More Evidence of the Technology
Exposing Intelligence Agency Human Rights Abuses, Government and Corporate Corruption Along with the Problems of Zionism. The Foundation of Freedom is Freedom of Thought and Freedom of Speech
See here and here for little known technology that is used for torturing people. See here for slavery by satellite, geo-slavery. See here for gang stalking and smearing techniques.
See here for more info about technological human rights abuse. See here for more about gang stalking.
Psychological torture is considered a war crime under Article 32 of the Geneva Conventions, which has a maximum sentence of the death penalty. The United States has been in a declared state of war, since October 2001, which invokes the Geneva Conventions.
In the United States, it is also a serious felony charge – to conspire to violate the civil rights of thousands of U.S. citizens - a possible sentence of life in prison. Numerous state and federal laws are being broken every day by these criminals. It is disturbing to even consider that government tax payer supported individuals get up every morning, and gladly plan for the torture of thousands of people in the United States.
I am alarmed at the thought of even asking this question: How sick and disturbed does someone need to be, to willingly torture people every day? These are acts of violence that are beyond comprehension and beyond murder, in my opinion. It is planned and deliberate, every day. This site contains information relating to advanced satellite surveillance and “harassment” technologies which are made available to covert government agencies and organized crime syndicates.
The secret technologies in question are covered by military/agency secrecy orders, mostly obtained under the US Inventions Secrecy Act, 1951. There are currently over 5,000 hidden devices, many computer – based and satellite facilitated, all with military / criminal applications. A list of known patents is available under the 'Mind Control Patents' and 'Classified & Hi-Technology' categories (also see here,) of this blog. Neurophones, brain scanners, and brain wave vocabulary software, directed energy and EM weapons. Undemocratically, and to protect powerful criminals from scrutiny, various secret National Security and Defamation legislation has been enhanced in recent years.
The US Patriot Act, for example, protects governments and connected criminals from criticism and/or detection and prosecution. Under this act anyone whistleblowing or fighting the system on a major concern is arbitrarily deemed to be unpatriotic (when it’s the criminals they criticize who betray us). They can then be listed (by a senior politician or at the request, through them, of a connected criminal) as a security risk and harassed covertly; using secret technologies.
In fact a Department Of Defense Directive, Directive 5240 1-R, 1994, gives open permission for those under surveillance to be used for remote experimentation. It’s no coincidence that this particularly undemocratic and evil move was followed in 1996 by a significant increase in the number of satellites deployed for the purpose of civilian surveillance and harassment. Over 20,000 satellites currently target and silence countless people worldwide (est. 500,000 plus) as a result of such terrible laws.
The victims are not openly confronted as that would remove any feigned excuses and leave the perpetrators open to all manner of accusation. Instead the methods used are covert; employing high tech’ to remotely torture, torment, hurt, and deceive victims without leaving evidence. This technology is also capable of mind control, altering brain states and emotions. This leaves them discredited as they vainly seek help from ignorant or complicit authorities (police, MPs, doctors, media etc). This leaves them neutralized and possibly even silenced on the issue they originally raised. This, along with various research aspects, is the purpose of the exercise.
The situation is getting worse not better with more and more secretive, undemocratic legislation being sneaked past the unwary public all the time. State treachery and terrorism are behind it yet it is all hidden under the guise of “the war on terror”. For example, the US gov’t just passed the National Defense Authorization Act, 2012, giving the President (and others) the power to target and silence anyone questioning State corruption. When this is done openly in other countries the US is the first to condemn such evil yet when they are guilty of the same they do it in secret and no-one dares to criticize lest they join the ranks of those they persecute. So much for gov’t of the people, for the people and by the people. The criminals who do such things abuse their authority, betray our trust and secretly mock the democratic ideals they publicly support. They don’t serve us, they simply help themselves and their criminal associates. By using stealth they can feign ignorance and hide their true nature from most.
