Tag Archives: technology

How Do You Defeat Superior Technology That You Have No Defense Against

Many people may find themselves in during some future war or civil disturbance. That situation is you coming up against superior technology that you have no defense against. So, how do you deal with this threat?

Every weapons system is designed to operate in a certain environment and do a certain task within that environment. Because of that, every weapons system has weak points that it cannot hide from once you change that environment.

In WWII Sherman tanks were outmatched by German Tiger tanks. They were able to overcome this disadvantage by superior numbers and by putting the Tigers in situations that gave the Sherman the advantage. The Shermans were smaller and more maneuverable so they would try to engage tigers in dense areas where they could not maneuver and turn their guns because of obstacles. This allowed the Shermans to get behind the tigers and shoot them in their only weak point, their ass. The Tiger might get three Shermans but there was usually a fourth one that managed to get the Tiger.

When radar began to be used in WWII the RAF soon came up against German flak batteries that had radar. To get past this threat they came up with a simple solution. They deployed strips of aluminum foil, code named windows, that confused the radars and allowed the planes to get through. The Germans soon figured out how to deal with this but for a time it made their systems almost useless.


When you are faced with superior weapons you need to do two things.

Determine what its limitations are.

Determine how to attack it in that weak spot.

Those two things are the basis of counter weapons development for centuries. Not long after we got the tank we then developed anti-tank weapons. It’s the same with any new weapons system. Sometimes you need to develop your own superior technology to use against it and sometimes you need to resort to caveman technology.

Killer robots may come after us one day and be able to outrun us but how well do they rappel down a mountain or swim? They may be impervious to rifle bullets but what happens when they are hit by a 6 lb. steel ball from a cannon? A solid object traveling at high speed can do a lot of damage when it hits something. Just look at the DUC rounds the M1 Abrams fires or when a large meteor hits Earth. How do robots handle the bumper of a large truck traveling at high speeds? I have two words for the backyard inventors out there, rail gun.

New optical systems may be able to scan our retinas a mile away and tell who we are but how well do those optical systems work in fog, smoke or covered with mud or paint?

Those new MRAPs may be hard but how well do they operate in woods that have no roads? How well can they drive when all of the windows are covered with paint or other materials that blind them? How fast can they go when they are laying on their side or sitting in three feet of mud? The people in that vehicle must get in at some point and get out at some time. That is a weak point. That vehicle must be refueled at some time. That is a weak point. Are you getting the picture?

How well does any weapons system work when it is hosed down with fuel and ignited? How well does it work without fuel? How well does it work without ammo? How well does it work without repair parts or human operators? How well does it work when it cannot “see”? How well can it operate when it has no traction? How well can it operate in bad weather? What does it take to disable its electronics? What does it take to put a hole in it? What happens to an attack helicopter when a steel cable is suddenly propelled up into its rotors? How well can the operators function when they have no air to breathe?

Every system has a certain environment it works well in. Your job is to get it into a situation that is outside of its operating box so you have the advantage. That is the advantage that humans have over technology. We have the ability to adapt to new situations and learn new tricks. Most weapons systems cannot do that. Even if they can adapt they do not have our imagination. How many weapons systems would think of giving a group of enemy fighters diarrhea to reduce their combat effectiveness?

Our ability to think outside of the box is our greatest advantage. That is what we need to depend on in the days to come. Having weapon systems to fight back with will be important but the most destructive thing we have is our mind. Remember, it was a human that made that new weapon and it will be a human that designs the countermeasure to it.


North Korea ‘Has the Missile Technology to Destroy US Carriers Near Its Shores’

Intercontinental ballistic missile (ICBM) Hwasong-14 is pictured during its second test-fire in this undated picture provided by KCNA in Pyongyang on July 29, 2017.

North Korea’s Foreign Ministry says Pyongyang’s nuclear capabilities have come close to reaching a state of equilibrium with the United States. Speaking to Sputnik, Russian observers said that although that may be somewhat of an overstatement, Pyongyang is right to claim that it has the ability to “strike at the United States.”

Speaking at a conference on nuclear non-proliferation in Moscow on Friday, Choe Son-hui, director of the North Korean Foreign Ministry’s North American Department, said that North Korea was coming close to matching the US nuclear potential.

“Our ultimate goal is to achieve a balance with the United States, so they do not dare talk about any military actions against the DPRK,” the diplomat noted. Choe added that nuclear weapons capability is a matter of “life and death” for Pyongyang, and that the country has no plans to negotiate with Washington on its nuclear status.

