In addition to the videos below, please see here about nanotechnology and catching a potential virus.
Exposing Intelligence Agency Human Rights Abuses, Government and Corporate Corruption Along with the Problems of Zionism. The Foundation of Freedom is Freedom of Thought and Freedom of Speech
Wednesday, February 24, 2016
Human Infected With Computer Virus Via RFID Implant
In addition to the videos below, please see here about nanotechnology and catching a potential virus.
Tuesday, February 23, 2016
Can Someone Influence Your Behavior and Affect Your Judgment So it Makes it Harder For You To Tell The Difference Between Right and Wrong?
Click through on the links below to:
1. Morality Study Narrows Gap between Mind and Brain
2. Morality is modified in the lab
3. Scientists Show that They Can Change People's Moral Judgments
4. Watch this video starting at 35:20.
5. Professor Creates Remote Control People (Based on the work of Jose Delgado, see here for bull example. These examples are very crude compared to what they have today. Imagine how the same could be done with nanotechnology: see here and here for more information.
6. Watch this video about using synthetic telepathy. This is classified technology that allows two brains to connect. What this demonstrates is how one brain can influence another at a distance. Or, how you could influence the EEG of another person's brain. What can you do when you change the EEG of another person? You can change who that person is. Effectively, two brains become one. There have been scientific studies conducted that show how a BCI (Brain-Computer Interface,) can change the neuroplasticity of a human brain. This is one of the reasons why ethical considerations plague anything that alters the human mind.
7. See these three patents: here, here and here.
8. Watch this video about DARPA brain implant and guinea pigs.
9. Watch this video that has been put together using government documents and talks about the use of nanotechnology, augmented cognition and synthetic telepathy.
10. Watch this video of an amateur techie driving a remote control car with his thoughts.
11. Connecting Brains: Merging Two Brains to Become One --- Or The Ethical Implications of When "I" Becomes "We"
12. BCI- The Brain Computer Interface
13. Homemade Mind Controlled TV Remote & Controlling Your Computer With Your Mind
14. Human Moves Rat's Tail With Thoughts Alone
15. Gamer - Nanotechnology - Classified Technology - and Covertly Influencing People
16. Watch this old CNN clip from 80's discuss what they could do way back then. One of the people they interview is Jose Delgado and the other is a pioneer in Bioelectricity and Bioelectromagnetism named Robert Becker.
17. See this Cisco commercial admitting that synthetic telepathy, (telepathy with technology,) is possible
18. See here for where Mark Zuckerberg talks about synthetic telepathy.
19. See here and here for more information about mind control.
Do you understand the implications of this and the other documents I've posted?
I think it's important to realize that we live under what some people have coined a pseudo "Panopticon." For, in a true panopticon you would KNOW the level of surveillance that you are under. But, if you don't know about the existence of any of this technology, how do you know what the truth is in this world?
Think about it for a second. How much of your tax money is going into creating a technological surveillance-dictatorship?
1. Morality Study Narrows Gap between Mind and Brain
2. Morality is modified in the lab
3. Scientists Show that They Can Change People's Moral Judgments
4. Watch this video starting at 35:20.
5. Professor Creates Remote Control People (Based on the work of Jose Delgado, see here for bull example. These examples are very crude compared to what they have today. Imagine how the same could be done with nanotechnology: see here and here for more information.
6. Watch this video about using synthetic telepathy. This is classified technology that allows two brains to connect. What this demonstrates is how one brain can influence another at a distance. Or, how you could influence the EEG of another person's brain. What can you do when you change the EEG of another person? You can change who that person is. Effectively, two brains become one. There have been scientific studies conducted that show how a BCI (Brain-Computer Interface,) can change the neuroplasticity of a human brain. This is one of the reasons why ethical considerations plague anything that alters the human mind.
7. See these three patents: here, here and here.
8. Watch this video about DARPA brain implant and guinea pigs.
9. Watch this video that has been put together using government documents and talks about the use of nanotechnology, augmented cognition and synthetic telepathy.
10. Watch this video of an amateur techie driving a remote control car with his thoughts.
11. Connecting Brains: Merging Two Brains to Become One --- Or The Ethical Implications of When "I" Becomes "We"
12. BCI- The Brain Computer Interface
13. Homemade Mind Controlled TV Remote & Controlling Your Computer With Your Mind
14. Human Moves Rat's Tail With Thoughts Alone
15. Gamer - Nanotechnology - Classified Technology - and Covertly Influencing People
16. Watch this old CNN clip from 80's discuss what they could do way back then. One of the people they interview is Jose Delgado and the other is a pioneer in Bioelectricity and Bioelectromagnetism named Robert Becker.
17. See this Cisco commercial admitting that synthetic telepathy, (telepathy with technology,) is possible
18. See here for where Mark Zuckerberg talks about synthetic telepathy.
19. See here and here for more information about mind control.
Do you understand the implications of this and the other documents I've posted?
I think it's important to realize that we live under what some people have coined a pseudo "Panopticon." For, in a true panopticon you would KNOW the level of surveillance that you are under. But, if you don't know about the existence of any of this technology, how do you know what the truth is in this world?
Think about it for a second. How much of your tax money is going into creating a technological surveillance-dictatorship?
Motorola Patents E-Tattoo That Can Read Your Thoughts By Listening To Unvocalized Words In Your Throat
Imagine trying to patent the smartphone, or for that matter, the tattoo. Any company that could swing that, could probably also patent the fork and knife. Incredibly, a new application from Google-owned Motorola Mobility seeks a patent not for any particular utensil, but rather, for setting the table. In other words, if you have an electronic smart tattoo, and want it to speak to your mobile communications device, you may soon be able to do it in spades, but you will have to do it Google style.
But hold on for a minute, as there is a bit more to the whole concept than might first appear. The tattoo they have in mind is actually one that will be emblazoned over your vocal cords to intercept subtle voice commands — perhaps even subvocal commands, or even the fully internal whisperings that fail to pluck the vocal cords when not given full cerebral approval. One might even conclude that they are not just patenting device communications from a patch of smartskin, but communications from your soul.
Or maybe not. It has been known for decades that when you speak to yourself in your inner voice, your brain still sends neural spike volleys to your vocal apparatus, in a similar fashion to when you actually speak aloud. The main difference between the two, is that the nervous action driving covert speech as it is called, is subthreshold, and does not generate the full muscle contraction. The same might also be said for imagining throwing a baseball — it is probably not possible to even do so without simultaneously calling up and at least partially launching unamplified motor programs. Stated another way, your thoughts are your motor intentions, only they are not always recognizable as such if they are sufficiently abstracted.
The actual patent speaks of picking up an “auditory signal” from the tattoo, and converting it into a digital signal. The signals from the brain, carried by spikes on the hundreds of laryngeal nerve fibers (and other nerves modulating the vocal tract), are already digital. They bear no real resemblance to an auditory signal at this point. After transformation in the numerous muscles that control the speech organs, there is still no single signal that could be sent to a transducer to generate sound recognizable as speech. Looking at an image of a smart tattoo pioneered by John Roger’s Illinois-based research lab, there seems to be all kinds of sensor goodies which can be built in to pick up various biologics. I don’t know if the strain gauges could pick up an actual speech signal in the same way that a conventional microphone could, but they would certainly generate useful information. The built-in EMG and ECG electrodes would not pick up individual spikes so to speak, but could certainly generate electrical records of muscle activity, and perhaps eventually compound nerve potentials. Rogers helped to form a company, MC10, that hoped to commercialize this technology, and although he indicated that he was not involved in these recent ventures, they have joint development efforts with Motorola Mobility.
There is already a device known as a throat microphone that has been used to record an auditory signal in noisy conditions like, for example, the cockpit of a jet fighter.
Developed along with the first pressure suit back in 1934, it used a direct contact microphone to pick up sound waves traveling through solid objects such as the throat wall. Later so-called throat microphones, such as the Xbox 360 accessory, only use an open-air microphone. They do not really exclude background noise, nor have the ability to pick up unvoiced signals. What got some folks attention recently, namely those over at Patently Apple, was a few peculiar statements in the patent regarding the recording of galvanic skin responses. These guys first heard about the e-skin tattoo from Regina Dugan, the former DARPA head who is now in charge of advanced research at Motorola. Their article notes that the e-tattoo would provide a nice way to do authentication, but the seemingly out of place inclusion of the lie detection talk certainly raises some questions.
Developed along with the first pressure suit back in 1934, it used a direct contact microphone to pick up sound waves traveling through solid objects such as the throat wall. Later so-called throat microphones, such as the Xbox 360 accessory, only use an open-air microphone. They do not really exclude background noise, nor have the ability to pick up unvoiced signals. What got some folks attention recently, namely those over at Patently Apple, was a few peculiar statements in the patent regarding the recording of galvanic skin responses. These guys first heard about the e-skin tattoo from Regina Dugan, the former DARPA head who is now in charge of advanced research at Motorola. Their article notes that the e-tattoo would provide a nice way to do authentication, but the seemingly out of place inclusion of the lie detection talk certainly raises some questions.
Covert voice activation of your device in a crowd would definitely be a nice feature. Instead of actually speaking to Siri or Google Now, you could merely think your voice command. Detecting stress and other emotion could have some applicability too, although who else really needs to know if you have a lump in your throat? Perhaps I have not read that many patents recently, but there certainly did seem to be an excess of wording, and scope. Every wireless communications protocol I am familiar with was included in some form, somewhere. Not only were there definitions for words like “a” and “an,” but also actual percentages associated with a list of words like “about,” “approximately”, “essentially”, and “substantially”. Clearly this is one among several recent patents that we all may want to keep an eye on.
RFID Chips Fuse With Human Brain Cells and Can Be Controlled
You Must Watch All Three Videos Below!
Below is a video about RFID chips fusing with human brain cells and how they can be controlled. Also, there is one video with a nanobot latching onto a synapse in a brain and the very bottom video is about nanowires in the brain. See here, here, here, here, here and here for previous posts about brain chips and nanotechnology. Also, see here and here about synthetic telepathy.
Monday, February 22, 2016
Documented Radio Frequency Testing, Torture and Experimentation
In addition to the article below, see here, here and here. See here for more about microwave weapons. See here for more about classified technology.
The US Navy was testing weapons on Eugene Oregon back in the 1970's for months with microwaves. Citizens were being tortured, made sick by radio waves beamed into their homes from 500 miles away. The signals were deemed psychoactive by the Pacific Northwest Center for Non-ionizing Radiation. The story ran in the Register-Guard, and Oregon Journal. The University of Oregon, Governors Office, Senator Mark Hatfield, Congressman Jim Weaver and others confirmed it. The FCC and EPA were called in and confirmed it.
Oregon, a directed energy/surveillance system test bed. Check out the news update below for the scoop, the Register-Guard article from 3/26/1978. This confirms they have the ability to hurt people from very long ranges, and have these types of weapons installed over Oregon. (Article continues after newspapers clippings)
Eugene wavelength proves that the US military has the weapons technology to hurt people from hundreds of miles away using radio waves. Back in the 1970s, our government tested devices on Eugene Oregon and Corvallis. Over 150 complaints were lodged. Psychoactive signals were detected in peoples homes. Making them sick, creating voices in their heads, heating and chilling them, creating red skin, making them dizzy and nauseated.
This was investigated by local University of Oregon professor, and other professionals. Oregon's Governor, Senator Mark Hatfield, and Congressman Jim Weaver called in the FCC and EPA. The EPA covered it up, dodged reporters, and left the state lying about what was uncovered.
The FCC determined the signals were being emanated by the US Navy base in Dixon California, over 500 miles away from Eugene. The signals were detected all over Oregon including 3000 feet above the cities stretching for miles, specifically designed to target humans. The signals were building penetrating. This was reported March 26th, 1978 in the Eugene Register-Guard (article title: "Strong radio 'pulse' of unknown origin may cause health problems," and another article entitled "Had enough field-burning?
Try electronic smog" describing the battle between the military who denied radiation effects and environmentalists who focused on the science.), and another paper called The Oregon Journal (this is a Portland Oregon newspaper, it was the main newspaper before going defunct - before The Oregonian.) had similar coverage ("Mysterious Radio Signals Causing Concern in Oregon.")
"Was the technology tested at home on private citizens? In March 1978, the city of Eugene, Oregon, found itself inundated with microwave radiation. The Oregon Journal reported: “Mysterious Radio Signals Causing Concern in Oregon.” Federal government specialists blamed the Soviets, but the Federal Communications Commission concluded that the signal—recorded throughout the state of Oregon—came from a Navy transmitter in California.
