Gang Stalking, An Overview
THE “NEUTRALIZING” OF DISSENT IN THE UNITED STATES OF AMERICA WITH REMOTE-CONTROL EMF RADIATION/SONIC NEUROWEAPONRY
I am writing to call your attention to a phenomenon of extreme civil-rights and human-rights abuse involving the physical torture of humans facilitated by this massive surveillance, which has apparently already been in operation for years/decades, and is currently openly occurring, both everywhere within the United States and outside the United States.
People who are being targeted for these sustained neuroweapon attacks are literally having their brains/minds being irradiated; weapons used include Remote EEG readers, Remote Electro-Muscular Shock/Incapacitation weapons, Remote Microwave Weapons, Remote Voice to Skull weapons, Remote Neural Monitoring technologies, and EMF brain-wave monitoring, tracking, and harvesting technologies. (Please see the enclosed links and list of patents posted here for more information.)
Researchers suggest that brain waves of citizens are being tracked for experimental NSA/DOD Neuroscience/Artifical Intelligence/Cybernetics/Supercomputing purposes via a program termed “MASINT,” the military Measurement and Acquisition of Signature Intelligence, meaning the seeking and measurement of signature electromagnetic frequencies associated with the specific brains and bodies of specific individuals (by aircraft and satellite, as well as ground-based means.)
OPEN LETTER TO JOURNALISTS AND HUMAN RIGHTS ADVOCATES & ORGANIZATIONS IN THE USA & WORLDWIDE
Google reveals ‘terrifyingly scary’ timeline feature that can show users their location history
- Timeline service available on both desktop and mobile
- Looks at locations to work out most popular places visited
- Can let users retrace their steps – and even see pictures they took
Read more: http://www.dailymail.co.uk/sciencetech/article-3171415/Google-really-does-know-ve-Search-giant-reveals-terrifyingly-scary-timeline-feature-users-history.html#ixzz3gjQnDhG3
Follow us: @MailOnline on Twitter | DailyMail on Facebook
Jade Helm Terror Brutality Already Crippling Targeted Individuals: Aussie Confesses Darkest Secrets
Read more at http://investmentwatchblog.com/jade-helm-terror-brutality-already-crippling-targeted-individuals-aussie-confesses-darkest-secrets/#vlqo36zlEsmo5juU.99
HEY, SOMEBODY TELL DAD I STILL MIGHT GET MURDERED!
5:32 PM (2 minutes ago)
They are the same as hundreds of thousands of other innocent, self-identified targeted individuals report. They are the same as many TIs described before their untimely deaths.
According to Finch’s account, perpetrators in the program have capacity to and are employing the following covert, mainly technological assaults:
- Place human subject under ceaseless satellite surveillance, regardless of where he/she is.
- Via satellite, ceaselessly monitor human brain, including thought, reaction, motor command, auditory event and visual image reading, through ‘Remote Neural Monitoring’ (RNM).
- Ceaselessly attack the human brain via satellite with voices, noises, other disturbances, images and ‘virtual-reality scenarios’; and override, control, and alter consciousness through ‘Electronic Brain Link (EBL)’.
- Directly abuse, torture, assault, and interfere with bodies, including performing advanced medical procedures via satellite.
- Directly interfere with personal electronics, alter, insert etc. data, files, communications and legal evidence even during transmission via satellite.
- Make live TV, radio, and other screens/monitors two-way for surveillance, invasion of privacy, deception, traumatisation etc.
- Control information flow and orchestrate media globally.
- “The ‘circuits’ are always open – my brain, body and physical space are ceaselessly brutally violated, monitored and interfered with – and forced into reaction and response – 24 hours a day. It’s a brutal, technological, inescapable ‘Iago-bullshit-hell-machine’. “I literally haven’t had a single minutes mental rest, relaxation or privacy since 2005 – not a single minute.”
- (He describes it better than I could.)
Read more at http://investmentwatchblog.com/jade-helm-terror-brutality-already-crippling-targeted-individuals-aussie-confesses-darkest-secrets/#vlqo36zlEsmo5juU.99
No One Is Safe: $300 Gadget Steals Encryption Keys out of the Air, and It’s Nearly Unstoppable
Just when you thought you were safe, a new hacking toy comes along and rocks your world. Imagine a tool exists that lets hackers pluck encryption keys from your laptop right out of the air. You can’t stop it by connecting to protected Wi-Fi networks or even disabling Wi-Fi completely. Turning off Bluetooth also won’t help you protect yourself.
Why? Because the tiny device that can easily be hidden in an object or taped to the underside of a table doesn’t use conventional communications to pull off capers. Instead it reads radio waves emitted by your computer’s processor, and there’s really nothing you can do to stop it.
NSA’s XKeyscore collects router data, Skype conversations, webcam image
Newly revealed documents from the Edward Snowden trove show that it’s much more than a Google-like search engine for the world’s private communications data.
Rather, it’s more like a gigantic sea-dwelling kimodo dragon with double-jointed jaws that snarfs up the data equivalent of Great White Sharks like they were hors d’oeuvres.
As The Intercept reports, besides suctioning off web traffic from the fiber-optic cables that form the backbone of the world’s communications network, including data on people’s internet searches, documents, usernames, passwords, emails, and chats, it also absorbs 700,000 voice, fax and video files every day.
That includes pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation (CNE) targeting, intercepted username and password pairs, file uploads to online services, VOIP streams taken from Skype sessions, and more.
Amazon Patents Ear Recognition Technology for Smartphones
“They’ll be watching and scanning your head at a distance, everything…and picking up your biometrics.”
FBI Can Secretly Turn On Laptop Cameras To Eavesdrop Without The Indicator Light
(I have pictures of myself that somebody took from my computer when I was alone in my car, early Spring, 2013, when I was first aware I was being stalked. (I don’t know if it was supposed to freak me out when a picture showed up on the screen spontaneously, but I got educated after that.) My hands are nowhere near the keyboard. I guess if the FBI can do it, anybody can, right? Same with ALL THE FORMS OF CYBER-STALKING I meticulously recorded.)
GOOGLE AT CENTER OF HIGH-STAKES PRIVACY CASE… ‘INVISIBLE TRACKING IS COMPANY’S LIFEBLOOD’… EAVESDROPPING TOOL INSTALLED ON COMPUTERS WITHOUT PERMISSION…
Disconnect argues in its complaint:
[I]nvisible, unsolicited tracking is Google’s lifeblood. The company makes virtually all of its revenue from advertising. Tracking permits Google to target its ads and, hence, to charge advertisers far more for ad placement. Indeed, Google is under enormous pressure from the financial community to increase the “effectiveness” of its tracking, so that it can increase revenues and profits. Giving a user the ability to control his own privacy information (and to protect himself from malware) by blocking invisible connections to problematic sites constitutes an existential threat to Google.
Read more at http://investmentwatchblog.com/google-at-center-of-high-stakes-privacy-case-invisible-tracking-is-companys-lifeblood-eavesdropping-tool-installed-on-computers-without-permission/#XMp7wTjGcq7JIfcA.99
How the US uses sexual humiliation as a political tool to control the masses
… the supreme court decided that anyone can be strip-searched upon arrest for any offense, however minor, at any time. This horror show ruling joins two recent horror show laws: the NDAA, which lets anyone be arrested forever at any time, and HR 347, the “trespass bill”, which gives you a 10-year sentence for protesting anywhere near someone with secret service protection.
Peter Mooring talks of Gang Stalking Cruelity The greatest threat humankind has ever faced
Gang stalkers not only mock people, they mock every value that sustains human life. Trust, honour, decency, honesty, innocence, affiliation, professional integrity, protection, support, parental values.
So gang stalkers are not only misogynist, homophobes, racist and classist, they possess a bigotry unique to themselves – elitist.
“Thought Crime” Program Found In Computer (Google)
We all heard about the new US Government Pre-Crime “Thought Crime” Laws, and I was shocked to find it in my very Own Computer. Can you imagine, the US Gov now invading our computers that sends “Thought Crimes” about your internet activity? We all know that Google is working on computers for NSA and the US Government, and now I found out a “GOOGLESHARING” extension called “ThoughtCrime”! It’s here and it is Real folks!
Neuropsychological and Electronic “No-Touch Torture”. The Spectrum of ‘Interrogation” and Torture Techniques Used by the US and its Allies
Torture is often used for revenge, punishment, interrogation, and behavior modification. In other terms torture is used to remove the continuity of thought to confuse the target to reveal information, erase brain patterns such as values and beliefs, or to break down the human spirit to make them submit and obey their handlers.
While the subject can be broadcast mental images to their mind using hypnosis and other suggestions as well as visual entrainments, the more invasive controls of the brain manipulation technologies can be used to entrained the brain’s autonomic nervous systems such as not breathing causing the target to not be able to sleep from fear of suffocation equivalent to water boarding. The neural linguistic programming can add fears such as heart attack, stroke, and cancer threats.
In no-touch torture the techniques are more psychologically specialized for each target. Most common examples include homosexual targets that are forced with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are forced to view child pornography in their minds. And vice versa is true, that heterosexual targets are forced to view homosexual sexual acts like in the secret U.S. torture prisons.
The government training exercise uses language like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”, “use deception”, “ruin business relationships”, and “post negative information on appropriate forums” – in a malicious effort to target bloggers, activists, journalists, social event organizers and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.
No-touch torture offers the same sexual humiliation and lack of privacy by using through wall radar, cameras, and EEG visual cloning to let the target know they are being watched. Degrading comments are often used on the no-touch torture subjects while they are naked or in the bathroom.
This is why many random people are put into the torture and mind control experiments. There are some devious uses of a secret army of remote controlled assassins in every country in the world. The samples must include different education, language, culture, and economic factors. Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it.
In no-touch torture the psychological trauma of simulated rape takes on different forms. Using technique often called EEG-heterodyning the targets will receive molestation effects of their genitals. In men this can be the anus and genitals. Similarly women can be wirelessly raped by the analogous function of perception.
Free Speech, Facebook and the NSA: The Good, the Bad and the Ugly
For instance, the USA FREEDOM Act not only reauthorizes Section 215 of the Patriot Act for a period of time, but it also delegates to telecommunications companies the responsibility of carrying out phone surveillance on American citizens.
Then there are the fusion and counterterrorism centers that gather all of the data from the smaller government spies—the police, public health officials, transportation, etc.—and make it accessible for all those in power.
And of course that doesn’t even begin to touch on the complicity of the corporate sector, which buys and sells us from cradle to grave, until we have no more data left to mine.
Thync: company launches mood-changing wearable that zaps brains
Thync costs $299 and has just been released to the public. It provides “calm or energy on demand”, the company says, by using “neurosignalling” to activate nerves and change people’s state of mind.
Gang Stalking -article by private investigator
Those who select the target may be doing so for any number of reasons, including revenge, jealousy, or a desire to keep someone silent.
The reasons why someone is initially targeted for gang stalking may vary. Sometimes, the victim may be a political activist
Lawson writes that the victim is intentionally “sensitized” to the presence of the stalkers, so that he or she will know that the occurrences are orchestrated. It is a psychological reign of terror intended to make victims look crazy and to keep them in a constant state of hyper-vigilance (anxiety and stress) concerning what will happen next.
Often, victims become the target of ridicule by friends and family because the occurrences are so hard to believe. These tactics are intended to weaken the target to the point of physical and psychological collapse. Now that the number of targets has increased to the point where victims can network with one another, they find out that the same tactics are being used everywhere.
