All Posts (12221)

Sort by

Whitches

Covens of witches

https://www.covertharassmentconference.com/speakers

A sociopath evolves

I have a sociopath and psychopathic evolving together ..

help who can help me

I am a single targeted and see psychically

Someone is letting evolve

to form a large taskforce

Russians left many eggs in CATALUÑA

Now the groups are picking with electronic harassment

only they need a female sociopath

that is the archetype MOTHER DEAD.....stimulating them psiquicamente.....to remember who they are

9143188279?profile=original

Read more…

Covens of witches

9143187072?profile=original

Into the coven: The woman is a very dangerous animal;  HER NEED of Belonging a group ...the necessity of belonging to a man...and have offspring...be accepted socially...makes it= Schizophrenic as social individual.

You can not trust...If you belong to a patriarchal culture, sexist and patronizing.Because it is a MONA ELECTRA.

Look for a male referent which follow and obey...And use emotional intelligence to self-deception...

If a psychiatrist or a psychoanalyst tells ....=we will use a person to "excite her psychically"...to study their behavior...And I need you to do some act....to plunge in its UNCONSCIOUS...

And we will play to make it wake...He forgets the education received by the church and his family....because "DEAR FEELS" by Pope

A coven of Witches: It is a dramatization of women with "cultural sexual repression"..in a closed place where nobody can recognize...which they are delivered to a sexual paroxysm...in which his unresolved erotica part manifests....n a scene "Dantesque and PRIMITIVE"...And where his part thanatic....evolves to create in the march..

A Bolshevik sociopath...I am destroying me...me, my family, neighbors ...And they are manifesting parallel psicopatas...evolve....toward sexual perversion and sadism

Infantalize men ............... weakening us with coercive pressure of BIORESONANCE QUANTIFIED...

The drunk with sex indulgence ... giving space travel TIME / SPACE to fuck women ...They buy them with virtual sex

https://www.covertharassmentconference.com/speakers

9143187258?profile=original

9143187288?profile=original9143187674?profile=original333333333333333.jpg

Cultures that do not put limits to women are a danger ...These people are gestating a future in Barcelona...How many sociopaths Bolsheviks are being used for gentrification?

9143186683?profile=originalEuropean ancient culture of worship SATAN

Read more…

serious about DISAPPEARING

http://www.esia.net/Cover_Your_Tracks.htm

If you feel you can overcome any tracking chips, or protect yourself using clothing wired like a faraday cage, this article may be of help.  It is written by a private detective and gives advice to stalked victims on how to avoid being located through a public records search.

I've talked to many TIs who read what other TIs have to say PRIMARILY so they can prepare themselves for tactics they believe are inevitably coming their way at some point in the future.  Let's not forget that these chat rooms are full of perps who love to drive up a TIs blood pressure, and instill them with fear.  I believe many perp tactics are learned by perps right here in forums.  PLEASE don't back yourself into a corner from where there can never be any escape.  Take each day as it comes to you, and learn to survive by rolling with the punches instead of anticipating the next tactic w/anxiety.

Escape, if possible, can not be accomplished merely by packing your bags, giving notice to the landlord, quitting your job, and getting into your car/airplane/train and leaving.  Escape and moving are not the same thing.  Whether your escape will work will never be known unless you try it - even temporarily for a week.  To try it means giving up everything, planning a new life & source of income, and walking away.  To give any form of advanced notice is to invite your perps to enjoy a new facet to their game of cat and mouse.

They will NEVER win because I won't sit still being battered long enough to allow it.  Adapt physically and mentally, and roll with the punches to survive.

Read more…

justice

Man is a very honest creature
which faces the enemy naturally ..... when it sees it .

9143184868?profile=originalThe man calls himself: fagot

Because it kills women from astral.

The operator psychotronic man

Come work of the "fellow women"

When women cry .... and manipulate the thinking of the victims

with his face painted and arranged

The man subconsciously observed

as they destroy lives

unconsciously reflect on his life

They realize that they have sabotaged as free men.

other women were killed and incapacitated ...

Hatred of women inherent in this environment and solidifies.

that hatred is the fuel to be violent

UNCONSCIOUSLY do justice

Read more…

Health care takes on the fight against trafficking

http://www.marketplace.org/2016/03/02/health-care/health-care-takes-fight-against-trafficking

4j4a0128A hallway in Brigham and Women's Hospital in Boston. - Courtesy: Michelle Cerulli

Note: This is the first of a three-part series about human trafficking and health care. You can find to the second part, about what happens to victims when they get a chance to run, hereFind the third part, about how the health care system can start making a difference, here.

Dr. A rolled his eyes.

It was last October, and he had just come across a triage note that said, “I have a tracker in me.”

Dr. A  — we’re not using his name or identifying his hospital, which is in a major American city, to protect patient safety  is 28 years old, a resident and about as green as they come.

And he’s got a patient who claims she’s got a GPS tracking device implanted in her side.

“When you work on the east side of our hospital, psychiatric patients are a dime a dozen,” he said.

But this patient is different. She’s put together. She’s lucid. She’s got an incision.

A group crowded around the computer to see her x-ray.

“Embedded in the right side of her flank is a small metallic object only a little bit larger than a grain of rice,” he said. “But it's there. It's unequivocally there. She has a tracker in her. And no one was speaking for like five seconds  and in a busy ER that's saying something.”

ImplantA tracking chip was removed in October 2015 from a patient who was a victim of human trafficking. - 

It turns out this 20-something woman was being pimped out by her boyfriend, forced to sell herself for sex and hand him the money.

 “It was a small glass capsule with a little almost like a circuit board inside of it,” he said. “It's an RFID chip. It's used to tag cats and dogs. And someone had tagged her like an animal, like she was somebody's pet that they owned.”

This is human trafficking. It’s a marginal issue here in the U.S. for most of us. Part of that is because the average person isn’t sure what human trafficking – or modern day slavery – actually means.

“Very plainly, human trafficking is when one person takes advantage of another person for some profit,” said Katherine Chon, director of the newly created Office on Trafficking in Persons at the U.S. Department of Health and Human Services.

Trafficking can mean being locked in a room, having an RFID chip injected under your skin, or something like your employer holding your passport. It’s found in industries from prostitution to manufacturing to domestic service.

Breaking this cycle of violence traditionally has been left to law enforcement. But in the last three years, people in healthcare are waking up to the fact that they can play a critical role.

“I can guarantee you that I’ve placed my hands and I’ve examined and I’ve spoken to more trafficking victims than I know I have,” said Wendy Macias, an ER doctor at Massachusetts General Hospital in Boston.

Macias is one of the nation’s leading advocates to get doctors, nurses and hospital executives involved. 

One report finds as many as 88 percent of sex trafficking victims end up in ERs and clinics at some point while being held.

Much different than law enforcement, healthcare providers get these moments  a sort of a privileged access into the lives of people who often are out of reach

“You know traffickers are really smart, they will move their patients around from one city to the next all across the country,” she said. “I want us to help them when we have them in our midst because it may be the last time that they’re there.”

Trafficking%20final

But here’s the challenge: you’ve got to convince doctors and nurses that they are the ones uniquely placed to break the cycle of violence.

One study shows just one-quarter of providers think human trafficking touches their patients.

The Justice Department says 83 percent of confirmed sex trafficking victims are U.S. citizens.

Dr. Dale Carrison at the University Medical Center in Las Vegas hopes the case with the tracking device is so disturbing that it pushes people in healthcare to action.

