THE REASON FOR TARGED INDIVIDUALS BY NATO IS THE ABILITY OF QUANTOM COMPUTERS TO BREAK ANY CODE. TARGETED INDIVIDUALS ARE PART OF A FRACTAL ENCRYPTION METHOD AND ARE WORLD WIDE TO SEND AND DECODE MESSAGES. READ ENTIRE DOCUMENT TO UNDERSTAND

Step by step, scientists are busy perfecting an entirely new and amazingly powerful approach to computer technology. Far more than simply being the next generation in tinier, faster hardware and smarter software, quantum computing represents a fundamental difference in kind. Though the capabilities -- including actual quantum teleportation -- may seem astonishing, quantum computing is not science fiction or the next "cold fusion." Quantum computing is proven, hard fact. Impressive results have already been accomplished in major laboratories around the globe, validated independently by other researchers, and reported in prestigious, peer reviewed journals. Yet history has shown all too often that a country's national security is deeply affected by its own and its potential adversaries' relative number-crunching prowess.

Reading the best secret codes: It turns out that an individual light photon (indivisible, sub-microscopic packet of energy) can exist in a vast number of superimposed states all at once. As a result, quantum computers differ drastically from current digital computers, where the fundamental unit of information is the familiar "discrete 0 or 1." This enables a new type of parallel processing on a truly mind-boggling scale.

Certain computational-intensive tasks -- including military code-breaking -- which would take literally millions of years with the latest supercomputers, could instead be solved in mere seconds on a full-blown quantum computer. Such a device, if perfected in secret, could compromise every encryption scheme in existence. But the idea of it is already public. Research on codes immune to fast quantum-computer decryption had better keep pace! Otherwise industrial, diplomatic, and warfighting activity might be reduced to a "new Dark Ages," in which every player's mail gets read by competitors and enemies, like it or not.

http://www.military.com/NewContent/0,13190,Buff_081304,00.html

What the above means is that any message sent via standard encryption methodologies is subject to decryption by any nation that owns a quantum computer. No encrypted message is safe. The only encryption methodology that might be safe is Fractal Encryption methods.

-David Huber

Targeted individuals are controlled physiologically and systemically. Every emotion and bioelectrical signal can form the basis of an encryption code. Everything they look at and every physical motion they make can also be the basis for a fractal encryption code.

For example if your left arm has a muscle cramp or twitches and you are looking at a chair in your house and you are lying on the couch in a comfortable position and the voices to the skull say certain words this will form the basis for an encrypted message that can be sent to another targeted individual. Example a targeted individual in San Francisco can receive this type of messages and even be observed by another targeted individual further encrypting the message. The message can then be sent via satellite at the speed of light to another targeted individual in another NATO country for further encryption or decryption. –David Huber

Fractal Encryption:

Encryption methods based upon nonprobabilistic nondeterminism show promise in the optical age.

In 1987 a discovery led to the formal proof that it is possible to use chaotic functions to arrive at a nonprobabilistic and nondeterministic method normal context of the operation of this system, and by using a virtual operational environment, the investigators are manipulating data in eight dimensions, which require a sixty-four discrete coordinate system, using eight nominative octets. Each octet is further addressed using the characters 0 through 9, and lower- or upper-case letters from A to Z. These provide the ability to address using normal ASCII characters. This format was chosen to ensure backward and forward compatibility with external third-party-written software.

This original discovery has led to the fundamental principle that the main focus of any chaotic system was what the output would look like. After watching hundreds of runs of Edward Lorenz's strange attractors show up in places that were seemingly endless, it was decided that the team would pursue the goal of placing this type of behaviour into a software/hardware combination that would supply the necessary functionality and still be robust enough for a PC or minicomputer format. This was accomplished when the first modules of Fortran were created; then, as time went on in the development process, the investigators translated some of the harder features into what languages were available and able to be used.

The system that was decided upon was one where a combination of hardware and software was used. The hardware provided a means of proper transmission and error correction, and the software was utilized to create the front end and all of the virtual mechanisms used to create each message block, or octet as the case may be.

http://www.techbriefs.com/content/view/2579/32/

IN THE CASE OF TARGETED INDIVIDUALS WE ARE A PART OF THE COMBINATION OF HARDWARE AND SOFTWARE USED FOR THIS TYPE OF ENCYPTION.

Human biophysical emotions and physical movement and heart rate and other quantifiable measurements are used to encrypt and decrypt messages amongst 1000s of targeted individuals.

-David Huber

You need to be a member of Peacepink3 to add comments!

Join Peacepink3

Votes: 0
Email me when people reply –