Letter from a Targeted Individual
See more letters at: http://www.wisdomabovegold.com/#!target-accounts/clux
Stop the bullshit. They are not collecting meta data. They are building profiles on everyone in this country.
First TRAPWIRE, now RIOT, the new product from the defence company, Raytheon, and which is featured in the above video. RIOT will use GPS and other technologies to track people anywhere in the world. It also boast predictive capabilities (work out the most likely location the target will go to next). RIOT will basically search, analyse and organise all social network content globally.
Read more at http://investmentwatchblog.com/stop-the-bullshit-they-are-not-collecting-meta-data-they-are-building-profiles-on-everyone-in-this-country/#WKiXZJuMuPZ5WMyH.99
The National Security Agency and its closest allies planned to hijack data links to Google and Samsung app stores to infect smartphones with spyware, a top-secret document reveals.
The surveillance project was launched by a joint electronic eavesdropping unit called the Network Tradecraft Advancement Team, which includes spies from each of the countries in the “Five Eyes” alliance — the United States, Canada, the United Kingdom, New Zealand and Australia.
The top-secret document, obtained from NSA whistleblower Edward Snowden, waspublished Wednesday by CBC News in collaboration with The Intercept. The documentoutlines a series of tactics that the NSA and its counterparts in the Five Eyes were working on during workshops held in Australia and Canada between November 2011 and February 2012.
But the agencies wanted to do more than just use app stores as a launching pad to infect phones with spyware. They were also keen to find ways to hijack them as a way of sending “selective misinformation to the targets’ handsets” as part of so-called “effects” operations that are used to spread propaganda or confuse adversaries. Moreover, the agencies wanted to gain access to companies’ app store servers so they could secretly use them for “harvesting” information about phone users.
The revelations are the latest to highlight tactics adopted by the Five Eyes agencies in their efforts to hack computers and exploit software vulnerabilities for surveillance. Last year, The Intercept reported that the NSA has worked with its partners to dramatically increase the scope of its hacking attacks and use of “implants” to infect computers. In some cases, the agency was shown to have masqueraded as a Facebook server in order to hack into computers.
(I bet they can even hijack a voice…and make it say something different.)
Gang stalking and it’s preternatural connections.– Evil takes many forms in this world. It’s areas of influence go deeper into the workings of our lives and institutions than many are aware of.
The goal of Gang Stalking
The expressed goal of Gang Stalking is to silence a victim, drive a victim insane and possibly to the point of suicide, or destroy the victim’s reputation and believability as the person will likely be viewed as mentally ill should they complain or report the abuse. Gang Stalking is also used to gather information on individuals as well as force individuals to move or leave an area.
Motivations for the abuse
Motivations for Gang Stalking vary. Revenge for a real or imagined offense(People in these organizations are quite petty, mirroring their preternatural handlers); false accusations of a “horrible crime” of which the victim has gotten away with(Used to discredit the victim and destroy his/her reputation); silencing a corporate “whistle-blower”; defecting from a cult; a perceived enemy of a group or organization; “knowing too much” are all examples of possible motivations.
Writer/Researcher Carissa Conti puts it this way: “The people involved with gang stalking activities may not always be piloting their own wheel, to put it in a straight forward manner. Other “stuff” may be manipulating them, working through them. There definitely seems to me to be a hyperdimensional component to it all – hyperdimensional, as in, non-physical realms and entities, whether positive or negative, that exist outside our own 3rd density physical reality, unconstrained by space-time, manipulating reality and working through people, like puppet masters from behind the scenes.”http://in2worlds.net/gangstalking-and-targeted-individuals
AnchoringAnchoring is a technique employed by stalkers to implant a false motivation or reason behind the stalking, preventing the victim from discovering the truth. In more sinister examples, Anchoring involves the implantation of evidence to persuade the victim some other group or organization is responsible for the abuse.Baiting
The term “Baiting” is a stalking tactic used to lure a victim into environments, or situations, which cause further problems to the victim. Often “Baiting” involves tricking a victim into committing a crime or unknowingly engaging in an illegal activity such as assault. They trick the victim into thinking an innocent bystander is the culprit of their harassment and try to compel the victim into assaulting the person.
Targeted Individuals’ Breakthrough: Fusion Center Abusing TIs Exposed
The damaging information you have about the police, military or intelligence (our government) is deemed to be MUCH MORE IMPORTANT to SILENCE and DISCREDIT than any individual’s rights (or even life)
YOU ARE BEING MONITORED 24/7/365. EVERYTHING you say. EVERY MOVEMENT you make. EVERY phone call. EVERY internet/electronic communication and activity. EVERY transaction. EVERY breath you take. All of your habits have been analyzed. EVERYTHING about you is being analyzed. THIS IS LITERALLY THE MOVIE “Eagle Eye” and YOU are the target
Quantum Physics is being used against you in your new “constantly negative environment” (research the term and understand the detrimental health and emotional effects of constantly “absorbing their negative energy”)
Intimidation is a primary objective in psychological warfare. Understand this key to their puzzle and recognize this objective. This program is designed to silence and discredit. Do not fall for their clever charade – it is all part of their grandiose show!
You are being FRAMED and subjected to an extraordinary entrapment campaign that is designed to alienate you, enrage you and get you to lash out in any way possible in order to incarcerate or simply REMOVE YOU from society
Everything you’ve ever been taught to believe about justice, freedom, constitutional/civil and even human rights have now VANISHED. You are a test subject in a classified and extremely intricate maze of psychological warfare (sometimes also accompanied by ongoing, daily physical torture and poisoning through the targeting of directed energy/radiation/acoustical next-generation weaponry designed to break you and eliminate you)
Your new reality is now that of a non-consenting military test subject in a classified program that is controlled at THE HIGHEST levels of our government and military
Understand that one of the primary goals in an operation like this is to get the targeted individual to make what appear to be fantastical claims that will not be able to be proven in order to discredit them and create the perception or diagnosis of mental illness. The accomplishment of this goal will allow the perpetrators to bring the harassment to a new, more intense level since the targeted individual has now been professionally diagnosed or at least documented as showing symptoms of mental illness. Other obvious goals include incarceration, from a targeted individual lashing out from the constant abuse or institutionalization. Either of which accomplish the ultimate goal of removing the targeted individual from society.
Read more at: http://atargetedindividual.blogspot.com/
Advice for Victims
It is also worth noting that mind reading technologies allow for stolen memories (good or bad) to be used to torment you. They facilitate illegal research, duplication, fraud and other crimes.
Note:- The military have scanners which can detect the monitoring/interference but, for “political and legal reasons”, they will not help. However, complaints can be lodged with Federal Police and the Head of State (or Leader) of your country of residence.
Some of the companies involved in high tech ‘human research’ include :- Raytheon, General Dynamics, Systems and Electronics Inc., Technology Patents LLC, Dome and Magalin Inc and MRU (Mankind Research United). These, along with military/agency facilities like the CIA’s Langley Research Centre and the NSA’s Fort Meade Centre are involved in Remote Neural Monitoring (RNM), Electronic Brain Linking (EBL) and other hideously inhuman projects designed to study methods of controlling/using human beings without their approval.
Read more here: http://www.surveillanceissues.com/advice-for-victims/
Minority Report: Your Iris Can Now Be Scanned From Across the Room
Prolific Use of Directed Energy Weapons & Microwave Mind Control On An Increasing Number of American Citizens
July 4, 2014 Show With Deborah Tavares & Ron Angell
(Deborah Tavares is an exceptional researcher. I think she began studying by opposing ‘smart meters’.)
Duncan also reveals that many people are now in wireless mental contact with artificial intelligence run on supercomputers.
In the interview posted below we discuss, among other topics, remote “mind reading,” CIA hive mind experimentation (multiple people sharing the same mental “space”), how people can be targeted and tracked remotely via their energy signature or “brain print,” the existence and use of a technology for remotely “cloning” or “copying” thoughts, emotions and other states (including intense pain) onto a target,  and how a weapons system capable of totalitarian control has been developed (with non-consensual and often-times brutal experimentation on civilians ongoing).
Google is the new evil empire pulling the strings of government and society
As a company, Google began as merely a better search engine. Now, the firm has grown into the world’s largest media company with ties so deep within the federal government that its corporate executives meet an average of once per week with the Obama administration.
Moreover, Google’s influence on the internet has grown to frightening proportions in ways that destroy privacy and often make the NSA’s surveillance capabilities look amateurish in comparison.
EXCLUSIVE – Sex cravings, visions of monsters and foul-mouthed rants: What force is torturing residents of Kazakh ‘Village of the Damned’ hit by mysterious ‘sleeping sickness’?
- Villagers have been battling a mysterious sleeping sickness for four years
- People fall into deep sleep for up to six days after striking without warning
- Now residents reveal the horrifying side effects – which include increased sex drive, inability to control the bladder and ghastly visions
- Worse, while no one knows what causes it, some fear they may be being deliberately poisoned to force them to make way for a gold mine
Read more: http://www.dailymail.co.uk/news/article-3059042/EXCLUSIVE-Sex-cravings-children-seeing-monsters-foul-mouthed-rants-Residents-Kazakh-Village-Damned-hit-mysterious-sleeping-sickness-reveal-sufferers-disturbing-new-symptoms.html#ixzz3Ysrkk6UX
Follow us: @MailOnline on Twitter | DailyMail on Facebook
Rense.com is one of my favorite sites. I’ve been reading Jeff Rense for years. He almost died in an inexplicable wreck near his driveway.
I also know a woman whose brother-in-law was a military weapons specialist. He had a toy, hand-held, and he played with it. She saw him one time push a button and watched EVERY CAR IN FRONT OF THEM pull over to the right shoulder. His wife was driving and she also kept swerving to the right. Goons can 1) control cars, and 2) control brains.
“How simple it is, and how old the technology is to take somebody out of consciousness, on demand, when they’re driving a car. and they lose control of their car.”
(I think when he speaks of the dead journalist, he means Michael Hastings. Not Michael “Harrison”. Hastings’ brand new Mercedes ‘blew up’. Mercedes says their cars DO NOT BLOW UP.)
I think the fear of this technology is MUCH GREATER for those who aligned themselves with the guys who play with toys (especially those who fail to complete their ‘mission’) …than it is for those who oppose them. God is in control.
(Stew Webb was also in a near fatal car accident recently.)
“A report published by Privacy International as well as an article posted by Vice Motherboard clearly show that both the DEA and the United States Army have long-standing relationships with Hacking Team, an Italian company that’s notorious for selling malware to any number of unsavory characters.”
“What you need is a way to bypass encryption, collect relevant data out of any device, and keep monitoring your targets wherever they are, even outside your monitoring domain.”
Heads Up! DHS, Walmart, FEMA and Local Cops Using Huge Facial Recognition ‘Spy Network’
8 Unusual Ways Corporations Are Spying On You
4) Jell-O, Adidas and Kraft
Jell-O, Adidas and Kraft all use facial recognition software in supermarkets to help them craft more effective TV commercials. The creepiest part of this is the cameras are actually linked up to Facebook as well, so the company could hypothetically couple their video surveillance with social media profiles for an even juicier data grab.
Cisco Shipping Hardware to Bogus Addresses to Throw off NSA Intercept-and-Implant Efforts
Cisco became an inadvertent (and very unwilling) co-star in the NSA Antics: Snowden Edition when its logo was splashed across the web by a leaked document detailing the agency’s interception of outbound US networking hardware in order to insert surveillance backdoors.
