| Home - Latest News | Introduction | Bayside Prophecies | Directives from Heaven | Shopping Cart | Testimonies | Veronica Lueken | Miraculous Photos | Bible | Radio Program |

 These Last Days News - September 3, 2014

Electromagnetic Warfare Is Here...

"Learn a simple lesson from the past, My children. When the morals of a country start to go down into darkness, and the teachings turn from God to man, that country will soon be ended. First the spiritual life and then the material life of your country shall be destroyed." - Jesus, October 2, l976  

IEEE Spectrum reported on August 25, 2014:

by William A. Radasky

In the 2001 action movie Ocean’s Eleven, criminals use an electromagnetic weapon to black out a portion of Las Vegas. Very futuristic, you may say, but the threat is real and growing.

The problem is growing because the technology available to attackers has improved even as the technology being attacked has become more vulnerable. Our infrastructure increasingly depends on closely integrated, high-speed electronic systems operating at low internal voltages. That means they can be laid low by short, sharp pulses high in voltage but low in energy—output that can now be generated by a machine the size of a suitcase, batteries included.

Electromagnetic (EM) attacks are not only possible—they are happening. One may be under way as you read this. Even so, you would probably never hear of it: These stories are typically hushed up, for the sake of security or the victims’ reputation. Occasionally, though, an incident comes to light.

In May 2012, for instance, the Korea Herald reported that over 500 aircraft flying in and out of South Korea’s Incheon and Gimpo airports reported GPS failures, as did hundreds of ships and fishing boats in the sea west of Incheon Airport. The source of the EM fields was traced to the North Korean city of Kaesong, about 50 kilometers north of Incheon. South Korean officials indicated that North Korea had imported truck-based jamming systems in 2010 that had the capability to jam GPS signals. These officials speculated that one purpose of the jamming was to interfere with South Korea’s highly digital society. Or perhaps the North Koreans were conducting an experiment, using South Korea as their beta tester.

In decades past, the few key electronic systems that existed worked at higher voltages than today’s machines and at lower frequencies, making them less sensitive to EM disruption. Today, though, any digitally controlled infrastructure presents a target: Power, telecommunications, finance, water, natural gas, and more are all coming under the ever-finer control of computers. Right now the power systems in developed areas of the world are installing smart power meters in homes and businesses, along with communications systems to transmit the data. The new wave of distributed renewable power systems requires additional sensors to determine their operating status, so that the grid can operate efficiently and avoid collapse. The increased need for information and the means to communicate it make all these systems vulnerable to anyone who may wish to create problems—and that means hackers, criminals, vandals, and terrorists.

And, unlike other means of attack, EM weapons can be used without much risk. A terrorist gang can be caught at the gates, and a hacker may raise alarms while attempting to slip through the firewalls, but an EM attacker can try and try again, and no one will notice until computer systems begin to fail (and even then the victims may still not know why).

Governments and professional organizations have been aware of the problem (called intentional electromagnetic interference, or IEMI) at least since the 1990s; in the wake of attacks like the one in South Korea, they began to take it seriously. For instance, in 2012 the European Union began funding three projects to deal with assessing EM attacks and protecting critical infrastructures from them. One project, known as Secret (Security of Railways against Electromagnetic Attacks), is meant to find ways to prevent the jamming of railroad equipment that uses the new GSM-Railway wireless communication standard. It’s not enough to patch holes that bad actors have discovered; we must also try to anticipate attacks that haven’t yet occurred. It may seem strange that we should find ourselves in need of defending against electromagnetic generators, a kind of weapon most people have still never heard of. The reason is obvious: Not only is it getting easier to make these generators, but we are also becoming more dependent on the data networks those generators threaten.

The recipe for frying a network is simple. Begin with a generator, fold in a battery, and garnish with either an antenna to propagate the output or a hardwired connection into the building you have targeted. Even a briefcase-size model could generate EM fields with peaks in the thousands of volts per meter, and those peaks would come fast and short, with a rise time of about 100 picoseconds and a pulse width of about 1 nanosecond. Such a pulse would contain frequencies between 100 megahertz and several gigahertz.