Eg. In the USA over 300,000 NSL’s (National Security Letters) have already been issued. These allow the agency targeting of innocent civilians whose objections to corruption / crime in high places have been deliberately skewed or misinterpreted as a threat to powerful people. Once placed in a program people can be abused and experimented on, from a distance (using satellites / high tech’). This effectively silences and discredits them while providing agency researchers with guinea pigs for experiments in control, brain function, health, robotics and much more. Post 9/11, $750 billion per year has been spent on satellite weapons used for human experimentation / targeting. Most of this has found it’s way from gov’t coffers to about 80 defense contractors who are also culpable for the crimes against humanity that are addressed on this site.
There is a circular / Catch 22 type problem in that governments use “classified” covers to hide criminal activity (esp. if it is an unconstitutional act) but targets can’t prove any of that BECAUSE it has been classified…. Eg. NSA Whistleblower William Binney in an interview points out that Executive Order 13526 section 1.7 (covering classified status allocation) specifically says that **”You cannot classify information merely to cover up a crime”**. Even if devices or procedures are classified this also applies to them and information on them when they are being used for criminal purposes. So, in theory, by misusing devices, abusing authority and so on the administration not only commits crimes but should open up the information relating to that for public scrutiny…(Government of, by and for the people).
Now Presidents Obama and Bush both signed this executive order 13526 so if any of these hidden crimes was to be presented to the US Supreme Court then any current US leader could be impeached as having breached their oath of office…which includes upholding the constitution. The ECHELON spying system, neurophone harassment, remote neural monitoring, the use of directed energy weapons and more are all clearly crimes against the people and humanity in general and so by classifying the devices the government and it’s leaders are breaching the constitution as well.
As with any crime the break in the loop between the acts, investigation, trial and incarceration is the lack of proof. “Classifying” information and calling it a matter of National Security negates the need for the criminals involved to even create excuses for their conduct. The ability of government to classify crime is what must be fought.
Also, the US military is supposed to be prohibited by law from targeting US citizens with PSYOPS within US borders under Executive Order S-1233, DOD directive S-3321.1 and National Security Directive 130. Of course there’s no-one to police that especially since Psyops, by their very nature, are difficult to prove. This is particularly so where the secret weapons discussed on this web site are employed. Also nothing stops agencies, US or allied, from doing that dirty work and hiding it under the National Security carpet.
Also, previously The International Commitee of the Red Cross (ICRC) raised the issue of psychotronic weapons; firstly in 1994, then the 2002 Geneva Forum and then the 2009 5th Symposium on non-lethal weapons. The EUROPEAN PARLIAMENT passed a “Resolution on the Environment, Security and Foreign Policy” – A4-0005/99, January 28th, 1999 which called for “An international convention introducing a global ban on ALL development and deployment of weapons which might enable any form of manipulation of human beings”…”It is our conviction that this ban can not be implemented without the global pressure of the informed general public on governments. Our major objective is to get across to the general public the real threat which these weapons represent for human rights and democracy and to apply pressure on the governments and the parliaments around the world to enact legislation which would prohibit the use of these devices to both government AND private organisations as well as individuals”. (Plenary sessions / European Parliament, 1999). ]
From the Beginning of the Attack on October 7th, 51 Days Later.... a Cease Fire.... Watch (Another 51 Associated With Israel)
The 51-Day Waco Siege in Texas against the government
You Had a Jew Doing a Crossword of the Space Needle on My Mom's Birthday, July 31st. (Space Needle was opened 111 days into the year) 111 days into the year, 254 days left.
MOOG
Mary O (Moon) O (Sun) Grace
Established 1951
Former CEO Brady
TRINITY-21
2 Come Together to Make 1
111
Who worked at Surrey Satellites before current place? Connections to Macdonald Dettwiler and Associates. Marco and Michelle that name sound familiar?
Does Macdonald Dettwiler and Associates ring a bell? Connects to the Canadian Space Agency and NASA, among other things. (RCMP and CSIS)
John Trudeau your wife deleted her Facebook, why? She was posting on Marco's Facebook. Marco why are you following Sophie Trudeau? I bet this is all a coincidence.
See here for how Marco Brugman has interesting connections on his Facebook.
