| |||
|
OF (396)
"Matthew 12:42 The queen of the South will rise at the judgment with this generation and condemn it; for she came from the ends of the earth to listen to Solomon's wisdom, and now one greater than Solomon is here."
The Bible prophesies the Queen of the South will rise at the judgment, but did not give her name or any other detail about her. Nowadays, many people believe that Queen of Sheba in 1King 10:1-13 is the Queen of the South referenced in Matthew 12:42.Among the significant questions surrounding the Queen of the South, her role in the judgment and the Queen of Sheba:
Where are the ends of the earth?
How will the Queen of the South come from the ends of the earth?
Who was Queen of Sheba in 1King10:1-13?
Who were Queen of Sheba’s ancestors?
Soleilmavis Liu, author of The Queen of the South in Matthew 12:42, will take you along to seek the answers, using a large number of historical and archaeological facts, through conclusive arguments, scientific and systematic analysis and rigorous study and demonstration of each chapter.
Here is the Video which introduces the book "The Queen of the South in Matthew 12:42."
https://peacepink.ning.com/video/queen-of-south
Soleilmavis hopes that her presentation sheds new light on this important person, which would play a decisive role in the history. This book is a step in that direction.
Go to the following link to buy the book
PLEASE SEND YOUR TORTURE AND ABUSE CASES AND INFORMATION TO THE INTERNATIONAL CRIMINAL COURT – use Reference: OTP-CR-70/07
Ok someone tryed to do this to my wife moments ago there idiots. this is how some people think there cool they try to make girls do stuff and men there loosers. see some used this for self defence and others use it to be assholes.
when they talk of masters and slaves the master can make people do things here not spose to some did this for self defence others are offencive. to try to make girls sex slaves and do harm to others.
this is what i fought against for years to end the chips. they try to access a chip and remote controal other humans this is what these losers do. there are ways of doing it some call it mastering. it''s done through a mind controal device or implant. alot of people been hideing and lieing bout this for years.
people are not spose to speak of it they do not want it stoped. since they just tryed to make my wife jennifer do something to me im releaseing the info. the more they do the more i will release.
see whit the mind controal devices it's posable to do these people are dangerous some so they want to blaim 2 my wife never realy knew about it and now she is like knowing some stuff becouse people are trying to make her know to pretend she knows alot she dose not now.
you ever have a thought you never knew where it came from ?
you ever just say something and you do not recall ?
now you know how it was done.
| |||||||||||||||
Freedom From Covert Harassment and Surveillance • 3925 Paxton Ave. • Cincinnati, OH 45209 |
Subscribe | Unsubscribe | Send to a Friend | Preferences | Report Spam |
Powered by MyNewsletterBuilder |
Please use the common subject/reference: I join the lawsuit of the victims of mind control - electronic
harassement and surveillance worldwide or the reference number
Please use the following link as a guide:
http://directenergyterror.oyla.de/cgi-bin/hpm_homepage.cgi
Togehter we are strong
FFCHS News |
IN THIS ISSUE FFCHS NEWS Letter to the Editor Published FFCHS at Democracy Now! Event in NYC COMMUNITY NEWS Dr. Posner in Fresno to Start TI Meetup in Central/Northern California Radiation Measurement Device ARTICLES Indymedia Article About Gangstalking Fly on the Wall Drone/Spy Uses Ultrasound Sensors WEBSITES Survivalist Communities Food for Homeless Animals VIDEOS HAARP Documentary CONFERENCE CALLS RELATED INFORMATION Printer-friendly link: http://www.mynewsletterbuilder.com/email/newsletter/1410300711 LETTER TO THE EDITOR PUBLISHED So far, we have one letter to the editor that is known to have been published: The Douglas Enterprise in Douglas, Georgia. If anyone else has information about other places that published the letter, please let me know. FFCHS AT DEMOCRACY NOW! FUNDRAISER WITH MICHAEL MOORE & PATTI SMITH April was quite a high-profile month for FFCHS. First, there was the press conference in Louisville, Kentucky, then on to New York City for the Democracy Now! fundraiser. Due to the generosity of one of our members, two TI's from our community, FFCHS paralegal, Lynn Weed and Attorney Keith LaBella, recently attended Democracy Now!'s fundraiser in New York City, at $250 per person. Some attendees apparently paid $1000 per ticket to attend this event. It was a small, elite gathering of 40 individuals who listened to Amy Goodman interview film producer Michael Moore, singer Patti Smith, and journalist Juan Gonzalez. The event went quite well and that FFCHS attended was a plus for our group, as some attendees were national journalists and other activists who would possibly take our claims seriously. One hitch to the event was that in the process of all this, Lynn Weed lost her glasses. So we're trying to fundraise to replace them at a cost of $200. If any of you all can help with this effort, it'd be appreciated. Derrick derrickcrobinson@gmail.com 513 344 4113 Here is Lynn Weed's account of the evening. Amy Goodman’s Interview With Michael Moore At Democracy NowBy Lynn Weed New York City April 27, 2010 On April 26, 2010 Keith LaBella, Esq. and Lynn Weed, paralegal attended Democracy Now’s interviews with actor/producer Michael Moore, singer/poet Patti Smith and journalist, Juan Gonzalez at Democracy Now’s new studio in New York City. Award winning humanist journalist Amy Goodman, of Democracy Now interviewed all three. About 40 event attendees listened in a semi circle around the TV stage. Viewers commented that the interviews were interesting and brought many facts to light. Michael Moore related information concerning events, following his Academy Award speech. Apparently because of his comments concerning the Bush Administration and the Iraqi War, his home was vandalized and he has received death threats. He travels with a security team and rarely gives out personal interviews to the general public, at this time. His interview with Amy Goodman was lively, informed and extremely witty. He is engaging, talented and willing to share his political views. Some of his earlier exploits with the nuns in the parochial school he attended, had the listeners laughing. Patti Smith sang several songs. In her last song, “Because the Night Belongs to Lovers”, she had the audience singing along with her. Guest were heard commenting that her singing was "amazing and very good." Her Baez-like tones were appreciated. Award winning journalist Juan Gonazalez spoke of the need for independent journalism to continue, as corporate journalism looms and internet journalism threatens to diminish the professionalism, characterized in the field for so long. He spoke of the need for an independent free press, in a capitalistic society, to keep democracy working. It was a good intereview and his points seemed well taken and were well received. During her interview with Amy Goodman, Patti Smith spoke eloquently and poignantly of a man, she is working with, in a human rights capacity. He had been detained and kept in a small cell in Guantanamo Bay. He had been shackled there for many months. The light had been kept on the entire time he was in the cell (months) and he described this as another form of torture. When he was finally freed, as an innocent, he had trouble walking because of damage to nerves and muscles from those months of being shackled. As she told each step of his plight, this poetic artistic clearly portrayed the pain inflicted on this innocent man and how it affected his life. The story was extremely moving story and I believe everyone listening was touched by the pathos of this true story. Later, thinking of her descriptions and the pathos now in this innocent man’s life, I became aware; his plight had truly touched me. I realized that the parallels between our plight and his were many and in some ways similar. We then moved to the wine and hors d’ oeuvres part of the evening. Keith and I circulated and gave our information to many people attending, who may be of help to us. This included some show producers, a journalist, two lawyers and one Midwestern camera and cable man, who may have been with Michael Moore’s party and showed interest in what Keith and I were presenting. It was a productive evening. END |
|
So this is america and there filthy ways people say go to america it will be great in other countrys if you do come here and are chipped you will probly just want to kill the americans. most of the americans will say right out. this country sucks. these poeple act like it's a great place to be. America is nothing but a predetermined image and a lie. the freedom in the united states is not real. Is it's a free country ? NO
only for those that are stupid enough to belive the lies.