“There's so many sci-fi movies where they stick a device in somebody. Well guess what? It's real. It happened,” he said. “That was a big wake up call for me personally that ‘Uh-oh we're going to another level now.’ And I need to get the word out to all my colleagues, don’t blow this off.”

There are some signs of life.

Money is beginning to flow to train clinicians to identify patients. More than half a dozen professional societies – including the American Medical Association – have passed resolutions highlighting the problem. The grass-roots group Heal Trafficking made up of some 600 providers  has formed.

The first step is simple awareness.

Knowledge certainly has helped change how Dr. A approaches his patients. 

“It’s always important to simply consider the possibility that something not obvious might be going on. And recognizing that is the first step to diagnose it,” he said.

Since that October afternoon, Dr. A says he’s pulled about five patients aside, checking for signs of trafficking.

He’s come up empty each time. He explains, that’s what he does, rule out the bad stuff.

That, he says, is his job. 


We've collected more resources related to human trafficking, particularly in health care, here.

Follow Dan Gorenstein at @dmgorenstein
Read more…

Why are the intelligence agencies revealing their spying techniques?

http://www.theguardian.com/commentisfree/2016/mar/03/intelligence-agencies-spying-security-services-phones-privacy-impossible

Now that the security services are allowed to record us through our phones, privacy has become impossible – unless we renounce modern telecoms
Banksy’s mural depicting agents monitoring a phone box near GCHQ in Cheltenham.

Banksy’s mural depicting agents monitoring a phone box near GCHQ in Cheltenham. The spy agency now admits it can take control of a phone or computer. Photograph: Jules Annan/Bancroft

Legalised hacking in the UK now allows a third party to take control remotely of a phone’s camera or microphone and record video and conversations taking place, the Guardian’s Alan Travis reported this week. What’s the point of Apple trying to encrypt its iPhones if the spooks can switch them on remotely and monitor what we are doing?

Until recently, the security services have gone to great lengths not to disclose their operational capabilities. If the bad guys know how their communications can be monitored, they’ll look for other ways of exchanging information.

So it’s something of a surprise to see how open the agencies have now become. Ciaran Martin, director of cybersecurity at GCHQ, gave evidence recently to the investigatory powers tribunal about what’s now called “equipment interference”. If the new investigatory powers bill becomes law, warrants permitting interference with equipment will be issued by a secretary of state and approved by a judicial commissioner. Under clause 88, this would include “observing or listening to a person’s communications or other activities”.

In evidence to the tribunal, Martin explained that equipment interference might involve installing an implant into a laptop or mobile, perhaps by persuading a user to click on a link.

A simple implant would transmit information over the internet. But others “might monitor the activity of the user of the target device or take control of the computer”. This presumably includes switching on a device’s camera and microphone, even when it’s not being used to make calls. Martin accepted that such operations could be “highly intrusive”. But so is someone hiding a camera in your bedroom, which will not require prior judicial authorisation.

We can see how this works from a case study published by the Home Office in its response to the bill’s pre-legislative scrutiny. It refers to intelligence that several suspects were at large after being involved in an attempted murder.

“Equipment interference and other intelligence-gathering techniques were used to identify and locate the suspects, leading to their arrest before further offences could be committed,” it says.

“Without the use of equipment interference, it would not have been possible to arrest the suspects simultaneously, which was critical to preserving the evidence.”

It seems clear from this example that investigators managed, at the very least, to activate the suspects’ phones or computers remotely without their knowledge.

Many more examples, real or hypothetical, are given in the government’s 83-page draft code of practice for equipment interference, with the caveat that they should “not be taken as confirmation that any particular … agency undertakes the activity described”.

Agencies are advised to consider carefully whether they should conduct equipment interference against a person who is not of direct intelligence interest in order to enable surveillance through that person’s device of a wanted associate – given that this surveillance would inevitably pick up private information about the original person’s innocent family.

Other examples deal with cases in which an agency might want to acquire private information from a computer as well as intercepting a live video call. A combined warrant would be needed. There is also guidance on how analysts can use their knowledge of a particular software package commonly used by terrorist groups in the Middle East to retrieve the communications of a “Daesh [Isis]-inspired cell”.

GCHQ admits how simple it is to transmit information over the internet from your laptop or phone. Photograph: Kieran Doherty/Reuters

More examples of how equipment interference can be used are to be found in the government’s operational case for “bulk powers”, which enable the collection of vast amounts of data. These are said to be real examples, although edited to avoid “handing an advantage to those who mean us harm”. Classified details have been given to parliament’s intelligence and security committee.

We can be sure that GCHQ officials debated long and hard before allowing examples such as these to be published. They tell us the ways in which the agencies seek to use their powers, the nature of their targets and the limits the agencies impose to avoid “collateral intrusion” (the unintentional gathering of material such as a background conversation). Whether we believe them or not is for us to decide, but at least we have something to go on.

Do these revelations damage the agencies’ operational capabilities? The assumption must be that their targets have a pretty good idea of what they can do already. Sometimes it suits the agencies to make people think that their techniques are more effective than they actually are, especially if it persuades targets to switch from a secure method of communication to one that the agencies have already penetrated.

And is it a good idea to take a chainsaw to your computer or incinerate your iPhone? Certainly, if you have something illegal to hide – although doing so will inevitably limit your ability to commit more crimes. For the rest of us, it all depends on whether we value our personal privacy more highly than the convenience of using modern communications – and whether we think the agencies are on our side.

Read more…

MKUltra Researcher Put Electrodes in People’s Brains for the US Government

mindcontrol2By Melissa Dykes

In the mid-1950s, neurophysiologist Carl Wilhelm Sem-Jacobsen built his own EEG lab at Gaustad psychiatric hospital in Norway with copious funding from the Rockefeller, Ford, and other “charitable” foundations. He soon took on multiple US government contracts from the Air Force, the Navy, and NASA for research using electrodes implanted in the brains of psych patients to carry out what many have said was unethical research on them. It is widely believed today that Sem-Jacobsen was really doing his brain research, which continued for years, under the auspices of MKUltra.

sem-jacobsen

Of particular note is the fact, admitted by the Norwegian government, that Sem-Jacobsen wrote a letter claiming this kind of questionable research would be easier to do in his country because he did not have to worry about lawsuits or patient consent like doctors in America do.

Screenshot-2016-03-02-at-10.16.08-AMStill, the real question is, what exactly was the goal of Sem-Jacobsen’s brain research for the US government?

Related Reads:

Melissa Dykes is a writer, researcher, and analyst for The Daily Sheeple and a co-creator of Truthstream Media with Aaron Dykes, a site that offers teleprompter-free, unscripted analysis of The Matrix we find ourselves living in. Melissa also co-founded Nutritional Anarchy with Daisy Luther of The Organic Prepper, a site focused on resistance through food self-sufficiency. Wake the flock up!

Read more…

Spies in the sky: The top secret military technology found in covert planes that could be watching at this very moment

Spies in the sky: The top secret military technology found in covert planes that could be watching at this very moment

  • Famous Cold War spy plane the U-2 is still going strong and currently works for Nasa conducting atmospheric tests
  • Lockheed Martin's 'Son of Blackbird' will use a hybrid system to cross an entire continent in an hour
  • Bulging 'Global Hawk' drone looks less conventional and could carry our pre-programmed missions
  • TR-X - another Lockheed invention - is set to combine best spy plane technology and could be airborne by 2030 

Before the advent of the Lockheed U-2, gaining intelligence about the Soviet Union’s secretive actions during the Cold War was almost impossible for surveillance planes flying low over Russia.