Whether the attacker transmits via an antenna or a hardwired connection depends on circumstances. The radiated field method gives attackers greater flexibility, but the power decreases rapidly the farther they are from the target. A hardwired approach lets attackers put the pulsed power where they want it without as much wastage, but it does require that they get close enough to the target to make the physical connection. Even this needn’t be very hard: Many commercial buildings have vulnerable communications cabinets and external power outlets, as Daniel Månsson, at the KTH Royal Institute of Technology, in Stockholm, has documented.

An attack might be staged as follows. A larger electromagnetic weapon could be hidden in a small van with side panels made of fiberglass, which is transparent to EM radiation. If the van is parked about 5 to 10 meters away from the target, the EM fields propagating to the wall of the building can be very high. If, as is usually the case, the walls are mere masonry, without metal shielding, the fields will attenuate only slightly. You can tell just how well shielded a building is by a simple test: If your cellphone works well when you’re inside, then you are probably wide open to attack.

When the pulsed fields enter the building, they induce a current in the internal wiring that flows into the electronics, either damaging the equipment or just producing a disruption, which in turn might require a manual restart or corrupt some data.

The fields are of two kinds: narrowband and wideband. A narrowband waveform is essentially a single frequency of power, delivered over a period of anywhere from 100 ns to several microseconds. Narrowband attacks are usually of very high power, on the order of thousands of volts per meter. Achieving such strong fields is fairly easy because the electrical energy is concentrated in a narrow band. The frequency can be optimized for one purpose and then modulated for another. For instance, the attackers might beam in a gigahertz wave—perfect for penetrating small apertures in equipment cases—and then modulate it to produce a lower-frequency signal (just as AM radio is modulated to encode music). That lower-frequency signal, in turn, is intended to pour energy into the electronics inside the case. But the attack will succeed only if the frequency matches the resonance pattern in the equipment. If no resonance occurs, or if the resonance is confined to just a portion of the equipment, then the effect will be much less serious, or nonexistent. To increase the odds that such “coupling” occurs, the attacker can continue to shift the signal to other frequencies.

Wideband (sometimes called ultrawideband) packs a different punch. Here, the power of each pulse is spread over a range of frequencies, for example, from 100 MHz to 1 gigahertz. If the range is wide enough—that is, if the ratio of the highest to the lowest frequencies in a single pulse is 10 or more—it’s considered hyperband. There’s less power at any one frequency, and that means less damage will be inflicted per pulse than in a narrowband attack. But wideband pulse generators can easily produce 1,000 pulses per second for many minutes at a time, and that greatly increases the chance of damaging a system, or at least interfering with communications through a straightforward denial of service. Yury Parfenov, of the Russian Academy of Sciences, Joint Institute for High Temperatures, has demonstrated how a high repetition rate can reduce wired Ethernet communications to nearly zero.

And because each pulse requires minimal energy to generate, the energy supply for such a weapon is modest compared to what a narrowband weapon requires. In our laboratory at Metatech Corp., an EM consultancy in Goleta, Calif., we have built a power supply from an automobile battery and an inverter, and it can operate our wideband pulser for days without losing its charge.

Over the past 15 years, our laboratory and others in Germany, Norway, Russia, Sweden, and the United Kingdom have conducted hundreds of experiments studying how commercial equipment holds up to both narrowband and wideband attacks. The emphasis has been on personal computers, alone and in networks, but more recent testing has included cash machines, industrial control equipment, substation electronics, power supplies, Ethernet components, Wi-Fi networks, automobiles, GPS electronics, cellular phones, tablets, and various sensors.

Computers and other systems based on microprocessors turn out to be vulnerable to radiated narrowband fields above 30 volts per meter, although newer high-speed PCs appear to be resistant up to about 300 V/m at some frequencies. That’s largely because U.S. and European rules now limit the amount of EM radiation that such machines can emit to the 1- to 10-GHz range, and those rules have had the effect of increasing the machines’ shielding. What’s more, as the frequency rises from 1 to 10 GHz, computers become less vulnerable to narrowband attack, according to experiments by Richard Hoad at QinetiQ Group, a defense technology company in England. That’s good news, but remember, not all industrial computers use high-speed processors. Slower microprocessors (present in programmable logic controllers, for example) don’t emit in the gigahertz range, and so they are not well protected against EM attacks in that same frequency range.

