5G AND THE WIRELESS BODY AREA NETWORK
They are turning humans into 5G-6G-7G antennas and servers/routers with each jab. The Agenda 2030 ultimate goal is to be able to track & trace down to the cellular level and transmit data through our DNA in real time.
Sabrina D. Wallace https://t.co/QB6B9aXMMg
Video Transcript AI Summary
The speaker explains the use of biosensors for global information connectivity and emergency broadcasts. They discuss the wireless body area network and how signals are sent to individual nodes, including the body itself. The speaker mentions the use of applied signals technology and the involvement of companies like Raytheon and L3 Harris. They also touch on software-defined networking, virtual machines, and the convergence of interconnect networks. The speaker emphasizes the tracking of the body rather than devices and the importance of health applications like telemedicine. They mention the use of metamaterials, nanotechnology, and graphene-based biosensors. The speaker concludes by discussing the routing protocols and the need for understanding these technologies.
Speaker 0: And so I had to explain that the biosensors that we use for our global information connectivity to reach your body anywhere in the world, whether or not you have a phone on you, whether or not you're at home, obviously, anywhere. The biosensors are inside of you. They're 802.15.4 in computer networking. Your wide body area network is what those frequencies are seeking. The system for the emergency broadcast is tied into the backbone of the United States.
When we send out a signal for our emergency broadcast. And we wanna make sure that it goes out to each individual node. We do not only send the signal to a phone or a computer. Since 2005, we send the signal to your body because your body is 802.15.6, the wireless body area network node. Now people continue to say that this was not to both because folks of that nature, many of them are still unaware of the wireless body area network.
They are also unaware of our the way that our 6 g wireless area or Excuse me. Our 6th generation wireless actually works. Your body is at 802.15.6. That is the international standards for electrical and electronics engineering for how your body will be contacted and what will be sent to your body with digital data on the Internet. These systems that I am explaining to you right now are used for information surveillance and reconnaissance.
The human Body is both electrical and wireless and the human body has been tethered to the cloud for the following reason. We We use something called applied signals technology with those sensors, biosensors, sensors open system architecture. We do this so that we had information surveillance and reconnaissance can utilize high accuracy detection exploitation systems. You would commonly know most of these companies as our military industrial complex electronic war fair folks. Raytheon, L3 Harris.
Their primary purposes are usually in telecommunications, wireless communications as well, satellites. Okay? So when we send out a signal with our emergency broadcast surface. Excuse me. Emergency alert system.
There's actually 2 of them. But for my purposes today, I want you to keep this image in mind for just a few moments. When the system signal is sent out, it has no way of knowing if you're on the go if you're with other people, if you're on the go near a grocery store or a lot of you know, in the city or outside of the city or in your Car. Right? K.
Now here's you out and about with your car. There's your body 802.15.6. Here's what people do not understand. I have both of these technical documents I'm going to explain drawn here on the cart. You can find them right now on the channel and I'll link them with this video.
Your EAS device here is going to potentially connect to a satellite. It has special outputs on the back of it for MPEG encoding that makes what you see on the TV legally appropriate because sometimes we have to to inject a local channel. And sometimes they have or it's hard to explain this. They have to inject information from a local channel, change out volume. There's a microphone for this device in case someone has to actually pick it up and make an emergency broadcast, by voice.
It has several outputs on the back of it that can be multiplexed for digital, but you'll notice that it's still using IP multicast routing. And the back of our lovely emergency alert system is running on what's called Internet Protocol Networks. That's IP networks. Okay? So from this device, it starts talking to the satellites outside the cable TV head end.
This device is sitting at something called a cable head end. Your cable system is gonna broadcast and in the event that you're not at your home. Let's see. Your home is down here and you follow all these little lines to get back to that end. Well, if you're not at home and you're out in your car, The device will send it out through the cell phone networks to look for you because you're a node but on its network.
I'm gonna explain that in a minute. Now anytime that we are sending data to biomarkers currently, wearables or in c 2 in vivo with 802.15.4, which attempt to bootstrap devices that are local to you, like your phone or your iPad. But if those devices are not within range, we're going to be using the 2 radio frequency syncs and what are called mesh relay networks or wireless sensor networks. The wireless sensor networks are 802.15.5. They go up and go down very fast, thus they're called on the fly networks ad hoc.
I'm going to show you the image again of your body with the 2 radio frequency syncs and multiple internal nodes. Your body itself is a different network from these little guys. And the network that I'm referring to right now is a third one that follows you around and it goes up or down to relay from your body just in case you don't have your phone. These industrial systems are built on the industrial Internet of things for use for use of memory as well as redundancy. Now I'm gonna turn the card around.