These others in this web sight are proof enough. the government is currupt the people are no good and this is how they treat the people. harassment invasion of privacy and messing with others wives they have no buisness doing. i got Marryed so they thing there going to go rape my wife or use there equipment to ave her go have sex with someone and come home and tell me about it. these people deserve to die.
Maybe another country will take action against America one day. or the human rights people will wake up and do something about it. untill them these people with there chips will harass people and try to enslave others as they think they will.
what great chipped people. the kindest there are americans. now you know why they sipt on flags and burned them in other countrys. You should also.
The American flag is not fit to wipe my ass with.
If you have any diganty you should shun the american show them no tust. cast them out from your Forigen homes and send them back to whence they came.
head the warrning this and is not free and the government prays on it's own people..
http://www.xing.com/app/forum?op=showarticles;id=1077122004 Jul 2008, 04:22 amGoogle Patent #4647773 ![]() ![]() AltaVista fand 486 Ergebnisse Method of continuous production of retroviruses (HTLV-III) from ... A cell system is disclosed for the reproducible detection and isolationof human T-lymphotropic retroviruses (HTLV ... United States Patent4647773. Abstract: ... ![]() Weitere Seiten zu freepatentsonline.com AIDS is man-made - Interview with Dr. Boyd Graves Dokumententyp:PDF - Download PDF Reader Insimpler terms, he received a patent (U.S. Patent No. 4647773) tocontinue the ... BG: The patent was issued to Rabbi Dr. Marvin Antelmanof Morantech ... ![]() Weitere Seiten zu deqebat.com humanmilkpatentpending: HIV...patents Patent# 4647773 called "Method of continuous production of retrovirus(HTLV-III) ... The patent inventors were Gallo, Popovic, andSarngadharan and it was also owned ... vwmcclain.blogspot.com/2008/03/hivpatents.html • Translate Weitere Seiten zu vwmcclain.blogspot.com Assay and apparatus for detecting feline immunodeficiency virus ... Compositionsderived from a novel viral isolate designated feline T-lymphotropiclentivirus (FTLV) ... United States Patent 5565319. Abstract: ...4647773 ... ![]() Weitere Seiten zu freepatentsonline.com AIDS CURE: U.S. Patent #5676977 , page 1 Discusionabout AIDS CURE: U.S. Patent #5676977 in the AboveTopSecret.com ...4647773 - This is the actual intellectual property of the virus provingthe ... ![]() Weitere Seiten zu abovetopsecret.com AIDS estimates surge in America See the killer patent. Copy this patent number: 4647773. Click on ![]() onlinejournal.com/artman/publish/article_2785.shtml • Translate Weitere Seiten zu onlinejournal.com Read Article ... you the 1997 patented CURE for AIDS, U.S. patent #5676977, ![]() ![]() Weitere Seiten zu unobserver.com UK Indymedia - US Patents for HIV AIDS and Patent for CURE UnitedStates Patent 5,676,977 Antelman October 14, 1997 ... 4647773 Method ofcontinuous production of retroviruses (HTLV-III) from patients ... ![]() Weitere Seiten zu indymedia.org.uk MySpace.com - indigenous - 33 - Male - BROOKLYN, New York - www.myspace ... MySpaceprofile for indigenous with pictures, videos, personal blog, ... U.S.Patent #4647773 United States Patent 4,647,773 Gallo -Continuousproduction ... profile.myspace.com/index.cfm?fuseaction=user.viewprofile&friendid=319476040 • Translate Weitere Seiten zu profile.myspace.com It's over and you did nothing It’sOver and You Did Nothingby Daniel J TowseyWhile you slept on your couchand your Pacifier ... Here's the Patent for HIv US Patent For Aids #4647773 ... ![]() Weitere Seiten zu mychurch.org ![]() ![]() AltaVista fand 486 Ergebnisse Method of continuous production of retroviruses (HTLV-III) from ... Acell system is disclosed for the reproducible detection and isolationof human T-lymphotropic retroviruses (HTLV ... United States Patent4647773. Abstract: ... ![]() Weitere Seiten zu freepatentsonline.com AIDS is man-made - Interview with Dr. Boyd Graves Dokumententyp:PDF - Download PDF Reader Insimpler terms, he received a patent (U.S. Patent No. 4647773) tocontinue the ... BG: The patent was issued to Rabbi Dr. Marvin Antelmanof Morantech ... ![]() Weitere Seiten zu deqebat.com humanmilkpatentpending: HIV...patents Patent# 4647773 called "Method of continuous production of retrovirus(HTLV-III) ... The patent inventors were Gallo, Popovic, andSarngadharan and it was also owned ... vwmcclain.blogspot.com/2008/03/hivpatents.html • Translate Weitere Seiten zu vwmcclain.blogspot.com Assay and apparatus for detecting feline immunodeficiency virus ... Compositionsderived from a novel viral isolate designated feline T-lymphotropiclentivirus (FTLV) ... United States Patent 5565319. Abstract: ...4647773 ... ![]() Weitere Seiten zu freepatentsonline.com AIDS CURE: U.S. Patent #5676977 , page 1 Discusionabout AIDS CURE: U.S. Patent #5676977 in the AboveTopSecret.com ...4647773 - This is the actual intellectual property of the virus provingthe ... ![]() Weitere Seiten zu abovetopsecret.com AIDS estimates surge in America See the killer patent. Copy this patent number: 4647773. Click on ![]() onlinejournal.com/artman/publish/article_2785.shtml • Translate Weitere Seiten zu onlinejournal.com Read Article ... you the 1997 patented CURE for AIDS, U.S. patent #5676977, ![]() ![]() Weitere Seiten zu unobserver.com UK Indymedia - US Patents for HIV AIDS and Patent for CURE UnitedStates Patent 5,676,977 Antelman October 14, 1997 ... 4647773 Method ofcontinuous production of retroviruses (HTLV-III) from patients ... ![]() Weitere Seiten zu indymedia.org.uk MySpace.com - indigenous - 33 - Male - BROOKLYN, New York - www.myspace ... MySpaceprofile for indigenous with pictures, videos, personal blog, ... U.S.Patent #4647773 United States Patent 4,647,773 Gallo -Continuousproduction ... profile.myspace.com/index.cfm?fuseaction=user.viewprofile&friendid=319476040 • Translate Weitere Seiten zu profile.myspace.com It's over and you did nothing It’sOver and You Did Nothingby Daniel J TowseyWhile you slept on your couchand your Pacifier ... Here's the Patent for HIv US Patent For Aids #4647773 ... ![]() Weitere Seiten zu mychurch.org Of course. Thatshow politics work these days. Wars are not necessarily fought withweapons but through a variety of other means, including economic ones. S. Mr Carnicom as well as Dr. Staninger are experts in this. ![]() ![]() Dr Carnicom is an expert in chemtrail composition and morgellon research. It is worth a look. Also I havespoken with Dr. Hildiegard Staninger and she too is a morgellon expert. Google Morgellon disease ![]() Itis something the UN is not familiar with and needs to become becausethe United States is attempting world control-that you must see andshould be obvious that if countries to not comply with the UnitedStates then they are punished economically. Bush did this whenSchroeder did not agree with the US attacking Iraq. Bush placed economic sanctions on Germany. Be open minded and judge for yourself. You seem very well educated and very logical. Danke, Ron Angell |
Sent: Thursday, August 13, 2009 8:14 PM
Subject: shielding
Sorry for the multiple post.
Look up the materials that the stealth bomber uses to deflect and absorb RADAR energy. Has anyone tried combinations of Teflon, cellophane, etc? High di-electric constant material should help reduce some of the effects usingpassive shielding techniques. Since the military’s system uses adaptivebeamforming technologies, passive shielding will have its limitations. It willadapt to find the maximum entry overtime. More sophisticated methods of activejamming with alterations in the magnetic flux and the expected spectralabsorption lines for the ions of interest would be far more effective.
My book is getting close to completion. Would anyone care to proof read it before it goes to the editor and publisher?
An Introduction to Information Warfare Theory, Technologies, and Practice.
Engineering Intelligence and Designing Gods
Book Contents
Preface.......................................................................................................................................... 13
Introduction by Noam Chomsky and Ray Kurzweil................................................................... 14
Chapter 1 Enemy of theState...............................................................................................14
Chapter 2 Advanced Sensors and Systems forBio-Communications................................. 15
RADAR..................................................................................................................................... 16
Doppler RADAR.................................................................................................................................................................. 17
Signal to Noise Ratio, Gain, and Sensitivity at a Distance Parameters.................................................................. 23
Full Spectrum Radar and Multiresolution Wavelets................................................................................................. 24
Adaptive filtering........................................................................................................................................................... 26
Phased Locked Loops................................................................................................................................................... 27
Phased Arrays and Multi-dynamic RADAR.............................................................................................................. 28
Heterodyning High Frequencies into Low Frequency Sidebands......................................................................... 29
Reflection, Absorption, and Scatter............................................................................................................................ 30
Passive and Active Sensing......................................................................................................................................... 30
Adaptive Beam Forming and Electronic Scanning.................................................................................................... 31
Holography and Interferometry.................................................................................................................................. 32
Electronic Warfare and Radio Frequency Interference........................................................... 34
Directed Energy Weapons........................................................................................................ 34
Communication Warfare........................................................................................................... 36
NSA Encoding and Decoding Techniques..................................................................................................................... 36
Imaging...................................................................................................................................... 40
Spectrograms........................................................................................................................................................................ 41