But the U-2 spy plane, which was able to fly out of reach of enemy fighters and missiles and take detailed aerial photographs of airfields, factories and shipyards, was a game changer.

Knowledge is power, and these images proved to the US that there was no immediate threat and so a deadly arms race - and potential nuclear war - was averted.

Despite their ability to prevent crises and lack of on-board weapons, over the course of their history, spy planes have become the most feared aircraft and a new generation is taking to the skies with using increasingly smart technology, explain experts from How It Works magazine. 

Explore the technologies using the zoomable modules below 

Before the advent of the Lockheed U-2 (illustrated above), gaining intelligence about the Soviet Union’s secretive actions during the Cold War was almost impossible for surveillance planes flying low over Russia

Before the advent of the Lockheed U-2 (illustrated above), gaining intelligence about the Soviet Union’s secretive actions during the Cold War was almost impossible for surveillance planes flying low over Russia

The U-2 is able to climb to 50,000ft (15,240 metres) in around 20 minutes and 65,000ft (19,812 metres) within an hour of take-off. Hover your mouse above the graphic to zoom in for other details and facts 

Deployed by government and military forces, these eyes in the sky can be used for many different tasks, from patrolling borders and gathering information behind enemy lines, to monitoring battlefields for strategic decision-making.

Getting the information they need quickly and discreetly is the key aim for engineers.

Lockheed Martin's Skunk Works division, for example, is developing a faster, unmanned successor to its legendary SR-71 Blackbird spy plane called the SR-72, which is nicknamed the 'Son of the Blackbird'.

THE ICONIC U-2 SPYPLANE: STATISTICS AND FEATURES 

Altitude: The U-2 is able to climb to 50,000ft (15,240 metres) in 20 minutes and 65,000ft (19,812 metres) within an hour of take-off.

Wingpan: The U-2 spy plane has a tip-to-tip wingspan of 103ft (31.4metres) and is tuned to provide lift for its high-altitude missions.

Payload: While the plane carries no weapons, it holds 5,004lbs (2,270kg) of sensors and other mission-specific equipment.

Cabin pressure: To prevent decompression sickness, the cockpit pressure was recently adjusted from the equivalent of 29,002ft (8,840 metres, or the height of Mount Everest) to 14,993ft (4,570 metres).

Sensors and display: Electro-optical/infrared sensors feed data into the cockpit, presenting information clearly to the pilot.

Landing gear: The wheels are behind one another and the plane comes to a stop with one wingtip scraping the ground.

Safety car: Landing a U-2 is difficult, another pilot gives instructions from a safety car.

The SR-71 was built in the analogue age, taking off in 1964 and performing reconnaissance missions until its retirement in 1990.

Despite being 105ft (32 metres) long with a 56ft (17-metre) wingspan, this black behemoth could fly faster than a rifle bullet, hitting Mach 3 – three times the speed of sound, over 2,299mph (3,700 km/h)

Its distinctive curved shape with a sharp edge that ran along the body of the plane presented very few surfaces for radar detection, and using top-of-the-range photographic equipment for the time, Blackbird captured images of the ground from an altitude three times the height of Everest. 

Although some were lost in accidents, none were ever shot down or captured.

By comparison, its successor's engines will use a hybrid system to reach hypersonic speeds, enabling the aircraft to cross an entire continent in an hour.

The air friction of this speed alone could melt steel, so the SR-72 is likely to be made of composite materials, similar to those used for space shuttles and missiles. 

It will need to be capable of withstanding temperatures in excess of 1,000°C (1,832°F) and be sealed to stop lethal air leaks.

The technology needed to take photographs at this kind of speed will also be an incredible feat, and the exact makeup of this aircraft's gadgetry has not been confirmed, or perhaps even invented yet.

What experts do know is that it won't just be an observer.

This new unmanned plane will be armed to the teeth, launching bombs to hit targets from altitudes of around 15 miles (24km) up in the stratosphere.

Aerodynamics play a huge part in spy plane technology and aircraft like the SR-72 needs to be designed to cope with stresses experienced when travelling at such high speeds.

The Son of the Blackbird will need to be incredibly well balanced to deal with the changes between subsonic, supersonic and hypersonic flight to ensure that the craft is not ripped apart by the shifting centre of lift.

Supersonic is when an aircraft breaks the sound barrier or tops Mach 1, while hypersonic is when it reaches Mach 5, or five times the speed of sound.  

Lockheed Martin's Skunk Works division is developing the 'Son of the Blackbird' (illustrated above). The engines will use a hybrid system to reach hypersonic speeds, enabling the aircraft to cross an entire continent in an hour. The air friction of this speed alone could melt steel, so the SR-72 is likely to be made of composite materials, similar to those used for space shuttles and missiles

Lockheed Martin's Skunk Works division is developing the 'Son of the Blackbird' (illustrated above). The engines will use a hybrid system to reach hypersonic speeds, enabling the aircraft to cross an entire continent in an hour. The air friction of this speed alone could melt steel, so the SR-72 is likely to be made of composite materials, similar to those used for space shuttles and missiles

HOW SPY PLANS FIND AND TRACK MOBILE SIGNALS 

Spy planes can detect mobile phone signals to give away a person's location from the air.They are often equipped with technology known as a 'dirtbox' which stand for digital receiver technology. 

It works by mimicking the job of telecommunication towers, tricking mobile phones into sending unique registration to a device.

Explore the diagram below by hovering your mouse of each section 

http://i.dailymail.co.uk/i/graphics/2016/03/01/surveillanceTriple/large.jpg

large.jpg

large.jpg

Modern spy planes can find and track mobile communications signals (hover over graphic to magnify). They usually use 'dirtboxes' that mimic telecommunications towers, tricking mobile phones into sending unique registration data to the dirtbox device

The dirtbox can scan thousands of phones before it reaches its intended target. Once the suspect has been located and locked on to, the dirtbox disregards the other phones and focuses on collecting information.

The plane manoeuvres into the best location to get a clear signal from the mobile phone in question. It can detect signal strength and the geographical location of the user as well as obtain identifying information about the phone's owner.

Using this information from the mobile phone signal, a suspect's location can then be pinpointed to within 10ft (three metres). The dirtbox can even help to track a person down to a specific room in a building.

However, the Global Hawk, an Unmanned Aerial Vehicle made by Northrup Grumman, looks dramatically different to a spy plane you might imagine.

It has a bulging front profile and a somewhat chunky tail end, but this amazing surveillance drone is able to fly across the world to deliver real-time ISR (intelligence, surveillance and reconnaissance) data to its controllers at US Air Force ground bases.

Unmanned aircraft offer numerous advantages when it comes to spying from the air.

First of all, engineers do not need to construct a cockpit that safeguards human life.  

The Global Hawk (pictured), an Unmanned Aerial Vehicle made by Northrup Grumman, looks dramatically different to a spy plane you might imagine. It has a bulging front profile and a somewhat chunky tail end, but this amazing surveillance drone is able to fly across the world to deliver real-time ISR (intelligence, surveillance and reconnaissance) data to its controllers at US Air Force ground bases

The Global Hawk (pictured), an Unmanned Aerial Vehicle made by Northrup Grumman, looks dramatically different to a spy plane you might imagine. It has a bulging front profile and a somewhat chunky tail end, but this amazing surveillance drone is able to fly across the world to deliver real-time ISR (intelligence, surveillance and reconnaissance) data to its controllers at US Air Force ground bases

When it comes to creating a monster machine that operates on the very edges of space, this is a money, time and space-saving bonus.