North Korean leader Kim Jong Un waves during a military parade on Saturday, April 15, 2017, in Pyongyang, North Korea to celebrate the 105th birth anniversary of Kim Il Sung, the country's late founder and grandfather of current ruler Kim Jong Un.

“The current situation strengthens us in our understanding that we need nuclear weapons in order to repel a possible attack,” she stressed, adding that North Korea lives under the “constant nuclear threat from the US.” At the same time, the US is the only country being actively targeted by North Korea’s nuclear capabilities, the diplomat said.Commenting on Cho’s remarks, Evgeny Kim, a senior researcher at the Russian Academy of Sciences’ Center for Korean Studies, told Sputnik that while Pyongyang may be exaggerating with its claim that it is close to reaching parity with US military strength, it can deal the superpower serious damage in the event of war.

“Of course, there is some exaggeration here, because North Korea cannot achieve parity with the US in nuclear-armed missile technology, not now or in the next decade,” Kim said. “First, they do not have the kind of delivery means that the US does…Second, they do not have as many nuclear warheads as the US. North Korea has tested nuclear warheads, but isn’t mass producing them. They will probably be able to start mass production sometime in the next two or three years.”


“But they are correct in the sense that they have capabilities that could cause some damage to US military power,” Kim added. “For example, the USS Ronald Reagan-led carrier group is located in the Sea of Japan. North Korea could, using all the capabilities of its missile technology, destroy this carrier. In this sense, Pyongyang is right to say that they are capable of inflicting a blow against the United States.”

The Navy's forward-deployed aircraft carrier USS Ronald Reagan and the forward-deployed Arleigh Burke-class destroyer USS Stethem steam alongside ships from the Republic of Korea Navy in the waters east of the Korean Peninsula on October 18, 2017
The Navy’s forward-deployed aircraft carrier USS Ronald Reagan and the forward-deployed Arleigh Burke-class destroyer USS Stethem steam alongside ships from the Republic of Korea Navy in the waters east of the Korean Peninsula on October 18, 2017

The confrontation between Pyongyang and Washington intensified again this week amid joint US-South Korean drills east of the Korean peninsula. Forty US and South Korean warships, including the USS Ronald Reagan super carrier, along with US Air Force B1-B strategic bombers, were deployed across an area stretching from the Yellow Sea to the Sea of Japan.

North Korean leader Kim Jong Un guides the launch of a Hwasong-12 missile in this undated photo released by North Korea's Korean Central News Agency (KCNA) on September 16, 2017

This week, CIA Director Mike Pompeo ‘joked’ about North Korean leader Kim Jong-un’s possible death or disappearance, and added that Washington must be prepared for the possibility that North Korea is just some “months” away from achieving the technical capabilities to launch a nuclear attack against US territory.

“We all want to resolve this,” the CIA chief said, but added that Washington was prepared to use force, if necessary, to ensure that Pyongyang “doesn’t have the capacity to hold America at risk.”

North Korean leader Kim Jong Un (not pictured) guides the launch of a Hwasong-12 missile in this undated photo released by North Korea's Korean Central News Agency (KCNA) on September 16, 2017
North Korean leader Kim Jong Un (not pictured) guides the launch of a Hwasong-12 missile in this undated photo released by North Korea’s Korean Central News Agency (KCNA) on September 16, 2017

Asked to comment on what Pompeo’s cryptic comments may mean, and whether Moscow and Beijing should see them as an indication of an imminent US attack against Pyongyang, political analyst and Asia-Pacific expert Vladimir Terekhov said that the US rhetoric is part of Washington’s strategy to apply pressure against China.

“I don’t think anything serious will happen before President Trump’s November 8 visit to Beijing,” the observer said. “But the way, [Pompeo’s] statement itself is a kind of preparation for this visit as an element of pressure against China. Since it’s clear that the main goal of all this American rhetoric, and their actions in the Korean peninsula are directed not against North Korea itself, but against Washington’s main geopolitical adversary – China.”

Terekhov warned however that it is impossible to exclude more a pessimistic scenario, in which the United States might seek to resort to the use of force against Pyongyang. “It’s entirely possible in a situation where things worsen and no progress is made, from the American point of view, in solving the Korean issue, they will resort to the force of arms. Nothing can be excluded,” he stressed.Russia and China have recommended that Pyongyang declare a moratorium on new nuclear tests and missile launches, and that Seoul and Washington should refrain from any more drills in the region. Both sides have so far ignored the recommendations and continued to exchange hostile rhetoric.