Oregonians statewide complained of headaches, fatigue, inability to sleep, reddening of the skin, anxiety, “clicks” in the head and a “buzz” harmonizing with a high-pitched wail. Canadian researcher Andrew Michrowski wrote to Prime Minister Pierre Trudeau on September 19, 1978, citing a Pacific Northwest Center for Non-Ionizing Radiation study that found the signals “psychoactive” and “very strongly suggestive of achieving the objective of brain control.”"
Hearing “Voices” The Hidden History of the CIA’s Electromagnetic Mind-Control Experiments https://sites.google.com/site/mcrais/voices.
The radio signal that has mobilized the health division and that is expected to bring federal experts to Eugene is described by personnel at the University of Oregon and at the U of O Medical School in Portland as a "radio frequency pulse signal." The experts who have investigated the phenomenon describe it as a 4.75 megahertz pulse occurring 1,100 times per second.
"I was surprised," said Clifford Shrock of Portland, a Tektronixs Inc. engineer who specializes in radio frequency analysis. "I'd never seen anything like it before."
Shrock conducted the aerial tests that detected the powerful signal over Eugene. He sits on several FCC committees dealing with radio frequencies. He has been an editor of a technical magazine serving engineers in his field. And, in connection with his work at Tektronix, he wrote sections of the Central Intelligence Agency and National Security Agency manuals on "debugging" methods involving radio frequencies.
"I've seen things like that frequency that I could explain - like when you know you're flying directly over a big military transmitter or a transmitter on a mountaintop," he said. "But to be in that location, over Eugene, and to have a signal stay in that amplitude range for that great an area - that's something.
Van Ert, an industrial hygienist in the University of Oregon's Health Physics Office, says he was approached by the man last October. At that point, Van Ert said, the man had been to numerous public agencies and had spent more than $5,000 with private consulting firms in an attempt to identify that he was experiencing in his home and that he felt were affecting his health. (this is crazy, the guy was getting bombarded with directed energy in his home for long periods of time, no one was there to shut it down or help him - until he found the UoO guy, who pretty much solidified it was all real the whole time)
Van Ert says he visited the Santa Clara area home and also felt low-level sound and vibration. However, despite weeks of testing, he was unable to record the signal with instruments or to detect a source.
He subsequently requested the assistance of Bill Bise, a Portland broadcasting engineer who directs a small non-profit corporation founded for research on possible adverse health effects of radio waves and microwaves.
Bise and Shrock came to Eugene with more sophisticated instruments and conducted a limited series of tests which they say detected the signal at six ground locales and in the air over the city. At the same time, Van Ert conducted a series of about 25 interviews with persons who live or work in areas where the signals have been detected. A few of the contacts were in Corvallis, where aerial testing also showed the signal to be present, he said.
Although the source of the powerful signal is unknown, Van Ert, Bise and Shrock offer several possibilities. One is an errant signal from a government or military installation. Another is the possibility of a "spurious" signal, a physical phenomenon that occurs under certain conditions when two or more frequencies combine to produce another signal.
And still another possibility is "skywave," or "skip," the freak transmissions that occur when signals from a distant location bounce off the atmosphere and are directed to earth again.
This tells a story about our government (either intelligence, police or military,) or organized crime, actually attacking and beaming radiation into citizens from remote locations with incredible accuracy (I also heard about other operations they did this in, such as CIA Operation Pique, we targeted European's in that case), enough to hit a single individual, inducing illnesses and mental effects to cripple and debilitate, being tested on citizens around the world. No longer can anyone claim this is not reality, possible, and highly scientific.
Dr. Peter Breggin, a Harvard psychiatrists work, investigated this and helped the victims, he also worked along top mind control doctors at Harvard based on other sources. He has experience working with victims remotely controlled with radio waves and implants, those victims falsely labeled as psychotic by other doctors. Interesting. This shows that in fact, when people want to help others with this problem, they can, but it simply requires an uncorrupt person to do it.
"Following the nightmarish operation, Dr. Peter Breggin of the Center to Study Psychiatry, an ombudsman of psychiatric abuses, investigated Kille’s case and found—despite Mark’s and Ervin’s reports of therapeutic success—that the post-op patient was “totally disabled and subject to nightmarish terrors that he will be caught and operated on again at the Massachusetts General Hospital.”
In 1971, a hospital attendant discovered Kille holding a metal wastebasket over his head to “stop the microwaves.” A sympathetic doctor at Boston’s VA hospital, where Kille was transferred, ordered for him “a large sheet of aluminum foil so he may fashion a protective helmet for himself.” Uninformed that Kille had been fitted with electrodes, the VA doctors diagnosed him as a delusional paranoiac.
The US Navy was testing weapons on Eugene Oregon back in the 1970's for months with microwaves. Citizens were being tortured, made sick by radio waves beamed into their homes from 500 miles away. The signals were deemed psychoactive by the Pacific Northwest Center for Non-ionizing Radiation. The story ran in the Register-Guard, and Oregon Journal. The University of Oregon, Governors Office, Senator Mark Hatfield, Congressman Jim Weaver and others confirmed it. The FCC and EPA were called in and confirmed it.
Oregon, a directed energy/surveillance system test bed. Check out the news update below for the scoop, the Register-Guard article from 3/26/1978. This confirms they have the ability to hurt people from very long ranges, and have these types of weapons installed over Oregon. (Article continues after newspapers clippings)
Eugene wavelength proves that the US military has the weapons technology to hurt people from hundreds of miles away using radio waves. Back in the 1970s, our government tested devices on Eugene Oregon and Corvallis. Over 150 complaints were lodged. Psychoactive signals were detected in peoples homes. Making them sick, creating voices in their heads, heating and chilling them, creating red skin, making them dizzy and nauseated.
This was investigated by local University of Oregon professor, and other professionals. Oregon's Governor, Senator Mark Hatfield, and Congressman Jim Weaver called in the FCC and EPA. The EPA covered it up, dodged reporters, and left the state lying about what was uncovered.
The FCC determined the signals were being emanated by the US Navy base in Dixon California, over 500 miles away from Eugene. The signals were detected all over Oregon including 3000 feet above the cities stretching for miles, specifically designed to target humans. The signals were building penetrating. This was reported March 26th, 1978 in the Eugene Register-Guard (article title: "Strong radio 'pulse' of unknown origin may cause health problems," and another article entitled "Had enough field-burning?
Try electronic smog" describing the battle between the military who denied radiation effects and environmentalists who focused on the science.), and another paper called The Oregon Journal (this is a Portland Oregon newspaper, it was the main newspaper before going defunct - before The Oregonian.) had similar coverage ("Mysterious Radio Signals Causing Concern in Oregon.")
"Was the technology tested at home on private citizens? In March 1978, the city of Eugene, Oregon, found itself inundated with microwave radiation. The Oregon Journal reported: “Mysterious Radio Signals Causing Concern in Oregon.” Federal government specialists blamed the Soviets, but the Federal Communications Commission concluded that the signal—recorded throughout the state of Oregon—came from a Navy transmitter in California.
Oregonians statewide complained of headaches, fatigue, inability to sleep, reddening of the skin, anxiety, “clicks” in the head and a “buzz” harmonizing with a high-pitched wail. Canadian researcher Andrew Michrowski wrote to Prime Minister Pierre Trudeau on September 19, 1978, citing a Pacific Northwest Center for Non-Ionizing Radiation study that found the signals “psychoactive” and “very strongly suggestive of achieving the objective of brain control.”"
Hearing “Voices” The Hidden History of the CIA’s Electromagnetic Mind-Control Experiments https://sites.google.com/site/mcrais/voices.
The original two Register-Guard articles are available online in Google's newspaper index, here to read: https://news.google.com/newspapersid=PfJVAAAAIBAJ&sjid=4eEDAAAAIBAJ&pg=6423%2C7035058.
The radio signal that has mobilized the health division and that is expected to bring federal experts to Eugene is described by personnel at the University of Oregon and at the U of O Medical School in Portland as a "radio frequency pulse signal." The experts who have investigated the phenomenon describe it as a 4.75 megahertz pulse occurring 1,100 times per second.
"I was surprised," said Clifford Shrock of Portland, a Tektronixs Inc. engineer who specializes in radio frequency analysis. "I'd never seen anything like it before."
Shrock conducted the aerial tests that detected the powerful signal over Eugene. He sits on several FCC committees dealing with radio frequencies. He has been an editor of a technical magazine serving engineers in his field. And, in connection with his work at Tektronix, he wrote sections of the Central Intelligence Agency and National Security Agency manuals on "debugging" methods involving radio frequencies.
"I've seen things like that frequency that I could explain - like when you know you're flying directly over a big military transmitter or a transmitter on a mountaintop," he said. "But to be in that location, over Eugene, and to have a signal stay in that amplitude range for that great an area - that's something.
Van Ert, an industrial hygienist in the University of Oregon's Health Physics Office, says he was approached by the man last October. At that point, Van Ert said, the man had been to numerous public agencies and had spent more than $5,000 with private consulting firms in an attempt to identify that he was experiencing in his home and that he felt were affecting his health. (this is crazy, the guy was getting bombarded with directed energy in his home for long periods of time, no one was there to shut it down or help him - until he found the UoO guy, who pretty much solidified it was all real the whole time)
Van Ert says he visited the Santa Clara area home and also felt low-level sound and vibration. However, despite weeks of testing, he was unable to record the signal with instruments or to detect a source.
He subsequently requested the assistance of Bill Bise, a Portland broadcasting engineer who directs a small non-profit corporation founded for research on possible adverse health effects of radio waves and microwaves.
Bise and Shrock came to Eugene with more sophisticated instruments and conducted a limited series of tests which they say detected the signal at six ground locales and in the air over the city. At the same time, Van Ert conducted a series of about 25 interviews with persons who live or work in areas where the signals have been detected. A few of the contacts were in Corvallis, where aerial testing also showed the signal to be present, he said.
Although the source of the powerful signal is unknown, Van Ert, Bise and Shrock offer several possibilities. One is an errant signal from a government or military installation. Another is the possibility of a "spurious" signal, a physical phenomenon that occurs under certain conditions when two or more frequencies combine to produce another signal.
And still another possibility is "skywave," or "skip," the freak transmissions that occur when signals from a distant location bounce off the atmosphere and are directed to earth again.
This tells a story about our government (either intelligence, police or military,) or organized crime, actually attacking and beaming radiation into citizens from remote locations with incredible accuracy (I also heard about other operations they did this in, such as CIA Operation Pique, we targeted European's in that case), enough to hit a single individual, inducing illnesses and mental effects to cripple and debilitate, being tested on citizens around the world. No longer can anyone claim this is not reality, possible, and highly scientific.
Dr. Peter Breggin, a Harvard psychiatrists work, investigated this and helped the victims, he also worked along top mind control doctors at Harvard based on other sources. He has experience working with victims remotely controlled with radio waves and implants, those victims falsely labeled as psychotic by other doctors. Interesting. This shows that in fact, when people want to help others with this problem, they can, but it simply requires an uncorrupt person to do it.
"Following the nightmarish operation, Dr. Peter Breggin of the Center to Study Psychiatry, an ombudsman of psychiatric abuses, investigated Kille’s case and found—despite Mark’s and Ervin’s reports of therapeutic success—that the post-op patient was “totally disabled and subject to nightmarish terrors that he will be caught and operated on again at the Massachusetts General Hospital.”
In 1971, a hospital attendant discovered Kille holding a metal wastebasket over his head to “stop the microwaves.” A sympathetic doctor at Boston’s VA hospital, where Kille was transferred, ordered for him “a large sheet of aluminum foil so he may fashion a protective helmet for himself.” Uninformed that Kille had been fitted with electrodes, the VA doctors diagnosed him as a delusional paranoiac.
PATENT 6011991 [Explained] Remote Brain Computer Interface – Neural Monitoring 01.04.2000
I published this in an earlier post located here. But I think it would be good to republish it once again. Please also see this post here. In addition, this is also a good video to watch about becoming a human node in a world surveillance network. The reality is, this is already happening.
Abstract: A system and method for enabling human beings to communicate by way of their monitored brain activity. (Note: this is artificial telepathy.) The brain activity of an individual is monitored and transmitted to a remote location (e.g. by satellite). At the remote location, the monitored brain activity is compared with pre-recorded normalized brain activity curves, waveforms, or patterns to determine if a match or substantial match is found.