Magnetic Nuclear Resonance............................................................................................................................................ 41
Electron Spin Resonance.................................................................................................................................................... 41
Scintillation of Organic Molecules Using Free Radicals and Spin Probes................................................................. 41
Viewable Scintillation of Ion Density............................................................................................................................... 42
Ion and Electron Cyclotron Resonance........................................................................................................................... 42
Using Doppler to Scan Ion Current Density with Frequency Spread......................................................................... 42
Filtering, Identification of Signatures, and Tracking Algorithms............................................ 43
Chapter 3 Modes of NeuronInfluence.................................................................................44
Directed Energy........................................................................................................................ 44
Energy Wave Shaping........................................................................................................................................................ 46
Thermal Elastic Expansion.................................................................................................................................................. 47
Thermal Catalytic Reaction Speeds.................................................................................................................................. 48
Heating...................................................................................................................................... 48
Stored Waveform Inverse Fourier Transform (SWIFT).......................................................... 48
The Diode Effect....................................................................................................................... 49
Neurotransmitter Release........................................................................................................ 49
Electron Cyclotron Current Driving......................................................................................... 51
Ion Cyclotron Resonance, Ion Heating.................................................................................... 51
Magnetic Induction................................................................................................................... 52
Quasi-Static High Voltage Electric Fields................................................................................ 52
Ultrasonic energy...................................................................................................................... 53
Colloidal Vibration Potential.............................................................................................................................................. 53
Kinetic Elastic Expansion................................................................................................................................................... 53
Direct under skull electrical probes......................................................................................... 53
Genetic Engineering and TSS Chemical Division Research for the “psi” Gene.................... 53
Chapter 4 Wet and Dry NeuralNetworks............................................................................54
Information Theory................................................................................................................... 54
Data → Information → Knowledge → Wisdom → Enlightenment............................................................................. 54
Memetics and the Mating of Minds......................................................................................... 55
Super Intelligence..................................................................................................................... 55
The Global Brain Project.......................................................................................................... 55
Hive Minds and Swarm Theory of Information........................................................................ 55
Integrated Intelligent Systems................................................................................................. 55
Centralized and Distributed Intelligence................................................................................. 56
The Global Brain Project..................................................................................................................................................... 56
Cybernetic Hive Minds....................................................................................................................................................... 56
Human Networks................................................................................................................................................................. 56
Super-Intelligence................................................................................................................................................................ 57
Cognitive Entities, Networks, and Society of Minds................................................................................................ 57
Harvesting Human Minds and Other Wet Nets........................................................................................................ 58
Think Tanks (Brainstorming)........................................................................................................................................ 58
Organizational Behaviors.............................................................................................................................................. 60
Network Structures........................................................................................................................................................ 60
Hierarchies and Classism.................................................................................................................................................... 60
Structure, Importance, Relevance, and Meaning............................................................................................................ 61
Defining Human Cognition and the Sense of Self..................................................................... 61
Computational Equivalence and the Conscious Universe....................................................... 62
Chapter 5 NeuralProgramming...........................................................................................63
AutoCorrelograms.................................................................................................................... 64
Mapping.................................................................................................................................... 64
Self-organizing unsupervised learning / reinforcement learning / neurodynamic programming............................. 65
Classification and Brain Printing Identification.............................................................................................................. 65
Port Scanning.................................................................................................................................................................. 66
Brute force hacking........................................................................................................................................................ 67
Compression................................................................................................................................................................... 67
Cataloguing............................................................................................................................... 69
Personality Segmentation................................................................................................................................................... 69
Loyalty Affinities and Belief System Classification.................................................................................................. 69
Personality Simulations................................................................................................................................................. 69
Creating Cogs in the Machine...................................................................................................................................... 69
Data-mining Anomalies...................................................................................................................................................... 70
Counter Terrorism.......................................................................................................................................................... 70
Counter Intelligence....................................................................................................................................................... 70
Censorship and Information Flow Controls............................................................................................................... 70
Cognitive Configurations.......................................................................................................... 71
Virtual Neurons......................................................................................................................... 71
Transformations between Machine and Human Knowledge Storage...................................... 72
Integrating the Internet with Wet and Dry Neural Networks.................................................. 72
Adding Non-biological Sensors to Human Perception............................................................. 72
Chapter 6 Applications..........................................................................................................73
Self Directed Evolution............................................................................................................. 73
Autonomous Modification, “Free Will”, Deterministic Reprogramming, and ‘Bit Twiddling’................................ 73
Diagnostics and Monitoring...................................................................................................... 74
Efficient Communications......................................................................................................... 75
Universal Translators.......................................................................................................................................................... 75
Telepathy and Psychophony............................................................................................................................................ 75
