Many readers here sent versions of the story that China launched the world's first quantum communications satellite, and the timing could not have been more interesting. Indeed, in my opinion, China's launch of this satellite must be viewed within the context of the hacking spree occurring in the USSA, with the recent hacks of the Democratic National Committee, the various groups connected to Darth Soros, and most recently, the NSA. In a (very greatly) oversimplified nutshell, quantum computing would rely on quantum states, rather than binary logic gates(with only two modes of handling information). In other words, at a minimum, rather than two states per node of information handling, there would be seven. Expand this idea to encryption, where entanglement of quantum information is used to transmit information, without the parameters of that entanglement to decrypt messages and communications, communications become virtually impossible to decode.

In a world that has seen how vulnerable the most "secure" servers are, from the DNC to Darth Soros being hacked, and now, even the NSA, such a satellite has huge implications:

China Launches First Quantum Satellite

Hack-proof? China launches world’s 1st quantum communications satellite

China Launches Quantum Satellite for Hack-Proof COmmunications

Now why am I putting this in the context of the hacking stories about which I speculated yesterday?

Well, for one thing, the nature of using quantum entanglement and other quantum information-processing technologies, as (poorly) outlined above, means that such communications are "hack proof". But let's put this in terms of intelligence and espionage, for as noted above, the problem posed by such technologies is that the old fashioned "signals intercept and decryption" techniques of number crunching and so on to crack the codes and communications of the enemy ala Britains' Bletchley park "Ultra" operations in World War Two might fast be approaching its own kind of obsolescence. Without the encryption and decryption keys, cracking such communications becomes a super-computing nightmare. One might, just possibly invent some such technology and technique, but even then, the computing power would be extraordinary, and by the time an unauthorized "decrypt" was achieved, the information may no longer be timely or even possible to act upon.

Now, if one has been in the intelligence or espionage business, or for that matter, in the counter-intelligence business, the implications of this will be immediately evident, for it will mean that, contrary to the prognostications of yesteryear, HUMINT - human intelligence, i.e., actual human spies infiltrating an enemy's intelligence and military to steal secrets, like quantum encryption and decryption keys - will become not less important, but hugely important. In the quantum communications world, they will become the sine qua non of intercept and decryption activity. This means, similarly, that the "intelligence advantage" will accrue to that nation or bloc that has (1) invested in such encryption and communications technologies while (2) not curtailing its HUMINT intelligence and counter-intelligence operatives, but rather, expanding them and targeting key agencies and corporations to access their software and encrypt-decrypt keys. For a nation behind the curve in the development of quantum communications and computing, this will mean infiltrating such corporations and agencies as are likely to develop such technologies, with sleeper agents to be activated when those "behind the curve" nations get quantum computing and satellite communications.  And of course, one can do it another old fashioned way, and put bugs in the hardware itself. And of course, one should not imagine this activity will be restricted simply to countries; corporations will engage in it as well as other private groups dependent on secure communications. This is also to say that private groups and corporations will also seek to pierce the communications veil of competitors and rivals for power; in short, they will become major players in the espionage field.

All of this is to suggest that behind the hacking stories I blogged about yesterday there is a real old fashioned John le Carre-Robert Ludlumesque espionage game being played, for recall that in the considered opinion of some NSA experts, the recent NSA hacks could not have been achieved without HUMINT, i.e., without some human operative on the inside of the NSA physically stealing programs and codes, an operative either deliberately infiltrated into the organization, or someone already in it who was "turned" by the usual processes (blackmail, bribery, threat, etc). This implies in turn that the NSA hacks might indeed have occurred precisely because the NSA has secretly deployed similar satellites of its own, and thought itself "hack proof".

See you on the flip side...

Posted in

Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and "strange stuff". His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into "alternative history and science".


  1. Ethan on August 22, 2016 at 3:14 pm

    An extra tidbit for all of you:

    China to build a radar on the MOON as part of plan to observe the Earth

    “The facility on our natural satellite would be used for research and *defence* monitoring and provide the clearest images yet of Earth.