(Note: I can see this being applied to the human nodes on the network, (human beings under constant monitoring and surveillance) as well as going to the ABI (activity based intelligence) data being collected – going to thought based activity - for mapping & mastering the Human Domain. )
If such a match is found, then the computer at the remote location determines that the individual was attempting to communicate the word, phrase, or thought corresponding to the matched stored normalized signal.
(Note: Right now, this technology is being employed in Geospatial Intelligence, meaning you don't have the privacy of your own thoughts. This technology wasn't funded, developed and patented for government and military use to sit on a shelf somewhere collecting dust. )
DESCRIPTION: This invention relates to a system and method for enabling human beings to
communicate with one another by monitoring brain activity. In particular, this invention relates to such a system and method where brain activity of a particular individual is monitored and transmitted in a wireless manner (e.g. via satellite) from the location of the individual to a remote location so that the brain activity can be computer analyzed at the remote location thereby enabling the computer and/or individuals at the remote location to determine what the monitored individual was thinking or wishing to communicate.
In certain embodiments this invention relates to the analysis of brain waves or brain activity, and/or to the remote firing of select brain nodes in order to produce a predetermined effect on an individual.
(Note: this is remote mind control – MK-Ultra directed not necessarily by human handlers, but by a computer system that sits on a Global Information Grid in a network centric environment. They can not only monitor your thoughts but they can modify your behavior remotely.)
Generally speaking, this invention fulfills the above described needs in the art by providing a method of communicating comprising the steps of: (Note: And here are the following 9 steps that will be employed:)
1. Providing a first human being at a first location; (Note: this would be the equivalent of your patient zero or target node on the network.)
2. Providing a computer at a second location that is remote from the first location; (Note: this would be the Geospatial Intelligence Artificial Intelligence System on the Global Information Grid.)
3. Providing a satellite; (Note: this would be the 'space' component of the domain on the Global Information Grid.)
4. Providing at least one sensor (preferably a plurality--e.g. tens, hundreds, or thousands, with each
sensor monitoring the firing of one or more brain nodes or synapse type members) on the first human
being; (Note: This ties into the remote nano sensing devices discussed in Geospatial symposiums and papers.)
5. Detecting brain activity of the first human-being using the at least one sensor, and transmitting the
detected brain activity to the satellite as a signal including brain activity information; (Note: Once you're a human node on a geospatial intelligence network with a unique BioAPI or network identifier, this is a piece of cake for them.)
6. The satellite then sending this signal including the brain activity information to the second location; (Note: or in other words, down to the Global Information Grid for processing.)
7. A receiver at the second location receiving the signal from the satellite and forwarding the brain
activity information in the signal to the computer; (Note: the human terrain analysis tool and the A.I. Programs are being developed to identify the signal in the noise....this brain mapping technology goes to that aspect of GeoINT.)
8. Comparing the received brain activity information of the first human being with normalized or
averaged brain activity information relating to the first human being from memory. (Note: This goes to mapping individual human nodes (human beings on the system) for normalcy patterns, from a telepathic ABI standpoint, by way of mapping the human brain activity casting a neural net over humanity.)
9. Determining whether the first human being was attempting to communicate particular words,
phrases or thoughts, based upon the comparing of the received brain activity information to the
information from memory. (Note: If it can distinguish 'reminiscing thought' from present time/space activity communication of words, phrases or thoughts, this technology can, in essence, determine intent (just like in the movie Minority Report ) – before the action is executed by “the first human being” Can you imagine the massive implications of this technology layered on to the A.I. Core of the GeoINT network system! Do you understand the potential for abuse! Do you know that they can currently hack into Pacemakers? What do you think they will do with this?)
In certain embodiments, the invention includes the following step: asking the first human-being a
plurality of questions and recording brain activity of the first human-being response, to the plurality of questions in the process of developing said normalized or averaged brain activity information relating to the first human-being stored in the memory. A database in a memory may include, for each of a plurality (e.g. one hundred or thousands) of individuals, a number of pre-recorded files each corresponding to a particular thought, attempt to communicate a word, attempt to communicate a
phrase or thought, or a mental state. (Note: this goes to the artificial intelligence and GeoINT's ability to detect and read emotions.) Measured brain activity of a given individual may be compared to files from that database of that individual to determine what the individual is attempting to communicate or what type of mental state the individual is in. (Note: this capability is within the GeoINT context and goes to “Answering questions before they're asked.")
In certain embodiments, the plurality of questions are the same question.
In certain embodiments, the plurality of questions are different questions.
In certain embodiments, the invention includes the step of normalizing or averaging recorded brain
activity responsive to a given question or set of questions in developing the normalized or averaged
brain activity information relating to the first human being.
It is an object of this invention to enable brain activity of a first human being to be monitored, with the activity being transmitted to a remote location so that individuals and/or a computer at the remote
location can determine what the first human being was thinking or intending to communicate. In such a manner, human beings can communicate with one another via monitoring of brain activity, and
transmission of the same.
(Note: this is synthetic telepathy for humans to communicate with other humans, and the ability to read or map brain functions and send that information to a machine for processing and interpretation for an actionable response – by the AI system.)
It is another object of this invention to communicate monitored brain activity from one location to
another in a wireless manner, such as by IR, RF, or satellite. (Note: In other words over the domain of land, air and space.)
It is another object of this invention to provide a system capable of identifying particular nodes in an
individual's brain, the firings of which affect characteristics such as appetite, hunger, thirst,
communication skills (e.g. which nodes are utilized to communicate certain words such as "yes", "no", or phrases such as "I don't know", "I'm not sure", or numbers such as "one", "two", "ten", "one
hundred" and the like), thought processes, depression, and the like. When such nodes are identified,
they may be specifically monitored by one or more sensors to analyze behavior or communication or
words, phrases, or thoughts. In other embodiments, devices mounted to the person (e.g. underneath the scalp) may be energized in a predetermined manner or sequence to remotely cause particular
identified brain node(s) to be fired in order to cause a predetermined feeling or reaction in the
individual, such as lack of hunger, lack or depression, lack or thirst, lack of aggression, lack of
alzheimer's disease effects, or the like. (Note: The 'devices mounted to the person can be wetware or wearable technology. The remotely transmitted neural stimulation can also trigger the exact opposite of the predetermined feelings and reactions mentioned - - fear, depression, aggression, anxiety. How about pain? That has serious implications stemming from the complete blocking of, or the inducement of this sensation remotely.)
Brain node firings are the basis of thought and mind processes of individuals. Certain embodiments of this invention enable such brain firings and behavior to be captured by an external device. It is an
object of this invention to utilize a normalization or normalizing curve (or waveform or pattern) based upon monitored brain activity to detect or determine thought processes by the monitored individual. In such a manner, individuals can transmit by satellite what they are thinking or intending to think via their monitored brain activity, without the need to talk or write down information.
Each individual has a distinct pattern of brain node firings or brain activity. Each person is believed
to be different in this regard. Thus, a separate brain activity file may be stored in a memory for each
individual, and analyzed or compared to received brain activity from the monitored individual in order to determine what that individual is thinking or attempting to communicate. (Note: This also goes to creating a unique bio identifier for each human network node based on their individual, unique brain activity signature. This also goes to cataloging and establishing 'norms' based on an individuals brain activity in addition to the mind reading capability identified here.)
It is an object of this invention to utilize brain monitoring and transmission of monitored brain activity for lie detection and/or human communication. (Note: This AI technology would be able to “read” a person who is telling the truth or lying by the interpretation of body language, voice intonations and facial expression and make a determination for a course of action.)
It is another object of this invention to formulate or build-up a file for each individual based upon
patterns recorded in response to that individual answering or responding to numerous predetermined
questions with known intended responses. Subsequently, monitored brain activity from that individual may then be compared to information stored corresponding to that individual to determine whether the individual is lying or what the individual is intending to communicate in the monitored brain activity. The higher the level of detail of the file, the higher the level of potential communication by certain embodiments of this invention.
At least one sensor on the scalp or skin in certain embodiments provides signals representative of
physiological activity generated in the brain of a monitored individual. A data acquisition device
receives the signals representative of the physiological activity generated in the monitored brain, and
transforms the signals into a pattern or curve corresponding to the monitored brain activity. This is
then transmitted (e.g. by satellite) to a computer located at a remote location, with the monitored brain activity pattern or curve being stored in a memory at the remote location. The computer then causes the received pattern or curve information to be compared with stored brain activity pattern information relating to the monitored individual in order to determine (a) whether the monitored individual is lying in response to a particular question, or (b) what the monitored individual is communicating or attempting to communicate. (Note: They have the capability and now with the Global Information Grid in conjunction with GeoINT, to reduce humanity to the sum total of the data collected on each human network node. Not only that, your every activity, transaction, communication and yes, even your inner most personal thoughts will be cataloged and uploaded to a hive based AI system on a network centric Global Information Grid.)
Another object of this invention is to utilize normalization curves representative of received brain
activity patterns from the monitored individual, and to compare the received normalized data with
normalized brain activity pattern or curve data stored in memory relating to that individual. The use of normalization curves in one or both of the individual's file and received brain activity improves
reliability, accuracy, and efficiency.
In certain embodiments of this invention, the computer located at the remote location includes a
neural network suitably programmed in accordance with known neural network techniques, for the
purpose of receiving the monitored brain activity signals, transforming the signals into useful forms,
training and testing the neural network to distinguish particular forms and patterns of physiological
activity generated in the brain of the monitored individual, and/or comparing the received monitored
brain activity information with stored information relating to that individual in order to determine
what the individual is attempting to communicate. (Note: Again, this goes to the already known capabilities of the A.I. system and GeoINT and expands on those capabilities using remote command and control aspects of MK-Ultra.)
This invention further fulfills the above described needs in the art by providing a method of affecting a mental or physiological state of an individual, the method comprising the steps of:
1. providing at least one firing device capable of being energized on an individual; and
2. energizing the firing device to cause the firing device to cause a particular or group of brain nodes
to be fired in the individual in order to affect the mental or physiological state of the individual. (Note: Again, The “device” being referred to can be wetware, wearable technology or directed signal transmission in the form of RF, FM, microwave, ELF or electromagnetic.)
3. In certain embodiments, the method including the step of providing at least one firing device on or
under the scalp of the individual in proximity of the brain of the individual.
4. In certain embodiments, the method including the step of identifying at least one brain node related to the mental or physiological state intended to be affected, targeting the identified brain node, and
energizing the firing device or devices to cause the identified node to be fired in order to affect the
mental or physiological state of the individual. (Note: This is among the other diabolical applications - remote behavior modification prior to the perceived behavior being acted out.)
5. In certain embodiments, the method is utilized to cause the individual to be one of less hungry, less thirsty, less anxious, and less depressed. (Note: Or, as I previously pointed out, it can be used to cause the exact opposite. To what end is served by making a person or population who are starving 'not feel hungry'? Or a population in a region with no access to water to feel 'not thirsty'. The proponents of global dominance, of mastering the human domain and the technology that will be used to accomplish this agenda are not benevolent. My question is, will this technology be used to euthenise individuals or entire population centric regions? I don't know the answer and we can all speculate, but one thing's for sure, this technology has the capability to identify, target and eliminate people on many levels.)
6. In certain embodiments, the remote node firing devices are electrically energized and generate
electromagnetic waves which cause a plurality of brain nodes to be fired. (Note: One thing we know for certain, we are bio electrical in nature – we are frequency based beings and the disruption,
interference or manipulation of these frequencies can have devastating and dire effects on us.)
Research Links:
President's Commission for the Study of Bioethical Issues letter to respondent 07.27.2011
Patent # 003951134 Distant Brain Reading & Brain Wave Manipulation 4.10.1976
Patent # 6011991 Communication system and method including brain wave analysis and/or use of
brain activity 01.04.2000
Patent # 6470214 USAF RF Hearing Effect for skull/tissue penetrating sound
Patent # 6587729 Similar to Patent # 6470214
PATENT 6011991 Remote Brain Computer Interface – Neural Monitoring 01.04.2000
Abstract: A system and method for enabling human beings to communicate by way of their monitored brain activity. (Note: this is artificial telepathy.) The brain activity of an individual is monitored and transmitted to a remote location (e.g. by satellite). At the remote location, the monitored brain activity is compared with pre-recorded normalized brain activity curves, waveforms, or patterns to determine if a match or substantial match is found.