Distributed Knowledge Management...................................................................................... 75
Self Organizing Adaptable Reconfiguration and Swarm Theory................................................................................. 75
Dream Harvesting – Utilizing Down Cycles.................................................................................................................... 76
Beaming and ‘Transporter’ Technology.......................................................................................................................... 76
Enhanced Human Performance................................................................................................ 77
Over-clocking the common fundamental Human Algorithms....................................................................................... 77
Forced Sleep and Adrenaline Boosts............................................................................................................................... 77
Memory Enhancement........................................................................................................................................................ 77
Intelligence and knowledge enhancements..................................................................................................................... 78
Extra Senses and Psi-borgs(Cybernetic biological computer entities)........................................................................ 80
Mood Management............................................................................................................................................................. 81
Enhancing Biological Sensors........................................................................................................................................... 81
Silicon Immortality............................................................................................................................................................... 81
Virtual Heaven and Hell................................................................................................................................................. 81
Crime and Punishment.............................................................................................................. 82
Automating Justice and Preventing Crimes.................................................................................................................... 82
Correctional Alternatives................................................................................................................................................... 83
“Behavioral Training”, Brainwashing, psychic driving and programming............................................................ 83
Secret Prisons................................................................................................................................................................. 83
Big Brother, Aliens, and the Voice of God................................................................................................................. 85
Cultural Engineering and Cultural Normalization.................................................................... 85
Accelerated Education........................................................................................................................................................ 87
Directed Evolution............................................................................................................................................................... 88
Productivity of Society....................................................................................................................................................... 89
Entertainment Applications...................................................................................................... 89
Ego trip.................................................................................................................................................................................. 89
Memory implants................................................................................................................................................................. 90
Virtual vacations.................................................................................................................................................................. 90
Shared interactive movie and music creation.................................................................................................................. 90
Virtual sex.............................................................................................................................................................................. 90
Electromagnetic Psychoactive Drugs and Altered Conscious States......................................................................... 91
War Gaming.......................................................................................................................................................................... 91
Sensing of desires and fulfilling them.............................................................................................................................. 92
Medical Applications................................................................................................................ 92
A New Medical Instrument that Spin Tags and Monitors Free Radicals................................................................... 92
Accelerated Healing............................................................................................................................................................ 92
Anit-Depression medication, Cure for Post Traumatic Stress Syndrome................................................................... 92
Cure for Loneliness and Broken Hearts........................................................................................................................... 92
Behavioral Modification to Quit Smoking, Lose Weight, Exercise Motivation......................................................... 93
Analgesics and Sensitization............................................................................................................................................. 93
Monitoring of seizures, heart activity.............................................................................................................................. 93
Diagnostics through Pain Sharing.................................................................................................................................... 93
Empathy Creation................................................................................................................................................................ 93
Universal Translator...................................................................................................................................................... 94
Replace Ritalin and many psychoactive pharmaceuticals............................................................................................. 95
Drug Rehabilitation............................................................................................................................................................. 95
Sobriety signal..................................................................................................................................................................... 95
Replace dying brain cells with virtual ones..................................................................................................................... 95
Cures for Blindness and Deafness.................................................................................................................................... 95
Muscular sclerosis (MS), Seizures, Bi-polar, Schizophrenia Cures............................................................................. 96
Bionics and spinal injuries................................................................................................................................................. 96
Biological Cloning and Mental Cloning........................................................................................................................... 97
Immortality............................................................................................................................................................................ 97
Military applications.................................................................................................................. 97
Spying/ESPionage/Remote Viewing................................................................................................................................. 97
Control of enemy................................................................................................................................................................. 98
Control of politics................................................................................................................................................................ 98
Control of civilians opinions.............................................................................................................................................. 99
Remote control soldiers...................................................................................................................................................... 99
Reading of vitals................................................................................................................................................................ 100
Enhanced human performance........................................................................................................................................ 100
Faster reaction times......................................................................................................................................................... 100
Psi-borg extra senses........................................................................................................................................................ 100
EEG control of robotic machines..................................................................................................................................... 101
Current Uses........................................................................................................................... 101
Silencing Dissenters and Government Whistle Blowers............................................................................................. 101
Brain print assassinations........................................................................................................................................... 101
Remote Lobotomies and Remotely Induced Schizophrenia.................................................................................. 102
Finding the outlying thinkers..................................................................................................................................... 105