This is the heavy technical data for those of you that are in the industries. Okay? And then I will finish up for the folks that are not necessarily in the industry. Pardon me. So in our emergency alert system, what has happened as software defined networking.
A lot of people don't seem to be aware of it. It happened back in 2013. And when it did, it changed things like net network function virtualization is the replacement of network appliance hardware with virtual machines. Computer networking changed in 2013 for the first time in a long time. Software defined networking, virtual machines or network function virtualization instead of network hardware purchases that would need to be made.
So with this came the challenge of the remoting of our physical OSI layer and for that we have developed A new system that can switch by converged inter interconnect networks can switch between layer 2, which only has the MAC and no IP address or layer 3 which can then go out to routed protocols. It uses a distributed access architecture for its Converge cable access platform cores and this right here is going to be a component of your CMTS which is this black box running all your cable modems to your house with the drop, and then you have multiple houses that go out with you to an optical node up to the fiber loop back back to the encoder, and then it will send out all these different signals as it's making sure that it can reach the web, radar, satellite, cell phone towers, whenever it needs to. Because your cable TV head end is where your TV broadcast, radio broadcast, all of it comes from. So this is your house and this is the drop from your cable company. And inside, you have your cable modem, your different wireless machines.
Maybe you have LAN. Maybe you have a set top box on your TV, whatever it is. But the emergency alert system is in the head end. And she's using an IP networking way to get to the comm controller. Now the comm controllers are sitting here.
We've gone to our remote physical layer or remote mac ID and physical layer. And then we use the mesh networks to make them talk with something called spine leaf architecture to avoid the problems we've had with spanning tree, pardon me, and redundancy. This allows the comm controllers to use the converged Internet excuse me, the converged interconnect network in the event then it has to change one of these nodes to an edge flare and let it move around more. I am attempting to oversimplify. My point with all of this is telling people that when we send a signal that was designed to reach anyone anywhere at any time And if you put your phone in a Faraday cage, it will not reach you.
It's the same as telling people that we have A network centric warfare system. We have a global information grid system which is industrial, But if you take your wearable off, if you go off grid by taking your wearable off or putting your phone in a Faraday cage, we cannot find you. If that were the case, the last 60 years of electronic warfare would not have been successful. We do not track you by device any longer. Those items can be tracked for other reasons, But at the industrial scale of the wireless body area networks, we are tracking your body, and it is for health applications like telemedicine.
So in closing, the net Centric warfare system for cognitive threat warfare technology allows us to choose your internet service provider, satellite, drones, infrasonic, the MAC IDs on the physical layer or just the MAC ID or your personal area network. Networks break out and are segmented. We do that too. But no matter what, we will find you, and it will be your body because you're the node. You're the node that's attached to that comm controller in the head end.
It's no longer just cable modems. So when the device, and again I recommend to those of you who are having a hard time reading my mapping about this device to check the links that will be in the description. This is your emergency alert system in your cable TV head end and these are the hard metrics that Cisco and Trivedi for the equipment for EAS have listed. And I know From my own personal experience of having to deal with a Cisco 72100, And on this one yeah. She's down here.
Cisco 72100, I had a 29 100 XL and an AS 53 100 router. And that box, When it goes into any of those ports, I have to and had to configure that router specifically to be able to properly send the signal from the emergency alert services because that's what a CMTS is. Well, the 72100. Sorry. The other ones are smaller.
But the bottom line is still the same. You're routing over Internet protocol traffic unless you're only routing at the logic link layer. And even then, you're still using the body area network and the mesh relays to do it. We also route open shortest path first. If your phone is on and we can bootstrap it, great.
But if it's not, we don't need your phone and we're not going to. I also wish to point out at this time that this echoes cybersecurity from 2022 for 6 g personal area networks in which we use the same types of dynamics with the mesh relay and the convergence technology. Let me double check that Phrase again, converged interconnect network because we also have to have the ability to create an ad hoc vehicular network work versus mesh networking only, with machine to machine encryption for our autonomous weapon systems with lethal autonomous drones that will then hunt you by the same wireless body area network in the same way because it's NetCentric warfare. So it had to have a way that no matter where you live, to no matter where you connected, we could still hit you on the physical layer and route details with and for you for your telehealth, for the metaverse, for your smart city, and, of course, for the smart grid applications of your 15 minute city. So thank you for your time out there, and I hope this helps clear up any further metric, discussions about the potential reach of our NetCentric warfare and how we also utilize the new functions of Cisco's Interconnected systems with our spine leaf instead of spanning tree types of routing so that we can make sure no matter where you go, we are able to connect.