In other experiments, Hoad has determined that the presence of metal connecting cables typically increases the vulnerability of the computer equipment. Attacking and damaging small handheld equipment that has no connected cables, by contrast, requires very high fields, usually with peaks greater than 5 kilovolts per meter.

Cables also weaken the defenses of industrial and power-system controls, as shown by Edward Savage, my colleague at Metatech. He simulated attacks, then found that a disproportionate number of equipment failures had originated in cable interface cards. This work suggests that for hooking together the nodes of a network, fiber-optic cable (without metal components) is definitely preferable to copper cable.

Other researchers around the world have determined which kinds of wideband pulses are most dangerous to which kinds of equipment. For instance, a peak electric field of about 2 kV/m for pulse widths on the order of 200 ps can disrupt microprocessor-based systems enough to force administrators to push the reset button (although resets do not always work and sometimes the operating system must be reloaded). Peaks at around 5 kV/m will fry the chips beyond redemption.

In these experiments, the field strengths were determined by placing the targeted equipment within the line of sight of a radiating antenna. Of course, if the way is blocked by windowless walls, particularly walls that contain metals, the fields will be attenuated and any damage or disruption will be diminished, if not prevented.

Our electronics are vulnerable for a simple reason: They were designed to handle naturally occurring electromagnetic radiation, but not the malicious sort. By design, they resist narrowband electric fields below 10 V/m for frequencies above 80 MHz; if they didn’t, they’d suffer interference from any passing mobile phone or walkie-talkie, and you’d have trouble operating your PC whenever you received a phone call on your handset. Today’s electronic products can also withstand a certain level of electrostatic discharge; otherwise, the gentlest spark from a finger on a dry winter’s day would be enough to scramble a computer’s brains. Electrical and communication cables also have a certain amount of built-in electromagnetic immunity.

The typical specification (such as the standard IEC 61000-6-1) requires that your home computer, for instance, must survive a 1-kV pulse in the cable—a pulse that can itself be induced by a transient EM field of 1 kV/m. Greater protection is typically required in special cases, such as in a power-generating facility or substation. The usual test for electromagnetic immunity involves waveforms with rise times as fast as 5 ns and pulse widths as long as 700 ms—far less threatening than the faster pulse rates that attackers are capable of sending.

Take the Jolt simulator, an experimental wideband generator developed by the U.S. Air Force (and described in the Proceedings of the IEEE in July 2004). It produced an electric field of 50 kV/m from 100 meters away, inducing voltages of 50 kV on short cables. That’s more than 10 times what it takes to wreck most unprotected electronics!

Obviously, the mandated immunity levels of commercial electronics are too low to protect against EM weapons. We must take steps to harden them, especially the electronics that control our critical infrastructures.

The first line of defense should be putting as much distance as possible between you and the attacker. For instance, you could surround a building with a broad green meadow protected by fences, thus taking advantage of the falloff in an antenna’s electric field strength with distance. That’s not always possible, of course, so at the very least, you should locate critical equipment away from the building’s outermost walls.

The second line of defense involves the building in which the sensitive electronics are housed. No cable should enter the building without first passing through a specially designed surge arrester and a filter protection device coupled to a low-inductance grounding system. The surge arrester will “clip” a high-voltage pulse, but it will also generate some additional high-frequency noise, which the filter protection device will remove. The third line of defense lies in the walls themselves. Ideally, they should contain no windows, which are rather transparent to high-frequency EM fields; if there must be windows, cover them with metal screens. You should harden the walls with metal, such as concrete reinforced with rebar or even metallic wallboard. Best of all is a complete metal shield.

If you can’t seal the entire building, you might instead consolidate critical equipment into a room with a solid metallic wall or a specially designed metal screen. Call this the fourth line of defense. Hospitals already use such “screens” to shield powerful MRI machines; here the purpose is not to keep electromagnetic radiation out but to keep it in (so that it doesn’t damage computer systems in other rooms).