(Note: I can see this being applied to the human nodes on the network, (human beings under constant monitoring and surveillance) as well as going to the ABI (activity based intelligence) data being collected – going to thought based activity - for mapping & mastering the Human Domain. )
If such a match is found, then the computer at the remote location determines that the individual was attempting to communicate the word, phrase, or thought corresponding to the matched stored normalized signal.
(Note: Right now, this technology is being employed in Geospatial Intelligence, meaning you don't have the privacy of your own thoughts. This technology wasn't funded, developed and patented for government and military use to sit on a shelf somewhere collecting dust. )
DESCRIPTION: This invention relates to a system and method for enabling human beings to
communicate with one another by monitoring brain activity. In particular, this invention relates to such a system and method where brain activity of a particular individual is monitored and transmitted in a wireless manner (e.g. via satellite) from the location of the individual to a remote location so that the brain activity can be computer analyzed at the remote location thereby enabling the computer and/or individuals at the remote location to determine what the monitored individual was thinking or wishing to communicate.
In certain embodiments this invention relates to the analysis of brain waves or brain activity, and/or to the remote firing of select brain nodes in order to produce a predetermined effect on an individual.
(Note: this is remote mind control – MK-Ultra directed not necessarily by human handlers, but by a computer system that sits on a Global Information Grid in a network centric environment. They can not only monitor your thoughts but they can modify your behavior remotely.)
SUMMARY OF THE INVENTION
Generally speaking, this invention fulfills the above described needs in the art by providing a method of communicating comprising the steps of: (Note: And here are the following 9 steps that will be employed:)
1. Providing a first human being at a first location; (Note: this would be the equivalent of your patient zero or target node on the network.)
2. Providing a computer at a second location that is remote from the first location; (Note: this would be the Geospatial Intelligence Artificial Intelligence System on the Global Information Grid.)
3. Providing a satellite; (Note: this would be the 'space' component of the domain on the Global Information Grid.)
4. Providing at least one sensor (preferably a plurality--e.g. tens, hundreds, or thousands, with each
sensor monitoring the firing of one or more brain nodes or synapse type members) on the first human
being; (Note: This ties into the remote nano sensing devices discussed in Geospatial symposiums and papers.)
5. Detecting brain activity of the first human-being using the at least one sensor, and transmitting the
detected brain activity to the satellite as a signal including brain activity information; (Note: Once you're a human node on a geospatial intelligence network with a unique BioAPI or network identifier, this is a piece of cake for them.)
6. The satellite then sending this signal including the brain activity information to the second location; (Note: or in other words, down to the Global Information Grid for processing.)
7. A receiver at the second location receiving the signal from the satellite and forwarding the brain
activity information in the signal to the computer; (Note: the human terrain analysis tool and the A.I. Programs are being developed to identify the signal in the noise....this brain mapping technology goes to that aspect of GeoINT.)
8. Comparing the received brain activity information of the first human being with normalized or
averaged brain activity information relating to the first human being from memory. (Note: This goes to mapping individual human nodes (human beings on the system) for normalcy patterns, from a telepathic ABI standpoint, by way of mapping the human brain activity casting a neural net over humanity.)
9. Determining whether the first human being was attempting to communicate particular words,
phrases or thoughts, based upon the comparing of the received brain activity information to the
information from memory. (Note: If it can distinguish 'reminiscing thought' from present time/space activity communication of words, phrases or thoughts, this technology can, in essence, determine intent (just like in the movie Minority Report ) – before the action is executed by “the first human being” Can you imagine the massive implications of this technology layered on to the A.I. Core of the GeoINT network system! Do you understand the potential for abuse! Do you know that they can currently hack into Pacemakers? What do you think they will do with this?)
In certain embodiments, the invention includes the following step: asking the first human-being a
plurality of questions and recording brain activity of the first human-being response, to the plurality of questions in the process of developing said normalized or averaged brain activity information relating to the first human-being stored in the memory. A database in a memory may include, for each of a plurality (e.g. one hundred or thousands) of individuals, a number of pre-recorded files each corresponding to a particular thought, attempt to communicate a word, attempt to communicate a
phrase or thought, or a mental state. (Note: this goes to the artificial intelligence and GeoINT's ability to detect and read emotions.) Measured brain activity of a given individual may be compared to files from that database of that individual to determine what the individual is attempting to communicate or what type of mental state the individual is in. (Note: this capability is within the GeoINT context and goes to “Answering questions before they're asked.")
In certain embodiments, the plurality of questions are the same question.
In certain embodiments, the plurality of questions are different questions.
In certain embodiments, the invention includes the step of normalizing or averaging recorded brain
activity responsive to a given question or set of questions in developing the normalized or averaged
brain activity information relating to the first human being.
It is an object of this invention to enable brain activity of a first human being to be monitored, with the activity being transmitted to a remote location so that individuals and/or a computer at the remote
location can determine what the first human being was thinking or intending to communicate. In such a manner, human beings can communicate with one another via monitoring of brain activity, and
transmission of the same.
(Note: this is synthetic telepathy for humans to communicate with other humans, and the ability to read or map brain functions and send that information to a machine for processing and interpretation for an actionable response – by the AI system.)
It is another object of this invention to communicate monitored brain activity from one location to
another in a wireless manner, such as by IR, RF, or satellite. (Note: In other words over the domain of land, air and space.)
It is another object of this invention to provide a system capable of identifying particular nodes in an
individual's brain, the firings of which affect characteristics such as appetite, hunger, thirst,
communication skills (e.g. which nodes are utilized to communicate certain words such as "yes", "no", or phrases such as "I don't know", "I'm not sure", or numbers such as "one", "two", "ten", "one
hundred" and the like), thought processes, depression, and the like. When such nodes are identified,
they may be specifically monitored by one or more sensors to analyze behavior or communication or
words, phrases, or thoughts. In other embodiments, devices mounted to the person (e.g. underneath the scalp) may be energized in a predetermined manner or sequence to remotely cause particular
identified brain node(s) to be fired in order to cause a predetermined feeling or reaction in the
individual, such as lack of hunger, lack or depression, lack or thirst, lack of aggression, lack of
alzheimer's disease effects, or the like. (Note: The 'devices mounted to the person can be wetware or wearable technology. The remotely transmitted neural stimulation can also trigger the exact opposite of the predetermined feelings and reactions mentioned - - fear, depression, aggression, anxiety. How about pain? That has serious implications stemming from the complete blocking of, or the inducement of this sensation remotely.)
Brain node firings are the basis of thought and mind processes of individuals. Certain embodiments of this invention enable such brain firings and behavior to be captured by an external device. It is an
object of this invention to utilize a normalization or normalizing curve (or waveform or pattern) based upon monitored brain activity to detect or determine thought processes by the monitored individual. In such a manner, individuals can transmit by satellite what they are thinking or intending to think via their monitored brain activity, without the need to talk or write down information.
Each individual has a distinct pattern of brain node firings or brain activity. Each person is believed
to be different in this regard. Thus, a separate brain activity file may be stored in a memory for each
individual, and analyzed or compared to received brain activity from the monitored individual in order to determine what that individual is thinking or attempting to communicate. (Note: This also goes to creating a unique bio identifier for each human network node based on their individual, unique brain activity signature. This also goes to cataloging and establishing 'norms' based on an individuals brain activity in addition to the mind reading capability identified here.)
It is an object of this invention to utilize brain monitoring and transmission of monitored brain activity for lie detection and/or human communication. (Note: This AI technology would be able to “read” a person who is telling the truth or lying by the interpretation of body language, voice intonations and facial expression and make a determination for a course of action.)
It is another object of this invention to formulate or build-up a file for each individual based upon
patterns recorded in response to that individual answering or responding to numerous predetermined
questions with known intended responses. Subsequently, monitored brain activity from that individual may then be compared to information stored corresponding to that individual to determine whether the individual is lying or what the individual is intending to communicate in the monitored brain activity. The higher the level of detail of the file, the higher the level of potential communication by certain embodiments of this invention.
At least one sensor on the scalp or skin in certain embodiments provides signals representative of
physiological activity generated in the brain of a monitored individual. A data acquisition device
receives the signals representative of the physiological activity generated in the monitored brain, and
transforms the signals into a pattern or curve corresponding to the monitored brain activity. This is
then transmitted (e.g. by satellite) to a computer located at a remote location, with the monitored brain activity pattern or curve being stored in a memory at the remote location. The computer then causes the received pattern or curve information to be compared with stored brain activity pattern information relating to the monitored individual in order to determine (a) whether the monitored individual is lying in response to a particular question, or (b) what the monitored individual is communicating or attempting to communicate. (Note: They have the capability and now with the Global Information Grid in conjunction with GeoINT, to reduce humanity to the sum total of the data collected on each human network node. Not only that, your every activity, transaction, communication and yes, even your inner most personal thoughts will be cataloged and uploaded to a hive based AI system on a network centric Global Information Grid.)
Another object of this invention is to utilize normalization curves representative of received brain
activity patterns from the monitored individual, and to compare the received normalized data with
normalized brain activity pattern or curve data stored in memory relating to that individual. The use of normalization curves in one or both of the individual's file and received brain activity improves
reliability, accuracy, and efficiency.
In certain embodiments of this invention, the computer located at the remote location includes a
neural network suitably programmed in accordance with known neural network techniques, for the
purpose of receiving the monitored brain activity signals, transforming the signals into useful forms,
training and testing the neural network to distinguish particular forms and patterns of physiological
activity generated in the brain of the monitored individual, and/or comparing the received monitored
brain activity information with stored information relating to that individual in order to determine
what the individual is attempting to communicate. (Note: Again, this goes to the already known capabilities of the A.I. system and GeoINT and expands on those capabilities using remote command and control aspects of MK-Ultra.)
This invention further fulfills the above described needs in the art by providing a method of affecting a mental or physiological state of an individual, the method comprising the steps of:
1. providing at least one firing device capable of being energized on an individual; and
2. energizing the firing device to cause the firing device to cause a particular or group of brain nodes
to be fired in the individual in order to affect the mental or physiological state of the individual. (Note: Again, The “device” being referred to can be wetware, wearable technology or directed signal transmission in the form of RF, FM, microwave, ELF or electromagnetic.)
3. In certain embodiments, the method including the step of providing at least one firing device on or
under the scalp of the individual in proximity of the brain of the individual.
4. In certain embodiments, the method including the step of identifying at least one brain node related to the mental or physiological state intended to be affected, targeting the identified brain node, and
energizing the firing device or devices to cause the identified node to be fired in order to affect the
mental or physiological state of the individual. (Note: This is among the other diabolical applications - remote behavior modification prior to the perceived behavior being acted out.)
5. In certain embodiments, the method is utilized to cause the individual to be one of less hungry, less thirsty, less anxious, and less depressed. (Note: Or, as I previously pointed out, it can be used to cause the exact opposite. To what end is served by making a person or population who are starving 'not feel hungry'? Or a population in a region with no access to water to feel 'not thirsty'. The proponents of global dominance, of mastering the human domain and the technology that will be used to accomplish this agenda are not benevolent. My question is, will this technology be used to euthenise individuals or entire population centric regions? I don't know the answer and we can all speculate, but one thing's for sure, this technology has the capability to identify, target and eliminate people on many levels.)
6. In certain embodiments, the remote node firing devices are electrically energized and generate
electromagnetic waves which cause a plurality of brain nodes to be fired. (Note: One thing we know for certain, we are bio electrical in nature – we are frequency based beings and the disruption,
interference or manipulation of these frequencies can have devastating and dire effects on us.)
Research Links:
President's Commission for the Study of Bioethical Issues letter to respondent 07.27.2011
Patent # 003951134 Distant Brain Reading & Brain Wave Manipulation 4.10.1976
Patent # 6011991 Communication system and method including brain wave analysis and/or use of
brain activity 01.04.2000
Patent # 6470214 USAF RF Hearing Effect for skull/tissue penetrating sound
Patent # 6587729 Similar to Patent # 6470214
Sunday, February 21, 2016
PATENT #3951134 [Explained] Distant Brain Reading & Brain Wave Manipulation 4.10.1976
I published this in an earlier post located here. But I think it would be good to republish it once again. The patent was from Robert. G. Malech for a company that was bought by a major military contractor. Robert Malech was one of the individuals that made Microwave Scanning Antennas possible.