It moved quickly to mitigate the damage, sending a letter to the President asking him and his administration to institute some safeguards and limitations to protect US tech companies from the NSA’s backdoor plans. To date, there has been no direct response. So, Cisco has decided to handle the problem itself.
WIRED now totally admits what the entire media called ‘loony conspiracy theories’ just five years ago
Remember when it was considered the subject matter of tin foil hat-wearers to surmise that everything we do, say, or search for online is being tracked by covert government agencies acting in blatant violation of the U.S. Constitution? Well, now it’s become common knowledge that we live in this exact, illicit surveillance society, as is now openly admitted by popular media sites such as WIRED.
Inventor of Antivirus Software: The Government Is Planting Malicious Software On Your Phone So It Can Bypass Encryption and See What You’re Doing
Interview with John McAfee who says things like:
- Every city in the country has 1 to 3 Stingray spy devices … Bigger cities like New York probably have 200 or 300
- When you buy a Stingray, Harris Corporation makes you sign a contract keeping your Stingray secret (background here and here)
- Stingray pushes automatic “updates” – really malicious software – onto your phone as soon as you come into range
- The software – written by the largest software company in the world – allows people to turn on your phone, microphone and camera, and read everything you do and see everything on your screen
- Bank of America’s online banking app requires you to accept microphones and cameras. McAfee called Bank of America and asked why they require microphones and cameras. They replied that – if you emptied all of the money in your account and said “it wasn’t me”, they could check, and then say:
Well, it certainly looks like you. And it certainly sounds like you.
- In order to do that, B of A’s app keeps your microphone and camera on for a half hour afteryou’ve finished your banking
See more at: http://www.washingtonsblog.com/2015/04/mcaffee.html
CREEPY ‘SAT NAV’ DEVICE STEERS PEOPLE WITH TINY JOLTS OF ELECTRICITY
“In sports for example, it could steer long-distance runners via different jogging trails on different days for increased variety and enjoyment,” Max Pfeiffer, a researcher in the Human-Computer Interaction Group at the University of Hannover in Germany, who helped develop the navigation system, told The Telegraph. “New variants of team sports may be devised in which the coach or an external player may influence the moves of the team… Imagine visitors of a large sports stadium or theater being guided to their place or being evacuated from a stadium in the most efficient way.”
Or, when the bets are high, who is going to catch that pass? (This is REALLY OLD NEWS.)
Facebook: A ‘bug’ caused it to track people who have not even been to Facebook website
CRAZY! DARPA Made a Device That Turns Insects Into Remote Controlled Cyborgs
“Through a DARPA-funded program, scientists at the University of California invented a tiny rig that connects to an insect’s brain and flight muscles. Once implanted, the device takes over the insect’s body, turning it into a remote control cyborg capable of receiving flight commands wirelessly from a nearby laptop.”
Read more at http://investmentwatchblog.com/crazy-darpa-made-a-device-that-turns-insects-into-remote-controlled-cyborgs/#dhYgtspFwHeKaV6t.99
Your Porn Is Watching You
“Porn watchers everywhere are being tracked, and if software engineer Brett Thomas is right, it would be easy to out them, along with an extensive list of every clip they’ve viewed.”
“If you are watching porn online in 2015, even in incognito mode, you should expect that at some point your porn viewing history will be publicly released and attached to your name,” Thomas proclaimed in a blog post titled “Online Porn Could Be the Next Big Privacy Scandal,” shortly after.
” …you’re not just sending a request to the porn site—a so-called first-party request. You’re sending third-party requests to Google, to the web-tracking company AddThis, and to a company called Pornvertising, too, even if you’re browsing in private mode. You’re also sending other data that can be used to identify your computer, like your IP address.”
How to END Your Gang Stalking!
(I don’t know that all of these suggestions are valuable…except DOCUMENT EVERYTHING. The author seems to think the “observers” can be fooled when they can also observe our thoughts and mental states, and alter them.)
“Government Gang Stalking is an attack on innocent US citizens by traitors to the United States and the constitution. If you are a “Targeted Individual” (TI) you are in a battle for your right to live freely and free from tyranny.”
“Be aware that everyone involved with the justice system knows this is going on but the vast majority will never acknowledge it. One of the problems with people who aren’t involved is that there’s nothing they can do. It is beyond the jurisdiction of any police that aren’t in on it. These are powerful forces at work and every cop wants to retire one day.”
“The NCVC (National Center for Victims of Crime) in NYC collect statistics on “organized stalking.” They receive thousands of complaints about it per month which represents 10% of the total complaints they get, so it is significant. Police departments around the country also receive thousands of complaints.”
“On Sept, 16, 2013 a well-armed Alexis allegedly made his way onto a base in Washington, DC where he worked for a subcontractor as a computer technician and killed twelve people. Prior to this however on August 7, 2013 he filed a complaint with the Newport, RI, Police alleging that he was a victim of government gang stalking and ELF wave weapons.”
David and Goliath: What do we do about surveillance?
“There are brilliantly creepy examples. Take Cobham, a UK company that sells a system which allows “blind” calls to be sent to your phone. It won’t ring, so you won’t know you received it, but it makes your phone send a signal so callers can track it within a metre. Then there’s Lower Merion School District in Ardmore, Pennsylvania, which installed spyware on laptops for its pupils. School administrators could secretly record chat logs, monitor web use and photograph the kids. This was exposed when a student was shown a picture of himself taking drugs. It turned out to be candy.”
“Researchers at Carnegie Mellon University in Pittsburgh, Pennsylvania, set up a camera in a public space and identified people by combining face-recognition software with Facebook’s publicly tagged database. By correlating names with other databases, they displayed data about individuals in the time it took them to pass by.”
“Air-gapped systems are used in classified military networks, the payment networks that process credit and debit card transactions for retailers, and in industrial control systems that operate critical infrastructure. Even journalists use them to prevent intruders from remotely accessing sensitive data. To siphon data from an air-gapped system generally requires physical access to the machine, using removable media like a USB flash drive or a firewire cable to connect the air-gapped system directly to another computer.”
“But security researchers at Ben Gurion University in Israel have found a way to retrieve data from an air-gapped computer using only heat emissions and a computer’s built-in thermal sensors.”
Force Fields are here! Boeing patents Microwave Forcefield – STOPS EXPLOSIVE BLASTS!
“The days of denial are over.”
Everything I ever told you about scalars.. and using a transmitter to generate plasma… now comes out.
Now they are going to use it to mount to vehicles! As it turns out, not only is the plasma good for heating an area in the sky for weather modification, it can also stop shockwaves from incoming blasts. Not only can the plasma reflect RF (radio frequency) it will reflect physical shockwaves!!
Done between two transmitters, it will STOP SHOCKWAVES from explosions by reflecting the waves with an ion mirror !
Ionization using two transmitters… SCALAR energy forming at a distance from the transmitter.
“One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction.”
Using the US governments own top secret documents released by Snowden [see them HERE] proving their objectives, we can read their own words of what they are doing against the American people as they themselves state their purpose is to: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable.
Apple Admits Siri Voice Data is Being Sent to Third Parties
“Powermat is one of the leading vendors of wireless charging technology. Last year it struck a deal withStarbucks SBUX -1.51% to install its charging stations inside the company’s coffee shops across the United States and in the U.K.”
Read more at http://investmentwatchblog.com/microwave-weapons-are-being-used-against-civilians-in-the-uk-and-us/#Y2yzTvcJexRwsRYh.99
We can do this, and we really have to. This is a time of tremendous fear (intentional fear is the product of LEGALIZED (2012?) PROPAGANDA…) but it is also a time of supreme opportunity. I have earthly reason to be afraid. Even my own father! But, SO WHAT? We have been chosen to inhabit Earth during its defining moment. I don’t want to miss a thing and I refuse to fear holographic constructs of impending doom. I pray for wisdom as I have done for years and I also pray that I will 1) not believe any falsehood, and 2) not ever REFUSE to believe any truth. He’s gathering his army and I’m excited to get this show on the road. Nothing else matters. Nothing matters if we cannot have truth. Nothing matters if we cannot have truth. I know others recognize this imperative and soon they’ll be my friends.
How the NSA’s Firmware Hacking Works and Why It’s So Unsettling
“The hacking tool, believed to be a product of the NSA, is significant because subverting the firmware gives the attackers God-like control of the system in a way that is stealthy and persistent even through software updates. The module, named “nls_933w.dll”, is the first of its kind found in the wild and is used with both the EquationDrug and GrayFish spy platforms Kaspersky uncovered.”
See more here: http://www.wired.com/2015/02/nsa-firmware-hacking/
“UK’s Government Communications Headquarters (GCHQ) and the US National Security Agency (NSA) could be responsible for sophisticated hack attacks on Gemalto detected in 2010 and 2011, according to the company’s investigation.”
“Then, of course, there’s government surveillance by the NSA and its counterparts, which the curators singled out as a particular type of “haunting.” “When you’re distrustful of your laptop, it’s a very difficult situation to find yourself in,” said Revell. “You either feel like it’s cheating on you or haunting you or something.”
Russian cyber-security company Kaspersky says it has discovered a global hacking group, which has managed to stay hidden for years. WikiLeaks spokesperson Kristinn Hrafnsson says that after such revelations there is no trust in privacy and security in the modern world.
Read more at http://investmentwatchblog.com/surprise-that-nsa-has-tech-capable-to-infiltrate-air-gapped-computers/#4zmQQlQv8cJbFflc.99
“The document–and the rating system–is part of a wider strategy for Countering Violent Extremism, which calls for local community and religious leaders to work together with law enforcement and other government agencies. The White House has made this approach a centerpiece of its response to terrorist attacks around the world and in the wake of the Paris attacks, announced plans to host an international summit on Countering Violent Extremism on February 18th.”
“A major difficulty that targeted indviduals have is identifying what is happening to them. Over the years I made several attempts to uncover why it appeared my reputation was being trashed everywhere I went and people who did not know me knew about things that had happened to me that I hadn’t talked to anyone about.”
“I only discovered “gangstalking” this year after bizarre behaviour from a relative caused me to contact Wikipedia Reference Desk to see if anyone had an explanation for the outrageous behaviour.”
The realisation that anything spoken near your Smart TV might be recorded and transmitted to a third party is bad enough, but how about the possibility of “always-listening voice search” getting built into Google’s Chrome browser?
Never mind, Samsung, GOOGLE will EAVESDROP as you browse on Chrome
Voice Search extension project described as ‘Ear of Sauron’
“Afshin Rattansi goes underground on Google’s shady privacy record. Kristinn Hrafnsson, lawyer for Wikileaks, warns that it appears Google is ‘not a benign company, it has sinister aims’ and reveals that they want to be a dominant part of the military intelligence complex, handing information to the US government.”
Read more at http://investmentwatchblog.com/wikileaks-spox-google-is-a-privatised-nsa-with-sinister-goals-they-want-to-be-a-dominant-part-of-the-military-intelligence-complex-handing-information-to-the-us-government/#DUZBz06Va11AUj7q.99
“The Facebook project known as Deep Face can decern the accuracy of the true identity of any picture of you. DeepFace AI system is now powerful enough to spot users in the 400 million photos uploaded to the social network every single day. ”
“This war, covertly waged against Americans of highest ethical standards for decades, has become more overt in terms of high profile targets. The new widely acclaimed film Silenced, as shocking and important as it is, shows only the tip of the iceberg of the covert war, complete with military-grade weapons assaulting thousands of innocent Targeted Individuals daily.”