At his Valdai speech earlier this week, Russian President Vladimir Putin warned the international community against driving Pyongyang into a corner, emphasizing that North Korea is a sovereign state and that “any contradictions must be resolved in a civilized manner.”


EXTREME TECHNOLOGY Russian Military Pantsir-S1 Air Defense System downs all flying objects

A great extreme technology video of the Russian Military Pantsir-S1 air defense system. SUPPORT SOUTH FRONT: PayPal: southfront@list.ru, http://southfront.org/donate/ or via: https://www.patreon.com/southfront Pantsir-S1 (Russian: Панцирь-С1, NATO reporting name SA-22 Greyhound) is a combined short to medium range surface-to-air missile and anti-aircraft artillery weapon system produced by KBP of Tula, Russia.

The system is a further development of 2K22 Tunguska (NATO reporting name: SA-19/SA-N-11) and represents the latest air defence technology by using phased array radars for both target acquisition and tracking. The Pantsir-S1 was designed to provide point air defence of military/industrial/administrative installations against aircraft, helicopters, precision munitions, cruise missiles and UAVs and to provide additional protection to air defence units from enemy air attacks employing precision munitions especially at the low to extremely low ranges.

The first finished version was completed in 1995 with the 1L36 radar, later was designed another.[6] It is a short to medium range ground based air defence system, wheeled, tracked or stationary with two to three operators. Its air defense consists of automatic anti-aircraft guns and surface-to-air missiles with radar or optical target-tracking and radio-command guidance.

Its purpose is the protection of civil and military point and area targets, for motorised or mechanised troops up to regimental size or as defensive asset of higher ranking air defence systems like S-300/S-400. The system has capability for anti-munitions missions. It can hit targets on the waterline/above-water.[7] It can operate in a fully automatic mode.[8] It has the ability to work in a completely passive mode.

The probability of hitting a target for 1 rocket is not less than 0.7 with a reaction time of 4–6 seconds.It can fire missiles and gun armament while in motion.[9] For its main radar station, early detection in height may be between 0-60° or 26-82° depending on the mode.[10] The system has claimed significant advantages over other systems, such as Crotale NG (France), Roland-3 (France + USA), Rapier 2000 (UK), SeaRAM (Germany + USA).


This is not confirmed by comparative testing, but clearly follows from declared limit of possibilities of systems  Since 2013, there is a variant with two radar stations for early detection * standing back to back *.[13] The system has a modular structure which enables a fast and easy replacement of any part. [14] After receiving target coordinates (from any source) it may defeat the target (using all the radar except the early detection radar) within a range from -5 to +85 (82[15]) degrees (vertical).[16] The interval between missile launches is 1-1.5 seconds (a world record for analogue systems) Armament[edit] Missile[edit] 57E6

Type Surface-to-air missile Place of origin Russia Service history In service 2012–present Used by See list of operators Production history Designer KBP Instrument Design Bureau Designed 1994 Produced 2008 Variants 57E6, 57E6-E,[35] 57E6Y[36] Specifications (57E6-E[35]) Weight 90 kg (200 lb) and 74 kg (163 lb) without container packing and storage of missiles[37] Length 3.2 m Diameter 0.17 m Warhead frag-HE and multiple continuous rod

Warhead weight 20 kg Detonation mechanism Contact and proximity Propellant Solid-fuel rocket Operational range 20 kilometres (12 mi) Flight altitude 15 kilometres (49,000 ft) Boost time 2 seconds Speed Start 1,300 m/s (Mach 3.8), 780 m/s (Mach 2.3) to 18 km (11 mi) distance[38] Pantsir-S1 carries up to twelve export designated 57E6 or 57E6-E two-stage solid fuel radio-command-guided surface-to-air missiles in sealed ready-to-launch containers.

Missiles are arranged into two six-tube groups on the turret. The missile has a bicalibre body in tandem configuration. The first stage is a booster, providing rapid acceleration within the first 2 seconds of flight, after which it is separated from the sustainer-stage.

The sustainer is the highly agile part of the missile and contains the high explosive multiple continuous rod and fragmentation warhead, contact and proximity fuses as also radio transponder and laser responder to be localised for guidance.

The missile is not fitted with seeker to keep target engagement costs low. Instead high-precision target and missile tracking is provided via the system’s multiband sensor system and guidance data is submitted via radio link for up to four missiles in flight.