REMOTE MK ULTRA
DoD & Military Patents for Government Application
PATENT 3951134 Distant Brain Reading & Brain Wave Manipulation 4.10.1976
Abstract: Apparatus for and method of sensing brain waves at a position remote from a subject
whereby electromagnetic signals of different frequencies are simultaneously transmitted to the brain of the subject in which the signals interfere with one another to yield a waveform which is modulated by the subject's brain waves. The interference waveform which is representative of the brain wave activity is re-transmitted by the brain to a receiver where it is demodulated and amplified. The demodulated waveform is then displayed for visual viewing and routed to a computer for further processing and analysis. The demodulated waveform also can be used to produce a compensating signal which is transmitted back to the brain to effect a desired change in electrical activity therein.
The present invention relates to apparatus and a method for monitoring brain waves wherein all
components of the apparatus employed are remote from the test subject. More specifically, high
frequency transmitters are operated to radiate electromagnetic energy of different frequencies through antennas which are capable of scanning the entire brain of the test subject or any desired region thereof.
The signals of different frequencies penetrate the skull of the subject and impinge upon the brain where they mix to yield an interference wave modulated by radiations from the brain's natural electrical activity. The modulated interference wave is re-transmitted by the brain and received by an antenna at a remote station where it is demodulated, and processed to provide a profile of the subject's brain waves. In addition to passively monitoring his brain waves, the subject's neurological processes may be affected by transmitting to his/her brain, through a transmitter, compensating signals. The latter signals can be derived from the received and processed brain waves.
(Note: This would be any type of wireless, RF or microwave receiver/transmitter local or remote)
It is therefore an object of the invention to remotely monitor electrical activity in the entire brain or
selected local regions thereof with a single measurement.
(Note: this serves two purposes, 1) creating a unique bio identifier or BioAPI for each human network node, 2) Mapping your mind. Creating a unique Human Terrain for every human node on the GeoINT network.)
Another object is the monitoring of a subject's brain wave activity through transmission and reception of electromagnetic waves.
(Note: With the technology being employed by GeoINT, this can be done on an individual or population centric basis.)
Still another object is to monitor brain wave activity from a position remote from the subject.
A further object is to provide a method and apparatus for affecting brain wave activity by transmitting electromagnetic signals thereto.
(Note: the apparatus they are referring to in this section is wearable tech. They are talking about manipulating your brain via network broadcast.)
A profile of the entire brain wave emission pattern may be monitored or select areas of the brain may
be observed in a single measurement simply by altering the scan angle and direction of the antennas.
(Note: they have had the technology to map your mind, now they have the ability to deploy this technology on a large scale – this is how they intend to master the human domain, or, to apply the same analysis and monitoring that they have been using for emails and phone calls on the human being.)
There is no physical contact between the subject and the monitoring apparatus.
(Note: again, this goes to creating human nodes on the GIG that will be monitored and controlled by the GeoINT system.)
The computer also can determine a compensating waveform for transmission to the brain to alter the
natural brain waves in a desired fashion. The closed loop compensating system permits instantaneous and continuous modification of the brain wave response pattern.
(Note: this is remote mind control being conducted over a network, MK Ultra taken from a scale of one to one, to a scale by orders of magnitude.)
In performing the brain wave pattern modification function, the computer can be furnished with an
external standard signal from a source representative of brain wave activity associated with a desired
neurological response. The region of the brain responsible for the response is monitored and the
received signal, indicative of the brain wave activity therein, is compared with the standard signal.
The computer is programmed to determine a compensating signal, responsive to the difference between the standard signal and received signal. The compensating signal, when transmitted to the monitored region of the brain, modulates the natural brain wave activity therein toward a reproduction of the standard signal, thereby changing the neurological response of the subject.
(Note: this sounds a lot like remote behavior modification. In other words, these systems are able to determine behavioral patterns considered to be out of the norm based on parameters set by the HTA (human terrain analysis) tool using ABI (activity based intelligence) - - it appears, at least according to this patent, they can identify 'undesirable' brain wave patterns and correct them. So, the question is.... is this how those humans determined to be 're-educatable' are going to be reprogrammed?)
It is to be noted that the configuration described is one of many possibilities which may be formulated without departing from the spirit of my invention. The transmitters can be monostratic or bistatic. They also can be single, dual, or multiple frequency devices. The transmitted signal can be continuous wave,pulse, FM, or any combination of these as well as other transmission forms. Typical operating frequencies for the transmitters range from 1 MHz to 40 GHz but may be altered to suit the particular function being monitored and the characteristics of the specific subject. Various subassemblies of the brain wave monitoring and control apparatus may be added, substituted or combined. Thus, separate antennas or a single multi-mode antenna may be used for transmission and reception.
(Note: I would add that the microwave and electromagnetic antennas and voluntary wearable technology with receive & transmit capabilities which can and probably will, be used for this as well. This patent was registered 39 years ago and I'm sure they've made significant leaps and bounds regarding the 'foot print' of the receiver/transmitter technology as well as in the area of range and remote targeting.)
President's Commission for the Study of Bioethical Issues letter to respondent 07.27.2011
Patent # 003951134 Distant Brain Reading & Brain Wave Manipulation 4.10.1976
Patent # 6011991 Communication system and method including brain wave analysis and/or use of
brain activity 01.04.2000
Patent # 6470214 USAF RF Hearing Effect for skull/tissue penetrating sound
Patent # 6587729 Similar to Patent # 6470214
REMOTE MK ULTRA
DoD & Military Patents for Government Application
PATENT 3951134 Distant Brain Reading & Brain Wave Manipulation 4.10.1976
Abstract: Apparatus for and method of sensing brain waves at a position remote from a subject
whereby electromagnetic signals of different frequencies are simultaneously transmitted to the brain of the subject in which the signals interfere with one another to yield a waveform which is modulated by the subject's brain waves. The interference waveform which is representative of the brain wave activity is re-transmitted by the brain to a receiver where it is demodulated and amplified. The demodulated waveform is then displayed for visual viewing and routed to a computer for further processing and analysis. The demodulated waveform also can be used to produce a compensating signal which is transmitted back to the brain to effect a desired change in electrical activity therein.
SUMMARY OF THE INVENTION
The present invention relates to apparatus and a method for monitoring brain waves wherein all
components of the apparatus employed are remote from the test subject. More specifically, high
frequency transmitters are operated to radiate electromagnetic energy of different frequencies through antennas which are capable of scanning the entire brain of the test subject or any desired region thereof.
The signals of different frequencies penetrate the skull of the subject and impinge upon the brain where they mix to yield an interference wave modulated by radiations from the brain's natural electrical activity. The modulated interference wave is re-transmitted by the brain and received by an antenna at a remote station where it is demodulated, and processed to provide a profile of the subject's brain waves. In addition to passively monitoring his brain waves, the subject's neurological processes may be affected by transmitting to his/her brain, through a transmitter, compensating signals. The latter signals can be derived from the received and processed brain waves.
(Note: This would be any type of wireless, RF or microwave receiver/transmitter local or remote)
OBJECTS OF THE INVENTION
It is therefore an object of the invention to remotely monitor electrical activity in the entire brain or
selected local regions thereof with a single measurement.
(Note: this serves two purposes, 1) creating a unique bio identifier or BioAPI for each human network node, 2) Mapping your mind. Creating a unique Human Terrain for every human node on the GeoINT network.)
Another object is the monitoring of a subject's brain wave activity through transmission and reception of electromagnetic waves.
(Note: With the technology being employed by GeoINT, this can be done on an individual or population centric basis.)
Still another object is to monitor brain wave activity from a position remote from the subject.
A further object is to provide a method and apparatus for affecting brain wave activity by transmitting electromagnetic signals thereto.
(Note: the apparatus they are referring to in this section is wearable tech. They are talking about manipulating your brain via network broadcast.)
SUMMARY
be observed in a single measurement simply by altering the scan angle and direction of the antennas.
(Note: they have had the technology to map your mind, now they have the ability to deploy this technology on a large scale – this is how they intend to master the human domain, or, to apply the same analysis and monitoring that they have been using for emails and phone calls on the human being.)
There is no physical contact between the subject and the monitoring apparatus.
(Note: again, this goes to creating human nodes on the GIG that will be monitored and controlled by the GeoINT system.)
The computer also can determine a compensating waveform for transmission to the brain to alter the
natural brain waves in a desired fashion. The closed loop compensating system permits instantaneous and continuous modification of the brain wave response pattern.
(Note: this is remote mind control being conducted over a network, MK Ultra taken from a scale of one to one, to a scale by orders of magnitude.)
In performing the brain wave pattern modification function, the computer can be furnished with an
external standard signal from a source representative of brain wave activity associated with a desired
neurological response. The region of the brain responsible for the response is monitored and the
received signal, indicative of the brain wave activity therein, is compared with the standard signal.
The computer is programmed to determine a compensating signal, responsive to the difference between the standard signal and received signal. The compensating signal, when transmitted to the monitored region of the brain, modulates the natural brain wave activity therein toward a reproduction of the standard signal, thereby changing the neurological response of the subject.
(Note: this sounds a lot like remote behavior modification. In other words, these systems are able to determine behavioral patterns considered to be out of the norm based on parameters set by the HTA (human terrain analysis) tool using ABI (activity based intelligence) - - it appears, at least according to this patent, they can identify 'undesirable' brain wave patterns and correct them. So, the question is.... is this how those humans determined to be 're-educatable' are going to be reprogrammed?)
It is to be noted that the configuration described is one of many possibilities which may be formulated without departing from the spirit of my invention. The transmitters can be monostratic or bistatic. They also can be single, dual, or multiple frequency devices. The transmitted signal can be continuous wave,pulse, FM, or any combination of these as well as other transmission forms. Typical operating frequencies for the transmitters range from 1 MHz to 40 GHz but may be altered to suit the particular function being monitored and the characteristics of the specific subject. Various subassemblies of the brain wave monitoring and control apparatus may be added, substituted or combined. Thus, separate antennas or a single multi-mode antenna may be used for transmission and reception.
(Note: I would add that the microwave and electromagnetic antennas and voluntary wearable technology with receive & transmit capabilities which can and probably will, be used for this as well. This patent was registered 39 years ago and I'm sure they've made significant leaps and bounds regarding the 'foot print' of the receiver/transmitter technology as well as in the area of range and remote targeting.)
Research Links:
President's Commission for the Study of Bioethical Issues letter to respondent 07.27.2011
Patent # 003951134 Distant Brain Reading & Brain Wave Manipulation 4.10.1976
Patent # 6011991 Communication system and method including brain wave analysis and/or use of
brain activity 01.04.2000
Patent # 6470214 USAF RF Hearing Effect for skull/tissue penetrating sound
Patent # 6587729 Similar to Patent # 6470214
Thursday, February 18, 2016
Sunday, February 14, 2016
Zersetzung Part 3 - The New Homeland Security
I have written previously about the Stasi and Homeland Security. Along with reading this article about Zersetzung, I highly recommend reading the first and second article in this series.
Also, download this free Stasi tactics book. It is interesting to note that the idea for the Stasi came from the Bolsheviks and the Cheka.
It absolutely must be mentioned that Jews played a leading role in the development of Bolshevism and the Cheka. (To learn more about this, see here, here, here, here and here.) They have also played a major role in the development of the new Homeland Security laws. Also, see this post about classified technology that allows them to stalk, harass and torture you remotely.
========================================================================
Informants have apparently been used to frame targets for crimes or to participate in staged events which foster character assassination. A person may not be aware of some of these set-ups. First, see this article about front groups and how they are established near a target to help with slander, character assassination, organized stalking and intelligence gathering. Then, see these articles about slander and covert torture techniques using classified technology.
Some staged events may include people provoking targets into confrontations. Recurrent confrontations by family members, friends or unusually hostile strangers, can be common. Seemingly homeless people who are well-dressed and very clean will get into confrontations with targets... and create big public scenes.
As an example, let's say a woman target spoke with a man who had often made stomping and banging noises in the apartment above her. After she spoke with him about this, which occurred even during his absence, he immediately complains to the building manager that she was stalking him. He conveniently forgets to inform the building manager that he had assiduously 'courted' this individual for several months, without success; and that he had been following her around on a regular basis, bumping into her at different locations in a seemingly random way, but, way to often to be random.
Presumably, these setups and staged confrontations are done to get targeted people into the penal or mental health system. At the very least they can aid with recruitment. See here and here about recruiting. Also, photos, or video footage taken of an enraged target after they have been antagonized and set-up, may also assist with a smear campaign when leveraging support of the community to facilitate the removal of the target. Multiple complaints filed independently which entail the same report may also achieve this.