The other benefit of using a spy drone instead is that it can keep going for longer than a mission with an on-board pilot.

Many drones can also be pre-programmed to carry out assignments even if contact is lost with its base team.

One such spy drone causing ripples in aerial reconnaissance is Northrop Grumman's RQ-180. 

THE FAMOUS LOCKHEED U-2 SPY PLANE AND ITS SUCCESSORS

The plane that peeked around the Iron Curtain is still going strong.

Named 'Dragon Lady' by the US Air Force, the U-2 was the brainchild of engineer Clarence 'Kelly' Johnson and went from design to test flight in just nine months.

The slender body and long wingspan allow it to fly a range of over 2,983 miles (4,800km) at an altitude of over 13 miles (21 km).

The plane that peeked around the Iron Curtain is still going strong. Named 'Dragon Lady' by the US Air Force, the U-2 (silhouette pictured) was the brainchild of engineer Clarence 'Kelly' Johnson and went from design to test flight in just nine months

The plane that peeked around the Iron Curtain is still going strong. Named 'Dragon Lady' by the US Air Force, the U-2 (silhouette pictured) was the brainchild of engineer Clarence 'Kelly' Johnson and went from design to test flight in just nine months

The next-generation U-2 family, the U-2S, was built in the 1980s and is expected to be operational beyond 2050. 

These planes are fitted with state-of-the-art sensor systems that are able to collect data day and night, in all weather. 

The intelligence is distributed in real time for analysis and exploitation over super-fast digital links.

Today, some of the U-2's work is for Nasa, equipped with various sensors to conduct atmospheric tests. 

U-2s have also patrolled the skies above Iraq and Afghanistan, intercepting insurgent communications and using their incredible imaging sensors to detect small disturbances on the ground, alerting troops to the presence of improvised explosive devices and mines.

Not much is known about this robot apart from the fact that it exists and that the stealth drone is designated for flying in defended airspace for spying on heavily armed rival nations. 

It's thought that to evade radar detection, this drone may be designed with the 'cranked kite' formation, where the shape is a fusion of the 'kite' and 'flying' wing formations. 

The chunky and angular shapes are designed to scatter oncoming radar waves, so that they can't be bounced back to their location and the plane can fly undetected. 

Modern spy planes use cutting-edge science and technology to do this, but historical planes were able to achieve amazing feats too. One such example is the SR-71 Blackbird (stock image). It was built in the analogue age, taking off in 1964 and performing reconnaissance missions until its retirement in 1990

Modern spy planes use cutting-edge science and technology to do this, but historical planes were able to achieve amazing feats too. One such example is the SR-71 Blackbird (stock image). It was built in the analogue age, taking off in 1964 and performing reconnaissance missions until its retirement in 1990

This diagram shows how the Boeing P-8 scans waters for submarines. It features in the latest issue of How It Works magazine

This diagram shows how the Boeing P-8 scans waters for submarines. It features in the latest issue of How It Works magazine

As well as the shape of the aircraft, radar-absorbent materials can also be used to make it less visible.

When the waves from the seeking radar hit it, these coatings can deflect the waves and send them in another direction, or in such a manner that the deflected waves cancel out the incoming ones.

This renders the craft practically undiscoverable.

Stealth, speed and strength are all very well, but if a spy plane can't carry a decent payload then it's not worth its salt.

There are countless different gadgets and gizmos that can be attached, built in, added or upgraded in order to turn an ordinary military aircraft into a hub of digital sensory perception.

Radar and sonar, for example, use radio and sound waves (respectively) that bounce off objects to pinpoint their location.

Reconnaissance aircraft will often carry high-resolution imaging equipment, with top-level zooms and digital video streaming and recording capabilities.

Thermal imaging and infrared sensors are other payload regulars, along with a plethora of communications interceptors, acoustic monitoring and many other ways to listen in on the rest of the world.

The data is delivered to analysts either on-board or on the ground via high-speed real-time links, so the intelligence gathered can be used advantageously.

It would seem that the future for ISR missions involves plenty of speed, power and altitude with the benefit of automated features.

Although there are no plans to retire the old faithfuls like Lockheed's U-2 Dragon Lady just yet, there are also plenty of rumours circulating about plans for faster, meaner, more multifunctional spy planes.

One such concept is the TR-X – another Lockheed invention from its famous Skunk Works spy plane creation station in California.

The planning stages are still in their infancy, but Lockheed has stated this spy plane will take the best bits of all the other great spy planes in the skies today and roll them into one mega plane that could be deployed by 2030.  

The full feature is available in How It Works magazine, on sale now 

THE SUBMARINE HUNTER: BOEING'S P-8 SCANS WATERS FOR UNWANTED VISITORS 

Boeing’s Poseidon P-8 sub hunter scans the waters for unwanted aquatic visitors

Based upon the tried-and-tested body of the Boeing 737-800 commercial airliner and the wings of Boeing's 737-900, the Poseidon P-8 is an advanced maritime patrol and reconnaissance aircraft.

Featuring all kinds of task-specific technology, the P-8 is able to fly fast and low, cruising above the sea to seek out submarines that can pose threats to aircraft carriers.

Boeing’s Poseidon P-8 sub hunter scans the waters for unwanted aquatic visitors. Based upon the tried-and-tested body of the Boeing 737-800 airliner and the wings of Boeing's 737-900, the Poseidon P-8 is an advanced maritime patrol and reconnaissance aircraft. Hover your mouse above the graphic to zoom into details 

Six extra body fuel tanks extend the plane's range to find the subs. Some variants of the Poseidon P-8 model use radar, a magnetic anomaly detector and electronic intelligence sensors to monitor telecommunications and infrared imaging to keep tabs on shipping.

It can also deploy expendable sonobuoys to act as satellite sensors in the field.

But that's not all this spy plane can do. With its strengthened fuselage, the Poseidon also boasts missiles, mines and torpedoes in its arsenal, making it ready to aim, fire and dispatch a rebel submarine if ever required.

 

Read more…

Dear Bioethics Commission,

 

I would like to thank this commission for their efforts to recommend ethical protections for human subjects.

 

Ethical protections for human subjects are essential considering the past history of non-consensual research by United States Military and intelligence agencies in collaboration with educational institutions such as Harvard, John Hopkins, MIT, Princeton, and Stanford; pharmaceutical companies such as Eli Lily; medical schools and hospitals; the American Psychological Association; the National Institutes of Health, the Veterans Administration Center, U.S. Public Health Service  and others. 

 

Examples of past non-consensual experimentation include the Tuskegee Syphilis Experiment, The Manhattan Project, The Willowbrook Experiment, and Radiation Experiments. 

 

Mind control experiments such as Project CHATTER, Project BLUEBIRD, Project ARTICHOKE, Project MKULTRA, Project MKSEARCH, Project MKNAOMI and others were often interwoven with radiation experiments and research on chemical and biological weapons.  Psychiatrists, psychologists, neurosurgeons and other contractors conducting the work were embedded in a broad network of doctors and some of the research was published in medical journals.

 

As previously reported to this commission in 2011 and continuing to be reported in increasing numbers to this day United States citizens and others are reporting non-consensual experimentation including remote experimentation and torture.  In 2011 it was reported to this commission that there were approximately 3000 known victims.  Four years later those numbers have grown to 4000  to 5000 victims, an increase of at least 33%.  I have brought with me over 60 of their statements.

 

Non-consensual victims of experimentation have experienced covert COINTELPRO type tactics including those used in Project MKDELTA.  MKDELTA materials were used for harassment, discrediting, or disabling purposes. 