Losers Marco and Michelle Brugman know Lori Graham and Billy Graham. Daniel Mate is following Lori Graham's Instagram. Aaron Mate is his brother, he is a colleague of Max Blumenthal who wrote the 51-Day War about this war that happened over my Mom's birthday and mine. Right losers? Yes. I could put up a bunch of other losers in the community of Maple Ridge too. One was a former Mayor of the town and another a former Mayor of Pitt Meadows who was also a part of the RCMP for over 20 years. All are following Lori Graham and they know what is happening. I could put up a bunch more of you pathetic losers and maybe I will, you are all a fucking joke.
SMITH-CUMMING
Smith (Grandmother Maiden name)
Cumming (Mother Maiden name)
007
British Intelligence and CSIS
and my Loser Family
Anything to Say?
Is this not EVIL? Marco see here and see below.
See here for who really did this.
1992 Sesame Street
The guy's name in the clip from Sesame Street below is Louise.
It is connected to Lucifer see here.
Below are three interesting articles, read them all. Also, watch this documentary about experimenting on people with classified technology. Pure evil. The intelligence agencies and many police officers of the Western world are very aware of this technology. See here for more about Homeland Security. This is how truly sick our countries are. They rule over us and they work with criminals.
1.. The secret of the neuroscience boom: are there secret human experiments in Latin America? (Download this)
2. Transhumanism: the big fraud towards digital slavery (Download this)
Also, read this past article here: Slavery By Satellite - Must-Read Article From Academics (Download this)
Does anyone Know People Working With Intelligence Agencies and Drug Cartels?
Besides book here is more information to check out:
1. a list of classified technology
2. a whole blog dedicated to advanced and classified technology
3. Classified and Hi-Technology category of this blog
4. the mind has no firewall
5. Must read: Political Prisoner Torture - very similar my life, except mine physical body too.
6. Doctor talking about satellite terrorism
7. Former U.S. Rep From Ohio and Candidate for the President Attempted Ban On Classified Technology
8. Dangers of DNA tests
9. MRNA JABS CONTAIN 'NANOBOTS' THAT PERMANENTLY ALTERS DNA?
10. Documentary about the history of human experimentation and mind control
11. Activist Reveals Hidden Military Ties Between Canada and Israel-Weaponizing Nanotechnology
12. Must Watch: Doctor Daniel Lebowitz Confirms Organized Stalking & Stasi Smear Tactics Exist
13. Targeted Individual Program is US Special Operations Command’s “Continuous Clandestine Tagging, Tracking, and Locating Hostile Forces With Nanotechnology
Click on Links Below to Read the
Government Documents
The following seven power point presentations made by and for US Special Operations Command (USSOCOM) and their military and corporate partners clearly describe and detail the “technology,” systems, and personnel behind the “organized stalking-electronic torture program."
These power point presentations indicate that this new form of unconventional warfare/low intensity conflict being covertly waged against civilians placed on the Terrorism Watch List under the pretext of the so-called “War on Terrorism” is actually “multi-domain warfare.”
The following terms and technologies, depicted in these power point presentations, strongly suggest that so-called “Clandestine Tagging, Tracking, and Locating (CTTL)”, later termed “Hostile Forces- Tagging, Tracking, and Locating (HF-TTL), is the USAP (Unacknowledged Special Access Project) commonly referred to as the Targeted Individual Program/Organized Stalking-Electronic Harassment.
Furthermore, TIs are obviously the expendable guinea pigs/test subjects for development of these technologies:
These programs are funded via American tax dollars and deploy regular and irregular (citizen-based agents) forces as well as special forces against innocent citizens.
I. US Special Operations Command: Continuous Clandestine Tagging, Tracking, and Locating (CTTL)
by Doug Richardson SOAL-T WSO, Sept. 5, 2007
Mr. Doug Richardson SOAL-T WSO 5 September 2007. The overall classification of this briefing is: UNCLASSIFIED and Locating (CTTL) The Ability to Locate, Track, and Identify Human Beings.