Controlling Mass Media................................................................................................................................................... 105
Controlling Religions........................................................................................................................................................ 105
Acquiring Black Mail on Politicians............................................................................................................................... 105
Assassinating with plausible denial targets in the US and abroad........................................................................... 105
Controlling World Politics................................................................................................................................................ 106
Controlling Financial Markets......................................................................................................................................... 106
Collapsing Economies like the Former Soviet Union or the United States.......................................................... 106
Cheating at Gambling Games...................................................................................................................................... 106
Brain bugs - Spying, Espionage, and Sabotage............................................................................................................ 106
Human Robots and Psi-Borg Slaves............................................................................................................................... 106
Creating Alter Personalities – Dr. Jekyll and Mr. Hyde.......................................................................................... 106
Passing/failing Polygraphs and Brain Printing fMRI Truth Detectors................................................................ 107
Stress Conditioning..................................................................................................................................................... 107
Remote Interrogations – No-Touch Torture and Mind Probing................................................................................ 108
Dream Programming and Memory Probing.................................................................................................................... 109
Evolving Mind Virus Weapon Effectiveness................................................................................................................ 109
Directed Evolution............................................................................................................................................................. 110
Eugenics, Genocide, and the Silent Holocaust........................................................................................................ 110
Menticide and Silent Warfare..................................................................................................................................... 111
Intelligent Design......................................................................................................................................................... 111
Human animals and machines with souls................................................................................................................. 112
Chapter 7 Hacking Computer and BiologicalSystems..................................................... 113
History of Mind Hacking........................................................................................................ 113
Mind Hacking and The Enemy Within................................................................................... 114
Cognitive and Perception Warfare......................................................................................... 115
Cognitive Modeling and Reverse Engineering the Brain..................................................... 115
Mind Viruses........................................................................................................................... 120
Genetic Algorithms and Directed Evolution.................................................................................................................. 121
Human Experimentation, Brain Knapping, and Food for Thought....................................................................... 121
Malicious Payloads........................................................................................................................................................... 122
Replacing Personalities............................................................................................................................................... 123
Protected Memory, Partitioning, and Cognitive Containment......................................................... 123
Infinite Looping................................................................................................................................................................. 124
Demons............................................................................................................................................................................... 124
Crashing the Operating System Through Error Amplification.............................................. 124
Zombification and Remote Control Attacks........................................................................... 125
Scalable Enslavement and Zombification Strategies.................................................................................................... 126
Spiders................................................................................................................................................................................. 126
Bots...................................................................................................................................................................................... 127
Intelligent Agents.............................................................................................................................................................. 127
Brute Force Hacking – Master/Slave Roles.......................................................................... 127
Queuing Executables - Subliminal and Hypnosis................................................................... 128
Logic and Memory Buffer Overflow....................................................................................... 128
Denial of Service Attacks....................................................................................................... 129
Trojan Horses......................................................................................................................... 130
Triggers and Triggered Payloads...................................................................................................................................................... 131
Personality Overlays.................................................................................................................................................... 131
Psycho-bombs.............................................................................................................................................................. 132
Programmed Assassins............................................................................................................................................... 132
Terrorists....................................................................................................................................................................... 134
Pleasure/Pain principles.......................................................................................................... 134
Spoofing................................................................................................................................... 136
Social Engineering, Identity Theft, and Doppelgangers............................................................................................. 137
Authority, Privilege, Access, and Role Level Hacking................................................................................................ 138
White Noise Generators, Jammers, and scramblers............................................................. 138
Phreaking and mobile phone cloning...................................................................................... 139
Phishing and Brain Scanning – Finding hosts......................................................................... 139
Co-Processor Usurpation....................................................................................................... 139
Inserting Secret Hooks in Device Drivers............................................................................ 140
Worms , Memetic Viruses, and Psychotronic Viruses........................................................... 140
Ghosting the Sensor Systems................................................................................................. 140
Cloaking and Stealth Technologies........................................................................................ 140
Hacking the Variables of Belief Systems............................................................................... 141
Dictionary Attack.............................................................................................................................................................. 141
Purging and Altering Memory......................................................................................................................................... 141
Electronic Dissolution of Memory --- E.D.O.M....................................................................................................... 142
Thought filtering and suppression................................................................................................................................. 142
Hacking Decision Trees.................................................................................................................................................... 144
Psychographic Mapping............................................................................................................................................. 144
Game Theory................................................................................................................................................................. 144
John Nash Equilibriums............................................................................................................................................... 145
Reflashing the BIOS, Infecting Boot Sectors, Substitution of Operating System Files........ 146
Hacking Input Output Ports – The 5 Senses and Motor Cortex.......................................... 148
Spyware................................................................................................................................... 152
Stealing Passwords.................................................................................................................. 154
Key Stroke Loggers........................................................................................................................................................... 154
