. NSA TECHNIQUES AND RESOURCESRemote monitoring/tracking of individuals in any location, inside any building, continuously, anywhere in the country.A system for inexpensive implementation of these operations allows for thousands of persons in every community to be spied on constantly by the NSA.Remote RNM DevicesNSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals, and can send messages through the nervous systems to affect their performance. RNM can electronically identify individuals and track them anywhere in the US.This equipment is on a network and is used for domestic intelligence operations, government security and military base security, and in case of bioelectric warfare.Spotters and Walk-Bys in Metropolitan AreasTens of thousands of persons in each area working as spotters and neighbourhood/business place spies (sometimes unwittingly) following and checking on subjects who have been identified for covert control by NSA personnel.Agents working out of offices can be in constant communication with spotters who are keeping track of the NSA’s thousands of subjects in public. NSA agents in remote offices can instantly identify (using~ RNM) any individual spotted in public who is in contact with surveillance subject.Chemicals and Drugs into Residential Buildings with Hidden NSA Installed and Maintained Plastic Plumbing linesThe NSA has kits for running lines into residential tap water and air ducts of subjects for the delivery of drugs (such as sleeping gas or brainwashing-aiding drugs).This is an outgrowth of CIA pharmapsychology (psychopharmacology).Brief Overview of Proprietary US Intelligence/Anti-Terrorist Equipment MentionedFixed network of special EMF equipment that can read EEGs in human brains and identify/track individuals by using digital computers. ESB (Electrical Stimulation to the Brain) via EMF signal from the NSA Signals Intelligence is used to control subjects.EMF equipment that gathers information from PC circuit boards by deciphering RF emissions, thereby gaining wireless modem-style entry into any personal computer in the country. All equipment hidden, all technology secret, all scientific research unreported (as in electronic warfare research).Not known to the public at all, yet complete and thorough implementation of this method of domestic intelligence has been in place since the early 1980s.