 

Due to past history, previous testimony and statements provided to this commission, and continuing reports of non-consensual research ethical protections for human subjects in the form of regulatory changes are critical.

 

As I understand Subpart A of the U.S. Department of Health and Human Services' (HHS) regulations, Protection of Human Subjects (codified at 45 C.F.R Part 46), also known as the Common Rule loopholes allow for experimentation when there is no physical intervention or interaction with the subject by an investigator as occurs in remote experimentation and previously reported to this commission by victims; or when the identify of the subject is unknown to the investigator (for example Subject 9,543).

 

Also there is no oversight for some non-federal entities such as private corporations and contractors and foreign entities; as well as some federal departments and agencies.  Oversight is needed for all entities conducting research on American citizens and U.S. persons as well as research conducted on foreign soil.

 

Additionally research activities are permitted for some demonstration and service programs for public benefit; department or agency heads can waive consent in certain cases; institutions can register their own institutional review board (IRB); and IRBs can waive consent in certain instances.  There are other loopholes not described here.   Additional protections are also needed for children, prisoners and those of impaired consent.

 

In light of the testimony given in 2011 and existing loopholes in federal regulations I was shocked and dismayed that the only notable recommendation the Bioethics Commission made regarding the consent process is to add people of impaired consent.  Ethical protections for human subjects necessitate regulatory changes. 

 

After experiencing painful vibrations in my forehead with associated blood in my mucous, vibrations of my organs and more I sought help in the form of testing.

 

Test results included materials specifically used in the manufacture of neural dust as researched and developed by the University of California, Berkley. Neural Dust is an ultrasonic low power implantable form of brain-machine interface which as originally designed includes a subdural transceiver, an external transceiver and cmos chips implanted into the cortex.

 

The University of California has collaborative agreements with Temple University, which in turn has collaborative agreements with Dartmouth University and Dartmouth Hitchcock Hospital where I had surgery on my nose and face.

 

Additionally, an ELF/EMF scan found 20 sites on my body that emit emf emissions beyond normal for the human body and consistent with implants.  Also, the scan showed my body receiving governmental frequencies that were not observed during ambient conditions; my body was acting as a receiver.

 

This is only one example of the continued collaboration between United States government agencies and others who receive funding from those agencies.

 

I do not consent nor  have I  knowingly consented to any form of research, experimentation or implantation.

 

Not everyone can afford to pay for testing nor should we have to.   We need the medical community to evaluate our medical complaints in a scientific manner and not subjectively rule out complaints as mental illness.  We also need an investigation into our complaints of non-consensual research and covert psychological operations.

 

In addition to regulatory changes, criminal penalties must be legislated for research involving human subjects when bodily integrity and autonomy are violated as for other criminals who are routinely punished with convictions for assault, fraud and homicide.  Unethical treatment of human beings can only be prosecuted when laws and regulations are in place.

 

Even if a researcher, physician, institution, other is engaged in socially beneficial research that might lead to cures or treatments for devastating diseases it is imperative that each person's autonomy, self-determination, human dignity and constitutional rights prevail over scientific advancement and social benefit.

 

Over fifty years ago American citizens reported being victims of non-consensual human experimentation and reports continue to this day.  Over fifty years later we still don't have the necessary reforms to protect U.S. citizens and others from non-consensual research.  As a society we must ensure that research subjects possess human rights that are inviolate.

 

This commission includes members of institutions that have participated in unethical research in the past.  This commission does not include a single victim of non-consensual research.  They have the insight that only a victim could impart.

 

Thank you for your efforts to recommend ethical protections for human subjects.  Much work still remains to be done.

 

Sincerely,

 

Karla Smith

Read more…

Please help oppose all this nazi rubbish

I hope you’re ok.

Please publicise everything I send you everywhere you can
 

Dear All

Here is some more activism – please participate!

Please send your petition, information and/or torture and abuse case summaries to all these people and organisations below.

Please take your time and work through the whole list – sending them your petitions, information and torture and abuse case summaries.

The aim of our activism is exposure of these crimes and weapons, and judicial and human rights intervention and protection.

Please tell all these organisations that this electronic torture, abuse and experimentation, and organized stalking, is a crime against humanity and that we need their humanitarian and legal assistance urgently.

The more petitions, information and torture and abuse case summaries they receive the better.

Please use all the email addresses so that they all know about us.


UN SPECIAL RAPPORTEUR ON TORTURE MR JUAN MENDEZ
jmendez@wcl.american.edu, sselg@ohchr.org,


HEAD INVESTIGATOR AT U.N – Mr Anand Grover
anandgrover@gmail.com,


EUROPEAN PARLIAMENT COMMITTEE ON CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS 
LIBE-secretariat@europarl.europa.eu,


JOURNALISTS AND ACTIVISTS CONNECTED TO EDWARD SNOWDEN
angler@rushpost.com,ewen.macaskill@theguardian.com,glenn.greewald@firstlook.org,laura.poitras@firstlook.org,jeremy.scahill@firstlook.org,Marcy.Wheeler@firstlook.org,dan.froomkin@firstlook.org,ryan.gallagher@firstlook.org,murtaza.hussain@firstlook.org,micah.lee@firstlook.org,sstanford@beforeitsnews.com,qjrpress@gmail.com,jim.gottstein@psychrights.org,peter.maass@firstlook.org,ryan.devereaux@firstlook.org,jwadham@interights.org,organisers@stopwatching.us,lschreiber@cair.com,ihooper@cair.com,info@codepink.org,team@fightforthefuture.org,organizing@restorethefourth.net,caaaron@freepress.net,action@eff.org,pk@publicknowledge.org,cduan@publicknowledge.org,mgriffin@publicknowledge.com,mark@cdt.org,info@demandprogress.org,timbl@w3.org,grant_gross@idg.com,juha@saaarinen.org,alexabdo@dcaclu.org,michellerichardson@dcaclu.org,hina.shamsi@law.columbia.edu,ceo@constitutioncentre.org,glenn.greenwald@guardiannews.com,qjrpress@gmail.com, info@whistleblower.org,glenn.greenwald@riseup.net,mraross1@outlook.com,investigations@icij.org, jstaley@lcsun-news.com, shudak@orlandosentinel.com,


USA GOVERNMENT ACCOUNTABILITY PROJECT
beatricee@whistleblower.org, kathleenm@whistleblower.org, jesselynr@whistleblower.org, info@whistleblower.org,dylanb@whistleblower.org, louisc@whistleblower.org, richardc@whistleblower.org, sarahd@whistleblower.org, jackd@whistleblower.org shannad@whistleblower.org , tomd@whistleblower.org, AlyssaD@whistleblower.org, alisong@whistleblower.org, danag@whistleblower.org, kareng@whistleblower.org, amandah@whistleblower.org, douglask@whistleblower.org, basilK@whistleblower.org, elizabethl@whistleblower.org, michaelt@whistleblower.org,


PSYCHOLOGISTS FOR SOCIAL RESPONSIBILITY
tlong@psysr.org, info@psysr.org,


THE COALITION FOR AN ETHICAL PSYCHOLOGY
ssoldz@ethicalpsychology.org, sreisner@ethicalpsychology.org, bolson@ethicalpsychology.org, jmarrigo@ethicalpsychology.org, bwelch@ethicalpsychology.org, reidelson@ethicalpsychology.org, tbond@ethicalpsychology.org, coalitionfep@ethicalpsychology.org,