Missiles can be fired at up to four targets, but more often in salvos of two missiles at one target. They are believed to have a hit probability of 70–95% and have a 15-year storage lifetime in its sealed containers. Pantsir-S1 combat vehicles can fire missiles on the move. Warhead weight 20 kg (44 lb)(5.5 kg (12 lb) explosive + 2,000 14.5 g fragments and rods).


Total Individual Control Technology: Insider Exposes How You & Your DNA are Being Targeted

Total Individual Control Technology is a nefarious type of EM (Electromagnetic) and V2K (Voice to Skull) weaponized technology that is being experimented with and deployed against segments of the American population. Those attacked by this electronic stalking are known as TIs(Targeted Individuals). Recently another brave whistleblower has stepped forward to expose it. Bryan Kofron (who formerly used the alias of Justin Carter) is a security industry specialist who used to work for a private security company SIS (Security Industry Specialists) in Seattle, Washington. He quit in disgust after realizing that his former firm, and others just like it, were actively using this so-called total individual control technology to target people, then ultimately control and destroy their lives. Since he quit, he has himself become a victim of the technology via gangstalking.

What Total Individual Control Technology is Capable Of

According to Kofron, this technology is so advanced that it can be used to read your mind, program your mind with thoughts (that you would believe are your own) and induce emotional states in you (including pain, hate, and fear). It can be used to tap into your optical nerve and auditory systems to see and hear what you are seeing and hearing. It can target particular people by engaging in individual-specific attacks (based on the target’s DNA resonance). Finally, it is being used in vast social engineering programs as a way to experiment upon poor, homeless and weak people who have little or no chance of fighting back.

In interviews or presentations such as the below videos, Kofron explains that this technology is being used by psychopaths who have little scruples about the harm they are causing. They are targeting specific groups of people: those who are cognitively inclined, highly intelligent, knowledgeable about advanced technology or interested in alternative research (i.e. conspiracy research). In general, they are either targeting empowered individuals with free minds (to stop dissidents and revolutionaries) or those too poor and weak to fight back.

Using Kofron’s own words, here are some of the things Total Individual Control Technology is able to do:

“This technology manipulates the electrical signals in the brain, thus controlling thoughts and feelings and emotions and sensations throughout the body. It works by rewiring the brain by creating new neural pathways and destroying existing neural pathways, thus this literally changes the way a person thinks and thus behaves.”


“This technology can also be used to control the muscle movement of the target. It can take over one’s hands or feet while driving and make you press on the accelerator or press on the brake or turn. This can be used to cause accidents it can also be used to prevent accidents from happening.”

“This technology can also tap into the optical nerve of the target, and the auditory system of the target, so that those monitoring the target can see what the target is seeing and hear what target is hearing. This information is then downloaded and stored on a computer, in a highly secure classified site on servers that are guarded by some of the tightest security in the world. This results in the individual’s entire day, everything they see, everything they hear, everything they experiment, everything they experience, and everything they feel being recorded till the end of time.”

“This technology can also be used to manipulate the emotions of the target. It can induce fear, love, hate.”

“This technology can be used to beam images and even motion pictures into one’s brain. Images and motion pictures that are so realistic that you think you are actually watching a movie or seeing something in reality. It’s like a virtual reality 3D rendering that takes place within the target’s mind. The images and motion pictures manifest themselves in such a way that the target if they are not aware that this technology is being used on them will believe that they are natural thoughts and natural images.”

“This technology can also be used to induce and control dreams. It can be used to control dream cycles and sleep patterns. To cause one to sleep very deeply or to cause one to not sleep at all. REM cycles, alpha beta and delta brainwaves can be induced immediately by this technology. And this technology can also be used to mimic spiritual experiences. Joy, love, peace that passes understanding can all be induced artificially by this technology to make the target believe that they are having a genuine spiritual experience when they’re not.”

“This technology can also be used to sexually manipulate the target. Make them feel sexual arousal or turn off their sexuality altogether, it can stimulate them and it can shut them down at a moments notice. It can also be used to manipulate the hormones of the target, thus lowering and raising estrogen and testosterone levels in women and men respectively.”

“This technology can also be used to read the thoughts of the target in real time … they can read your thoughts verbatim as they occur within your own mind.”

“Anywhere from small groups of people 10-20 to 100, to medium size groups of people several thousand to tens of thousands. This is done by creating a field effect, where an entire field of electromagnetic energy is created in a geographical location and any human being within that geographical location within that electromagnetic field affecting that geographical location will be effected by the technology. This can be used to induce a general mood in a population or a crowd of people. It can be used to make them passive, it can be used to make them agitated. And this can be used to cause or stop, induce riots. Stop crime, start crime. Stop thoughts, start thoughts. Massive mind control on a citywide level.”

