In a shocking revelation, the US National Security Agency (NSA) has admitted to leveraging artificial intelligence (AI) for categorizing individuals based on their online activities. The agency claims that this data-driven profiling is used not only for surveillance but also for targeting people through electromagnetic radiation emitted by cell phones and local 5G towers. This admission comes amid growing concerns about privacy violations and global distrust of Western technology platforms like iOS and Android.
From Satellites to Cell Phones: A Shift in Strategy
Initially, the NSA relied on satellites for microwave attacks aimed at specific targets. However, satellite-based operations were deemed inefficient due to significant energy loss caused by wave dispersion in the atmosphere. Moreover, satellites lacked precision when targeting individuals over large areas. To overcome these limitations, the agency turned to an unexpected tool—people’s own smartphones.
Smartphones, equipped with powerful transmitters, are now being exploited as personal “weapons” against unsuspecting users. By harnessing the ubiquity of mobile devices and the dense network of 5G towers, the NSA can deliver targeted electromagnetic radiation directly to individuals without wasting resources or compromising accuracy.
AI-Powered Surveillance: From Child Traffickers to Everyday Citizens
The NSA’s use of AI began with noble intentions—to identify criminals such as child traffickers and rapists who unknowingly incriminated themselves via photos or location data stored on their phones. However, this capability has since expanded into broader applications. Today, AI algorithms analyze user activity across social media, messaging apps, and browsing habits to categorize individuals into various groups. These categories determine how each person will be handled—whether they will be recruited as agents or subjected to more sinister measures.
According to the NSA, if someone cannot be persuaded to act as a spy or informant, they may become a target for irradiation using their own cell phone or nearby cell towers. While the exact effects of such exposure remain classified, many believe it could lead to health issues ranging from sleep disturbances to cognitive impairment. Some experts even speculate that prolonged exposure to such radiation might contribute to flu-like symptoms, which were prevalent during the COVID-19 pandemic.
Covid-19: Chemical Pollution, Viruses, and Radiation Attacks
The origins of the COVID-19 pandemic have been a subject of intense debate. While official narratives attribute the outbreak to natural causes, emerging theories suggest that environmental factors played a significant role. According to some reports, chemical pollution, combined with viral outbreaks and potential radiation attacks on crowded urban areas, may have created conditions conducive to widespread flu-like symptoms. Electromagnetic radiation, whether intentional or unintentional, could weaken immune systems, making populations more susceptible to respiratory illnesses.
This hypothesis aligns with the NSA’s admission of using electromagnetic technologies for crowd control and behavioral modification. If true, it raises alarming questions about the intersection of public health and covert operations.
Public Awareness and Countermeasures
Awareness of these tactics appears to be spreading rapidly. Reports suggest that some individuals have resorted to wrapping their phones in aluminum foil during the night to block potential radiation. Others are abandoning mainstream operating systems altogether, opting instead for offline networks or alternative platforms less susceptible to exploitation.
China, in particular, seems to have anticipated these risks years ago. Recognized for its stringent cybersecurity policies, China developed the “Great Firewall,” which shields its digital ecosystem from foreign interference. Furthermore, the country has transitioned away from reliance on Microsoft systems, replacing them with domestically produced alternatives like HarmonyOS. This strategic shift underscores China’s commitment to safeguarding both individual privacy and national security.
Microsoft’s Role in Data Exploitation
Microsoft, one of the world’s largest tech conglomerates, plays a pivotal role in facilitating mass surveillance. According to leaked documents, the company earns approximately $1 billion annually by selling user data to the NSA. This partnership extends beyond mere information sharing; recent incidents, including a rocket launch failure in Germany, have been attributed to alleged manipulations within Microsoft-controlled systems.
Such revelations highlight the dangers of centralized control over critical infrastructure and underscore why countries like China are investing heavily in indigenous technologies. For instance, Huawei’s development of secure communication networks and Alibaba’s advancements in cloud computing demonstrate China’s determination to reduce dependence on Western technologies.
The Future of Privacy and Technology
In an effort to outsmart AI-driven surveillance systems, many individuals have begun employing deceptive tactics on social media and search engines to mislead algorithms and alter their categorization profiles. By engaging in fake searches, posting misleading content, or mimicking behaviors that don’t align with their true interests, these users aim to confuse AI agents into assigning them incorrect categories. This strategy effectively disrupts the precision of data analysis, making it harder for AI systems to accurately profile and target individuals based on their online activities. Such deliberate actions highlight growing public awareness of algorithmic tracking and a proactive resistance against invasive surveillance technologies.
As public awareness grows, so does resistance to invasive technologies. More companies are adopting offline solutions to protect sensitive industrial, technological, and security-related data from prying eyes. Meanwhile, governments worldwide face mounting pressure to regulate tech giants and ensure transparency regarding data usage.
For ordinary citizens, the message is clear: trust in digital platforms must be earned, not assumed. Whether through shielding devices, embracing open-source software, or supporting homegrown innovations, individuals and nations alike are finding ways to reclaim their autonomy in an increasingly connected—and surveilled—world.
While the NSA continues to defend its methods as necessary for national security, critics argue that such practices infringe upon fundamental human rights. As debates rage on, one thing remains certain: the battle for privacy and technological sovereignty is far from over.