7TH EUROPEAN SYMPOSIUM ON NON-LETHAL WEAPONS
http://www.non-lethal-weapons.com/index.html

conference@ict.fraunhofer.de, m.annati@marina.difesa.it, helmut.oppenheim@bmlv.gv.at, Christian.DeCock@mil.be, david.humair@armasuisse.ch, bezdek.m@vtupv.cz, jochen.neutz@ict.fraunhofer.de, ilkka.hoysti@poliisi.fi, willy.lamal@dga.defense.gouv.fr, paolo.giannetti@marina.difesa.it, igor.plaksin@dem.uc.pt, pascal.paulissen@tno.nl, vicsel@list.ru, sofia.hedenstierna@foi.se, EWGNLW@homeoffice.gsi.gov.uk, martina.mandt@ict.fraunhofer.de, hans.ebeling@ict.fraunhofer.de,


EUROPEAN CENTER FOR CONSTITUTIONAL AND HUMAN RIGHTS
info@ecchr.eu, info@publicinterestlawyers.co.uk,Paul.McNab@publicinterestlawyers.co.uk,


THE RUTHERFORD INSTITUTE
staff@rutherford.org, nisha@rutherford.org, internships@rutherford.org,


PLEASE FOLLOW THIS LINK AND SEND PRESIDENT OBAMA AND CONGRESS A LETTER
Tell Congress to STOP! Directed energy weapon attacks, covert surveillance, organized stalking and orchestrated harassment.
Send Letters to President Obama and Congress : 172 Letters Sent So Far
http://govharass.rallycongress.com/2367/tell-congress-to-stop-direc...


ANTI TORTURE ORGANISATIONS
omct@omct.org, omcteurope@omct.org, gr@omct.org, hk@omct.org, hm@omct.org,apt@apt.ch, cptdoc@coe.int, saa@fiacat.org, g.colin@fiacat.org, n.jeannin@fiacat.org, ir@interights.org, irct@irct.org, hdr@irct.eu, akj@irct.org, newsroom@presstv.ir, info@presstv.ir, intrelations@presstv.ir, bordc@mail.democracyinaction.org, info@bordc.org, organizing@bordc.org, a.amigo@dcaf.ch, acoomber@interights.org, if@irct.org, eb@irct.org, ats@irct.org, rericsson@apt.ch; eva@redress.org; daniele.perissi@trial.ch; l.grassy@fiacat.org; n.huet@fiacat.org, n.crottaz@alkarama.org; sb@omct.org, omct@omct.org, consultas@cels.org.ar,theo@redress.org, gaelle@redress.org, carla@redress.org, sarah@redress.org, mariana@redress.org, Dadimos@redress.org, makuta@redress.org, kevin@redress.org, lutz@redress.org, tara@redress.org, Letizia@redress.org, gaia@redress.org, eva@redress.org, juergen@redress.org, michelle@redress.org, mail@goodmanhurwitz.com,



AMNESTY INTERNATIONAL
amnestyis@amnesty.org; info@amnistia.cl; admin-us@aiusa.org; oficina@amnistia.org.uy; info@amnesty.org.uk; secretariat@amnesty.tw; info@madrid.es.amnesty.org;aiportugal@amnistia-internacional.pt; amnesty@amnesty.org.pl; ai-info@py.amnesty.org;  info@amnesty.org.nz; nireland@amnesty.org.uk;  supporter@amnesty.org.au; contacto@amnesty.org.ar; amnesty@amnesty.is; info@amnesty.ie; info@amnestyghana.org; admin-fr@amnesty.asso.fr; amnesty@amnesty.dk; info@amnesty.de; admin@amnesty.hr; amnesty@amnesty.cz;info@amnesty.ch;  aibf@aibf.be; aibda@ibl.bm; info@amnesty.at; aibf@aibf.be; amnesty@amnesty.nl, IEC@amnesty.org, secgen@amnesty.org, irene.khan@amnesty.org, ibyrne@amnesty.org, ESCR@amnesty.org, amnesty.info@amnesty.de, Klara.Schneiderova@amnesty.cz, jana.vargovcikova@amnesty.cz, secretariat@amnesty.tw, info@amnesty.tw, supporter@amnesty.org.au, info@amnesty.it, lisa.majumdar@amnesty.org, katerina.saldova@amnesty.cz,


THE ACLU –  THE AMERICAN CIVIL LIBERIRES UNION
executive_director@aclu.org, media@dcaclu.org, action@aclu.org, jjaffer@aclu.org ssoutar@acluct.org,acluofillinois@aclu-il.org, aclu@aclu-md.org, info@aclu-mass.org, support@aclu-mn.org, info@aclu-nj.org, wro@nyclubuffalo.org, info@gvclu.org, info@aclupa.org, info@acluvt.org, acluva@acluva.org, , tnelson@aclu-mn.org,ACLUOnline@aclu.org, acluva@acluva.org, info@mclu.org, info@aclupa.org, aclunc@nc.rr.com, info@aclusouthcarolina.org, info@acluga.org, aclufl@aclufl.org, aclupr@prtc.net, contact@acluohio.org, mail@acluwv.org, info@acluvt.org, info@aclu-ky.org, aclutn@aclu-tn.org, info@aclualabama.org, office@aclu-ms.org, acluofillinois@aclu-il.org, aclu@aclumich.org, liberty@aclu-wi.org, info@aclukswmo.org, legal@aclukswmo.org, info@aclu-ia.org, support@aclu-mn.org, southdakota@aclu.org, info@aclunebraska.org, acluok@acluok.org, info@aclutx.org, info@aclu-co.org, acluwy@aclu.org, aclu@aclumontana.org, admin@acluidaho.org, aclu@acluutah.org, aclunv@aclunv.org, info@aclusandiego.org, akclu@akclu.org, office@acluhawaii.org, info@aclum.org, riaclu@riaclu.org, info@acluct.org, info@aclu-nj.org, aclu@aclu-de.org, aclu@aclu-md.org, jcarnig@nyclu.org, mtrimble@nyclu.org, cnyintake@nyclu.org, geneseevalley@nyclu.org, suffolk@nyclu.org, westernregion@nyclu.org, msilver2@att.net, intake@aclu-co.org, smeswarb@aclu-co.org, jkrieger@aclu-co.org,  jcurr@nyclu.org, dberger@nyclu.org, mmiller@aclu-mn.org, ibratlie@aclu-mn.org, info@aclu-or.org, Volunteer@aclu-or.org, jkooren@aclu-mn.org, jcurr@nyclu.org, msilverstein@aclu-co.org, aclu@aclu.org, JDauteuil@aclusandiego.org, assistance@aclufl.org, lalexander@nyclu.org, rtwallace@aclu-co.org, srich@aclu-co.org, smeswarb@aclu-co.org, cstoddart@aclu-mn.org, jcarnig@nyclu.org, press@acluva.org, lmusselman@acluva.org,


THE AUSTRALIAN GREENS
greens@greens.org.au, senator.milne@aph.gov.au, senator.ludlam@aph.gov.au, adam.bandt.mp@aph.gov.au, senator.siewert@aph.gov.au, senator.hanson-young@aph.gov.au, senator.dinatale@aph.gov.au, senator.wright@aph.gov.au, Lisa.Marlin@aph.gov.au, senator.waters@aph.gov.au, senator.rhiannon@aph.gov.au, senator.whish-wilson@aph.gov.au, senator.xenophon@aph.gov.au,


