimulating the triggering mechanism that initiates the bolt, and triggering lightning such as that which struck Apollo 12 in 1968.40 Possible mechanisms to investigate would be ways to modify the electropotential characteristics over certain targets to induce lightning strikes on the desired targets as the storm passes over their location.

In summary, the ability to modify battlespace weather through storm cell triggering or enhancement would allow us to exploit the technological “weather” advances of our 2025 aircraft; this area has tremendous potential and should be addressed by future research and concept development programs.

Exploitation of “NearSpace” for Space Control

This section discusses opportunities for control and modification of the ionosphere and near-space environment for force enhancement; specifically to enhance our own communications, sensing, and navigation capabilities and/or impair those of our enemy. A brief technical description of the ionosphere and its importance in current communications systems is provided in appendix A.

By 2025, it may be possible to modify the ionosphere and near space, creating a variety of potential applications, as discussed below. However, before ionospheric modification becomes possible, a number of evolutionary advances in space weather forecasting and observation are needed. Many of these needs were described in a Spacecast 2020 study, Space Weather Support for Communications.41 Some of the suggestions from this study are included in appendix B; it is important to note that our ability to exploit near space via active modification is dependent on successfully achieving reliable observation and prediction capabilities.

Opportunities Afforded by Space Weather-modification

Modification of the near-space environment is crucial to battlespace dominance. General Charles Horner, former commander in chief, United States space command, described his worst nightmare as “seeing an entire Marine battalion wiped out on some foreign landing zone because he was unable to deny the enemy intelligence and imagery generated from space.”42 Active modification could provide a “technological fix” to jam the enemy’s active and passive surveillance and reconnaissance systems. In short, an operational capability to modify the near-space environment would ensure space superiority in 2025; this capability would allow us to shape and control the battlespace via enhanced communication, sensing, navigation, and precision engagement systems.

While we recognize that technological advances may negate the importance of certain electromagnetic frequencies for US aerospace forces in 2025 (such as radio frequency (RF), high-frequency (HF) and very high-frequency (VHF) bands), the capabilities described below are nevertheless relevant. Our nonpeer adversaries will most likely still depend on such frequencies for communications, sensing, and navigation and would thus be extremely vulnerable to disruption via space weather-modification.

Communications Dominance via Ionospheric Modification

Modification of the ionosphere to enhance or disrupt communications has recently become the subject of active research. According to Lewis M. Duncan, and Robert L. Showen, the Former Soviet Union (FSU) conducted theoretical and experimental research in this area at a level considerably greater than comparable programs in the West.43 There is a strong motivation for this research, because induced ionospheric modifications may influence, or even disrupt, the operation of radio systems relying on propagation through the modified region. The controlled generation or accelerated dissipation of ionospheric disturbances may be used to produce new propagation paths, otherwise unavailable, appropriate for selected RF missions.44

A number of methods have been explored or proposed to modify the ionosphere, including injection of chemical vapors and heating or charging via electromagnetic radiation or particle beams (such as ions, neutral particles, x-rays, MeV particles, and energetic electrons).45 It is important to note that many techniques to modify the upper atmosphere have been successfully demonstrated experimentally. Ground-based modification techniques employed by the FSU include vertical HF heating, oblique HF heating, microwave heating, and magnetospheric modification.46 Significant military applications of such operations include low frequency (LF) communication production, HF ducted communications, and creation of an artificial ionosphere (discussed in detail below). Moreover, developing countries also recognize the benefit of ionospheric modification: “in the early 1980’s, Brazil conducted an experiment to modify the ionosphere by chemical injection.”47

Several high-payoff capabilities that could result from the modification of the ionosphere or near space are described briefly below. It should be emphasized that this list is not comprehensive; modification of the ionosphere is an area rich with potential applications and there are also likely spin-off applications that have yet to be envisioned.