Local police participate in stalking and have framed people for crimes. See here for more.
Similarly, during the former Cointelpro, there were routine set-ups, and fabricating of evidence used to destroy a person's character or have them imprisoned. But this obviously hasn't stopped. According to the December 7th 2003 issue of the Sunday Herald, the FBI is on record using multiple informants to frame innocent people for crimes by having informants commit perjury. This can be done legally in the interest of "national security." The article sited a 141-page report by the House Committee on Government Reform, which stated that the FBI rigged evidence, and used informants to provide "false testimony," so that innocent people would be imprisoned. Oddly enough, some of these informants were murderers!
"Well over 20 murders were committed by FBI informants," the report revealed, and to protect them federal law enforcement "actively worked to prevent homicide cases [from] being resolved." The committee also concluded that "officials in FBI Director J Edgar Hoover's office were well aware that federal informants were committing murders." The article continued quoting Judge Nancy Gertner saying, "It is hard to conceive of accusations that shake the legal system closer to its foundation that would do more to challenge this nation's most basic assumptions of honesty, fairness, and trust in the administration of justice." She added, "All in the name of 'national security.'"
In his book, The Franklin Cover-up, former Senator John Decamp wrote, "In case after notorious case entirely unrelated to Franklin, Justice Department [DOJ] personnel appear as liars, perverts, frame-up artists, and even - assassins." Apparently Senator DeCamp experienced significant turbulence while investigating a child sex ring which included prominent individuals in Washington D.C. According to DeCamp, the elite used the FBI to orchestrate the cover-up.
If you're targeted, friends and family may be recruited to break you down. They may participate in harassment skits intended to make you look incompetent, inconsistent, hypocritical, and to mock and demoralize you.
New friends, may be used in an attempt to do the same. These 'friends' pose as confidants and abruptly end these 'friendships' under deliberately degrading and humiliating circumstances. When taken in the context of the ongoing surveillances and harassment, these exercises appear intended to heighten emotional trauma, perhaps to provoke an uncontrolled response and/or to enforce isolation.
If you're targeted and live with someone who has been co-opted, perhaps a friend or family member, they will probably be forced to carry out some of these harassment tactics. At home they may frequently repeat your thoughts back to you and talk about something similar to what you are doing to let you know that you are under surveillance, make noise and just be generally annoying.
Traps may be set, such as items frequently falling out of freezers or cabinets as you open them. Phone conversations which occur while you're present will be loud and contain information about your personal life. Out in public, these friends or family members may be forced by their handlers to guide you through and participate in Street Theatre, where they will interact with other citizen informants to harass you. These skits will be intended to make you feel foolish, incompetent, or inconsistent.
When break-ins occur there is usually no sign of forced entry, and they occur when the target is sleeping or elsewhere. This is the case even if there is a Hi-Tech security system in place. In virtually all such cases investigated, the burglars leave evidence of their visits, such as by relocating objects, or by committing petty and not-so-petty acts of vandalism. You have to understand that the people that are engaged in doing this have access to technology that surpasses anything that most people know of.
This happens at the home as well as the workplace if the target is fortunate enough to be employed. Targets have reported clothing being ripped, milk, coffee and other items poured out, and small-scale damage. Items may be stolen and brought back at a later date, and they may move items and place them in a slightly different spot. These are essentially Gaslighting tactics.
Victor Santoro claims that these subtle memory games can be used to drive people insane. Small things such as pens, shoes, and silverware are taken or tampered with so people will seem delusional if they file a police report. Burglarizing your home is very, very common, a lot of times they'll leave evidence of their visits, just little small changes in the target's home which is noticeable. Executive Order No. 12333 states that these break-ins can be done legally.
Interestingly enough, surreptitious break-ins, thefts, and sabotage were a staple part of the old Cointelpro. Other tactics Santoro advocates include filling a target's gas tank, or substituting items of his clothing with ones a size smaller. If you're unaware that you're targeted, as most people are, then these small changes may be attributed to a lapse in your memory. If these tactics are used in combination with others, then as Santoro illustrates, you may think you're going insane.
Gunderson also spoke of Gaslighting tactics, which he described as "psychological warfare." In his personal experience with what is presumably state-sponsored harassment, he has noticed bits of furniture and other items being moved around during surreptitious break-ins. He states they are, "so arrogant that they almost always leave subliminal messages of their... entry." The logic is that a thief would never break into your home and leave a computer or stereo and just steal a toothbrush, or pour out a portion of your milk.
In his book, Subliminal Mind Control, John J. Williams wrote, "If you are being subjected to a secret and involuntary subliminal experience it is a malevolent, sinister and often dangerous attack against you that you have every right to vigorously oppose and thwart as if you are a POW or someone has broken into your home to rob you of what is rightfully yours." He warns, "In fact they have broken into your mind, and are trying to rob you of your free will. Even in cases where there is actually an intended positive outcome."
Targets may regularly experience acts of vandalism. Electronic equipment may frequently be failing. People have reported having electrical systems in their cars, brand new appliances, TVs, radios, PCs, and other electronic equipment suddenly die, or act strangely.
Targets may experience frequent computer trouble such as failing hardware. Ongoing computer problems which do not follow any logical pattern may also occur. Some of this can be attributed to the E-bomb which can destroy electrical equipment while not damaging humans.
Many times this vandalism is usually just below what you'd report to the police. For instance, a small but noticeable portion of your masonry has been chipped off, and a crack has appeared in one of your windows. This may be restricted to minor vandalism, just to let you know that you're under surveillance. However large-scale property damage is also done to homes and vehicles, such as slashed tires, broken windows, tampering with break lines, and destruction of electrical equipment.
Some targets have report that their pets die or are being tortured as a retaliation for a target taking action to expose them. See here, here, here, here and here for more information regarding electronic warfare.
Automobiles are one of the biggest targets, they slash tires, they smash the windows, drain the oil out of the cars, fool with the electronic components and batteries.
Vehicles invite peculiarly ferocious attacks in these harassment campaigns-slashed tires, smashed windows, oil drainage, oil contamination, destruction of electronic components and batteries... grounded fuel gages and suddenly failed brakes and clutches occur. Recurrent break-ins and auto thefts have also been reported. Some targets will also experience staged accidents and insurance scams.
Multiple seemingly independent vehicles can be used to facilitate an accident which can appear to have been caused by a targeted person. Add to this, multiple independent witnesses (informants) and you have a recipe for murder or a framing. In fact, "accidental" deaths have reportedly occurred. Once more, the Stasi would do similar things. "Car brake-leads have been cut, accidents and deaths reverse-engineered," noted Funder.
When targets drive, they may be surrounded by vehicles driven by citizen informants who frequently cut them off and tailgate them. Targets will experience more tailgating and cut-offs than what would naturally occur. Vehicles will frequently pull out past stops signs as the TI approaches an intersection. This is apparently done to startle them.
While traveling on the highway there will be a rotation of vehicles that surround targets. These vehicles may be marked with an identifying feature, or a color that they've been sensitized to. This seems to function as both an NLP tactic to trigger negative emotions which have been anchored to the feature, as well as a method to unite the group and promote group cohesiveness. In other words, it is similar to a uniform, or a squad car.
There will also be a rotation of people tailgating targets. These vehicles may cut them off after they've been tailing them for a while. Apparently this is done to imply that they weren't going fast enough. When done in a recurrent manner by multiple vehicles, this antagonizing behavior may also serve to encourage the target to accelerate, which may result in them getting pulled over. This may be especially effective if they're not aware that they're targeted.
City and state vehicles which may stalk targets in public, include: off-duty metro buses, school buses, local restaurant delivery vehicles, city and construction vehicles, fire trucks and ambulances, police cars, postal and UPS vehicles, taxis, and 18 wheelers. Helicopters and small planes have also reportedly been used to stalk people. As will be revealed in the Informants section, many of these are vehicles belonging to organizations which have been selected for recruitment into the citizen informant programs.
Convoys of vehicles which are all spaced the same distance and traveling at the same speed will participate in stalking. Within this convoy, there may be several vehicles exhibiting traits that a target has been sensitized to with NLP. These traits are thereby symbolic of a uniform. For instance, most or all of them will be a shade of red. Or most of them will have their lights on, even during the daytime. Or they may have the same bumper stickers. During the evening targets may experience frequent Brighting while driving or walking.
Vehicular Brighting is an attack. It seems to be strategically used with corners. For instance, if you're targeted and you're walking down a quiet street late at night, you'll see vehicles repeatedly turn onto or off of connecting streets. Their timing is such that they continually turn the corners while you are at it. This effectively blinds you. This happens frequently at corners. Or, as you walk down a side street, there is one or more cars parked on the side, facing your direction with the lights on. They will also wait for you to approach them and then pull out into the street, thereby Brighting you as you walk by.
These Brighting tactics are maximized when a vehicle has one headlight grossly misaligned. The misalignment produces a Hi-Beaming effect. Like other tactics, frequency and duration play an important role here. Lights being shined into a target's windows have also been reported. "Among the most common non-lethal weapons are bright lights," wrote Dr. Alexander, in his book, Winning the War. He says, "The intent is to reduce risks of injury... by temporarily hindering the eyesight of the targeted personnel." He also wrote of the use of bright lights on targeted people in his book, Future War.
Job opportunities will be trashed. Most targeted people are unemployed. Many would be in the street if it weren't for parents, siblings, or friends. Targets who are employed are usually mobbed. "Progressive financial impoverishment, [is] brought on by termination of the individual's employment, and compounded by expenses associated with the harassment.
During her investigation she concluded, "The majority of those now in contact with the Project - educated, white-collar professionals - have lost their jobs. Termination of employment in many of these cases involved prefatory harassment by the employer and co-workers [Mobbing], which coincided with the other overt forms of harassment..."
According to an article in The Christian Science Monitor entitled, Blacklisted by the Bank, Blacklisting was originally used as a foreign-policy tool. At some point federal organizations obviously decided to start using it on individuals as well. Slander may play an important role in Blacklisting. Also there are Blacklists and software packages used to check these lists for suspected "terrorists," "threats to national security," etc. Apparently this is a flourishing business and some organizations are required by law to use it.
An August 2004 article entitled, The Surveillance-Industrial Complex, by the ACLU, stated "An entire industry has sprung up to produce software that makes it easier for companies to enforce the government's blacklists and other mandates. An example is 'Homeland Tracker,' produced by a subsidiary of the giant database company Choicepoint to 'help any business comply with OFAC and USA PATRIOT Act regulations.'" The article notes that the software has a feature called "accept and deny lists... otherwise known as blacklists."
Federal law enforcement has sent these watch lists to corporations. They contained the names of individuals that were not under official investigation or wanted, but that the agency just had an interest in. We already know that some of these agencies are targeting and harassing citizens. Unbeknownst to many, these agencies are apparently deliberately destroying careers on a massive scale. Wired NewsWire spoke of these Blacklists on August 9, 2004, in an article entitled, Big Business Becoming Big Brother. The article concluded, "There is no way to determine how many job applicants might have been denied work because their names appeared on the list."
A form of Blacklisting has also been used on Russian dissidents by the state. In his book, The Persecutor, Sergei Kourdakov, a member of the plain-clothed People's Brigade declared, once a person was targeted, they were "treated like a leper and could only get the worst jobs."(*) To accomplish this Blacklisting, the USSR used something called a workbook. The workbook was used to advance or destroy careers. If you were cooperative with the state, your career could be very successful. If not, you would live in poverty.
In East Germany dissidents were Blacklisted as well, and their careers were destroyed. After the wall came down they were allowed to inspect their files, and learned why they were unable to get jobs or enter into universities. Dr. Munzert, speaks of the similarity between what is now happening and what the occurred in Germany; he says the goal is "to bring their finances down," by making them "loose their job."
If you've previously been mobbed out of employment and are blacklisted, the mobbing may continue during interviews. Presumably, this is used to further traumatize you.
Interview questions may be asked with accusing, or mocking tones. Questions may also be asked using certain key words, regarding the environment you just left, which only you and your former co-workers (who Mobbed you) would know. These questions are obviously designed to trigger negative emotions which have been linked to a previously painful work environment, where you experienced mobbing. They may ask these questions over and over using a slightly different syntax.
If you're targeted, during an interview you may have potential employers demanding credentials that they did not list as a requirement in their AD. During phone interviews you may have employers telling you that you responded to an AD other than the one that you actually responded to. They may also tell you that they did not place the AD, or that they placed a slightly different one. You may be told that your updated resume says you're currently working at a place that you never worked at, or a place you worked at a decade ago.