And again, Converge cable Access platforms are letting your internet service providers build out their data centers differently and it's called distributed access architecture for converged interconnect networks with Cisco. Network function visualization, software defined networking. The reason that I am very proficient in the software defined networking cybersecurity change is because I attended in 2013 Several workshops on YouTube with MIT professors and professors because it was all brand new back then and then I picked this up. And it's very different because unlike networking in the past when hardware is guaranteed, this is not virtual machines. You Just turn it on, turn it off, make it disappear.
That is your wireless sensor networks and that is the mesh Bluetooth relay that a lot of people have seen pop up and down and they don't understand why they're showing up inside people who have had our graphinated cyber physical industrial backbone upgrade, which is what we're dealing in. At one point, dial up modems were plenty. We had more than enough bandwidth. But then more people started using the internet, and we needed cable modems. We needed faster throughput for video.
We needed faster throughput for emails and for the web in enroll. Now we've made the next step. We have now upgraded to body area networks with synthetic biology. Obviously, changes are gonna have to be made in the network in which software defined networking is available. For this reason, the reason of synthetic biology and synthetic telepathy.
The folks that deployed the cyber Physical backbone in 2017 then forced the COVID injection on everyone which includes something called caffeine. Most people don't understand what graphene even is. They think that it's somehow some big bioweapon. No. Graphene has its uses in something called metamaterials.
And if you're unfamiliar with what metamaterials are, They're a material not made in nature. They are made for the 6th generation wireless. This is your nanotechnology. And the reason that we needed it is because electromagnetic waves for those physical and mac ID Types of adaptive antenna, multi input, multi output, and beam forming have separate degrees of efficiency Seeing random channel behavior because electromagnetic waves undergo multiple uncontrollable alterations as they propagate through the wireless. So The answer to this is our intelligent communication environment, Internet of nano things, front haul backhaul, Internet of space things It's with nanoavionics.com.
Nano satellites. And these metamaterials are working with your mesh relay. There's also the Lego building blocks of nanotechnology. And so that is why I know from my previous job how we route the emergency alert services down to the plug ins that have to be multiplex to the fiber versus going to the other racks and which CMTS it goes to and what kind of security. It was my job.
Not much has changed. It's kind of a boring box in contrast to how many plugs of things are on the back of a lot of those boxes is gonna have to end. So what I would ask from all of you out there who went through all this, you know, fighting back and forth, People lied. A lot of people lied, and it's because, either they're used to it or they sincerely don't know about our new, healthcare biomedical wireless tissue engineering. The graphene based biosensors are for Multiple antennas, nano sized.
You might have heard of them. They're called slaughter bots. That sounds terrifying. I understand that, but that is the technology we have along with many other nanotechnologies. This is a list of the computer networks that we have to hit with that convergence when we're dealing with our broadcast systems because we are going to need more throughput but on our body area networks, which is what they've done.
We now have the ability to fly a drone over your home and perform laparoscopic surgery. You're gonna tell me that's sci fi because 11 years ago, they were already practicing this sitting at their desk and routing through your veins and arteries looking at it right here with special software using EEG, sensors open system architecture. We have specialized routing protocols for these wireless body area networks that have to be followed per Federal Communications Commission standards since 2014 for the medical body area network. The algorithm schemes that match them so that while we're watching you in your home for your health care, your telehealth, and the applications of your medicine, that we can keep an eye on the quality of service of all the signals that we're getting. With that much traffic going back and forth to your cable company already, the emergency alert system would be no issue and I did take the time to chase down the routing protocols, but it would be very boring.
The bottom line is they're selected based this they're selected the same way as the FCC mandated the medical body area network, which makes sense. That way, if you do have a heart attack, you take priority before someone who's just normally being checked for, are you alive or is your respiratory okay? Therefore, it is really important that you help people understand we do use cluster based routing for routing network game theory through the human body. This is the synergy tech metric PDF. I'll link this here as well.
For those of you that are interested, it's all free. You can just download it. And if you have any questions or anything ongoing concerns, please leave them below. And Doc Assurance, placebo, gracias, merci. Thank you all so very much for the opportunity and your time.
This will almost complete my long form as well. For those of you who asked with the ability to issue the new convergence tech with Cisco and understand and explain layer 2 to layer 3. I will now be finishing the quantum technology that we use, which has to do with mapping out the functions of your body at multiple layers of mathematics. This is just one of them for mapping being the planes that they use for segmenting the computer networks for your precision AI health care. Interestingly enough, while doing this research, I found a bit more about how they separate and segment the networks for health care.
I'm going to now pray to close-up this presentation. God bless you those of you who do not pray. I call you a prayerful person and thank you for your time. Please. And thank you all again.
Amen. Soul of the day, by faith alone. Do not be afraid, only believe.