Finally, you can try to limit the damage should an attack occur. To reduce the coupling of the fields to the cables and equipment, for instance, you can lay the cables along metallic surfaces, cover the cables and connectors with shielding, and install surge protectors at the connection of the cables to each piece of electronic equipment. Even better: Connect these nodes with optical cable rather than metallic wire.

Another obvious way to limit the damage once an EM attack is under way is to shut things down fast. To do that, you need an EM detector to sound the alarm. That’s more difficult than it may seem because it requires a detector that can handle all possible attacks, from narrowband to hyperband. Researchers at QinetiQ have built and tested prototype detectors that are good up to 8 GHz, but it will be some time before these products reach the market. Still, even an imperfect alarm would be welcome. Even if it can’t mitigate an attack, the information it records could later help forensic analysts to reconstruct the course of events.

Research on cost-effective defenses against EM attack goes on, notably through the International Electrotechnical Commission, in Geneva, the IEEE’s Electromagnetic Compatibility Society, and Cigré, in Paris, which studies the reliability of high-voltage power grids. Meanwhile, the operators of threatened facilities must make the best use of the methods that are now available. It’s the job of the engineering community to bring those methods to light.

Email this page to a friend.

"A country is known by the moral values, My children. In the history of your world, if you consult and look, My children, you will find that your country and many in your world are now proceeding along the same course taken before the fall of an empire!" - Our Lady of the Roses, February 10, 1976  

We urgently need your prayers and financial support to be able to continue to create these web pages.  Click here... Thank you in advance.

We strongly encourage you to print and/or email copies of this web page to all the bishops and clergy.  Also, email or mail a copy of this web page to the news media and as many other people as possible.     Email a copy of this page to everyone you know.

 When you pray the Holy Rosary, you have Our Lady's hand in your hand.  When you pray the Holy Rosary, you have the power of God in your hands.  Start now!  Let's All Pray the Rosary Together Around the World for Jesus and Mary to protect and guide us in the coming fall of America... Click here...

 The Virgin Mary's Bayside Prophecy Books are Now Available in E-book Version.  Click Here Now!

Directives from Heaven... http://www.tldm.org/directives/directives.htm

D13 - Secret Societies PDF Logo PDF  Order copies...
D19 - Prayers    PDF Logo PDF  Order copies...
D20 - Importance of Prayer (Part 1) 
PDF Logo PDF  Order copies...
D21 - Importance of Prayer (Part 2)  
PDF Logo PDF  Order copies...
D22 - Disciples of Latter Days (Part 1)  
PDF Logo PDF  Order copies...
D23 - Abortion
PDF Logo PDF  Order copies...
D24 - Homosexuality, Part 1    PDF Logo PDF  Order copies...
D103 - Communism  
PDF Logo PDF  Order copies...
D104 - Invasion  
PDF Logo PDF  Order copies...
D122 - Antichrist  PDF Logo PDF  Order copies...
D136 - Visions of the Great War: The Mideast  PDF Logo PDF
D138 - Permissiveness  PDF Logo PDF  Order copies...
D156 - Terrorism PDF Logo PDF
D158 - America the Beautiful PDF Logo PDF
D174 - Homosexuality, Part 2  PDF Logo PDF  Order copies...
D175 - Defilement of the Young  PDF Logo PDF  Order copies...
D176 - Sodom and Gomorrahh  PDF Logo PDF  Order copies...
D224 -
Restore America to One Nation Under God  PDF Logo PDF
D224 - Restore America to One Nation Under God  PDF Logo PDF  Order copies...

EDITOR'S COMMENT:  Evil is accelerating and the Anti-Christ forces are gaining power in the world.  When the persecution starts, all Christian web sites on the internet will be forced to close.  Be sure to have in your possession all the following items: the Bayside Prophecy books, Bayside Medals, Douay-Rheims Bibles, the Protection Packets, Candles, Sacramentals, and Religious Books.  Purchase these items now while they are still available!  You will urgently need them in the days ahead.  Also, you can print out all PDF files for the Directives from Heaven and all of the Bayside Prophecies.  Copy Our Lady's messages and the Directives from Heaven now while they are still available!  Pray to the Holy Spirit for wisdom and guidance on how to prepare now and for the days ahead when the Antichrist is revealed.  Viva Cristo Rey!