Ionospheric mirrors for pinpoint communication or over-the-horizon (OTH) radar transmission. The properties and limitations of the ionosphere as a reflecting medium for high-frequency radiation are described in appendix A. The major disadvantage in depending on the ionosphere to reflect radio waves is its variability, which is due to normal space weather and events such as solar flares and geomagnetic storms. The ionosphere has been described as a crinkled sheet of wax paper whose relative position rises and sinks depending on weather conditions. The surface topography of the crinkled paper also constantly changes, leading to variability in its reflective, refractive, and transmissive properties.

Creation of an artificial uniform ionosphere was first proposed by Soviet researcher A. V. Gurevich in the mid-1970s. An artificial ionospheric mirror (AIM) would serve as a precise mirror for electromagnetic radiation of a selected frequency or a range of frequencies. It would thereby be useful for both pinpoint control of friendly communications and interception of enemy transmissions.

This concept has been described in detail by Paul A. Kossey, et al. in a paper entitled “Artificial Ionospheric Mirrors (AIM).”48 The authors describe how one could precisely control the location and height of the region of artificially produced ionization using crossed microwave (MW) beams, which produce atmospheric breakdown (ionization) of neutral species. The implications of such control are enormous: one would no longer be subject to the vagaries of the natural ionosphere but would instead have direct control of the propagation environment. Ideally, the AIM could be rapidly created and then would be maintained only for a brief operational period. A schematic depicting the crossed-beam approach for generation of an AIM is shown in figure 4-1.49

An AIM could theoretically reflect radio waves with frequencies up to 2 GHz, which is nearly two orders of magnitude higher than those waves reflected by the natural ionosphere. The MW radiator power requirements for such a system are roughly an order of magnitude greater than 1992 state-of-the-art systems; however, by 2025 such a power capability is expected to be easily achievable.

Besides providing pinpoint communication control and potential interception capability, this technology would also provide communication capability at specified frequencies, as desired. Figure 4-2 shows how a ground-based radiator might generate a series of AIMs, each of which would be tailored to reflect a selected transmission frequency. Such an arrangement would greatly expand the available bandwidth for communications and also eliminate the problem of interference and crosstalk (by allowing one to use the requisite power level).

Kossey et al. also describe how AIMs could be used to improve the capability of OTH radar:

AIM based radar could be operated at a frequency chosen to optimize target detection, rather than be limited by prevailing ionospheric conditions. This, combined with the possibility of controlling the radar’s wave polarization to mitigate clutter effects, could result in reliable detection of cruise missiles and other low observable targets.50

A schematic depicting this concept is shown in figure 4-3. Potential advantages over conventional OTH radars include frequency control, mitigation of auroral effects, short range operation, and detection of a smaller cross-section target.

Disruption of communications and radar via ionospheric control. A variation of the capability proposed above is ionospheric modification to disrupt an enemy’s communication or radar transmissions. Because HF communications are controlled directly by the ionosphere’s properties, an artificially created ionization region could conceivably disrupt an enemy’s electromagnetic transmissions. Even in the absence of an artificial ionization patch, high-frequency modification produces large-scale ionospheric variations which alter HF propagation characteristics. The payoff of research aimed at understanding how to control these variations could be high as both HF communication enhancement and degradation are possible. Offensive interference of this kind would likely be indistinguishable from naturally occurring space weather. This capability could also be employed to precisely locate the source of enemy electromagnetic transmissions.

VHF, UHF, and super-high frequency (SHF) satellite communications could be disrupted by creating artificial ionospheric scintillation. This phenomenon causes fluctuations in the phase and amplitude of radio waves over a very wide band (30 MHz to 30 GHz). HF modification produces electron density irregularities that cause scintillation over a wide-range of frequencies. The size of the irregularities determines which frequency band will be affected. Understanding how to control the spectrum of the artificial irregularities generated in the HF modification process should be a primary goal of research in this area. Additionally, it may be possible to suppress the growth of natural irregularities resulting in reduced levels of natural scintillation. Creating artificial scintillation would allow us to disrupt satellite transmissions over selected regions. Like the HF disruption described above, such actions would likely be indistinguishable from naturally occurring environmental events. Figure 4-4 shows how artificially ionized regions might be used to disrupt HF communications via attenuation, scatter, or absorption (fig. 4.4a) or degrade satellite communications via scintillation or energy loss (fig. 4-4b) (from Ref. 25).