The nationwide then worldwide DNA database … coming to a town near you.

 

Total Individual Control Technology Attacks Specific Individuals Based on DNA Resonance

As I have discussed in previous articles on mind control such as “They” Can’t Read Your Thoughts … Right? the state of current mind control technology is beyond most people’s comprehension and the idea of what is possible. Yet, we have had enough out-of-the-closet whistleblowers and leaked or declassified documents to give us a clear idea of the scary extent to which we can be psychically attacked. Whistleblowers such as Dr. Robert Duncan have lectured at length about the capabilities of V2K technology, which is defined as an EM frequency technology that utilizes RF (Radio Frequency) signals to induce sound within the cranial cavity of the target. V2K literally pipes thoughts directly into people’s heads without them knowing it.

Kofron bases his information on his own experience as an insider in this field, and also as a recent victim of V2K himself. He was attacked once he went public. He claims he has been assaulted with a beta version which is especially nasty, piping thoughts into his head such as:

“Everyone’s against you”

“Please be quiet or we’re going to kill you”

“Don’t work again or we’re going to kill you” 

“You’re the lab rat now motherfucker”

Kofron claims the Total Individual Control Technology attacks are attempting to turn him against his former work colleagues, friends and family. However, since he was trained in this area, he knows that the voices are technological and can defend himself against the manipulations once he hears them.

Kofron echoes exactly what Duncan has warned about: individual-specific attacks. Duncan states that every person has a “unique resonance signature”, and in almost exactly the same words, Kofron states that:

“… the DNA of the individual is used to determine the resonant frequency of the DNA itself, the resonant frequency is then used to fine tune the technology … to tune it perfectly to the resonant frequency of the targeted individual’s DNA.”

The Drive to Create a Worldwide DNA Database

This leads into another aspect of the NWO agenda: the drive to create a worldwide DNA database. When seen in the light of Total Individual Control Technology, the acquisition of an entire population’s DNA takes on a very sinister meaning. It is no coincidence that Amazon and Google (who are ultimately controlled by the same force as David Icke suggests) are racing each other, along with Microsoft, IBM and other companies, to assemble a DNA database as quickly as they can. Those in power who gain access a completed worldwide DNA database and total individual control technology would have a horrifying weapon at their disposal to target literally anyone they wanted.

Kofron exposes how prospective employees are tricked out of their DNA. They apply for a job at SIS, get told they have to do a drug test, and when the urine sample is sent to a lab, part is siphoned off as DNA to go into Amazon’s burgeoning DNA database.

Americans, in the millions, are having their DNA stolen from them, without their knowledge or consent, so they become unwitting targets of this insidious program!

Social Engineering with Total Individual Control Technology

Kofron talks at length about how this technology is fully operational and is already being tested upon those in society who are struggling (such as those who are homeless, poor and who don’t have much family or many friends) since they make the easiest targets. On his website GangstalkerWars.com, he exposes the details of ongoing operations within Seattle (where he used to work for SIS). This social engineering is being done by the Federal Government, the Military Intelligence agencies, private security firms (more on this below), some of the largest US corporations (after all, we live in a corporatocracy), local and state police, and social programs within inner-city America.

In one such operation, the perpetrators would target certain geographical blocks of the city, and, for instance, cause everyone in that area to be in a bad mood. In another operation, SIS (employed by Amazon whose headquarters are in Seattle) would test upon Amazon employees. In another operation, SIS would experiment upon its own low-level employees. In another operation, homeless people were brought in from all over the nation to special buildings that were then targeted. This is true gangstalking – the ganging up by sociopaths and psychopaths upon the innocent to electronically harass and stalk them.

The Rising Danger of the Private Security Firm Industry in America

Kofron warns about an alarming trend in American society: the rise of private security companies who mostly employ ex-military and ex-intelligence agents. As I stated in my previous articles, the US Military Intelligence Complex is completely and utterly out of control. It runs the government and pulls the strings attached to all the puppet politicians, who don’t have the necessary “clearance” to access the truly top secret information. These security firms, like the MIC itself, appear to operate above and outside the law.

The culture inside of these companies is toxic. People rising up the ranks are conditioned to use this technology against innocent victims and are told they will be rewarded with everything (money, power, women, sex, connection, access, status, belonging to the power club) if they go along with the program and become perpetrators. If they have a strong conscience and refuse, they will be sacked, shunned, cut off, threatened and even made into TIs themselves.