“…private investigator William Taylor has served dozens of Targeted Individuals, including high profile people. Taylor told Deborah Dupré when investigating secretly forced brain implanted Targeted Individual James Walbert, “Only the best Americans are being targeted.”
“Hundreds of emails and testimonies sent to Dupré by lesser known targets being persecuted show it is only their unique courage and character keeping them alive. They are not only persecuted in their communities by government paid operatives, including some neighbors, but also, they are stalked 24/7, in itself torturous.”
“TIs, “America’s best,” are suffering 24/7, never knowing what will hit them next, never receiving local or national advocacy or defense from human rights groups. They are left as sitting ducks, easy prey for covert operatives to taunt or eventually kill, as a cat with a captured mouse.”
“The satellites download holographic mind control movies, pictures, sounds, and sensations to people through this technology. The Air Force has stated in “Air Force 2025? that their goal is to develop virtual and augmented reality mind control. Depending on the how the computer is programmed or depending on the mood or intent of the person interfacing with the technology, you can be probed, bothered, gaslighted, frightened, manipulated, electronically raped, or tortured. It scans your brain frequencies and deciphers your thoughts. The satellites track you by mapping your bioenergetic signature [body biometrics] and constantly scanning an area to find you.”
The True Purpose of Chemtrails?
Read more at: http://www.redicecreations.com/article.php?id=32667
“The ‘Experience Helmet’ is a new, high-tech wearable device that allows people to hear electronic representations of their thoughts. It uses Electroencephalography (EEG) technology to translate brain activity into data.”
“This basically means that the helmet can read your thoughts, convert it into sound, and play it back to you!”
This basically means that SOMEBODY can read your thoughts, convert them into WHATEVER FORMAT they want, and play it back to ANYBODY. Now they made it into a toy. Great.
I have been spied upon. I have been stalked, cyber-stalked, gang-stalked, gaslighted. I have been tormented in so many ways that no longer matter. When it happens to you, remember this number: 906-291-1376.
“I’m not talking about the NSA (though that too); I’m talking about software fine-tuned for comprehensive stalking—”spyware”—that is readily available to any insecure spouse, overzealous boss, overbearing parent, crazy stalker or garden-variety creep with a credit card.”
“Literally millions of people, according to the sales figures provided by these spyware companies, are going about their days not knowing that somewhere, some turdknockers are scouring their photo libraries and contacts and WhatsApp messages, looking for digital misdeeds.”
My dad is a turd-knocker.
New Psychiatric Diagnosis Targets “Internet Conspiracy Theorists”
“This constitutes a new subjective approach in diagnosing of mental illness in that it promises to end free speech and any form of political dissent. The federal government has already declared anyone who opposes its unconstitutional policies as having “political paranoia,” which is now diagnosed as a type of mental illness.”
“Under Obama’s new proposed gun regulations, anyone who has a diagnosable, or is potentially diagnosable (i.e. pre-crime) for being mentally ill, can have their gun confiscated.”
“When I went through my clinical training, the Bible of mental illness, The Statistical and Diagnostic Manual (DSM-4r) defined Oppositional Defiant Disorder (ODD) as a highly controversial mental illness used to describe children and teens as mentally ill if they exhibited disobedience and defiance. When I was first nationally credentialed, most practitioners did not take this diagnosis seriously and we mistakenly believed that it would fade away. We uniformly believed this to be true because defiance and oppositional behaviors are hallmark traits of healthy rebellion exhibited by children and teens as they seek independence. Rather than ODD fading away, the diagnosis has become the tool of the ruling elite.”
Read more at http://investmentwatchblog.com/new-psychiatric-diagnosis-targets-internet-conspiracy-theorists/#ifJEsigrXWJjRAEc.99
Read more at http://investmentwatchblog.com/new-psychiatric-diagnosis-targets-internet-conspiracy-theorists/#ifJEsigrXWJjRAEc.99
Read more at http://investmentwatchblog.com/new-psychiatric-diagnosis-targets-internet-conspiracy-theorists/#ifJEsigrXWJjRAEc.99
Seltzer, a professor in computer science at Harvard University, told attendees, “Privacy as we knew it in the past is no longer feasible… How we conventionally think of privacy is dead.”
“At least 50 U.S. law enforcement agencies have secretly equipped their officers with radar devices that allow them to effectively peer through the walls of houses to see whether anyone is inside, a practice raising new concerns about the extent of government surveillance.”
I guess if the cops can do it, then so can anybody with a Sharper Image catalog and a credit card.
Read more at http://investmentwatchblog.com/battlefield-technology-finding-its-way-home-to-civilian-policing-new-police-radars-can-see-inside-homes/#F3vMkS7I22xQitwb.99
“The program many know as targeting of individuals or organized gangstalking networks… it is far MORE VAST than even that.”
Mind Control – Wires in the Brain .. .Deborah Tavares 01-07-2015 on the Rense Radio Network
“Private investigators and the people who hire them demonstrate how technology and information can be used both in protective and intrusive ways.”
“Even more, technology equips the average person with the tools to spy on others. In this day and age, all eyes are on you any time of the day or night. It’s more of a matter of who does that spying — and whether we trust them.”
“In A Manner Of Speaking, It’s The New Prenuptial,” Private Detectives Use The Internet To Spy On Others
“A window pops up containing information about the vehicle — its exact coordinates in longitude and latitude, its speed and the time it last moved — plus the battery life of the GPS device that’s feeding him this information. The vehicle also has a unique seven-digit tracking number that allows Mesis to tell it apart from several other vehicles.”
Read more at: http://projects.aljazeera.com/2013/pi/
As the handling of college sexual assault continues to grab national headlines, a new report shows that addressing on-campus stalking should also be a priority
“Taser looks to parlay existing relationships with law enforcement agencies into a bigger share of the body-cam market. The company has built these ties by providing all kinds of “solutions” to lethal policing—they make stun guns, and, like Band-Aid, their brand name has become synonymous with the product. The fact that police have recently killed young black men with stun guns, and that the UN Commissions on Torture has found that they can be as lethal as firearms in the context of policing (especially when they are so frequently misused), has not negatively affected Taser’s finances.”
“For instance, with the flick of a switch (and often without your even being aware of the interference), police can now shut down your cell phone, scan your body for “suspicious” items as you walk down the street, test the air in your car for alcohol vapors as you drive down the street, identify you at a glance and run a background check on you for outstanding warrants, piggyback on your surveillance devices to listen in on your conversations and “see” what you see on your private cameras, and track your car’s movements via a GPS-enabled dart.”
SF33 stipulates that “a government entity may not obtain personal identifying information concerning an individual without a search warrant. A court order granting access to this information must be issued only if the government entity shows that there is probable cause for belief that the individual who is the subject of the personal identifying information is committing, has committed, or is about to commit a criminal offense.”
Read more at http://investmentwatchblog.com/minnesota-bill-would-ban-nsa-activity-called-the-biggest-threat-since-the-civil-war/#lgk7TCeX5TcjJdJz.99
“Cyber Command itself has always been branded in a sort of misleading way from its very inception… Now, the reason he says that is because it’s an attack agency”
Read more at: http://russia-insider.com/en/2015/01/12/2338
“Dr. Phil interviewed a Targeted Individual in an episode that can be viewed on the YouTube, Dr Phil Organized Stalking Victim Segment “I Swear I’m Being Cyber Stalked, Wiretapped & Followed.’(below) Note how Dr. Phil challenges almost every statement made by the TI Matt Barasch, an attorney and entrepreneur. One might question whether Dr. Phil responded more like a government agent than a mental health therapist, adding to injury Barasch already suffered. At best, he responded with as little respect and empathy as most lay people do when hearing the targeted individual stories.”
What we fail to remember as we evaluate the technology routinely used to covertly harass people, is that the same technology could remotely benefit people. We could make the tooth fairy a reality, and send sufferers magic presents, with the flick of a switch. Depression vibrates a certain way. Technology can induce an immediate depressive state. It could just as easily promote a sense of well-being. What happened to me was that I was walked right through every component of every mental illness I’ve ever heard of. Artificially. I didn’t bite at any of the “symptoms” because God’s word says, “I have not given you a spirit of fear, but of…a sound mind.” (If God says I’m not crazy, who am I to argue?) Then, inexplicably, I was walked back into reality and hope for humanity. I was walked through all the steps it took to clear my home of drug dealers and shepherded into positive actions. I’m thinking of hackers now, who I’ve encouraged to throw a shoe into the machine. (“Sabotage.” That Vulcan chick on Star Trek.) I now think we could achieve a double whammy if they just chose to alter the settings on their celestial x-box. What if instead of torturing the persons corresponding to the names on the “do-today” torture list, the hackers just made them all happy? They could do it. I know by experience.
BACKTRACK: Of COURSE they can’t do it! Nobody would buy any mothers’-little-helpers and the shrinks would have to go to trade school. It would really mess with the psycho-pharmo-industrial-complex.
“However, Washington doesn’t seem to be satisfied with its “progress” since it continues funding and developing new secret projects that would not simply allow the United States to retain an effective control over global information space, but to influence web users worldwide to its own advantage as well.“
“You can really break a person, and you can cause them to commit suicide, through despair, or give up being sociable or give up being friendly or going against their nature…”
Gang Stalking A Localised Form Of Occult Imprisonment – Morris
“You can interfere with every connection they have with everyone. You can totally destroy anyone’s life.”
“You can’t communicate with anyone and all areas are betrayal.”
“A gossip campaign is an extremely strong campaign in itself. You’re being framed and set up INFINITELY.”
“Browser hijacking occurs when you find that your web browsers settings have been changed without your permission. This could happen when you are installing new software, and during installation, your settings get changed; or it could occur if some malicious software takes control of your computer including the browser and changes its settings, without your knowledge.”
“On Christmas Eve, the National Security Agency released a trove of documents detailing 12 years’ worth of illegal activity by the spy agency.”
– See more at: http://xrepublic.tv/node/11686#sthash.o5vozlxC.dpuf
TESTIMONY OF A SURVEILLANCE GOON. (FORMER SURVEILLANCE GOON.) (APPARENTLY.)
Armin Gross: How have you come to this information?
Carl Clark: About the garbage, the phone, the post, the Internet. With increasing mechanization it has become easier and easier. Today you don’t need no more bugs to monitor. You eavesdrop on mobile phones, ISDN-phones or small dish aerials. Unfortunately, also the application of microwave weapons has become very slightly moveable. Constant supervision and pursuit can destroy life!!!
Carl Clark: It is a little bit like in a Science Fiction movie. People could be pursued everywhere using radar, satellite, a base station and complementary computer programs. Often, for example, three radar devices were positioned in the bigger vicinity of the person. The radar sends out electromagnetic waves, catches some again and evaluates the result. Then my friends who have worked in the special departments could pursue the person on their computer the whole day. Then this localization made it easy to use the weapons straightly. The colleagues could see exactly where they had to aim and also how the person reacts to it.
Armin Gross: Do you think that it is possible today to influence the feelings straight by electromagnetic rays?
Carl Clark: Unambiguously. We know that the organism reacts very sensitively to electromagnetic radiation. Elementary life processes in the cells walk along with biogenic electromagnetic oscillation. Frequency can disturb or change from the outside these processes. There were within the scope of military research quite far-reaching attempts to influence body, soul and mind about frequency. It is possible to promote fears, aggressions, nervousness or forgetfulness in this manner. In combination with still other interventions one can make a person so mad. For example, radiofrequency is manipulated, so that the affected person hears his own name on the radio or his computer indicates his name over and over again. Also voices are sent to a person that give them thought or comment their activities. I heard, for example, in the morning after getting up a voice which said: „Get up and injure”!