Exploding/disabling space assets traversing near-space. The ionosphere could potentially be artificially charged or injected with radiation at a certain point so that it becomes inhospitable to satellites or other space structures. The result could range from temporarily disabling the target to its complete destruction via an induced explosion. Of course, effectively employing such a capability depends on the ability to apply it selectively to chosen regions in space.

Charging space assets by near-space energy transfer. In contrast to the injurious capability described above, regions of the ionosphere could potentially be modified or used as-is to revitalize space assets, for instance by charging their power systems. The natural charge of the ionosphere may serve to provide most or all of the energy input to the satellite. There have been a number of papers in the last decade on electrical charging of space vehicles; however, according to one author, “in spite of the significant effort made in the field both theoretically and experimentally, the vehicle charging problem is far from being completely understood.”51

While the technical challenge is considerable, the potential to harness electrostatic energy to fuel the satellite’s power cells would have a high payoff, enabling service life extension of space assets at a relatively low cost. Additionally, exploiting the capability of powerful HF radio waves to accelerate electrons to relatively high energies may also facilitate the degradation of enemy space assets through directed bombardment with the HF-induced electron beams. As with artificial HF communication disruptions and induced scintillation, the degradation of enemy spacecraft with such techniques would be effectively indistinguishable from natural environment effects. The investigation and optimization of HF acceleration mechanisms for both friendly and hostile purposes is an important area for future research efforts.

Artificial Weather

While most weather-modification efforts rely on the existence of certain preexisting conditions, it may be possible to produce some weather effects artificially, regardless of preexisting conditions. For instance, virtual weather could be created by influencing the weather information received by an end user. Their perception of parameter values or images from global or local meteorological information systems would differ from reality. This difference in perception would lead the end user to make degraded operational decisions.

Nanotechnology also offers possibilities for creating simulated weather. A cloud, or several clouds, of microscopic computer particles, all communicating with each other and with a larger control system could provide tremendous capability. Interconnected, atmospherically buoyant, and having navigation capability in three dimensions, such clouds could be designed to have a wide-range of properties. They might exclusively block optical sensors or could adjust to become impermeable to other surveillance methods. They could also provide an atmospheric electrical potential difference, which otherwise might not exist, to achieve precisely aimed and timed lightning strikes. Even if power levels achieved were insufficient to be an effective strike weapon, the potential for psychological operations in many situations could be fantastic.

One major advantage of using simulated weather to achieve a desired effect is that unlike other approaches, it makes what are otherwise the results of deliberate actions appear to be the consequences of natural weather phenomena. In addition, it is potentially relatively inexpensive to do. According to J. Storrs Hall, a scientist at Rutgers University conducting research on nanotechnology, production costs of these nanoparticles could be about the same price per pound as potatoes.52 This of course discounts research and development costs, which will be primarily borne by the private sector and be considered a sunk cost by 2025 and probably earlier.

Concept of Operations Summary

Weather affects everything we do, and weather-modification can enhance our ability to dominate the aerospace environment. It gives the commander tools to shape the battlespace. It gives the logistician tools to optimize the process. It gives the warriors in the cockpit an operating environment literally crafted to their needs. Some of the potential capabilities a weather-modification system could provide to a war-fighting CINC are summarized in table 1, of the executive summary).

Chapter 5

Investigation Recommendations

How Do We Get There From Here?