Soul Catchers and Recording the Entire Life of Every Human.............................................................................. 154
Memory Probing..................................................................................................................... 156
Bi-directional Associative Memory (BAM) Probing................................................................................................... 156
Self Destruct Algorithms........................................................................................................ 157
Suicide bombers / Psycho-bombs................................................................................................................................... 157
Suicide through torture and depression signals........................................................................................................... 158
Amplification of destructive behaviors and addiction pathways.............................................................................. 158
Shutting down and Stressing the Subsystems........................................................................ 158
Heart Failure, blood clots, and Strokes.......................................................................................................................... 159
Secondary and tertiary diseases caused by prolonged stress.............................................................................. 159
Spooking to death............................................................................................................................................................. 160
Context Switching................................................................................................................... 162
Emotional Control.............................................................................................................................................................. 162
Handles, Handlers, and Proxies............................................................................................. 162
Invoking Defensive Algorithms then Redirecting a Counter Attack.................................... 162
Terrorists and Proxy Agent Provocateurs..................................................................................................................... 162
Psycho-Bombs................................................................................................................................................................... 162
Trip Wires and Detection Algorithms.................................................................................... 162
Van Eck Hacking and TEMPEST standards.......................................................................... 163
Network Analyzers and Packet Sniffers................................................................................. 164
Echelon for the mind......................................................................................................................................................... 164
Wireless hacking – electronic warfare, signal and communication intelligence.................... 164
AntiVirus Software.................................................................................................................. 165
Encryption and Protocols........................................................................................................ 165
Firewalls.................................................................................................................................. 165
Thought Stream Filtering.................................................................................................................................................. 167
Trace route and multi levels of indirection............................................................................ 168
Disrupting Human Networks.................................................................................................. 168
Plants and Agent Provocateurs...................................................................................................................................... 169
Hacking the Hackers.............................................................................................................. 170
Scarecrow Effect and Decoys.......................................................................................................................................... 170
Usurping the Eye Tracking Virtual Interface Controls and Audio Commands........................................................ 171
Chapter 8 Resistance is Futile - Counter ResistanceTechniques.................................... 173
Alice in Wonderland................................................................................................................ 174
Wizard of Oz – ‘The Kubark Manual’.................................................................................... 175
Angels and Demons Script............................................................................................... 175
Sleeping Beauty – The Script for sleeper agents and disposable CIA assets....................... 181
Snow White and the Seven Dwarfs................................................................................................................................ 182
The A, B, C’s of Enhanced Interrogation and Torture.......................................................... 182
False Confessions for Staged Courts and Media Events............................................................................................ 190
Brainwashing...................................................................................................................................................................... 191
Neural Linguistic Programming and Psychic Driving.................................................................................................. 192
Plausible Deniability................................................................................................................ 192
GasLighting........................................................................................................................................................................ 193
Framing (Setting up a target to be disposed of)........................................................................................................... 193
Scripts and Dirty Tricks.................................................................................................................................................... 194
The Art of War and the Art of Deception..................................................................................................................... 196
Tricks, Illusions, and the Psychology of Magic........................................................................................................... 197
Chapter 9 Designing Gods - Active DoD, NSA, and CIASystems................................... 198
Global Communication Warfare – code name “Gabriel”................................................. 199
Biometric Recognition And Identification Network – B.R.A.I.N................................................... 200
Remote Hypnotic Intra-cerebralControl ---- R.H.I.C.................................................................. 202
Mentally Integrated Neuron Duplicator ---- M.I.N.D.................................................................... 202
Artificial Linguistic Internet Computer Entity ---- A.L.I.C.E.......................................................... 203
The Ghost in the Machine and Demons of Destruction.............................................................................................. 206
Thought And Memory Interface ---- T.A.M.I.............................................................................. 207
Common Human Routines Inference Software Technology – C.H.R.I.S.T................................... 208
Silent Assassination Through Adapting Networks ---- S.A.T.A.N.................................................. 208
Death Doctors and Angels of Death.............................................................................................................................. 209
Voodoo Doll: No-touch torture subprograms............................................................................................................... 210
Mind Games - Psychic Warfare Training................................................................................ 223
Project “Noah’s Ark”......................................................................................................... 229
Chapter 10 The Politics and Ethics of Controlling HumanBeings................................... 230
Legal Issues............................................................................................................................ 232
The Costs and Benefits.................................................................................................................................................... 233
Appendix of Formulas and Calculations.................................................................................. 234
Other Methods of Spying and Sabotage.................................................................................... 235
Index........................................................................................................................................... 237
CD packet containing viral code, port scanners, Back Orifice, and many other hacking utilities and codesamples........................................................................................................................................247
Chapter 11 About theauthor................................................................................................248
Chapter 12 Review Quotes:...................................................................................................249
Breaking Down the Under-Oath Disclosures of the Formerly-Gagged Sibel Edmonds...
It has now been over a week since the video tape and transcript from the remarkable 8/8/09 deposition of former FBI translator-turned-whistleblower Sibel Edmonds was publicly released. Previously, the Bush Administration invoked the so-called "state secrets privilege" in order to gag Edmonds, in attempting to keep such information from becoming public.
The under-oath, detailed allegations include bribery, blackmail, espionage and infiltration of the U.S. government of, and by current and former members of the U.S. Congress, high-ranking State and Defense Department officials and agents of the government of Turkey. The broad criminal conspiracy is said to have resulted in, among other things, the sale of nuclear weapons technology to black market interests including Pakistan, Iran, North Korea, Libya and others.
Even as many of these allegations had been previously corroborated to varying extents, by a number of official government reports, documents and independent media outlets (largely overseas), not a single major mainstream media outlet in the U.S. has picked up on Edmonds' startling claims since her deposition has been made fully available.