Articles...

 Russia's Fantastic Secret Nikola Tesla Super Scalar Weapons...
http://www.tldm.org/news8/sovietelectromagneticattacksonunitedstates.htm

America: Slouching towards Gomorrah
http://www.tldm.org/news5/gomorrah.htm

President Washington: “Religion and morality are indispensable supports” to our country
http://www.tldm.org/news5/Washington.htm

Pope says abortion to lead to downfall of democracies
http://www.tldm.org/news4/abortion.htm

Paul Harvey: "If I were the devil"
http://www.tldm.org/news6/PaulHarvey.htm

God and our American Presidents
http://www.tldm.org/news6/Presidents.htm

President Lincoln's Proclamation for a Day of Prayer and Fasting
http://www.tldm.org/news5/lincoln.htm

Terrorism prophecies in Our Lady's message:

Our Lady of the Roses predicted 9-11, eleven years before to the day
http://www.tldm.org/news3/terrorism1.htm

September 7, 1974 prophecy: "You will find the world engrossed in not only a worldly war of the flesh, but one of the spirit--a war of religion"
http://www.tldm.org/Bayside/Messages/bm740907.htm

There are 4 Things You Must Have to Survive the End Times:

1.) The Douay-Rheims Holy Bible...

"I ask that all who hear My voice will take their Bibles, and if they do not have one, search, but find the right Bible, those printed not after 1965, My children." -  Jesus, October 5, 1985
     "You must all obtain a copy of the Book of life and love, the Bible. Do not accept the new mods. Try to find in your bookstores the old Bibles, My children, for many are being changed to suit the carnal nature of man.  I repeat, sin has become a way of life." - Our Lady, October 6, 1992  
    "I must ask you all to read but a few short chapters a day now, the Book of life and love, your Bible. Knowledge must be gained for all the disciples of My Son, for you will be attacked by scientific minds. But do not be concerned what you will say to them when accosted, for the words will be given to you by the Spirit." - Our Lady, April 10, 1976 
    The Douay-Rheims Bible was published in 1899.  It is the official Bible of the Roman Catholic Church.  Almost all other Bibles have been rewritten by Satan.   See: http://www.tldm.org/directives/d33.htmhttp://www.tldm.org/directives/d415.htm and http://www.tldm.org/directives/d182.htm   If you don't have a Douay-Rheims Bible order it now!  (Order Form)  Yours and your loved ones salvation could depend on it. 
    Read the Bible cover to cover.  If you read 4 chapters a day, you will complete the whole Bible in 334 days.  I have read the Bible 2 times and working on the third time.  A 75 year old Baptism gentleman told me that he and his wife have read the Bible nine times.  Wow!

2.)  The Complete Virgin Mary’s Bayside Prophesies in 6 Paperback Books...

The Virgin Mary brings directions from God, the Father in Heaven on how to survive the end times.  God, the Father, through the Virgin Mary, tells what is coming, how to prepare for it, how to survive it, and how to even stop it.  These six volumes along with the Bible are most important to save yourself and your loved ones.  Order it now.  Tomorrow may be to late.  These 6 pocket size paperback books costs $33.00.   (Order Form)

3.)  Heaven's Home Protection Packet...

Heaven’s Home Protection Packet...
Our Lord stated we must have crucifixes upon the outside of all of our outside doors. In the "Heaven’s Home Protection Packet" there are instructions, four crucifixes, a tube of special cement for wooden or metal crucifixes. Wooden crucifixes adhere better to the doors when the aluminum strap is removed from the back. Put a light coat of cement on the back of the crucifix and then press it to the outside of the door. If you have any problems, you can call us at 616-698-6448 for assistance. This Heaven’s Home Protection Packet is available for a donation of $10.00 plus $4.00 shipping and handling. Send $14.00 to TLD Ministries, P.O. Box 40, Lowell, MI 49331. Item # P15  (Order Form)

Crucifix on front and back door...  The only real protection against terrorists...
Jesus - "Pray and wear your sacramentals. And, also, My children, I ask you again to place a crucifix upon your door. Both front and back doors must have a crucifix. I say this to you because there will be carnage within your areas, and this will pass you by if you keep your crucifix upon your doors." (6-30-84) (Testimonies of lives and homes saved by the crucifixes.)  http://www.tldm.org/news/crucifix.htm    (Order Form)

4.) Heaven's Personal Protection Packet...