Note: Mr. Witte says, relying on research by Dr. Konstantin Meyl, and documentation of TI’s, that “microwave” is a smokescreen for the scalar technology now in use to destroy individuals’ lives.
The gentleman speaking with her also spoke at the conference. He owns whitetv.se, and is a student of Dr. Konstantin Meyl, who made Tesla technology work. His products have been successful in helping shield targeted individuals.
She gave me my medal with the female angel holding a sword because she said it reminded her of me. She took me to a soup kitchen. After she left the ashram she became a Christian and prefers to be called by her baptismal name: Maria.
Well, I asked for creative. The skinny columns are still ugly but the floating cursor is fun and I like the orange. When I was first being cyber-stalked and thought it was Adam I asked him to teach me stuff about the computer. I figured if he was going to be there anyway it could serve a purpose. I’d learn much faster if I could ask a few questions. (But I have a BLOG, which is astonishing so thank you very much, goons.)
With false thoughts pumped into my head all the time, I learned to pray, “Lord, do not allow me to believe even one thing that is untrue.” (Error is SIN.) Now I also pray, “Lord, please enable me to believe EVERYTHING THAT IS.”
The unbelieving and the fearful are the first cast into Hell! By their own choice!
I’ve been thinking about how to answer my brother’s question about “Am I supposed to not trust my father now?” I think I have the answer: You do what the evidence demands.
We can choose to believe that a fairy tale is real. Absent evidence, we have the choice to believe in it. But, if a thing IS REAL…and documented…we don’t really have a choice NOT TO BELIEVE IT. I mean we can SAY we don’t believe it but that’s not intellectually honest. Also, probably really lazy.
I have evidence about a number of things a lot of people choose not to believe in. I have evidence that we live in a corporate matrix that has never been democratic. I have evidence that the government tortures people, and that some entity tortured me and my family. I have evidence that my father’s a compulsive liar and tried to kill me. People seem to have their fingers in their ears and they’re humming real loud. That would be funny to watch if it weren’t so tragic.
14 Blessed (happy and [a]to be envied) are those who cleanse their garments, that they may have the authority and right to [approach] the tree of life and to enter through the gates into the city.
15 [But] without (outside) are the dogs and those who practice sorceries (magic arts) and impurity [the lewd, adulterers] and the murderers and idolaters and everyone who loves and deals in falsehood (untruth, error, deception, cheating).
“Total Connect (TM) Tracking Service” is “a great way to keep tabs on family members and employees, know if speed limits or predetermined geographic boundaries have been exceeded, and recover lost or stolen valuables.”
“The camera is simple to use out of the box—”plug and play,” as it’s called—and runs for between $8,000 and $20,000. Depending on the price, the camera is capable of running facial recognition technology, abandoned package alerts, and loitering detection, just to name a few options, a sales rep named Gene tells me.”
“As I leave he begins to hand me his business card, then, seemingly for the first time, sees the word “press” on my badge. He retracts his card, and says if I have further questions he can connect me through the corporate communications department.”
From the Covert Harassment Conference in Belgium, November 2014:
covert harassment conference 2014
the ways to defeat the secrecy surrounding the existence of mind control technology
Mojmir Babacek’s lecture
In the past decade there is an obvious trend in the world politics to place the struggle for power above the struggle for democracy. This can be exemplified by the current situation in Ukraine. You probably know that in the recent elections the majority of eastern Ukrainians did not vote for parties promoting ukrainian membership in the European Union. All the same the democratic European Union and the democratic USA support the war of western Ukrainians against their eastern co-patriots while democratic Russia supports the eastern Ukrainians in the war against western Ukrainians. Isn’t this an evidence that in the contemporary world democracy is not the priority for the power elites and financial entities behind them?
The issue of classification of mind control technologies is part of this favorisation of power above democracy. There would be no reason to hide those technologies from people if we were living in the world where democracy would prevail.
The fact that mind control technologies are classified is the reason why mind control technologies can be used on innocent people. The governments are perfectly aware of the fact that once the citizens know that their governments are in possession of technology which can be used to control citizen’s thinking and bodily functions, the citizens would demand immediate and verifiable ban of those technologies. To know that governments are in possession of such technologies is to know that the democracy no longer exists. For that matter our effort to disseminate information on the existence of this technology among people is an effort to save democracy and the salvation of democracy can be defined as well as a goal of this conference.
For the victims of experimentation with those technologies, the classification of those technologies is the major obstacle on their way back to freedom and good health. Once the technology enabling remote control of human nervous system is declassified, the only possible follow up is the legislation banning the use of those technologies and establishing teams capable to measure and detect the harmfull radiations and find their sources. The victims targeted by those radiations will be able to demand the verification of the use of those technologies against their persons and their torture will come to the end. The major problem is that so far only very few people are affected by those radiations and they have no chance to prevail in democratic process since they are small in numbers.
There are several ways to attract the attention of larger masses of people to the issue of mind control technologies and make the lawmakers and government officials work toward the ban of the use of radiations controlling the functioning of human nervous system:
The first approach is disseminating the convincing evidence on the existence of mind control technologies via Internet. There is certain amount of published scientific experiments proving that pulsed microwaves can produce effects in human nervous system including auditory hallucinations and microwave hearing. This scientific evidence can be supported by information from the websites of ministries of defence of NATO states which are engaged in the development of non lethal weapons including radiofrequency weapons acting on human nervous system as is stated in the study of the European Parliament entitled Crowd Control Technologieshttp://www.europarl.europa.eu/RegData/etudes/etudes/stoa/2000/168394/DG-4-STOA_ET%282000%29168394_EN%28PAR02%29.pdf. For example on the site of the ministry of defense of the Czech Republic we can read: “High frequency electromagnetic radiation. disrupts the activity of the brain and the central nervous system. The effect is perceived by the individual at the same time as an unbearable painfull sensation of intense hum and squeaking accompanied by anxiety and uneasiness depending on the precise conditions and parameters of the signal”. Apparently in order to hide this information from the Czech public this article is no more accessible directly from the webpage of the Czech ministry of defense, though you can still find it on the site of the ministry, if you know the exact address of the articlehttp://www.army.cz/scripts/detail.php?id=2212. Further evidence for the fact that at least certain governments are in possession of mind control technologies can be found in political actions aimed either at the ban of mind control technologies or at their military use.
Russia was proposing the ban of radio wave weapons which it considered to be weapons of mass destruction in the U.N. Committee on Disarmamment already in 1986. The only negative vote on the committee cast the USA and so those weapons were not banned. In 1998 Russia addressed the United Nations, OSCE and the European Council with a proposal for an international convention banning the development and use of informational weapons. Until that point of time there were presented four bills proposing the ban of mind control technologies in the Russian parliament. The European union cooperated with Russia in the following year and in 1999 the European parliament passed the resolution calling for the ban of manipulation of human beings. Evidently Russia and the European union cooperated in order to prevent advances in the construction of the American system HAARP which apparently can be used to manipulate nervous systems of whole populations. It seems to be rather evident that the convention banning the development and use of informational weapons was not signed again due to the resistance of the USA. Quite to the opposite they managed to convince the countries of the European Union to accept the development of non-lethal weapons into their military doctrines and abandon their effort to ban mind control technologies. In 2001 Dennis J. Kucinich opposed the decision of the U.S. government to keep their mind control technologies and presented in the U.S. Congres the Space Preservation Act bill demanding among others the ban of those technologies. However his effort did not last long. After the long silence on this issue in 2012 Russia, facing the danger that its nuclear weapons will no more pose a threat to the USA, choose the opposite path of action and the Russian defense minister declared that psychotronic weapons are part of the Russian state arms procurement program for the period from 2011 to 2020http://en.rian.ru/mlitary_news/20120322/172332421.html.
Those actions of governments and members of parliaments together with above mentioned scientific publications present convincing evidence that devices enabling remote manipulation of human body’s functions and brain activity actually exist.
The trouble is that if you gather this kind of evidence and publish it on Internet, since no big media dare to publish classified information, your publication on Internet is targeted by government agencies. For example when I published the article How Far in the Future is the Ban of Psychotronic Weapons, messages refering to my international webpage were blocked on Facebook as spam and on Twitter as malware and finaly both my webpages (in Czech and English language) containing this information were deleted from Internet. The western and especially American secret services apparently did not want to allow to happen, in a western hemisphere, an event comparable to the Arab Spring.
We would need a systematic work to expose this activity of government agencies to the Internet public. It would mean to record with a camera the sites with this information when they are placed on Internet and as well to record with a camera when they are no more available or when the reference to them is blocked on Facebook or Twitter. The video, proving this work of government angencies should then be placed together with a new webpage address of the text in question on YouTube and the whole story should be described in articles published on Internet. To avoid a repression by the state agencies this work should be done not by only one person, but by a group of people. This would be the way to make masses of people aware that the state agencies are hiding from them their possession of technologies enabling remote control of human mind and body. If anyone wants to take part in this effort, please write me at the email@example.com.
Second way to fight the secrecy surrounding weapons enabling remote control of human nervous system is to inform the deputies of parliaments about the existence of those technologies. Most of them apparently do not have security clearances to obtain this kind of information. I have talked to two deputies of the Czech parliament and evidently none of them was aware of the possibility of remote control of the functioning of human nervous system. Yet evidently when they are not aware of the existence of mind control technologies, they do not feel the obligation to implement the ban of their use. Anyway we know that deputies do not care for the issues about which the general public does not care. So the public pressure for the ban of mind control technologies is needed to make the deputies feel obliged to work toward this goal. The MP’s should be addressed individually and we should make sure that they have received the information and citizens should be made aware which MP’s were informed. Again this could be done only by an organized group of people and this should be the same group of people who would try to inform the general public. A list should be established on Internet dedicated strictly to this effort.
The third way how to make the governments and legislative bodies enact the legislation banning the mind control technology and establish teams capable to detect those harmfull radiations is to present the evidence of the feasibility of this technology to constitutional courts and demand them to suggest the verifiable ban of development, possession and use of technologies enabling remote manipulation of human nervous system. The problem is that constitutional courts usually are not authorized to suggest new legislations. At least in the Czech Republic the constitutional court does not have this right so far. The only way around it is to file a lawsuit in the regular court and if it denies the action than challenge its decision with the constitutional court. The trouble is that to file a meaningfull lawsuit we need an irrevocable evidence. Hopefully it can be acquired it with the use of various detection devices.
The irrevocable evidence is the evidence developed in a scientific way. Most of the detectors available on the market are capable to detect frequencies up to 8 GHz. Most scientists experimenting with effects of pulsed microwave radiation on human brain came to a conclusion that carrier microwave frequencies above 3 GHz do not have any effects. The reason is that the higher the microwave frequency is the faster it is absorbed in the human tissue and for that matter it does not penetrate deep enough into the brain to produce there any effects. All the same there are windows at frequencies above 3 GHz where the electromagnetic waves will penetrate deep enough into the brain tissue to produce effects on nervous system. Among those frequencies are frequencies of the red light and near infrared light. Red light, with wavelength from 620 to 750 nanometers, penetrates, about 1centimeter deep into the brain tissue and is capable to affect about one quarter of the brain gray matter. Near infrared light with wave lengths between 700 and 800 nanometers penetrates normally 3 to 4 centimeters deep into the tissuehttp://www.nirtherapy.com/penetration.php, but when the geometrical shape of a wave of near infrared light is changed this light can be made to penetrate up to 20 centimeters deep into the human tissue. The fact that red and near infrared lights penetrate into the human tissue is explained by the fact that the average wavelength of the activity of cell tissue in the human body ranges between 600 nanometers and 720 nanometershttp://www.elixa.com/light/healing.htm which match frequencies of red and infrared light. There are studies suggesting the ability of near infrared light to affect the activity of nerve fibreshttp://www.revitavet.com/CaseStudies/MechanismsActionInfraredLightTissueHealing.pdf (pg.6).