The harassment is masked in layers of accommodation to help strengthen the illusion that you're not working because you don't choose to. For instance, you may have recruiters who have harassed you in the past leave messages on your answering machine or with relatives/friends, indicating that there are opportunities available to you. It will be made to look as if you're unemployed due to your choice. The general public may not realize that Blacklisting exists because the institutions that use it operate most major news outlets. Reporters and historians are also Blacklisted for reporting corruption or historical facts that the Zionist complex does not want the public to be aware of.
Publishers Weekly, gives an editorial review on Amazon.com of a book entitled, Into the Buzzsaw, authored by Kristina Borjesson, in which they state, "The buzzsaw is what can rip through you when you try to investigate or expose anything this country's large institutions be they corporate or government want kept under wraps." This "buzzsaw" is what others have called the Invisible Government. The review continues, "Reporters who tattle risk losing their jobs and being blacklisted... [by] concerted corporate and/or government efforts to kill their controversial stories and their careers."
Targets experience tampering or lost mail. During the former version of Cointelpro, they would blatantly watch homes, follow cars, and open mail. The idea was to get as much info as possible to aid in the harassment and intimidation of their targets.
The Stasi too, "inspected all mail in secret rooms above post office," described Funder, "and intercepted, daily, tens of thousands of phone calls." Dr. Munzert noted that one objective of those running this program is to "disrupt the communication systems of the victims." Targets usually receive lots of wrong phone number calls or harassing telephone calls. These pranks may be linked to an event unfolding in the target's personal life. The phone has historically been an excellent harassment tool.
Targets may also be stalked online. Search engine results may be filtered (blocked) and replaced with information in a target's personal life. Websites that a target visits may be spoofed and contain information which is apparently intended to let the target know they're being stalked in the internet as well. This appears to be simply an online version of the public stalking. If you have a website devoted to exposing this program, you may have people constantly harassing you, emailing you to flame you, or claiming that they are victims and asking for support while making references to subjects unfolding in your personal life. This tactic may be used to foster a sense of hopelessness and isolation.
If you're targeted, you may receive "unsolicited" email that parallels a current event in your life. Or you may receive covert insults and threats. If you join a support group, you may also receive harassment via threads posted on message boards. Like other mediums of harassment, the topics of these threads may be about events that are unfolding in your personal life, as well as threats or insults covertly directed at you.
Your email may be blocked or filtered and your web activity may be monitored. Carnivore, DCS1000, or similar tracking software can accomplish some of this.(**) If you try to sell things online, participate in online discussions groups, or respond to employment Ads, you will probably be interrupted, trashed, or harassed.
Some people have reported that their inbox is clogged with junk messages even if they have filters on. These unsolicited emails may contain cryptic borderline-subliminal attacks. The words will be garbled but contain letters that convey a message when arranged in the correct order. Or they may contain a sounds like message. Your mind will automatically piece these letters together so they make sense. This is done on the fly, without you being aware of it.
These messages may contain junk in the body and the TI may not be able to reply to it because it came from a bogus address. These cryptic attacks are mentioned in the book, Subliminal Mind Control, by John J. Williams. If you're targeted, the message will probably pertain to something in your life situation. Any weakness you have can be exploited.
For instance, if you're going bald and have been looking for treatment, you could receive the following attack:
To: John Doe
Subject: Euro Balding Tummy
Body: asdfl;jkasdflkkjasdf;lkjasdfljkasdfl;jkasdfl
The harassment of some targeted people is more than likely broadcasted around the country via closed circuit TV to the politically powerful and those with connections in intelligence and organized crime.
In the workplace this can easily be done by surveillance systems, which many businesses now have in place. A report based on a survey conducted on over 500 companies appeared in the May 19, 2005 issue of Business Wire in an articled entitled, Statistics Show Rise in Surveillance of Workers. It stated, "More than half of the companies surveyed use video monitoring to counter theft, violence and sabotage," and that the number of businesses conducting surveillance is increasing.
This might be used for the purpose of "creating a sense of unity, [and] for identifying TIs who are to be harassed on the street." In addition to facilitating group cohesiveness and identifying targeted people, McKinney noted that it seems to be a "major source of entertainment" for the individuals participating in this harassment. Similarly, more overt degenerates have been known to record their actions so they can "re-live" the experience.
"Covert workplace surveillance is big business," stated the Denver Rocky Mountain News, on April 30, 2001. "Secret monitoring of employees has grown dramatically," echoed Knight Ridder in their August 6, 1997 article entitled, The Boss is Watching as Workplace Surveillance Grows. According to these publications, the equipment is installed after hours and includes miniature cameras hidden in thermostats, light switches, and on walls and ceilings that are located in changing areas, locker rooms, break rooms, and even bathrooms. Apparently, there have been some lawsuits concerning this.
My goal here is to provide evidence that these weapons exist and are being used on the civilian population. They are also known as, Directed Energy Weapons (DEW), Psychotronic Weapons, Less-lethal Weapons, and Electromagnetic Weapons. Most targets are hit with these weapons. See here, here, here, here, here, here, here, here and here for more information.
These weapons or similar ones are currently being used on a massive scale against citizens of North America and other NATO nations. Dr Munzert refers to "Directed energy weapons" as the "high-tech arms of the century," and adds that they are "part of crimes (in Europe) that almost nobody knows [about] except the victims and the offenders." Although the surface intention for the creation of these weapons is to save lives, the evidence suggests they are being deliberately misused on a global scale as a traceless form of slow torture.
Also, download this free Stasi tactics book. It is interesting to note that the idea for the Stasi came from the Bolsheviks and the Cheka.
It absolutely must be mentioned that Jews played a leading role in the development of Bolshevism and the Cheka. (To learn more about this, see here, here, here, here and here.) They have also played a major role in the development of the new Homeland Security laws. Also, see this post about classified technology that allows them to stalk, harass and torture you remotely.
========================================================================
Zersetzung Part 3
Informants have apparently been used to frame targets for crimes or to participate in staged events which foster character assassination. A person may not be aware of some of these set-ups. First, see this article about front groups and how they are established near a target to help with slander, character assassination, organized stalking and intelligence gathering. Then, see these articles about slander and covert torture techniques using classified technology.
Some staged events may include people provoking targets into confrontations. Recurrent confrontations by family members, friends or unusually hostile strangers, can be common. Seemingly homeless people who are well-dressed and very clean will get into confrontations with targets... and create big public scenes.
As an example, let's say a woman target spoke with a man who had often made stomping and banging noises in the apartment above her. After she spoke with him about this, which occurred even during his absence, he immediately complains to the building manager that she was stalking him. He conveniently forgets to inform the building manager that he had assiduously 'courted' this individual for several months, without success; and that he had been following her around on a regular basis, bumping into her at different locations in a seemingly random way, but, way to often to be random.
Presumably, these setups and staged confrontations are done to get targeted people into the penal or mental health system. At the very least they can aid with recruitment. See here and here about recruiting. Also, photos, or video footage taken of an enraged target after they have been antagonized and set-up, may also assist with a smear campaign when leveraging support of the community to facilitate the removal of the target. Multiple complaints filed independently which entail the same report may also achieve this.
Local police participate in stalking and have framed people for crimes. See here for more.
Similarly, during the former Cointelpro, there were routine set-ups, and fabricating of evidence used to destroy a person's character or have them imprisoned. But this obviously hasn't stopped. According to the December 7th 2003 issue of the Sunday Herald, the FBI is on record using multiple informants to frame innocent people for crimes by having informants commit perjury. This can be done legally in the interest of "national security." The article sited a 141-page report by the House Committee on Government Reform, which stated that the FBI rigged evidence, and used informants to provide "false testimony," so that innocent people would be imprisoned. Oddly enough, some of these informants were murderers!
"Well over 20 murders were committed by FBI informants," the report revealed, and to protect them federal law enforcement "actively worked to prevent homicide cases [from] being resolved." The committee also concluded that "officials in FBI Director J Edgar Hoover's office were well aware that federal informants were committing murders." The article continued quoting Judge Nancy Gertner saying, "It is hard to conceive of accusations that shake the legal system closer to its foundation that would do more to challenge this nation's most basic assumptions of honesty, fairness, and trust in the administration of justice." She added, "All in the name of 'national security.'"
In his book, The Franklin Cover-up, former Senator John Decamp wrote, "In case after notorious case entirely unrelated to Franklin, Justice Department [DOJ] personnel appear as liars, perverts, frame-up artists, and even - assassins." Apparently Senator DeCamp experienced significant turbulence while investigating a child sex ring which included prominent individuals in Washington D.C. According to DeCamp, the elite used the FBI to orchestrate the cover-up.
Friends and Family
If you're targeted, friends and family may be recruited to break you down. They may participate in harassment skits intended to make you look incompetent, inconsistent, hypocritical, and to mock and demoralize you.
New friends, may be used in an attempt to do the same. These 'friends' pose as confidants and abruptly end these 'friendships' under deliberately degrading and humiliating circumstances. When taken in the context of the ongoing surveillances and harassment, these exercises appear intended to heighten emotional trauma, perhaps to provoke an uncontrolled response and/or to enforce isolation.
If you're targeted and live with someone who has been co-opted, perhaps a friend or family member, they will probably be forced to carry out some of these harassment tactics. At home they may frequently repeat your thoughts back to you and talk about something similar to what you are doing to let you know that you are under surveillance, make noise and just be generally annoying.
Traps may be set, such as items frequently falling out of freezers or cabinets as you open them. Phone conversations which occur while you're present will be loud and contain information about your personal life. Out in public, these friends or family members may be forced by their handlers to guide you through and participate in Street Theatre, where they will interact with other citizen informants to harass you. These skits will be intended to make you feel foolish, incompetent, or inconsistent.
Thefts and Break-ins
This happens at the home as well as the workplace if the target is fortunate enough to be employed. Targets have reported clothing being ripped, milk, coffee and other items poured out, and small-scale damage. Items may be stolen and brought back at a later date, and they may move items and place them in a slightly different spot. These are essentially Gaslighting tactics.
Victor Santoro claims that these subtle memory games can be used to drive people insane. Small things such as pens, shoes, and silverware are taken or tampered with so people will seem delusional if they file a police report. Burglarizing your home is very, very common, a lot of times they'll leave evidence of their visits, just little small changes in the target's home which is noticeable. Executive Order No. 12333 states that these break-ins can be done legally.
Interestingly enough, surreptitious break-ins, thefts, and sabotage were a staple part of the old Cointelpro. Other tactics Santoro advocates include filling a target's gas tank, or substituting items of his clothing with ones a size smaller. If you're unaware that you're targeted, as most people are, then these small changes may be attributed to a lapse in your memory. If these tactics are used in combination with others, then as Santoro illustrates, you may think you're going insane.
Gunderson also spoke of Gaslighting tactics, which he described as "psychological warfare." In his personal experience with what is presumably state-sponsored harassment, he has noticed bits of furniture and other items being moved around during surreptitious break-ins. He states they are, "so arrogant that they almost always leave subliminal messages of their... entry." The logic is that a thief would never break into your home and leave a computer or stereo and just steal a toothbrush, or pour out a portion of your milk.
In his book, Subliminal Mind Control, John J. Williams wrote, "If you are being subjected to a secret and involuntary subliminal experience it is a malevolent, sinister and often dangerous attack against you that you have every right to vigorously oppose and thwart as if you are a POW or someone has broken into your home to rob you of what is rightfully yours." He warns, "In fact they have broken into your mind, and are trying to rob you of your free will. Even in cases where there is actually an intended positive outcome."
Sabotage, Vandalism and Staged Events
Targets may regularly experience acts of vandalism. Electronic equipment may frequently be failing. People have reported having electrical systems in their cars, brand new appliances, TVs, radios, PCs, and other electronic equipment suddenly die, or act strangely.
Targets may experience frequent computer trouble such as failing hardware. Ongoing computer problems which do not follow any logical pattern may also occur. Some of this can be attributed to the E-bomb which can destroy electrical equipment while not damaging humans.
Many times this vandalism is usually just below what you'd report to the police. For instance, a small but noticeable portion of your masonry has been chipped off, and a crack has appeared in one of your windows. This may be restricted to minor vandalism, just to let you know that you're under surveillance. However large-scale property damage is also done to homes and vehicles, such as slashed tires, broken windows, tampering with break lines, and destruction of electrical equipment.