To fully appreciate the development of the specific operational capabilities weather-modification could deliver to the war fighter, we must examine and understand their relationship to associated core competencies and the development of their requisite technologies. Figure 5-1 combines the specific operational capabilities of Table 1 into six core capabilities and depicts their relative importance over time. For example, fog and cloud modification are currently important and will remain so for some time to come to conceal our assets from surveillance or improve landing visibility at airfields. However, as surveillance assets become less optically dependent and aircraft achieve a truly global all-weather landing capability, fog and cloud modification applications become less important.

In contrast, artificial weather technologies do not currently exist. But as they are developed, the importance of their potential applications rises rapidly. For example, the anticipated proliferation of surveillance technologies in the future will make the ability to deny surveillance increasingly valuable. In such an environment, clouds made of smart particles such as described in chapter 4 could provide a premium capability.

Even today’s most technologically advanced militaries would usually prefer to fight in clear weather and blue skies. But as war-fighting technologies proliferate, the side with the technological advantage will prefer to fight in weather that gives them an edge. The US Army has already alluded to this approach in their concept of “owning the weather.”53 Accordingly, storm modification will become more valuable over time. The importance of precipitation modification is also likely to increase as usable water sources become more scarce in volatile parts of the world.

As more countries pursue, develop, and exploit increasing types and degrees of weather-modification technologies, we must be able to detect their efforts and counter their activities when necessary. As depicted, the technologies and capabilities associated with such a counter weather role will become increasingly important.

The importance of space weather-modification will grow with time. Its rise will be more rapid at first as the technologies it can best support or negate proliferate at their fastest rates. Later, as those technologies mature or become obsolete, the importance of space weather-modification will continue to rise but not as rapidly.

To achieve the core capabilities depicted in figure 5-1, the necessary technologies and systems might be developed according to the process depicted in figure 5-2. This figure illustrates the systems development timing and sequence necessary to realize a weather-modification capability for the battlespace by 2025. The horizontal axis represents time. The vertical axis indicates the degree to which a given technology will be applied toward weather-modification. As the primary users, the military will be the main developer for the technologies designated with an asterisk. The civil sector will be the main source for the remaining technologies.


The world’s finite resources and continued needs will drive the desire to protect people and property and more efficiently use our crop lands, forests, and range lands. The ability to modify the weather may be desirable both for economic and defense reasons. The global weather system has been described as a series of spheres or bubbles. Pushing down on one causes another to pop up.54 We need to know when another power “pushes” on a sphere in their region, and how that will affect either our own territory or areas of economic and political interest to the US.

Efforts are already under way to create more comprehensive weather models primarily to improve forecasts, but researchers are also trying to influence the results of these models by adding small amounts of energy at just the right time and space. These programs are extremely limited at the moment and are not yet validated, but there is great potential to improve them in the next 30 years.55

The lessons of history indicate a real weather-modification capability will eventually exist despite the risk. The drive exists. People have always wanted to control the weather and their desire will compel them to collectively and continuously pursue their goal. The motivation exists. The potential benefits and power are extremely lucrative and alluring for those who have the resources to develop it. This combination of drive, motivation, and resources will eventually produce the technology. History also teaches that we cannot afford to be without a weather-modification capability once the technology is developed and used by others. Even if we have no intention of using it, others will. To call upon the atomic weapon analogy again, we need to be able to deter or counter their capability with our own. Therefore, the weather and intelligence communities must keep abreast of the actions of others.

As the preceding chapters have shown, weather-modification is a force multiplier with tremendous power that could be exploited across the full spectrum of war-fighting environments. From enhancing friendly operations or disrupting those of the enemy via small-scale tailoring of natural weather patterns to complete dominance of global communications and counter-space control, weather-modification offers the war fighter a wide-range of possible options to defeat or coerce an adversary. But, while offensive weather-modification efforts would certainly be undertaken by US forces with great caution and trepidation, it is clear that we cannot afford to allow an adversary to obtain an exclusive weather-modification capability.