To make human nervous system more susceptible to be controlled by pulsed frequencies of light no microchips are needed. The scientists developed viruses which can make neurons susceptible to react to pulsed frequencies of lighthttp://www.realclearscience.com/blog/2014/01/optogenetics_the_physics_of_mind_control_108437.html . So now to make a human being susceptible to manipulation of his nervous system you only need to make him eat some contaminated food or to undergo a vaccination. Just two examples: one of the pioneers of this research Gero Miesenbock cut off the head of a fly and than used the pulsed light to order its body to fly and it did flyhttp://www.sciam.cz/files/vydani/SA_03_2010/brezen_2010_rozsveceni_mozku.pdf. Another one, Carl Diesenroth, made the mouse to run making only left turns with the use of pulsed light http://www.youtube.com/watch?v=88TVQZUfYGw.
However red and near infrared lights do not penetrate walls and other optical barriershttp://paginas.fe.up.pt/~ee05005/tese/arquivos/wireless_ir_com.pdf and for that matter could not be used for continuous manipulation of human nervous system. As well the red light is visible and could be detected rather easily. There is a question whether the same viruses which could make neurons react to light will make them react to microwave frequencies from 100 Megahertz to 3 Gigahertz, which penetrate into human brain. If they will not, most probably, there is no problem for contemporary science to develop viruses which would make neurons react as well to microwave frequencies.
The frequencies of near infrared light, which is invisible, can be detected by special detectors http://www.gigahertz-optik.de/272-0-RW-3702.html. As well there is a question whether wave shapes of frequencies above 3 GHz could not be doctored up to make them penetrate into human tissue. On Internet detectors for frequencies used by NATO (20 – 40 GHz) can be found http://www.bestbuy.com/site/whistler-laser-radar-detector-black-black/1307396490.p?id=mp1307396490&skuId=1307396490.
Anyhow extensive experimentation with the available devices should be carried out in search of the evidence of the use of so called “psychoactive” pulsed microwave frequencies on human beings. If it is found, it should be presented to media and courts. Such evidence should be sufficient reason for them to demand the legislation banning the possession and use of mind control technologies to private persons as well as to organizations and government agencies. It is obvious that media as well as the courts will want to verify this evidence at the scientific laboratories. For that matter it is worth effort to ask scientific laboratories for the verification of this evidence even before it is presented to the media or courts. Many scientists are kind people and when facing convincing evidence recorded on video they may be willing to verify it using their precise equipment.
Now what convincing evidence means. According to various studies the power density of electromagnetic radiation in the cities is most of the times no more than 5 microwatts per square centimeter. However in an Indian city the measurement reached 1mw per square centimeter. Most scientists, who experimented with the effects of microwave radiation on human organism agreed that the necessary power density does not exceed 10 mW/per sqare centimeter. In the experiment by Allen H. Frey with microwave auditory effect the average power density varied for different frequencies and pulse widths from 0,4 mW per square centimeter to 7,1 milliwat per square centimeter. In Ross Adey’s experiments with calcium efflux from nervous system, the efflux occurred only within the range of power density from 0,1 to 1mW per square centimeter or in other units he had the best results when using the intensity of electromagnetic field of 10 V per meter and 56 V per meter. For the fact, that power density of mind control frequencies is close to electromagnetic smog in the cities it is advisable to make the measurements of power density outside of cities. The measurements should be made as far away from the cell phone antennas as possible and away from power lines underneath which the intensity of electromagnetic field may reach 100 V per meter and as far away as possible from high voltage power lines underneath which the intensity of electromagnetic field may reach 10.000 V per meter. The measured person should be approaching the measuring person from distance so that the measuring person could see and record on video camera whether the power density is rising with the approaching measured person. The experiment should be repeated several times. The device for measurement in Volts per meter of intensity of electromagnetic fields in frequencies from 5 Hz to 400 KHz (with accuracy 1 microwatt per square centimeter) and power density of electromagnetic fields in frequencies from 300 Megahertz to 2000 Megahertz (2 Gigahertz) in milliwats per square centimeter can be found on Internet as Electromagnetic radiation detector DT-1180 and can be bought for 21 U.S. dollars.
As for frequency counters it is rather impossible to find evidence of microchips in the city as well as outside of the city due to the overwhelming presence of electromagnetic waves in the modern environment. But there are caves or ancient mines accessible to the public, where electromagnetic waves in microwave frequencies do not penetrate. Personnel at those sites does not object to performing measurements at their facilities. If the chip is not getting its energy from the outside antenna, it should be working still when it is in the cave or mine. It should be measured by frequency counter (the frequency counter Aceco FC-6002 Mk2 registering frequencies up to 6 Gigahertz can be bought for 149 euros) as well as by a device measuring the power density and the measurements should be recorded on the camera. The measurements should be repeated on the same spot in absence of the measured person and on a person which is not claiming to be targeted by brain control radiation and they should be repeated several times in front of the camera. The video recordings should be then presented to scientists who have access to electromagnetically shielded rooms and they should be asked to verify the presence of the chip with their equipment. The scientific evidence should be than presented to the media and courts. (To save money one could start with buying only the Electromagnetic radiation detector). If anybody finds the evidence I would be glad if he lets me know at the e-mail address firstname.lastname@example.org .
There is one more experiment which could be worth effort, though it would not bring out any objective evidence. It should be tried how much the experience of a person who claims to be targeted would change when the magnetic field in which it is situated changes. When Ross Adey carried out his experiments with calcium efflux from neurons, other scientists found out that they had to use different frequencies of microwave pulses than Ross Adey to obtain the same results. When searching for the reason of this phenomenon, they found out that those were the variations of the strength of the magnetic field of the Earth at the locations of their experiments which were responsible for the variations in effective pulse frequencies in their experiments. Finally Ross Adey placed next to chicken brains he was experimenting with a Helmholtz coil, which cut in half the Earth magnetic fields. Now to cause the efflux of calcium from neurons he needed instead of pulse frequency of 15 Herz a frequency of microwave pulses of 30 Herz. The explanation for this phenomenon is the cyclotron resonance. For that matter it would be important to see if the experience of a targeted person would change in the presence of a strong artificial magnetic field or Helmholtz coil. In the 70’s of the past century the hair dryers helmets produced magnetic fields of about 30 Gauss. The strength of the Earth magnetic field varies from 0,25 to 0,65 Gauss). If the current hair dryers helmets still produce strong magnetic fields it would be worth effort to see if the experience of a targeted person would change, when it is drying its hair in the helmet (If not it would be worth a try to buy someplace the old helmet). If the experience of several persons claiming to be targeted would change due to the effect changed Earth’s magnetic field this would be a definitive proof that those persons are subjected to the effects of pulsed microwave radiation and the only remaining problem would be to find the carrier frequency used against those individuals (if anybody tries it, please let me know the results at the email@example.com ). Another way to experience a strong artificial magnetic field would be to undergo examination with magnetic resonance which usually lasts more than half an hour. Solenoid would work as well.
I believe there should be a list created on Internet dedicated strictly to scientific research concentrating on the possibility of the use of pulsed electromagnetic waves against people.
Some eight years ago I have seen on Internet a proposal by Chinese scientists to develop a direct brain to brain communication with the use of the concept of non local electron and photon connection. You probably know that this concept of quantum physics states that when two electrons or photons make an encounter, ever since their reactions are coupled no matter how far away they are from each other. It sounds quite feasible that if the photons and electrons in two brains or in a brain and a neurocomputer are made to meet, the two brains or a brain and a neurocomputer will become intertwined. As we have seen in this lecture the near infrared light can be made to penetrate 20 centimeters deep into the brain. Perhaps this could be the way how to make acquainted the photons in two brains and interconnect one brain with the other brain or with the computer simulating brain activity. I am aware that to detect such a malicious act by some government organization is rather impossible once it was done. I wonder whether the weapons using unknown physical concepts, the development of which the Russians recently announced, include this concept. The possible defense against this kind of manipulation of human brain could be the replacement of “acquainted” photons in the brain by new photons by means of a long exposure to near infrared light. If anybody tries it, it would be worth effort to get the near infrared light generator generating the light penetrating 20 cm deep into the tissue (with adjusted wave shape). He should as well make sure that it does not generate near infrared light which is warming up the tissue and could cause him a brain damage. The near infrared light is warming up the tissue only by 0,2 degree Celsius. If anybody tries this method, please let me know the results at the e-mail firstname.lastname@example.org .
To conclude my lecture I would like to stress one more time that in the modern times, with incredible advances the science and technology are making, the ban to access human brain by various radiations from the part of governments or malicious organizations or individuals should be embedded in constitutions of all of the countries of the world. Otherwise the concepts of independence of a human being and democracy will be destroyed.
At present time the major obstacle to reaching this goal is the effort of the USA and its financial and corporate elites to reach global power instead of sharing it with Russia, the European union and other democratic countries as well as with China. If the human world is supposed to have any humanistic and democratic future the struggle for world dominance by individual governments must be stopped.
This report details the secret exotic weapons programs outlined in US House Resolution #2977. This very impressive array of weapons concepts is something everyone should know about.
“Sweeney’s ex-wife was not the focus of an investigation, nor was she a witness. Her ex-husband, however, had been targeted by the Malheur County Sheriff’s Office for a campaign of harassment and defamation that would eventually destroy his business and drive his family out of the state.”
“In the absence of evidence that Gillette and Hoyt had done anything illegal, the MCSO escalated from defamation to undisguised intimidation. Investigators hired by the family would later discover that Sgt. Speelman and his comrades systematically contacted the Gillette family’s friends, relatives, and business associates, telling them that criminal charges against Sweeney were pending.”
“But it’s also something that everyone in the United States should read, because it demonstrates exactly what lengths the intelligence community is willing to go to—and what happens when they take the fruits of the surveillance they’ve done and unleash it on a target.”
“The entire letter could have been taken from a page of GCHQ’s Joint Threat Research and Intelligence Group (JTRIG)—though perhaps as an email or series of tweets. The British spying agency GCHQ is one of the NSA’s closest partners. The mission of JTRIG, a unit within GCHQ, is to “destroy, deny, degrade [and] disrupt enemies by discrediting them.” And there’s little reason to believe the NSA and FBI aren’t using such tactics.”
Unredacted letter here: http://www.nytimes.com/2014/11/16/magazine/what-an-uncensored-letter-to-mlk-reveals.html
“There are multiple “revenge” packages available on the website designed to help ruin the subject’s life. He claims it’s all “legal” because they never physically touch the subject.”
“He claims they got started exposing businessmen who went over to Thailand to “pop off”. I know the American government was involved in operations in Thailand trying to track visiting pedophiles who engaged in child prostitution there.”