THE NATIONAL LAWYERS GUILD - NLG
president@nlg.org, legalworkervp@nlg.org, nvp3@nlg.org, traci@nlg.org, snvp@nlg.org, evp1@nlg.org, southernrvp@nlg.org, midwestRVP@nlg.org, northwestrvp@nlg.org, midatlanticrvp@nlg.org, mideastrvp@nlg.org, northeastrvp@nlg.org, farwestrvp@nlg.org, northwestrvp@nlg.org, southwestrvp@nlg.org, texomarvp@nlg.org, mideastrvp@nlg.org, midatlanticrvp@nlg.org, abi@nlg.org, membership@nlg.org, tupocc@gmail.com, nextgen@nlg.org, queercaucus@nlg.org, mvh@justiceonline.org, antiracism@nlg.org, antisexism@nlg.org, director.npap@nlg.org, director@nlg.org, communications@nlg.org, dan@nlg.org, heidibog@hotmail.com, dgregor2@gmail.com, treasurer@nlg.org,


THE AMERICAN BAR ASSOCIATION – ABA
irr@americanbar.org, tanya.terrell@americanbar.org, Patrice.payne@americanbar.org, Michael.pates@americanbar.org, sarah.turberville@americanbar.org, Jaime.campbell@americanbar.org,Katherine.incantalupo@americanbar.org,Leanne.Pfautz@americanbar.org, Julie.Pasatiempo@americanbar.org, Angela.Benson@americanbar.org, Audrey.Lamb@americanbar.org, Jessica.Smith@americanbar.org, Christina.Heid@americanbar.org, Curry.Wilson@americanbar.org, Thomas.Happell@americanbar.org, Adam.Vogel@americanbar.org, Jacqueline.Gichinga@americanbar.org, Michelle.Mattingly@americanbar.org, gpsld@americanbar.org , service@americanbar.org, Dawn.Holiday@americanbar.org, christianna.tucker@americanbar.org, humanrights@americanbar.org, silcomtech@americanbar.org, jill.pena@americanbar.org, tina.guedea@americanbar.org, teresa.ucok@americanbar.org, introl@americanbar.org, Will.Hornsby@americanbar.org, intlawmeetings@americanbar.org, Katherine.koszyk@americanbar.org, yolanda.muhammad@americanbar.org,

 FAMOUS HUMAN RIGHTS LEADERS
info@tutu.org,nomfundo@tutu.org ,info@tutufoundation-usa.org , pilgereditor@gmail.com, chomsky@mit.edu,admin@chomsky.info,david@mediachannel.org, editor@medialens.org, mail@robert-fisk.com, emailbox@robert-fisk.com, info@mind.org.uk, info@torturecare.org.uk, feedback@humanrightsfirst.org, hri@hri.ca, BurnsC@humanrightsfirst.org, info@savethechildren.it, carterweb@emory.edu,  tony.clark@nara.gov,  kolb@ihf-hr.org,  ldh@ldh-france.org, hommes.libertes@ldh-france.org, communication@ldh-france.org, administration@ldh-france.org, adherer@ldh-france.org, fuentes@dipol.gov.co, cooperantes@cgfm.mil.co, vleone@soaw.org, info@dcaf.ch, Center4justice@cja.org, info@ecchr.eu, mthomson@apt.ch, apt@apt.ch, a.amigo@dcaf.ch, contact@councilforthenationalinterest.org, national@washpost.com, heather@wrfg.org, sharonweinberger@gmail.com, Hillary.Viers@bioethics.gov, lklucy@att.net, alli@codepink.org; laura.codepink@gmail.com, frackturedprune@gmail.com, Sam.codepink@gmail.com, hannah.codepink@gmail.com, Anastasia@codepink.org, maggie.codepink@gmail.com,bordc@mail.democracyinaction.org, info@bordc.org, organizing@bordc.org, crcl@dhs.gov, apt@apt.ch, KatieP@codepink.org, Nalini@codepink.org,


THE UNION OF CONCERNED SCIENTISTS
rhester@ucsusa.org , ucsaction@ucsusa.org, pphartiyal@ucsusa.org, clepperd@ucsusa.org,


THE INTERNATIONAL COMMISSION OF JURISTS
info@icj.org, olivier.vanbogaert@icj.org,chancellor@scu.edu.au, ekonstan@techno-link.com, izurieta@ecuafast.com, sigi@nests.com.jo, info@icj-kenya.org, kmprdf@mail.com.np, jwa@binghodneland.no, post@icj.no, info@icj-ch.org, odhikar@citech-bd.com, bhrc.nhq@gmail.com, bar@caribsurf.com, mbdhp@fasonet.bf, etude.alhassan@intnet.td, ccj@col.net.co, info@ylbhi.or.id, mary.ann.hedlund@domstol.no, cile@rc.msu.ru, inbox@ip-centre.ru, tbax@ms17.hinet.net, ltdh@tg.refer.org, arlethag@globalrights.org, ielsur@chasque.apc.org, zamlaw@zamnet.zm, zlhr@icon.co.zw, chaskalson@concourt.org.za , dowdj@courts.nsw.gov.au, sekretariat@juristenkommission.at, redaction@gpdoc.com, sektion-ijk@t-online.de, m_ng@hk.super.net, ramdasanand@sify.com, cels@cels.org.ar, office@oliviers.be, paulanthonymcdermott@eircom.net, francovella@tiscalinet.it, jclu@jclu.org, contact@omdh.org, njcm@law.leidenuniv.nl, dallari@originet.com.br, patw@cba.org, advokat@HaStabell.com, hrcp@hrcp-web.org,rchiri@cajpe.org.pe, amp@plmj.pt, ipcentre@mtu-net.ru, info@icj.dk, acijlp@thewayout.net, lovrosturm@siol.net,secretariat@icj-sweden.org, rsmith@justice.org.uk, aaicj@mindspring.com, howen@icj.org,


PLEASE CONTACT US FOR FURTHER INFORMATION:-
Yours in the search for openness and respect for universal human rights
John Finch, 5/8 Kemp St, Thornbury, Vic 3071, Australia, TEL: 0424009627
EMAIL: tijohnfinch@gmail.com, noorwelliannaziism@gmail.com
FACEBOOK: http://www.facebook.com/john.finch.16547?ref=profile
GROUP FORUM:      https://peacepink.ning.com/

TARGETED INDIVIDUAL and a member of THE WORLDWIDE CAMPAIGN AGAINST ELECTRONIC TORTURE, ABUSE AND EXPERIMENTATION

Read more…

2 March 2016

中国受害者告全世界人民书 

An Announcement To The Whole World By Chinese Victims Of Electronic And Psychotronic Weapons

(SEE BELOW FOR CHINESE VERSION)


DEAR SIR/MADAM

First of all, please permit us to introduce ourselves to you. We are some of the Chinese victims from dozens of regions and cities across China , who have been cruelly harassed tortured and persecuted in a covert way by the means of secret remote control on human body & brain. Among us, there are corporate employees, teachers, students, retirees and other intellectual workers and physical workers. Our suffering period ranges from several months till over 30 years.

Thanks to Internet that builds a bridge for us to know each other, and it is same sufferings bring us to work together.

A group of secret criminals who abuse their powers, arbitrarily use “the means of secret remote control on human body & brain”, illegally manipulate our bodies and brains covertly, and also cruelly torture and harass us psychologically and physically and persecute us days and nights so that a lot of victims live a very miserable and horrible life.

