You are on page 1of 13

P a g e | 211

First Draft: Unedited…

Chapter 14 You Live or Die by Executing Details - Thursday

George called Curtis as soon as Daemon left the meeting. George sounded relieved

when he said, “Daemon and I had a good talk. Daemon asked how I was doing. I gave

him an update on our T. gondii research. He was pleased with our research results.

Daemon asked JR to join our discussion about our research.

Curtis replied he was pleased with the meeting outcome and told George he would see

JR and George this evening at his house.

Curtis would introduce Steven to JR and George. Curtis knew security was more

important now. With four people working together against Daemon, communication was

a key concern. With four people united against Daemon increased the risks of someone

making a security mistake.

Daemon had the advantage. He had more resources. Curtis had the advantage of

Daemon not knowing his weaknesses. It was a classic challenge in the security

business, not to become complacent and never assume anything.

Daemon had made himself vulnerable having too many activities that demanded his

attention. You live or die by the details.

Curtis had just walked into his house when JR, George, and Steven drove up in their

cars. Curtis introduced everyone as he poured soft drinks. This was no time to party.

Curtis explained how to use the special contact lens for communications. There was no

questions.

George asked, “How does The National Security Agency (NSA) illegally and

unconstitutionally harasses law-abiding Americans every day?” Curtis explained,


P a g e | 211

“Daemon was directing unauthorized, illegal activities. Daemon was authorized to utilize

the government process. Daemon was not authorized to us the Top Secret surveillance

and covertly eliminate individuals he decided were no good.” Daemon had gone over

the line. He was worse than loose cannons on a deck of a ship in a storm loaded with

gun powder.”

JR glanced at Curtis and nodded his head. Reassured, Curtis said, “Daemon was using

government Top Secret technology. EMF or ELF Radio Waves, and a technology

known as Remote Neural Monitoring do it. Haven’t you ever wondered about ringing in

your ears? The NSA is monitoring you. Some people are more sensitive to the

electronic eavesdropping than others.”

Curtis interrupted himself pointing his hand toward Steven informing George, “Steven is

part of Daemon’s New World Order Project. He has been infected with T. gondii to

enable super abilities that Daemon needs. That is why we are researching T. gondii to

improve the human characteristics and attributes. Daemon wants it all. He wants

soldiers that have superior intellect and abilities to execute his orders. His worldwide

communications system coupled with his ability to eliminate his chosen undesirable

individuals – including the ability to eliminate cultures that are unacceptable to him has

created a monster that we must stop.”

George with a look of panic in his eyes, says, “My ears are starting to ring. What do I

do?” Curtis explains to George, “JR has provided a system that he had integrated into

the special contact lens that will notify him when he is being watched.”

George asked, “Am I being monitored?” Curtis smiles and told him he was not being

monitored at the present time.”


P a g e | 211

George excitedly waves his arms and told Curtis, “I need to know more about how he

was being monitored.”

Curtis replied, “Blanket coverage of all electronic communication in the U.S. and the

world is done to ensure national security. The NSA at Ft. Meade, Maryland has had the

most advanced computers in the world since the early 1960’s. NSA technology is

developed and implemented in secret from private corporations, academia, and the

public.

JR interrupted Curtis with a comment, “I worked for a special government organization

called, Signals Intelligence (SIGINT). The Signals Intelligence mission of the National

Security Service (NSA) has evolved into a program of decoding electro motive force

(EMF) or, electrical waves in the environment for wirelessly tapping into computers and

tracking persons with the electrical currents in their bodies. Signals Intelligence is

because everything in the environment with an electric current in it has a magnetic flux

around it that gives off EMF waves. The NSA/DoD has developed proprietary advanced

digital equipment which can remotely analyze all objects whether man-made or organic

that has electrical activity.”

Steven asked, “Is the National Security Agency/Central Security Service (NSA/CSS) a

cryptologic intelligence agency of the United States government?”

George replied, “Yes it is. Now I understand why the government always have the best

quantum computers. It is based upon their quantum computers filtering what they need

and when they need information. Knowledge is organized information.”

JR continued with, “There is another organization called Domestic Intelligence

(DOMINT). The NSA has records on all U.S. citizens. The NSA gathers information on
P a g e | 211

U.S. citizens who might be of interest to any of the over 50,000 NSA agents. These

agents are authorized by executive order to spy on anyone. The NSA has a permanent

National Security Anti-Terrorist surveillance network in place. This surveillance network

is completely disguised and hidden from the public.”

Curtis looking at George said, “Daemon can control the lives of billions in the world by

using the NSA’s domestic intelligence network. NSA has the ability to covertly

assassinate U.S. citizens or run covert psychological control operations to cause

subjects to be diagnosed with ill mental health. Daemon has improved upon NSA’s

abilities and capabilities.”