Granted, last week was a busy news week, with the death of Ted Kennedy, the release of the CIA Inspector General's report on torture, and the announcement that Michael Jackson's death was ruled a homicide. And, it's true, a 4-hour deposition and/or 241-page transcript [PDF] is a lot of material to review, particularly given the wide scope of the charges being made here. Still, given the serious national security issues at stake, said to have the been among the most important matters of the past 8 years, one would think someone in the corporate MSM might have taken the time to go through the material, and report on it. Particularly as Edmonds' claims have previously been found "credible" "serious" and "warrant[ing] a thorough and careful review," by the DoJ Inspector General, and confirmed as such, on several occasions, by Senators Chuck Grassley (R-IA), Patrick Leahy (D-VT) and many many others.
So for the benefit of the U.S. media, and other readers, who may find it helpful for this large body of newly-available information to be culled down into more digestible pieces, I will attempt to break down the deposition, a bit, into some of its subject matter-based component parts. I will try to go through the major disclosures from the deposition, one-by-one, in a series of pieces which might help others to further report and/or investigate these breathtaking disclosures from a former FBI official who, following 9/11, listened to and translated wiretap recordings made from 1996 through 2002, in the FBI's counterintelligence and counterterrorism departments, under top-secret clearance.
In this first break-down article, we'll look at the answers given by Edmonds during her deposition in regard to bribery and blackmail of current and former members of the U.S. Congress, including Dennis Hastert (R-IL), Bob Livingston (R-LA), Dan Burton (R-IN), Roy Blunt (R-MO), Stephen Solarz (D-NY), Tom Lantos (D-CA, deceased) and an unnamed, currently-serving, married Democratic Congresswoman said to have been video-taped in a Lesbian affair by Turkish agents for blackmail purposes.
In further breakdown articles, we'll look at her disclosures concerning top State and Defense Department officials including Douglas Feith, Paul Wolfowitz and, perhaps most notably, the former Deputy Undersecretary of State, Marc Grossman, the third-highest ranking official in the State Department. Also, details on the theft of nuclear weapons technology; disclosures on Valerie Plame Wilson's CIA front company Brewster-Jennings; items related to U.S. knowledge of 9/11 and al-Qaeda prior to September 11, 2001; infiltration of the FBI translation department and more.
Though Edmonds was careful to not "discuss the intelligence gathering method by the FBI," she notes in her deposition that her claims are "Based on documented and provable, tracked files and based on...100 percent, documented facts."
Among the specific charges she levels against current and former U.S. Congress Members in the deposition:
Dennis Hastert: "[S]everal categories. The acceptance of large sums of bribery in forms of cash or laundered cash ... to make it look legal for his campaigns, and also for his personal use, in order to do certain favors ... make certain things happen for foreign entities and foreign governments' interests, Turkish government's interest and Turkish business entities' interests. ... other activities, too, including being blackmailed for various reasons. ... he used the townhouse that was not his residence for certain not very morally accepted activities. ... foreign entities knew about this, in fact, they sometimes participated in some of those not maybe morally well activities in that particular townhouse that was supposed to be an office, not a house, residence at certain hours, certain days, evenings of the week."Stephen Solarz: "[A]s lobbyist ... acted as conduit to deliver or launder contribution and other briberies to certain members of Congress, but also in pressuring outside Congress, and including blackmail, in certain members of Congress."
Bob Livingston: "Until 1999 ... not very legal activities on behalf of foreign interests and entities, and after 1999 acting as a conduit to, again, further foreign interests, both overtly and covertly as a lobbyist, but also as an operative."
Tom Lantos: "[N]ot only ... bribe[ry], but also ... disclosing highest level protected U.S. intelligence and weapons technology information both to Israel and to Turkey. ... other very serious criminal conduct."
Unnamed Congresswoman: (Though not identified as such during the deposition, Edmonds has since confirmed her to be a Democrat) "[T]his Congresswoman's married with children, grown children, but she is bisexual. ... So they have sent Turkish female agents, and that Turkish female agents work for Turkish government, and have sexual relationship with this Congresswoman in her townhouse ... and the entire episodes of their sexual conduct was being filmed because the entire house, this Congressional woman's house was bugged. ... to be used for certain things that they wanted to request ... I don't know if she did anything illegal afterward. ... the Turkish entities, wanted both congressional related favoritism from her, but also her husband was in a high position in the area in the state she was elected from, and these Turkish entities ran certain illegal operations, and they wanted her husband's help. But I don't know if she provided them with those."
Roy Blunt: "[T]he recipient of both legally and illegally raised donations, campaign donations from ...Turkish entities."
Dan Burton: (And others) "[E]xtremely illegal activities against the United States citizens who were involved in [covert] operations that were ... against ... foreign government[s] and foreign entities against the United States' interests."
Hastert, Livingston and Solarz, as Edmonds notes in her deposition, would all go on to become highly-paid lobbyist for Turkey and/or Turkish public interest groups after they left the U.S. Congress.

The startling key exchanges relating specifically to criminal corruption by members of the U.S. Congress, from the 8/8/09 Sibel Edmonds deposition in the Schmidt v. Krikorian case, currently pending before the Ohio Election Commission, are now excerpted here.
The full deposition transcript is here [PDF], and more details, including the complete video-tape of the entire deposition, can be seen in our original coverage of the deposition's release.
Follow Brad Friedman on Twitter: www.twitter.com/TheBradBlog
Added by ron angell on August 21, 2009 at 6:00am —5 Comments
Army's Chemical Corps at Edgewood Arsenal in Maryland ended up conducting experiments on more than 7000 American soldiers
THANK YOU !!!!!!!!!!!!!!!!!
From:
Added by ron angell on August 21, 2009 at 12:30am —3 Comments
Previous Posts and Evidence-To be used by International World Courts of Justice for the prosecution of crimes against humanity
Previous Posts and Evidence-To be used by International World Courts of Justice for the prosecution of crimes against humanity. Direct Violation of the United Nations Article 1 Declaration against torture,Violation of the Geneva Conventions, Violation of the Helsinki Doctrine
.Added by ron angell on August 20, 2009 at 5:30pm —2 Comments
50 US War Criminals http://afterdowning street.org/ warcriminals
Sent: Wednesday, August 19, 2009 8:21 PM
To: v911t@ya… Continue
Added by ron angell on August 20, 2009 at 6:25am —2 Comments
Diseased African Monkeys Used to Make Swine Flu Vaccines; DYNACORP Video
Added by ron angell on August 20, 2009 at 12:58am —4 Comments
Woman Convicted in Fake Flu Vaccine Case for her involvement in the distribution of a fake flu vaccine to more than 1000 persons in the Houston area,
Added by ron angell on August 19, 2009 at 4:10am —No Comments
The Paperchase TV SERIES-Remember it?