Highlights From PPT:
p. 3: Continuous Clandestine Tagging, Tracking, and Locating (CTTL)
– The Ability to Locate, Track, and Identify Human Beings and Other Important Targets
- Directly Supports DoD’s Ability to Prosecute the Global War on Terrorism (GWOT)
- Forces Require an Ability to Apply and Monitor Tags
- Detect and Identify Targets Based on Their Unique Observable Characteristics Without Undue Exposure of Personnel to Risks and With Devices That are Sufficiently Clandestine to be Effective.
p. 4: Partnership between Assistant Secretary of Defense for Special Operations and Low Intensity Conflict (ASD SO/LIC), USSOCOM, and U.S. Army
- Objective: Conduct a Collaborative Effort to Develop New Capabilities for Clandestine Tagging, Tracking, and Locating in Response to Priorities Established in a Quick-look Capability-based Assessment Conducted in Response to the Findings of the QDR
- Approach: Transition Existing State-of-the-Art Technologies in Nanotechnology, Chemistry, and Biology to Operational Systems Through the USSOCOM Acquisition Process and Conduct RDT&E From Basic Research Through Prototyping to Provide Continuous Improvements in the CTTL Technology Available for Transition to the Operators. Specific Capability Projections Are Classified.
p. 7: CTTL– Key Enabling Technologies
- Nanotechnology
Clandestine Devices
High Functional-density Devices
Self-organizing, Self-deploying Devices
Processing and Communications
Energy Harvesting
- Biotechnology
Biomimetic Devices for Detection and Identification (ID) at Long Distance Bio-based Devices for Detection and ID at Long Distance Taggants for Biological Signature Amplification, Translation Natural Signature Detection and ID
- Chemistry
Signature Enhancing Taggants
Chemical/Biochemical Sensors for Natural Signatures
p. 8: CTTL– Partnership for Transition–
- DDR&E and USSOCOM AE Executive Sponsorship and Oversight
- USSOCOM Transition
PEO-Special Projects
PEO-Intelligence and Information Systems
- Collaborative Execution of S&T
DoD Service Laboratories
Defense Advanced Research Projects Agency (DARPA)
ASD(SO/LIC) Coordinated Investments
Intelligence Community Research Organizations
DOE Laboratories
p. 13: CTTL — Human Signature Detection
- Skin Spectral Emissivity's Measured
- Thermal Fingerprints Determined
- “Target” Reacquired 90 Minutes Later
Goal: Verification of Capability and Operational Value Within 2 Years
Human Thermal Fingerprint at Long Distance
p. 14: CTTL –Human Signature Detection —
Goal: Demonstration of Fieldable “Bioelectronics” Within 5 Years
Synthetic Dog’s Nose Sensor
p. 15: CTTL — Signature Amplification/Translation
Bioengineered Signature Translation Bio-reactive Taggant
Goal: Move Basic Research to Advanced Development in 3 Years
Current Capability – Bioengineered Signature Translation
p. 16: CTTL — Nano-scale Devices
Quantum Dots
Goal : Micro-scale in 12 Months, Nano-scale in 4 to 5 Years
Self-assembled Photonic Antenna
There you go. No more rights. Here is the wikipedia of the guy that is featured in the top video below. In the bottom video is Sergey Brin, the co-founder of Google along with Klaus Schwab, the founder of the World Economic Forum. Have you ever seen the movie the Circle, which is loosely based upon Google? Remember the Google Chrome circle? Do you remember in the movie how they were following the guy around? This is organized stalking!
The guy in the top video is Dr Yuval Noah Harari, see interviews with him here, here, and here with James Altucher. I have written previously about James Altucher here, here, and here, The video proves what I am saying. James is a computer scientist, Yuval isn't, but he knows about this. (It is worth mentioning, James is not the only one covering this up.)
See past video with Steve Hoffman here. Some one in Silicon Valley that actually tells some of the truth. Think of how many of them know this and say absolutely nothing.
See here for more about nanotechnology. (Scroll down and read all the articles.) This is also what I have been saying about using viruses to get this in your body. (Also see here.) It has become so sophisticated it can also be introduced with dust. See the movie "Gamer" when they talk about this. Also, see this video about injecting a brain-computer interface into your body through your leg (starting at 4:32 into the video,) also see here.