JR explained he had trained with some NSA personnel and had learned the NSA keeps

track of all PCs and other computers sold in the U.S. This is an integral part of the

Domestic Intelligence network. The NSA’s EMF equipment can tune in RF emissions

from personal computer circuit boards (while filtering out emissions from monitors and

power supplies). The RF emission from PC circuit boards contains digital information in

the PC. Coded RF waves from the NSA’s equipment can resonate PC circuits and

change data in the PC’s. Thus, the NSA can gain wireless modem-style entry into any

computer in the country for surveillance or anti-terrorist electronic warfare. Radio and

Television signals can be substituted at the receiving end with special EMF equipment.

Replacing signals in Radios and Televisions is another outgrowth of the NSA’s Signals

Intelligence (SIGINT) mission.

Curtis wanting to ease George’s fears about being remotely watched, reminded him that

he will have the ability to when this occurs.

He told George NSA detects EMF Fields in Humans for Surveillance. A subject’s
P a g e | 211

bioelectric field can be remotely detected, so subjects can be monitored anywhere they

are. With special EMF equipment NSA cryptologists can remotely read evoked

potentials (from EEGs). These can be decoded into a person’s brain-states and

thoughts. The subject is then perfectly monitored from a distance. NSA personnel can

dial up any individual in the country on the Signals Intelligence EMF scanning network

and the NSA’s computers will then pinpoint and track that person 24 hours-a-dayThis is

how Daemon can remotely eliminate his undesirable people.”

George smiling heaves a sigh of relief and says, “Boy, I am glad I met you guys. At least

I know what to expect.”

Curtis replies with, “You must remember, The NSA has proprietary electronic equipment

that analyzes electrical activity in humans from a distance. NSA computer-generated

brain mapping can continuously monitor all the electrical activity in the brain

continuously. The NSA records aid decodes individual brain maps (of hundreds of

thousands of persons) for national security purposes.

George interrupts, “This is making me paranoid.” Curtis says, “There is more…EMF

Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In

military fighter aircraft, for example.) For electronic surveillance purposes, electrical

activity in the speech center of the brain can be translated into the subject’s verbal

thoughts. Remote Neural Monitoring (RNM) can send encoded signals to the brain’s

auditory cortex thus allowing audio communication direct to the brain (bypassing the

ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory

hallucinations characteristic of paranoid schizophrenia.


P a g e | 211

George, stands and says, “They do that without any contact with the subject? Curtis

answers with, “Remote Neural Monitoring can map out electrical activity from the visual

cortex of a subject’s brain and show images from the subject’s brain on a video monitor.

NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory

can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes

and optic nerves. NSA operatives can use this to surreptitiously put images in a

surveillance subject’s brain while they are in R.E.M. sleep for brain-programming

purposes.”

George says to Curtis, “I am ready for your special contact lens.” It was time to give

George and Steven their special eye contacts lens.

Curtis reminded them when they were being monitored their special eye contacts would

notify them. It was time to play a game of eight ball pool. They needed to relax. Halfway

through the game each glanced at each other. Daemon was watching them. They

continued playing as if nothing had happened. George and Steven learned quickly.

Their lives depended upon it. Tomorrow was Friday. They made plans to ride their

ATV’s in the California City area near the small town of Mojave. There were hundreds of

abandoned mines and miner shacks to explore. They would bring their powerful metal

detectors to search for old artifacts and perhaps locate coins.

Friday morning, it was good to enjoy coffee in his office. Daemon walked in and joined

him. Daemon asked Curtis for an update to his request from the quantum computer on

how to modify the given neural activity to the desired neural activity. Curtis responded

there is a printed summary on his desk. Daemon looks at the summary and tells, Curtis,

“Finally, the computer got it. I’ll take this report with me.” Daemon left.
P a g e | 211

This was a good time to check the feasibility to globally eradicate T. gondii. He

needed to know if it was feasible to transmit this known resonating frequency with

enough power via stationary satellites to eradicate T. gondii.

Curtis had built a prototype transmitter to irradiate with the specified frequency and

power, a mouse that had tested positive for T. gondii. It was time to radiate the infected

mouse.

After irradiation, the mouse tested negative for T. gondii infestation, the resonating

frequency and power settings worked. JR could tell him which satellites were available

and how many were required. He would know if the selected satellites were capable of

transmitting with the required frequency and power.

On the way home, Curtis called JR to tell him he did not want Sherriff Sloan to go with

them tomorrow. He wanted to develop strategies and concepts on how to stop Daemon

while they were together riding their ATV’s. He would meet them at the Voyager

Restaurant at Mojave Air and Space Port at 7 am sharp. Maybe Burt Rutan would be

there. It was always an exciting place to meet engineers and space entrepreneurs.

Curtis spent a quiet evening at home. He placed a call to Mary Sue. She was going out

of town this weekend. She agreed they would plan to meet sometime in the future.
P a g e | 211

Chapter15 - ATV Exploring: Developing a Plan

Voyager Airport Restaurant is located in the airport terminal building, under the old

tower adjacent to transient parking. 

Curtis joined JR, George, and Steven at a table inside the Voyager Airport Restaurant.

