THECOMPOUND.COM
Electromagnetic Control and Spying
The civilization your children will inherit
Slaves without choice


HAARP Antenna Array -- Meet Your New Master

_______


 COMPOUND RESEARCH LINKS

 
HAARP -- YOUR NEW MASTER
  HAARP --Your New Master  Introduction to HAARP
  Inventing a Neurorobot  Brain control experiments funded by the Defense Advanced Research Agency (Military)
  Silent Sounds & Super Computers  The mind altering mechanism is based on a subliminal carrier technology
  Pulsed RF in China  China's electromagnetic/biological research
  Anti-Personnel Electromagnetic Weapons  The history, the players
  HAARP Home Page  The Official Navy Page
 BrainWave Generator - Theory  EEG and the brain's state
  Brainwave Entrainment  The Science of Audio Based Brainwave Entrainment
  Dr. Bernard Eastlund  Dr. Eastlund's commercial page
  Dr. Eastlund, HAARP Creator   HAARP was built from Dr. Eastlund's Patents and the Navy denies his existence with the project -- follow the timeline 
  HAARP: Vandalism In The Sky?  Nexus Magazine's take on HAARP
  ARCO, Eastlund and the Roots of HAARP The history of HAARP and what the Navy denies
  HAARP: History History and Applications of HAARP Technologies - Bailey & Worthington
  RJ White Resource Center, HAARP  History, background information, uses...

 
ECHELON
and other privacy matters
  Interception Capabilities 2000  The mechanics of electronic surveillance
  ECHELON Research Resources  ECHELON - Project links for multinational installations
  ECHELON Global Surveillance  Someone is listening
  LODATO Device  Electronic security device Tempest and Echelon hardened
  Electronic Speech Identification  Intercepted voice transmissions identified in 4 seconds
  Communications Privacy In a Digital Age  Communications intercepts have increased... do something
  World Police Attack Anonymity  Financial anonymity is under attack World Wide
  Technologies of Political Control  EUROPEAN PARLIAMENT assessment document
  Trust In Cyberspace  Experts have known for some time that networked   information systems are not trustworthy and that the technology needed to make them trustworthy was, by and large, not at hand...
  Hidden Hand Of ILETS  Tapping on an International scale
  Microsoft Security  The Myth of Microsoft Security
  NSA Declassified  
  NSA Documents declassified
  Information Warfare - Defense  DoD report
  Electric Power Risk Assessment  
  Cyberterror and Cyberhype  Government officials are clue less
  CRYPTOME   Collected documents on privacy, cryptology and military technology -- ECHELON 

 
EDUCATION
  History Interview  Responses to High School history interview
  Interview Questions  The questions for the history interview
  Goals 2000  Goals 2000 -- Report by educator
  School To Work Opportunities Act  Analysis of the program
Outcome-Based Education  Putting it all together

 
 
 Messages

 
  1