Is Barack Obama Attempting To Harass And Intimidate Media Personalities On His ‘Enemies List’?
“An unusual thing has happened every night this week. When I arrive home and get out of my vehicle, I can hear loud music in my house. Each night I have discovered that our in-house stereo system was turned on with the volume at the maximum level. The music was so loud each night I could hear it when I got out of my vehicle in the driveway. My neighbors must think I’m losing my hearing….or my mind!”
“In short, the Chico Police Department was secretly keeping tabs on Gill as a suspected terrorist. Yet nowhere in the SAR was there a scintilla of evidence that he was engaged in any kind of criminal activity whatsoever. Nevertheless, that report was uploaded to the Central California Intelligence Center, one of a network of Department of Homeland Security-approved domestic intelligence fusion centers. It was then disseminated through the federal government’s domestic intelligence-sharing network as well as uploaded into an FBI database known as e-Guardian, after which the Bureau opened a file on Gill.”
“We do not know how many government agencies now associate Wiley Gill’s good name with terrorism. We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.”
Melanie Vritschan: We have evidence now that NSA is behind the Transhumanist Agenda
European Coalition Against Covert Harassment
“When Apple and Google unveiled new encryption schemes last month, law enforcement officials complained that they wouldn’t be able to unlock evidence on criminals’ digital devices. What they didn’t say is that there are already methods to bypass encryption, thanks to off-the-shelf digital implants readily available to the smallest national agencies and the largest city police forces — easy-to-use software that takes over and monitors digital devices in real time, according to documents obtained by The Intercept.”
“The manuals describe Hacking Team’s software for government technicians and analysts, showing how it can activate cameras, exfiltrate emails, record Skype calls, log typing, and collect passwords on targeted devices. They also catalog a range of pre-bottled techniques for infecting those devices using wifi networks, USB sticks, streaming video, and email attachments to deliver viral installers.”
“We refer to “symptoms” as both “effects” and “control mechanisms”. They have both functions at once.”
She starts talking about electronic rape at about 8 minutes.
Spies Found Torturing People In Homes For Mind Control
The Justice Department is claiming, in a little-noticed court filing, that a federal agent had the right to impersonate a young woman online by creating a Facebook page in her name without her knowledge. Government lawyers also are defending the agent’s right to scour the woman’s seized cellphone and to post photographs — including racy pictures of her and even one of her young son and niece — to the phony social media account, which the agent was using to communicate with suspected criminals.
“Chances are that some of you reading this are being Government gang stalked. There is so much going on with this story that I could never do it justice in a few short articles. Government gang stalking is different than all other gang stalking because it represents the ultimate betrayal to not only the victims, but to the country itself. It isn’t only tyranny in the classic sense, it’s also traitorous. It means that in many cases those who have taken an oath to defend our constitutional rights have violated that oath. You have for some reason without due process been declared an “Enemy of the State.”
Above left: Image from the Mini Z handheld backscatter X-ray. The same type used in airports and border checkpoints but can be aimed unsuspectingly and can cause cancer if used improperly. Right: Handheld V2K device for direct voice to skull communication.
“OK so moving on there was the street theatre and that’s where strangers put on a show for you. They start to talk about things that they know will relate to you personally and these are called triggers.”
“Every time I would run into him, the same song would play on the radio of my car or any car we were in. One day before I started my car I told him the song that was going to play on the radio. Sure enough, he said: “How did you know that?” and I said: “Because it’s always the same song every time I run into you.” He said: “Yeah, but it was the first song. Not like the third song it was the first song.” I said, “That’s because I’m being watched.”
“A case just ruled in favor of Kathleen Watterson, Joshua Tree, CA. was proved by her hiring her own investigative expert. He proved that she was being bombarded with microwaves from a stalkers satellite dish aimed at her house from next door by bringing in test equipment and testing over the period of about 2 months. This means it can be done on your own.”
“The last time I told you about the silent kill and how it referred to having the target commit suicide. There is another method of silent kill and this is done using high tech wave weaponry.”
Organized Stalking, Gang Stalking, Mind Control Technologies, Targeted Individual
Satellite Terrorism Interview with Dr John Hall
“Gang stalking” – also known as “organized stalking” – is a slang term for a set of tactics used in counterintelligence operations involving the covert surveillance and harassment of a targeted individual.
Read more at: http://fightgangstalking.com/what-is-gang-stalking/
“There has been a lot of justifiable outrage about the invasion of privacy of celebrities and the posting of their private, nude photos at 4Chan by hackers who apparently got into their cloud accounts.”
(I love when they call this stuff “news”)
“And beyond domestic privacy concerns, Snowden warns, the program could cause an international diplomacy nightmare for the U.S. as well, because the cyberattacks launched by MonsterMind are often routed through third-party computers housed in foreign countries.”
“I think they think there’s a smoking gun in there that would be the death of them all politically,” he says. “The fact that the government’s investigation failed—that they don’t know what was taken and that they keep throwing out these ridiculous, huge numbers—implies to me that somewhere in their damage assessment they must have seen something that was like, ‘Holy sh_t.’ And they think it’s still out there.”
“GIRARD’S STORY, HOWEVER STRANGE, reflects what TIs around the world report: a chance encounter with a government agency or official, followed by surveillance and gang stalking, and then, in many cases, voices, and pain similar to electric shocks. Some in the community have taken it upon themselves to document as many cases as possible. One TI from California conducted about 50 interviews, narrowing the symptoms down to several major areas: “ringing in the ears,” “manipulation of body parts,” “hearing voices,” “piercing sensation on skin,” “sinus problems” and “sexual attacks.” In fact, the TI continued, “many report the sensation of having their genitalia manipulated.”
“After a landmark court case, a California Targeted Individual victim of a secret cell tower radio frequency directed energy weapon, won her case in court against her perpetrator, she has been inundated with other targets pleading for help. The win has stirred the strong emotions and hope of hundreds of innocent targeted individuals, all claiming they are being attacked by secret microwave weapons used for mind control and to torture them.”
How the NSA hacks PCs, phones, routers, hard disks ‘at speed of light’: Spy tech catalog leaks
“A leaked NSA cyber-arms catalog has shed light on the technologies US and UK spies use to infiltrate and remotely control PCs, routers, firewalls, phones and software from some of the biggest names in IT.”
“As you clack away on the keyboard, your phone’s accelerometer can pick up the tiny impacts resounding through your desk and, based on the distance of the keys from the phone, mathemagically deduce which keys you’re stroking.”
“And the NSA tracks people’s porn-viewing habits in order to discredit activists. The NSA also keeps nude and suggestive photos of people in order to blackmail them.”
“The U.S. government decided to smash Chelsea Manning—absolutely smash her—to send a signal to everyone: Don’t you ever think about telling people what’s really going on inside the U.S. military and its abuses. And they tried to smash also the next most visible person and visible organization, which was WikiLeaks, to get both ends – the source end and the publishing end.”
“At the heart of his case, and of so many others, is the question of whether the Internet will remain a free and open platform for communication, or a commodity controlled by a few corporations, censored and surveilled by the U.S. national-security apparatus.”
Nomads of the Digital Age
Read more at: http://www.commondreams.org/view/2014/07/10-0
“In the last few years of his life, Ernest Hemingway grew paranoid and talked about FBI spying on him. He was even treated with electroshock therapy as many as 15 times at the recommendation of his physician in 1960. It was later revealed that he was in fact being watched, and Edgar Hoover had personally placed him under surveillance.”
“…they set up a key logging app which monitors the keystrokes on the laptop and encodes this information for acoustic transmission.”
“Acoustical networking as a covert communication technology is a considerable threat to computer security,” say Hanspach and Goetz.
“Here’s three weapons technologies the US military has developed to directly monkey with people’s nervous systems.”
Fusion Centers even watch our shopping habits!
OMG! We’re terrorists now if we don’t like to celebrate Holy-days by shopping for redundant crap!
– See more at: http://xrepublic.tv/node/9242#sthash.HPk1tmaX.dpuf
Fusion Center Update:
“After the terrorist attacks of September 11, 2001, the federal government created “fusion centers,” so that local, state and federal law enforcement agencies would have a way to share information and perhaps prevent more terrorist attacks. A Senate subcommittee report found the centers had little utility in that role…”
New report exposes US government’s treatment of social movements as ‘criminal or terrorist enterprises’
Read more at: http://www.commondreams.org/headline/2014/05/23-7
“The weapons operate at the speed of light; they can kill, torture and enslave; but
the public are largely unaware that they exist, because these weapons operate by stealth
and leave no physical evidence,” writes Harlan Girard of the Institute of Science in
Society in London. “By widely dispersing the involuntary human test-subjects, and
vehemently attacking their credibility, it has been possible for the United States to
proceed with these human experiments unhindered by discussions or criticisms, let
“The U.S. government first woke up to the threat of energy weapons when, in the early
1960s, it made the sensational discovery that the Soviets had been directing
electromagnetic and microwave emissions at the U.S embassy in Moscow”
Read more here: https://freedomfchs.com/pdfs/byronbweaponsofmc.pdf
WIKILEAKS: NSA Spying Expands to Hotel Rooms
“But we cannot work otherwise!” The agents of terror invariably justify their crimes. Let’s cut it short. Terrorizing others is not a job, it is a crime. Laws sanctioning that are illegitimate. Agencies enforcing them are illegitimate.”
Read more here: http://www.roitov.com/articles/newyork.htm
While April 10 is one day of action, the conversation around fusion centers must continue hand in hand with our national discourse around NSA, CIA, and FBI surveillance.
Where can I get more information about fusion centers?
2013 Brennan Center Report on National Security and Local Police
2013 StopLAPD Spying People’s Audit
2013 ACLU of Northern California Examples of Suspicious Activity Reports
ACLU of Massachusetts and National Lawyers Guild documents from Boston PD
2013 United States Government Accountability Office Report on Fusion Centers
2012 Senate Subcommittee Report: Federal Support for and Involvement in State and Local Fusion Centers
2012 Policing Dissent report from ACLU of Massachusetts and National Lawyers Guild
2012 Counterterrorism Intelligence: Fusion Center Perspectives report from George Washington University Homeland Security Policy Institute
2012 Constitution Project Report on Fusion Centers
2010 Political Research Associates Report: “Platform for Prejudice”
2009 Suspicious Activity Reporting Standards from the National Suspicious Activity Reporting Initiative
2008 Congressional Research Service Report on Fusion Centers
2007 “What’s Wrong With Fusion Centers” report from National ACLU
StopLAPD Spying Home Page
Fusion Center blog posts from ACLU of Massachusetts
Department of Homeland Security Fusion Center page
Please visit and support the Electronic Frontier Foundation for digital privacy and freedom.
Navy to unveil railgun in San Diego
“Frankly, we think it might be the right time for them to know what we’ve been doing behind closed doors in a Star Wars fashion,” he said. “It’s now reality. It’s not science fiction. It’s real and you can look at it.”
“But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.”
10 Unnerving Secrets Of The FBI
They’ve been targeting people for generations. Lots of suicides.
Christopher Soghoian: Government surveillance — this is just the beginning
– See more at: http://xrepublic.tv/node/7847#sthash.ryQPOG28.dpuf
They don’t just want to know about you…
they USE the information to set you up! 906-291-1376
– See more at: http://xrepublic.tv/node/7613#sthash.E3dhSntI.dpuf
Military technology used by domestic law enforcement.