    The base could even have *living facilities* and a powerful radar antenna that would be at least 50 metres tall.” (Emphasis mine)

    • goshawks on August 22, 2016 at 7:37 pm

      A twist on the above:

      The resolution of a radar goes down with increasing distance from the target, so an Enormous radar grid would be needed to achieve comparable resolution to Earth-orbiting spy/science satellites. Therefore, impractical for the stated purpose…

      However, radar stations on the Moon would be peachy-keen for monitoring ‘traffic’ coming towards the Moon. I would see them as near-indispensable for command-and-control and defense purposes, if a large-scale mining and/or colonization effort were envisioned…

    • Kahlypso on August 23, 2016 at 6:02 am

      I thought that they’d already found a huge radar dish on the moon.. 🙂 Having said that.. going back to the Private firms being allowed mining rights on the moon.. I believe that it stems from this event.

      Looking at what will happen..privately owned profit driven companies being in charge of moon mining operations.. This is dangerous. For the following reasons. (I list just a few. No links this time..)

      Airplanes that crashed due to poor maintenance practises. Imagine when companies are trying to save a penny on multi million dollar spare parts..

      Japan Airlines Flight 123
      Alaska Airlines Flight 261
      American Airlines flight 191
      Nigeria Airways Flight 2120

      TERRESTIAL mining operations :

      Benxihu Colliery Disaster (1942)
      Courrieres Coal Mine Disaster (1906)

      OIL RIG operations.. no we’re getting to places that are difficult to access..

      Piper Alpha Platform
      Alexander L. Kielland
      And of course who can forget..
      Deepwater Horizon – Who let them drill in a place that they couldnt even access in case of a fire??
      Probably the same idiots that are signing off on the moon..

      And these are just accidents due to human error.. What the hell is gonna happen when they blow up on the moon??

  2. Jon on August 22, 2016 at 2:14 pm

    I would venture that to seriously defeat such encryption would entail reaching deeper into the nature of the fabric of spacetime itself, perhaps by decrypting information in Whittaker wave signatures, and backtracking them through time. If one could access certain aspects of the virtual template of the equipment/software which encoded it, one could probably even know who sent the message. It might be possible to do that without disturbing the quantum state, thus possibly not leaving evidence of the decryption.

    Maybe this is another reason why robots are becoming so interesting – perhaps they leave fewer traces in the medium than conscious beings?

  3. Robert Barricklow on August 22, 2016 at 1:01 pm

    A perfect analogy of the forces at crosswords/roads:
    AI/Technit versus Human/Humnit
    Private/Property versus Public/Commons
    Parasites/Mind Control versus Spiritual Beings/Free-Will
    Add to this complexity the fact that perhaps we are not the independent spirits we think we are . Perhaps parasites /technology are woven into our psychology/biology and our culture. They make up the very fabric of our being. Indeed, we are more microbe than human > there is no I – only we.

    That agent might not even know he’s a smart agent
    [a smart-dusted one, that is].

    • Guygrr on August 22, 2016 at 3:25 pm

      Oh trust me there are literal parasites controlling our biology, and they can and do control an individual’s behavior to an astonishing degree.

      • Robert Barricklow on August 22, 2016 at 3:53 pm

        The appropriate metaphor herein are the Russian dolls, all appearing as one within one; an onion, if you will; a Zeno paradox.

        Here I’ll slip-side into my Professor Irwin Corey personae:
        Wherein, the AI/Free-Will/Mind-Control/Parasites/Spiritual Beings/Technologies/et al script their colorful palates upon observer/universe interfaces.

        • Robert Barricklow on August 22, 2016 at 4:19 pm

          Unable to get youtube to take
          just google
          Professor Irwin Corey at the cutting room NYC youtube

  4. Neru on August 22, 2016 at 11:37 am

    China + Russia seem to be recovering fast from the communism nonsence and use that renewed freedom to free themselves from the West Neocon Nazi parasites.