Some targets have report that their pets die or are being tortured as a retaliation for a target taking action to expose them. See here, here, here, here and here for more information regarding electronic warfare.
Automobiles are one of the biggest targets, they slash tires, they smash the windows, drain the oil out of the cars, fool with the electronic components and batteries.
Vehicles invite peculiarly ferocious attacks in these harassment campaigns-slashed tires, smashed windows, oil drainage, oil contamination, destruction of electronic components and batteries... grounded fuel gages and suddenly failed brakes and clutches occur. Recurrent break-ins and auto thefts have also been reported. Some targets will also experience staged accidents and insurance scams.
Multiple seemingly independent vehicles can be used to facilitate an accident which can appear to have been caused by a targeted person. Add to this, multiple independent witnesses (informants) and you have a recipe for murder or a framing. In fact, "accidental" deaths have reportedly occurred. Once more, the Stasi would do similar things. "Car brake-leads have been cut, accidents and deaths reverse-engineered," noted Funder.
Traveling
When targets drive, they may be surrounded by vehicles driven by citizen informants who frequently cut them off and tailgate them. Targets will experience more tailgating and cut-offs than what would naturally occur. Vehicles will frequently pull out past stops signs as the TI approaches an intersection. This is apparently done to startle them.
While traveling on the highway there will be a rotation of vehicles that surround targets. These vehicles may be marked with an identifying feature, or a color that they've been sensitized to. This seems to function as both an NLP tactic to trigger negative emotions which have been anchored to the feature, as well as a method to unite the group and promote group cohesiveness. In other words, it is similar to a uniform, or a squad car.
There will also be a rotation of people tailgating targets. These vehicles may cut them off after they've been tailing them for a while. Apparently this is done to imply that they weren't going fast enough. When done in a recurrent manner by multiple vehicles, this antagonizing behavior may also serve to encourage the target to accelerate, which may result in them getting pulled over. This may be especially effective if they're not aware that they're targeted.
City and state vehicles which may stalk targets in public, include: off-duty metro buses, school buses, local restaurant delivery vehicles, city and construction vehicles, fire trucks and ambulances, police cars, postal and UPS vehicles, taxis, and 18 wheelers. Helicopters and small planes have also reportedly been used to stalk people. As will be revealed in the Informants section, many of these are vehicles belonging to organizations which have been selected for recruitment into the citizen informant programs.
Convoys of vehicles which are all spaced the same distance and traveling at the same speed will participate in stalking. Within this convoy, there may be several vehicles exhibiting traits that a target has been sensitized to with NLP. These traits are thereby symbolic of a uniform. For instance, most or all of them will be a shade of red. Or most of them will have their lights on, even during the daytime. Or they may have the same bumper stickers. During the evening targets may experience frequent Brighting while driving or walking.
Brighting
Vehicular Brighting is an attack. It seems to be strategically used with corners. For instance, if you're targeted and you're walking down a quiet street late at night, you'll see vehicles repeatedly turn onto or off of connecting streets. Their timing is such that they continually turn the corners while you are at it. This effectively blinds you. This happens frequently at corners. Or, as you walk down a side street, there is one or more cars parked on the side, facing your direction with the lights on. They will also wait for you to approach them and then pull out into the street, thereby Brighting you as you walk by.
These Brighting tactics are maximized when a vehicle has one headlight grossly misaligned. The misalignment produces a Hi-Beaming effect. Like other tactics, frequency and duration play an important role here. Lights being shined into a target's windows have also been reported. "Among the most common non-lethal weapons are bright lights," wrote Dr. Alexander, in his book, Winning the War. He says, "The intent is to reduce risks of injury... by temporarily hindering the eyesight of the targeted personnel." He also wrote of the use of bright lights on targeted people in his book, Future War.
Blacklisting
Job opportunities will be trashed. Most targeted people are unemployed. Many would be in the street if it weren't for parents, siblings, or friends. Targets who are employed are usually mobbed. "Progressive financial impoverishment, [is] brought on by termination of the individual's employment, and compounded by expenses associated with the harassment.
During her investigation she concluded, "The majority of those now in contact with the Project - educated, white-collar professionals - have lost their jobs. Termination of employment in many of these cases involved prefatory harassment by the employer and co-workers [Mobbing], which coincided with the other overt forms of harassment..."
According to an article in The Christian Science Monitor entitled, Blacklisted by the Bank, Blacklisting was originally used as a foreign-policy tool. At some point federal organizations obviously decided to start using it on individuals as well. Slander may play an important role in Blacklisting. Also there are Blacklists and software packages used to check these lists for suspected "terrorists," "threats to national security," etc. Apparently this is a flourishing business and some organizations are required by law to use it.
An August 2004 article entitled, The Surveillance-Industrial Complex, by the ACLU, stated "An entire industry has sprung up to produce software that makes it easier for companies to enforce the government's blacklists and other mandates. An example is 'Homeland Tracker,' produced by a subsidiary of the giant database company Choicepoint to 'help any business comply with OFAC and USA PATRIOT Act regulations.'" The article notes that the software has a feature called "accept and deny lists... otherwise known as blacklists."
Federal law enforcement has sent these watch lists to corporations. They contained the names of individuals that were not under official investigation or wanted, but that the agency just had an interest in. We already know that some of these agencies are targeting and harassing citizens. Unbeknownst to many, these agencies are apparently deliberately destroying careers on a massive scale. Wired NewsWire spoke of these Blacklists on August 9, 2004, in an article entitled, Big Business Becoming Big Brother. The article concluded, "There is no way to determine how many job applicants might have been denied work because their names appeared on the list."
A form of Blacklisting has also been used on Russian dissidents by the state. In his book, The Persecutor, Sergei Kourdakov, a member of the plain-clothed People's Brigade declared, once a person was targeted, they were "treated like a leper and could only get the worst jobs."(*) To accomplish this Blacklisting, the USSR used something called a workbook. The workbook was used to advance or destroy careers. If you were cooperative with the state, your career could be very successful. If not, you would live in poverty.
In East Germany dissidents were Blacklisted as well, and their careers were destroyed. After the wall came down they were allowed to inspect their files, and learned why they were unable to get jobs or enter into universities. Dr. Munzert, speaks of the similarity between what is now happening and what the occurred in Germany; he says the goal is "to bring their finances down," by making them "loose their job."
If you've previously been mobbed out of employment and are blacklisted, the mobbing may continue during interviews. Presumably, this is used to further traumatize you.
Interview questions may be asked with accusing, or mocking tones. Questions may also be asked using certain key words, regarding the environment you just left, which only you and your former co-workers (who Mobbed you) would know. These questions are obviously designed to trigger negative emotions which have been linked to a previously painful work environment, where you experienced mobbing. They may ask these questions over and over using a slightly different syntax.
If you're targeted, during an interview you may have potential employers demanding credentials that they did not list as a requirement in their AD. During phone interviews you may have employers telling you that you responded to an AD other than the one that you actually responded to. They may also tell you that they did not place the AD, or that they placed a slightly different one. You may be told that your updated resume says you're currently working at a place that you never worked at, or a place you worked at a decade ago.
The harassment is masked in layers of accommodation to help strengthen the illusion that you're not working because you don't choose to. For instance, you may have recruiters who have harassed you in the past leave messages on your answering machine or with relatives/friends, indicating that there are opportunities available to you. It will be made to look as if you're unemployed due to your choice. The general public may not realize that Blacklisting exists because the institutions that use it operate most major news outlets. Reporters and historians are also Blacklisted for reporting corruption or historical facts that the Zionist complex does not want the public to be aware of.
Publishers Weekly, gives an editorial review on Amazon.com of a book entitled, Into the Buzzsaw, authored by Kristina Borjesson, in which they state, "The buzzsaw is what can rip through you when you try to investigate or expose anything this country's large institutions be they corporate or government want kept under wraps." This "buzzsaw" is what others have called the Invisible Government. The review continues, "Reporters who tattle risk losing their jobs and being blacklisted... [by] concerted corporate and/or government efforts to kill their controversial stories and their careers."
Communications Interference
Targets experience tampering or lost mail. During the former version of Cointelpro, they would blatantly watch homes, follow cars, and open mail. The idea was to get as much info as possible to aid in the harassment and intimidation of their targets.
The Stasi too, "inspected all mail in secret rooms above post office," described Funder, "and intercepted, daily, tens of thousands of phone calls." Dr. Munzert noted that one objective of those running this program is to "disrupt the communication systems of the victims." Targets usually receive lots of wrong phone number calls or harassing telephone calls. These pranks may be linked to an event unfolding in the target's personal life. The phone has historically been an excellent harassment tool.
Online
Targets may also be stalked online. Search engine results may be filtered (blocked) and replaced with information in a target's personal life. Websites that a target visits may be spoofed and contain information which is apparently intended to let the target know they're being stalked in the internet as well. This appears to be simply an online version of the public stalking. If you have a website devoted to exposing this program, you may have people constantly harassing you, emailing you to flame you, or claiming that they are victims and asking for support while making references to subjects unfolding in your personal life. This tactic may be used to foster a sense of hopelessness and isolation.
If you're targeted, you may receive "unsolicited" email that parallels a current event in your life. Or you may receive covert insults and threats. If you join a support group, you may also receive harassment via threads posted on message boards. Like other mediums of harassment, the topics of these threads may be about events that are unfolding in your personal life, as well as threats or insults covertly directed at you.
Your email may be blocked or filtered and your web activity may be monitored. Carnivore, DCS1000, or similar tracking software can accomplish some of this.(**) If you try to sell things online, participate in online discussions groups, or respond to employment Ads, you will probably be interrupted, trashed, or harassed.
Some people have reported that their inbox is clogged with junk messages even if they have filters on. These unsolicited emails may contain cryptic borderline-subliminal attacks. The words will be garbled but contain letters that convey a message when arranged in the correct order. Or they may contain a sounds like message. Your mind will automatically piece these letters together so they make sense. This is done on the fly, without you being aware of it.
These messages may contain junk in the body and the TI may not be able to reply to it because it came from a bogus address. These cryptic attacks are mentioned in the book, Subliminal Mind Control, by John J. Williams. If you're targeted, the message will probably pertain to something in your life situation. Any weakness you have can be exploited.
For instance, if you're going bald and have been looking for treatment, you could receive the following attack:
To: John Doe
Subject: Euro Balding Tummy
Body: asdfl;jkasdflkkjasdf;lkjasdfljkasdfl;jkasdfl
The harassment of some targeted people is more than likely broadcasted around the country via closed circuit TV to the politically powerful and those with connections in intelligence and organized crime.
In the workplace this can easily be done by surveillance systems, which many businesses now have in place. A report based on a survey conducted on over 500 companies appeared in the May 19, 2005 issue of Business Wire in an articled entitled, Statistics Show Rise in Surveillance of Workers. It stated, "More than half of the companies surveyed use video monitoring to counter theft, violence and sabotage," and that the number of businesses conducting surveillance is increasing.
This might be used for the purpose of "creating a sense of unity, [and] for identifying TIs who are to be harassed on the street." In addition to facilitating group cohesiveness and identifying targeted people, McKinney noted that it seems to be a "major source of entertainment" for the individuals participating in this harassment. Similarly, more overt degenerates have been known to record their actions so they can "re-live" the experience.
"Covert workplace surveillance is big business," stated the Denver Rocky Mountain News, on April 30, 2001. "Secret monitoring of employees has grown dramatically," echoed Knight Ridder in their August 6, 1997 article entitled, The Boss is Watching as Workplace Surveillance Grows. According to these publications, the equipment is installed after hours and includes miniature cameras hidden in thermostats, light switches, and on walls and ceilings that are located in changing areas, locker rooms, break rooms, and even bathrooms. Apparently, there have been some lawsuits concerning this.
Electronic Warfare
My goal here is to provide evidence that these weapons exist and are being used on the civilian population. They are also known as, Directed Energy Weapons (DEW), Psychotronic Weapons, Less-lethal Weapons, and Electromagnetic Weapons. Most targets are hit with these weapons. See here, here, here, here, here, here, here, here and here for more information.
These weapons or similar ones are currently being used on a massive scale against citizens of North America and other NATO nations. Dr Munzert refers to "Directed energy weapons" as the "high-tech arms of the century," and adds that they are "part of crimes (in Europe) that almost nobody knows [about] except the victims and the offenders." Although the surface intention for the creation of these weapons is to save lives, the evidence suggests they are being deliberately misused on a global scale as a traceless form of slow torture.
Subscribe to:
Posts (Atom)