The Human Rights Loophole: False Diagnoses

Another aspect of Total Individual Control Technology which the perpetrators use to shield themselves is the cruel use of false psychiatric diagnoses. Here’s how it works: they manipulate TI victims to see a psychiatrist, and then they bribe the psychiatrist to deliver a fake diagnosis that the victim is mentally unstable, deranged, delusional, crazy, incompetent, paranoid, schizophrenic, suffering from Multiple Personality Disorder – or they invent some similar legal-medical-psychobabble diagnosis. This has the unfortunate effect of stripping away the victim’s natural or human rights, which leaves him or her with no recourse to fight back against his attackers since his claims and testimonies will be dismissed as the ravings of a madman. This is a similar tactic to what is used with other victims of mind control.

The Infrastructure Underlying Total Individual Control Technology

The infrastructure that is enabling the total individual control technology is composed mostly of antennae, radar, and cell phone towers. Often, the antennae are camouflaged (hidden behind walls). Some or most of the radar used is from military bases. Kofron was not able to explain much of how the technology actually works, although an electrical engineer who called in on one of the radio interviews suggested that the perpetrators are setting up a standing wave of DNA, then doing slight variations in the phasing using pulse code modulation.

Final Thoughts: Total Individual Control Technology Perpetrated by the Cult of Power

In concluding, it’s important to realize how such cruel surveillance is being perpetuated. As Kofron explains, it’s all about creating an “in” club of perpetrators who get rewarded with money, sex, power and the intrinsic human need for belonging, get told they are on the “right” side and the TIs are on the “wrong” side – and get threatened that if they speak up or quit, they may end up on that wrong side. It’s the cult of power.

Hopefully, this testimony can serve as a wakeup call for those on the fence who can’t quite bring themselves to believe or act. In many ways, time is running out and the net is being drawn tighter and tighter. The more technology advances, the more weapons the cult of power will have to enslave those who stand for truth and freedom. At a certain point, there will literally be nowhere to run or hide. The only option is to face it now before it’s too late.


In Search Of: Ancient Rock Cutting Technology – Machines?

In this video, I am gonna show you the real technology behind India’s ancient rock cutting techniques. By the end of this video, I hope you will agree with me that these brilliant temples were not created with primitive tools. Archeologists insist that these massive rocks were cut with no more than chisels and hammers. First, Let’s take a look at their theory of how ancient builders cut huge rocks. After a rock is chosen, they would carve a series of holes that is about 1 inch wide and 2 inches deep.

Then, they would place wooden wedges and hammer them all in. After this, they would pour hot water on the wedge and the wedge would expand inside the rock. If they keep pouring hot water on these wedges every day, the rock would eventually split into half. Now this, not only works for small rocks, but will also split huge rocks like the one I am standing next to. This rock is 25 feet wide and 15 tall, but if you look closely, you can see a series of chisel marks on top. And you can see how even a huge boulder like this can be cut using simple things like wedges and hot water. This is pretty convincing evidence, so why am I roaming all over ancient Indian sites? Because, to cut a rock using this technique would take months!

The ancient builders have to keep pouring water for many months to get this rock to split into two halves. However, we have documented evidence that many of the temples were built in a few years! If it takes several months to split one rock into two halves, how were these brilliant temples, made of thousands of huge rocks, built in just a few years? The numbers simply don’t add up. There must have been some other technology to cut these huge rocks out of these hills and mountains. I got the first glimpse of a totally different technique of rock cutting in the hills of Hampi, in South India.

There is a drill mark which is about 1-2 feet long. There are no chisel marks on this rock whatsoever, and you can see that this rock has been sliced into half. If this is an ancient rock cutting technique, it changes everything we know. However, is this really ancient or was it done in recent years? I must find more evidence of this technique because experts will dismiss it as something that has been done in the last 10 years, with modern machines. So, I decided to go to Mahabalipuram, which is a ancient site that is protected by the department of archeology.

Mahabalipuram stretches for many miles, and rock cutting has been banned for the last 50 years to protect the ancient monuments in this area. Let’s go deep into the woods, and see if we can find the same rock cutting technique. Here, we can see the same type of rock cutting technique, where you see one single drill mark, and the rock has been split open. You can see how a series of this drilling was done on different rock faces, and the rocks have been cut open. This was not done in recent times, because there are trees and bushes growing in the place now, where the other half of the rocks once stood. So, this is in fact, the ancient rock cutting technology – Drilling a hole into a huge rock and splitting it into half.