    Every technology is on par or even surpassed the Wests toys. I just hope “morally” growth went together with the material development.

    For the moment Chgina + Russia don’t need to submerge the West in a political system that gives them the trading upper hand. The Western 1% parasites are doing a grand job themselves by making shure the new youth are not even capable of some basic autonomy.

    • Lost on August 23, 2016 at 7:27 am

      China is a communist country.

  5. marcos toledo on August 22, 2016 at 10:44 am

    It is interesting the tidbit Guardian dropped in it’s story. The subspace communication system used in Star Trek is feasible another so called science fiction technology that very real.

  6. Roger on August 22, 2016 at 9:40 am

    Seems to me it would be easier to hack if one was able to produce an outside device in quantum resonance to the communications satellite. All you would need to develop is a quantum tuning device and gain or bribe access to the quantum communications devices to be tuned to.

  7. T.J. on August 22, 2016 at 9:36 am

    A significant purpose of the new Chinese quantum communications satellite will be to run the new BRICS financial system and CIPS.

    • goshawks on August 22, 2016 at 7:26 pm

      You put your finger on something important here. The PTB are going to try to ruin the BRICS financial system in any way possible, including interception and spoofing of data.

      All the BRICS countries are going to have to be using new-from-the-bottom-up hardware, software, and transmitting modules. I imagine that there were some serious think-tank talks about what was required. Then, loads of R&D cash.

      On the transmission side, I think we have just seen the response…

  8. WalkingDead on August 22, 2016 at 8:20 am

    On August 31, an AMD FX processor achieved a Guiness World Record with a frequency of 8.429GHz, a stunning result for a modern, multi-core processor. The record was achieved with several days of preparation and an amazing and inspired run in front of world renowned technology press in Austin, Texas.
    This is what is achievable with a standard processor and liquid helium cooling. Now imagine what is achievable in the black projects world with quantum computing, liquid helium cooling, and other esoteric technologies. If we are hearing about it in the mainstream now, it may as well be considered old technology in the world of intelligence where you have no limits on how much you can spend to achieve the results you’re after. And this is just the hardware side of the equation.

  9. Lost on August 22, 2016 at 7:54 am

    A so called quantum signal can be hacked, it’s more that such hacking would disturb the signal and thereby be obvious.

    Satellite communication? That’s not really how black world com tech works, subspace signalling has been around since at least the early 20th century.

  10. DanaThomas on August 22, 2016 at 7:09 am

    So apart from the return to manual typewriters (remember those?) in Russia and I imagine elsewhere, there might be a revival of “remote viewing”. But maybe that can be hacked too, by deceiving them with a matrix-like cover to confuse their sightings.
    Ah yes, then there is the teleportation mentioned by Kahlypso. Getting persons or things in and out of locked rooms or even a digital “space”. If this can be done on a practical basis, we go back to the old dilemma of the locksmith and the thief. I might be able to use multidimensional techniques to get into the locked room, but this will only be valuable as long as that room is not “shielded”. And this means that my room, too has to be “shielded”. Not to mention the more esoteric techniques of materialisation and dematerialisation, working by mind only without any technological support, as demonstrated time and again in various Asian traditions.

    • DanaThomas on August 22, 2016 at 7:12 am

      PS the “Guardian” article is followed by a few interesting reader comments addressing such matters as what happens to information travelling at over light speed.

  11. Kahlypso on August 22, 2016 at 5:54 am

    Hey Doc. If the chinese are really releasing this info, its in response to this – imhos (in my high octane spectulation)
    That was 2 years ago. If you think that hacking information was easy before, wait until people can steal it with teleportation techniques.

Help the Community Grow

Please understand a donation is a gift and does not confer membership or license to audiobooks. To become a paid member, visit member registration.

Upcoming Events