Added by ron angell on August 18, 2009 at 8:00pm —2 Comments
On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology- Journal of Psycho-Social Studies, 2003.
Added by ron angell on August 18, 2009 at 5:45pm —3 Comments
http://www.thefluecase.com by jame burgermeister of Austria- thank you so much Frau Burgermeister!! Danke, Grazi, Prego, Gracias, thank you, merci
Added by ron angell on August 18, 2009 at 5:02pm —5 Comments
Complaint to stop enforced vaccinations in Washhington State filed on Monday: a guide to filing yourself
Added by ron angell on August 18, 2009 at 4:33pm —2 Comments
MKULTRA: Veterans Sue CIA Over Past Chemical Tests on Soldiers
Added by ron angell on August 17, 2009 at 10:00pm —6 Comments
Diseased African Monkeys Used to Make Swine Flu Vaccines; DYNACORP Private Military Contractor Holds Key Patents
HUMAN PERFORMANCE-The Dept of Defense Jason Program, the NON profit Mitre corp, Lehman Brothers mind control
VIP VIP VIP
The Mitre Corp HUMAN PERFORMANCEEvidence of TortureEvidence of TorturePlease look at the Document (Human Performance) Human.pdf That is the Mitre Corporation. The Chairman of the Board of the Mitre corp as well as formerly being in the US DoD Defense dept as well as being on the board of directors of Lehman Brothers is Dr. James R. Schlesingerhttp://www.mitre.org/about/trustees.htmlChairmanBoard Member Since 1985Dr. James R. Schlesinger currently divides his time between MITRE, where he serves as chairman of the board, and the investment banking firm of Barclays Capital, where he serves as senior advisor. He is also a consultant to the Departments of Defense and State, and a member of the Defense Policy Board and the International Security Advisory Board.Dr. Schlesinger is a fellow of the National Academy of Public Administration and a member of the American Academy of Diplomacy. He is a director for Evergreen Energy and Sandia National Corporation. He is also a counselor and trustee of the Center for Strategic and International Studies, a trustee of the Atlantic Council, the Nixon Center, the National Cryptologic Museum Foundation, the Center for Global Energy Studies, and the Henry M. Jackson Foundation.Google The Dept of Defense Jason Program. The 60 or so members have formed the Mitre Corporation based out of McLean VA as well as a Fusion Center and mind control center outside of Boston. http://www.mitre.orgEvidence of TortureEvidence of Torture1. English book “Twelve Years in the Grave – Mind Control with Electromagnetic Spectrums, the Invisible Modern Concentration Camp,” written by Soleilmavis Liu.
(ISBN: 9781304588296; Pages: 206; Dimensions (inches): 5.83 wide x 8.26 tall.)
Introduction:
Recent years, the words “mind control abuse and torture” and “target individual” appears frequently online. Thousands of people in groups or individually cries attention to the abuses and tortures with electromagnetic mind control technologies through internet and all other channels. The scale of the ongoing crimes is large, and hidden. This book is helping the public understand voice-to-skull and remote electromagnetic mind control technologies. It provides the sound facts and evidence about the secret abuse and torture with such technologies. Readers of the book have come to learn of these technologies and the crimes, which - if not exposed and publicized – in the future humanity would no longer know the meaning of physical inviolability and privacy.
http://www.lulu.com/spotlight/soleilmavis
2. English book “The Queen of the South in Matthew 12:42,” written by Soleilmavis Liu.
(ISBN: 9781304745354; Pages: 488; Dimensions (inches)5.83 wide x 8.26 tall.)
Introduction:
The Bible prophesies the Queen of the South will rise at the judgment, but did not give her name or any other detail about her. Nowadays, many people believe that Queen of Sheba in 1King 10:1-13 is the Queen of the South referenced in Matthew 12:42.Among the significant questions surrounding the Queen of the South, her role in the judgment and the Queen of Sheba:
Where are the ends of the earth?
How will the Queen of the South come from the ends of the earth?
Who was Queen of Sheba in 1King10:1-13?
Who were Queen of Sheba’s ancestors?
This book demonstrates who the Queen of the South is by using a large number of historical and archaeological facts, conclusive arguments, scientific and systematic analysis, and rigorous study and demonstration of each chapter. It lets readers understand where the Ends of the Earth are, how the Queen of the South comes from the Ends of the Earth, and what the judgment is.
https://peacepink.ning.com/blog/book-the-queen-of-the-south-in-matthew-12-42
Here is the 7-minute Video which introduces the book.
https://peacepink.ning.com/video/queen-of-south
3. English book, Volume One and Two of “The Struggles of an Ordinary Man - The Turbulent History of China Through a Farmer’s Eyes from 1900 to 2000.”
(Volume One: ISBN: 9781365818967; Pages: 398; Dimensions (inches) 5.83 wide x 8.26 tall.)
(Volume Two: ISBN: 9781365819070; Pages: 380; Dimensions (inches) 5.83 wide x 8.26 tall.)
This book is the true record of one hundred years of modern history in rural areas of the Eastern Shandong Peninsula from the 1900 to 2000, including the end of the Qing Dynasty, the Anti-Japanese War (1938-1945), China’s War of Liberation (1945-1949), the development of China after liberation (1950-1957), the Great Leap Forward Movement (1958-1959), the Three-year Disaster (1960-1962), the Socialist Education Movement (1964-1965), the Great Cultural Revolution (1966-1976), and the reform and opening up of China (1978-2000).
This work, with the spirit of unvarnished realism and true-life style, illustrates the actual life and inner mind of an ordinary man in rural areas, and through his eyes to see the significant changes of China during the past one hundred years. This book restores the true-life stories of the ordinary rural man with a fair view, which might be a little different from the propaganda of the media and government in those days.
Please go to the following links to buy Soleimavis' books.
http://www.lulu.com/spotlight/soleilmavis