Heaven’s Personal Protection Packet . . .
Our Lady tells us to be protected from all evil, we must wear the following sacramentals around our necks: a Rosary, a crucifix, the St. Benedict medal, Our Lady of the Roses medal, the Miraculous Medal, and the scapular. We have all of these sacramentals in a packet we call "Heaven's Personal Protection Packet." This packet is available for a donation of $7.00 plus $3.00 shipping and handling. Send $10.00 to TLD Ministries, P.O. Box 40, Lowell, MI 49331. Item # P5  (Order Form)

    Our Lady of the Roses, Mary Help of Mothers promises to help protect our children. On September 13, 1977, She said, "He has an army of ogres wandering now throughout your country and all of the countries of the world. They are in possession of great power; so wear your sacramentals, and protect your children and your households. Learn the use every day of holy water throughout your household. Insist even with obstructions, insist that your children always wear a sacramental. One day they will understand that they will repel the demons."
    On February 1, 1974, Our Lady said, "My children, know the value of these sacramentals. Guard your children well. You must awaken to the knowledge that you will not be protected without the sacramentals. Guard your children's souls. They must be surrounded with an aura of purity. Remove them if necessary from the sources of contamination, be it your schools or even false pastors."
    This Heaven’s Personal Protection Packet is available for a donation of $7.00 plus $3.00 shipping and handling. Send $10.00 to TLD Ministries, P.O. Box 40, Lowell, MI 49331. You may use your MasterCard, VISA, or American Express and call 1-616-698-6448.  Item # P5
(Order Form)

Incredible Bayside Prophecies on the United States and Canada book . . .
We have researched the Bayside Prophecies on the United States and Canada and put these outstanding prophecies in a 360 page pocket size paperback book.   Veronica said it was very good.  It tells what is going to happen here and how to prepare for it.  Every North American must read this book!  Item #B2 Cost $5.00 (Order Form)

Your names have been written in Heaven… "It is not by accident that you are called by My Mother, for your names have been written in Heaven.... But with this great grace you have great responsibility to send this Message from Heaven throughout the world, for if you are able to recover just one more for Heaven, an additional star shall be placed in your crown." - Jesus, August 5, 1975

A great obligation to go forward... "It is not by accident that you are called by My Mother, for it is by merit and the prayers that have risen to Heaven for your salvation.  For those who have received the grace to hear the Message from Heaven, you have a great obligation to go forward and bring this Message to your brothers and sisters.  Do not expect a rest upon your earth, for you will have eternal rest very soon." - Jesus, June 12, 1976

The sin of omission...  "The sin of omission shall condemn many to hell, be they layman or Hierarchy.  I repeat:  not the sin of commission, but the sin of omission will commit many to hell."  Our Lady of the Roses,  October 6, 1980

My Gift to help spread Our Lady of the Roses' messages to the world.  
Amount: $  

We encourage everyone to print or email copies of this web page to all the Bishops and all the clergy.  Also, email or send this web page to the news media and as many people as possible.

Email this page to a friend.

| Home - Latest News | Introduction | Bayside Prophecies | Directives from Heaven | Order Form | Miracles & Cures | Veronica Lueken | Miraculous Photos | Bible | Radio Program |

The electronic form of this document is copyrighted.    
Quotations are permissible as long as this web site is acknowledged with a hyperlink to:
http://www.tldm.org
Copyright © These Last Days Ministries, Inc. 1996 - 2014   All rights reserved.
P.O. Box 40                   616-698-6448
Lowell, MI 49331-0040
Revised:
July 31, 2018