He told them, “The menu is aeronautically inspired — why not try the Long EZ, two eggs

served up any style, named after an aircraft designed by Burt Rutan. Alternatively,

there's The Blackbird (sausage patties and eggs labeled after the super-fast U.S. Air

Force reconnaissance plane) or the Space Ship One, a plate of ham and eggs. The

Hangar Queen is a three-egg omelet or perhaps the Joudis Crash Landing, featuring

two poached eggs served on corn tortillas, topped off with mixed cheddar, jack cheese,

and special Ranchero sauce. Any selection is great.

Great food, great company, it was time to ride and explore on their all-terrain vehicles

(ATVs). They had selected an old mining area call Randsburg to explore.

Randsburg, Johannesburg, and Red Mountain are three small towns along U.S.

Highway 395 between Ridgecrest and Boron, California. They are the mining district

towns of the Rand Area, the gold and silver mining belt of Kern County.

Old Silver Mine Randsburg Old House & Car


P a g e | 211

Randsburg California

All Terrain Vehicle Old Silver Mine

Narrow Gauge Steam Engine Caves to Explore


P a g e | 211

Labor Day Weekend at Ransburg

To the north of Mojave Air and Space Port are Edwards AFB (classified aircraft have

been tested on the northern part of the base) and the China Lake Naval Air Weapons

Center, home of the Randsburg Wash Test Range, that the Navy described as "Sea

Site I, a highly classified, sensitive, electronic warfare facility" in a land withdrawal

handled by the California office of the Bureau of Land Management (BLM) in 1994.
P a g e | 211

Curtis knew this was a perfect government area to hide in plain sight. It was an ideal

area for Top Secret activity. Area 51, Naval Air Weapons Station, Edwards Air Force

Base and Mojave Air and Space Port South were surrounded with hundreds of square

miles of undeveloped dessert and old abandoned mines. The vast, sparsely populated

desert had near-perfect flying weather year-round and practically unlimited visibility was

an ideal location for secret research and development.

Naval Air Weapons Station China Lake, the high desert home of the Naval Air Warfare

Center Weapons Division, is where the Navy and Marine Corps have developed or

tested nearly every significant airborne weapon system in the past five decades. China

Lake is located 150 miles northeast of Los Angeles on the western edge of California's

Mojave Desert. It made sense Daemon was developing the Flying Weapons Platform

Program in this area. Edwards Air Force Base was in the ideal site.

All four of them, had their own ATV. They all wore projective clothing and helmets. They

were ready to have some fun. There was a mountain top near Johannesburg that was

their general direction to explore. They had to be careful of rattlesnakes and open,

exposed mineshafts. They gunned their ATVs and took off single file.

Approximately 15 minutes later, they stopped and examined a strange looking crashed

aircraft. It was an unmanned experimental aircraft. There was no one around for miles.

Apparently, it had just crashed. The government would send something very soon to

secure the area.

There were no aircraft or helicopter in sight. The crash must have just happened. Curtis

was sure the government would investigate and remove the crashed airplane. Perhaps

Daemon was involved with this experimental unmanned aircraft.


P a g e | 211

Curtis told JR, “Listen, what is the humming sound? Where is it coming from?” It was a

low-pitched hum. It sounded as if an electrical device was operating.

Steven yelled, “It is going to explode. Get out of here,” as he jumped on his ATV and

sped away from the aircraft. Everyone scattered in different directions on their ATV’s for

about a quarter of a mile away from the crashed aircraft. They did not have time to ask

questions. The panic in his voice explained the urgency.

There was a tremendous explosion. The crashed aircraft had disappeared. There was

shredded, burning pieces of metal falling from the air. No one moved.

As the group came back together, without a word, they understood it was best to put

lots of distance between them and the crashed experimental aircraft. They left the area

in a cloud of dust.

Twenty minutes later, they heard a fast, low flying helicopter heading straight to the

crashed aircraft. Sometimes it is best to not be involved and not to have to answer any

questions.

Depending on the mission and the sensitivity of the Top Secret unmanned aircraft, they

could subject themselves to extensive surveillance and questions for an undetermined

amount of time.

Ten miles away from the crash site, they stopped. Steven said to the group, “I

recognized that aircraft. It was one of Daemon’s plans. He could not discuss any other

details. When he recognized the aircraft, he knew it had a self-destruct design.”

Curtis said, “let’s find an old mine and explore it. We need to discuss methods to

develop strategies and concepts on how to stop Daemon. There is less opportunity for

our discussions to be monitored underground.”


P a g e | 211

George said, “Let’s make like a cheap bra, head ‘em up and head ‘em out.” “You mean

to make like a tree and leave?” Yelled JR as he pulled onto the trail. Dodging cactus

and rocks, they were maintaining 60 miles per hour as they gyrated, and bounced along

the small animal trail.

Key Facts

 Scheduled 100,000 words (350 pages): 50,000 words completed.

 First rough draft

 Scheduled completion of first rough draft: May 25…2010

 Scheduled edition process: June, 2010 (my editing)

 Scheduled professional review and editing July, 2010

 Publish first as ebook (amazon.com); as “platform” is developed with widespread

marketing…

 Contact publish to publish “Best Seller.”

 Comments welcome…!!!!!!!!!

 “Doing it, rather than wishing I had done it… Not for the faint-of-heart”

You might also like