“In the annals of internet conspiracy theories, none is more pervasive than the one speculating paid government plants infiltrate websites, social network sites, and comment sections with an intent to sow discord, troll, and generally manipulate, deceive and destroy reputations. Guess what: it was all true.”
“In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.”
Department of Homeland Security fusion centers–gangstalking superstore
They sicced dogs on her and kicked her out of government buildings.
Read more at: http://beforeitsnews.com/terrorism/2014/02/target-americans-fusion-centers-drone-surveillance-joint-terrorist-task-force-jttf-cops-trained-in-fusion-centers-2448194.html?utm_content=awesmsharetools-fbshare-small&utm_campaign=&utm_source=direct-b4in.info&utm_term=http%3A%2F%2Fb4in.info%2FdS5X&utm_medium=facebook-post
THE NSA’S MISSION AND DOMESTIC INTELLIGENCE OPERATION
- Communications Intelligence (COMINT)
Blanket coverage of all electronic communications in the US and the world to ensure national security. The NSA at Ft Meade, Maryland has had the most advanced computers in the world since the early 1960s. NSA technology is developed and implemented in secret from private corporations, academia and the general public.
- Signals Intelligence (SICINT)
The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and track persons with the electrical currents in their bodies. Signals Intelligence is based on fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves. The NSA/DoD [Department of Defense] developed proprietary advanced digital equipment which can remotely analyze all objects whether manmade or organic, that have electrical activity.
- Domestic Intelligence (DOMINT)
The NSA has records on all US citizens. The NSA gathers information on US citizen who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent national security anti-terrorist surveillance network in place. This surveillance network is completely disguised and hidden from the public.
Tracking individuals in the US is easily and cost-effectively implemented with NSA’s electronic surveillance network. This network (DOMINT) covers the entire US, involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously . Cost-effective implementation of operations is assured by NSA computer technology designed to minimize operations costs. NSA personnel serve in quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track.
NSA personnel in the community usually have cover identities such as social workers, lawyers and business owners.
- Individual Citizens Occasionally Targeted for Surveillance by Independently Operating NSA Personnel
NSA personnel can control the lives of hundreds of thousands of individuals in the US by using the NSA’s domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen.
NSA DOMINT has the ability to assassinate US citizens covertly or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.
|Electronic torture, Electromagnetic torture, Microwave torture, Electronic murder, Electromagnetic murder, Microwave murder, Organized murder, Cooked alive, Electronic mind control, Electronic mind reading, Brain zapping, People zapper|
|July 12, 2012: New! STOPEG forum, contact others, exchange information, etc.|
This website is the home of the following domains (I registered these domains to make sure they will not be used to prevent exposure of these horrible crimes):
|See also: Peter Mooring: http://www.petermooring.nl/blog/, People cooker: http://www.peoplecooker.comSTOPEG Foundation – STOP ELECTRONIC WEAPONS AND GANG STALKING: http://www.stopeg.com|
|[Mar 31, 2013] Survivors on Barack Obama’s Targeted Kill List presented evidence of being slowly killed while used for barbaric, cruel and unusual, torturous research, to Senator Ron Wyden of Oregon. A Targeted Killing advocacy group presented documentation of the United States intelligence community applying covert slow-kill methods to silence victims while using them for research in American communities.|
“- The pain is unbelievable. It involves tones, harmonics, hissing, stabs, blows, voice to skull transmissions, induced dreams (nightmares), burning sensations in the body and head, internal burning sensations inside of the body and head, crawling sensations on the body (phantom touch), electronic rape, induced and unwanted urination or orgasms, holographic inserts, and many other horrible tortures. My thoughts seem to be scanned every second.”
Read more at electronictorture.com
Here’s one time they tried to kill me: October 24, 2011
“Sick, I was as sick last night as I’ve ever been in my life and it was frightening. I was instantly drenched, the deluge left hot-flashes in the dust. Mud. I was losing consciousness, other times I’ve always been conscious, and I never, ever felt what my heart and breathing did. I was ripping off clothes and calling George to come pray for me. Then I couldn’t talk. My limbs started jerking at one point, oh it was so scary. As George prayed for me there were some guttural vocalizations, my breathing calmed down and eventually the palpitations and sweating stopped. He put “Calamity Jane” on TV as I recovered, and started working at a nearby computer.
I asked him, “You know I’ve been really struggling since the haunting left. I haven’t interacted much with the spirit realm, and I’ve questioned my definitions. But this time, I really was attacked, wasn’t I?” His answer shook me up. He said, “I didn’t want to tell you this, but all day long your neck and face looked like you weighed twenty pounds more than you do.” By that time I could sit up and he looked at me. ”You look completely normal now.” He still believes in demons too.”
(I wrote about 125 pounds of this stuff…I swore to much of it and had it notarized.)
(I sent a lot to Dad…he wouldn’t talk to me.)
(We did talk once, right around this time. He said my book was exceptional, called me ‘scary’ and brought us tons of food from a Halloween party. I don’t know if the attempt on my life came first but I could probably figure it out from my notes.)
Psychotronic Behavior Modification
Remote Neural Monitoring
“Full synthetic telepathy, meaning they are able to read your thoughts, they can see through your eyes and maintain a direct conversation with your thoughts.”
“They may even induce images, short films and sequences directly into your brain.”
Comment to this site:
My name is Noah Edward Washken.I’m living in Woburn Massachusetts, there are over ten people at least right now electronically harassing me, gang stalking me , and these attackers stated that they are part of the Federal Government. They have community stalked me as well. Changing the face of my town or city where I reside to isolate and torture me. I have pictures of these attackers, documentation on the subject, reports to police, picture of the outline of one attacker pointing a firearm at me when I was on vacation with my family Fourth of July 2013. I have had the proper medical evaluations clearing me of having any mental disorder. They have Put these RNM (remote neurological monitoring) devices illegally in my family, including children with threats of harming them. The FBI broke into our homes and injected us through needle point. I have there voices stating who they are and the crimes that they have committed on a digital recorder that I had purchased. I have Native American Ancestors, and I am direct blood relation to Ann Pope and George Washington. With the gathered evidence and documentation can somebody please tell me the proper lawyer so I can file a law suite for my family, community, and my self.Thank You 1-3-2014
Electronic torture is finally being recognized in court…a guy got a protection order!
“privacy-invasive remote interrogation and behavioral influence applications.”
(From last summer)
Open letter to Representatives MIKE ROGERS, JUSTIN AMASH & Dr. DAN
I would speak to my Congress about my government’s practices of torture.
When Richard Wurmbrand came to the U S after spending many years in the prisons of Ceausescu’s Romania, he removed his shirt before Congress. He testified of things he had suffered at the hands of a repressive government. America permitted him the privilege to display his scars. He was barefoot, because he couldn’t wear shoes. His torture came to a demonstrable end, due to the principles held dear by the United States of America. America now neither values, nor exercises those principles. America tortures its own.
I was the victim of torture. My long-term torture went unrecognized by those closest to me, because my behavior is frequently unusual. I interact with a realm my family knows. I talk to spirits. They do too. This fact became apparent to my torturers, and made me a more interesting victim. It also made me accept their interventions, and to continue in love. My love has grown tough. My love of truth became paramount, and indefatigable. I will have it.
Today’s avant garde torture tactics are frequently not recognized by the victim. I know myself very well. I am obedient. I usually only obey God, but he told me to obey sometimes, the other voices I was hearing. They were perverse. I suppose a person without God would find these irresistible. My heart goes out to all thus afflicted.
Remotely-induced pain does not sate the lust of American torturers. All aspects of life, for the targeted individual must be destroyed: relationships, finances, health, sanity, reputation, activities, even family members. Torturers target entire families. Electronic torture does leave physical scars as well, although these can always be attributed to natural causes. “Mental illness” frequently bears much of the blame for unexplainable sensations and actions. My novel, published in 2011, documents my experience. Two years of torture are detailed in my multi-volume sworn affidavit.
Gang-stalking” takes many forms. When covert techniques fail, sillier methods are attempted These are unbelievable and discussing them is impossible. Resulting isolation is debilitating, for one who is alone. I was not, and demonstrated the fact to the neural monitors. I recorded my experiences, swore to my words, notarized and sent them away. It’s documented that I have not seen them again.
Although I often considered the similarity of my torment to the woes of electronic-harassment-victims I’d studied, I dismissed the concept. It could not be possible that I was important enough to merit such ministrations. In America, nobody has the luxury of underestimating himself. Apparently, we’re all pretty important. Those often considered weakest, are the most important. As it stands, and I am indeed still standing, I give my heartfelt thanks for efforts that turned me into my torturers’ worst nightmare. I was without purpose, and they gave me just that.
It is with little satisfaction, but ultimate confidence that I say, many who read my words will wish they’d never been born. I am glad they were. The goons are forgiven, by myself and Almighty God. So are my parents, who set the hounds on me. However, this will mean little if each participant refuses to embrace truth. I await but will not influence the circumstances that will, inevitably, provide that opportunity. Their fate is in their own hands. Mine is the property of an entirely different realm, as I have demonstrated.
Soon, I won’t even remember this bullshit. Before that day, however, I will speak to those who abused me. I will look them in the eye. I will not watch them quiver, because Jesus is merciful and knows I don’t like pain. I don’t like to watch people naked, or at their weakest moments. I don’t get my rocks off hurting people. Neither does He, but he’s far tougher than I, and has demonstrated the extent of his commitment to truth and justice.
I suspect Edward Snowden hadn’t the stomach any longer, to torture for a living.
I suspect he gave blood at the office, and knows he has no hope for a normal life unless he changes the world. I know how that feels. Consider it done.
I say on behalf of Him who has demonstrated his omniscience on my behalf, “It is finished.”
Linda Goldthorpe, American citizen, Michigan Congressional District 1
Psychotronic Weapons Today
Yes, Virginia, they can read your mind…
(Actually this is kind of psychotronic weapons a couple decades ago but this Powerpoint pretty much sums up the state of our world.)
“PSYWAR operations can be summarized as conveying message events. Beyond the face value of the message, the people behind these operations want to make clear to the victim that they can listen to and change media content. A clear example I experienced, was when an informant of the authorities working in my church congregation approached me one Sunday and out of the blue began talking about vaccines, a topic I cannot remember touching on for many years; the respective person doesn’t use the internet. He explained at length that Bolivians didn’t get tuberculosis vaccines and thus this disease was widespread in the country. Shortly after, I went to an internet kiosk and checked my email. The act was unrelated to the preceding chat. All the banners in the pages I opened advertised vaccines of different types; an event I had never witnessed before. Somebody was attempting to show me his power.”
“Open surveillance is one of the most intimidating options for PSYWAR operations.”
“I spoke about these issues with authorities of the country that gave me political asylum, but later became my torturer and violator. They did not deny my complaint; moreover, the state lawyer told me you should get used to that, implying these were legal events. However, that’s just throwing sand in the eyes of the citizens. As a matter of fact, all these activities are severe violations of the Article 12 of the Universal Declaration of Human Rights:
No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.”
“There were 40 fusion centers when the report was published. Six months later there were 58 fusion centers and a growing number of news reports illustrating the problems we identified, so in July 2008 we published a follow-up report. Today there are at least 77 fusion centers across the country receiving federal funding.”
“… a number of troubling intelligence products produced by fusion centers have leaked to the public:”
“These bulletins, which are widely distributed, would be laughable except that they come with the imprimatur of a federally backed intelligence operation, and they encourage law enforcement officers to monitor the activities of political activists and racial and religious minorities”.