Secret criminals utilize the weapons of “secret remote control on human body & brain” and remotely influence us, and consequently our bodies suffer from “physiological diseases and physiological behaviors” caused artificially from their weapons such as aching, itching, coldness, hotness, trembling, unwell feeling and unhappiness, and so that our brains suffer harassments and tortures from “acoasma and hallucination”. Besides, criminals do all they could to shamelessly steal and indecently spread our privacy in our brains in a abnormal psychology
and crazily do all they could to intimidate and humiliate victims. All these vices do a great harm us psychologically and physically. Therefore , some innocent victims was forced to hospitals especially for being forced to accept mental treatment, some innocent victims were forced to suicide because of intolerable secret tortures and insults, and others died of “strange fatal diseases” yielded by criminals secretly in a special trap.

Such secret crimes as the wide abuse of their powers, the illegal use of “the means of secret remote control on human body & brain” and illegal violation of fundamental human rights, have resulted horribly in atrocity or the unprecedented anti-human catastrophe of human rights technically. These crimes not only challenge severely Chinese constitution and laws, but also human conscience, the UN Charter and the Universal Declaration of Human Rights. It is NOT permitted by all the human beings at all!

Owing to the above-mentioned cases, Chinese victims jointly lodged  “a collective complaint to Chinese President Hu Jintao” (please see attachment 1) on 3rd Dec. 2007, and emailed it to the Chinese Communist Party Central Committee, every ministries of the State Council, major news media and the legal community who we asked to deliver the complaints to Chinese President. 

Subsequently, we jointly announced " An Open Letter to the Head of Chinese Secret Institution"  on 5th May 2008.(Please see attachment 2)

Chinese Goverment has the undisputed responsibility to take an immediate investigation into the secret criminals who abuse their power, and to sternly punish them according to the clause of "the State respect and protect citizens' human rights" set out by Constitution of PRC China. However, unfortunately, so far we have not received any response on the issue.

The Universal
Declaration of Human Rights (UN General Assembly passed and published  Resolution 217A (III) on 10th December 1948) stipulates in the following relevant clauses that:

Article 3  Everyone has the right to life, liberty and security of person.

Article 5   No one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment.

Article 6    Everyone has the right to recognition everywhere as a person before the law.

Article 12     No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.

Article 19    Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.

China is one of the creators of the United Nations, a permanent member of the UN Security Council, a member of UN Human Right Council and one of the signers of UN Covenant on Human Rights. Therefore, China should seriously observe and enforce the relevant rules of UN Universal Declaration of Human Rights.

At present, the quantity of victims are increasingly rising around the globe. Thousands of victims strongly demand for an investigation into the sinful Hi-tech crimes which covertly violate human rights worldwide. A large quantity of the stated facts reveal that these secret fascist criminals are the common enemies of all the human beings who use Hi-tech means to arbitrarily secretly violate human dignity and fundamental human rights. The crazy secret Hi-tech crimes heavily threat and violate the fundamental rights of human livings in the world.  

Challenged by the unprecedented worldwide catastrophe of human rights and the severe crimes of damaging human beings, we urge an immediate actions in union and bravely fight against the gangs of secret fascist criminals! We must disclose the horrible crimes which are covertly damaging human beings, and put them into the Judge Courtroom in International Criminal Court!! 

Journalist and elites worldwide have the responsibility to provide supports for victims, the lawyers worldwide have the responsibility to stand by and offer a legal aid to victims.UN Human Right Council has the responsibility to safeguard human rights and to protect thinking right, sleeping right, health right and living right of all the human beings. International Criminal Court at Hague has the responsibility to carry out an investigation into the crimes denounced by victims, and to charge these secret fascist,the criminals who severely violate fundamental human rights with the Hi-tech Crime and the Antihuman Crime through and according to the relevant legal proceedings.

We, Chinese victims, support resolutely the global campaign of " Ban the abuse and torture of secret MIND CONTROL/PSYCHOTRONIC WEAPONS/Remote Human manipulation" through our practical actions. We strongly appeal for the United Nations to immediately stop the abuse of the means of the secret remote control on human body & brain which are used to cruelly harass and torture and persecute covertly common citizens.

We strongly urge the UN Secretary-General Ban Ki-moon to do his solemn duty to protect fundamental human rights of the whole world, and  hold a urgent international conference on the ban of abusing “the means of secret remote control on human body & brain" so as to protect the validity of the UN Charter and UN Declaration & Covenant on Human Rights. Also, we demand for European Commission for Human Right to immediately put Article 27 of A40005/1999 into practice.

We strongly urge global news media to stand out to support justice, and to take a deep careful investigation into the secret Hi-tech crimes, and to expose truly the sinful facts of secret fascist criminals to the global people. 

We strongly urge global legal community to stand out to offer a legal aid to all the victims and support justice based on the UN Charter and UN Declaration & Covenant on Human Rights.

We strongly urge UN Human Right Council to take an urgent investigation into these secret fascist criminals who arbitrarily use “the means of secret remote control on human body & brain” which have been crazily violating fundamental human rights.

We strongly urge International Criminal Court to take an immediate investigation into our complaints, and to charge these secret fascist criminals who heavily violate fundamental human rights with the Hi-tech Crime and the Antihuman Crime, and to make a historic great contribution to guarantee the fundamental human rights of all the human beings!! 

With best regards

  Yours   Truly


CHINESE  VERSION


尊敬的女士、先生:

我们来自中国各地数十个城市地区,是一些遭受“秘密遥控人体和大脑(精神)技术”武器残酷虐待折磨迫害和阴谋暗害的受害者。我们之中,有公司员工、教师、学生、退休职工,以及其他从事脑力和体力工作的普通平民。我们之中,受害的时间,短的仅几个月,长的则达三十多年。

网络使我们相识,受害的遭遇让我们走到了一起。

长期以来, 一帮滥用特权的秘密罪犯,肆无忌惮地使用“秘密遥控人体和大脑(精神)技术”,非法秘密控制我们的身体和大脑(精神),日夜不停地实施种种惨无人道的精神骚扰和肉体折磨迫害、阴谋暗害,致使许多受害者每天生活在无比痛苦的、生不如死的恐怖状况中。

他们使用“秘密遥控人体和大脑(精神)技术” ,遥控制造我们受害者身体内日夜交替出现:痛、痒、冷、热、颤抖、难受等人为的“生理疾病和生理行为”痛苦;遥控制造我们受害者的大脑(精神)日夜出现所谓的“幻听、幻觉”骚扰折磨痛苦。他们还竭尽无耻、卑鄙、下流的变态伎俩,窃取传播受害者大脑思维的隐私信息,并且,疯狂地对受害者进行秘密恐吓和种种人格侮辱。所有这一切,都给我们受害者的肉体和精神带来了无与伦比的巨大创痛,身心遭到极度的摧残和伤害。其中,有一些无辜受害者被诬陷并送进“精神病院”;另一些因无法忍受秘密折磨凌辱的痛苦而“自杀”;还有一些则被他们秘密制造身体内出现各种莫名其妙的“绝症怪病”而阴谋暗害,含冤死亡。

这样广泛的滥用“特权”,使用“秘密遥控人体(大脑)技术”,非法侵犯普通平民基本人权的秘密犯罪行为,在其技术性、恐怖性和反人类性上都已经成为中国和世界历史上空前的人权浩劫。这不仅是对中国宪法法律的严重挑战,而且,也是对人类良知、对《联合国宪章》和《人权宣言》的严重挑战,是全人类所绝对不能允许的!

为此,我们中国受害者于2007年12月3日,联名写了一封“致胡锦涛主席的集体控诉信” ( 见“附件一” ),并用电子邮件发送给了中共中央和中国国务院各部门,以及全国新闻媒体和法律界人士等,要求转呈给中国国家主席。

接着,在2008年5月5日,又联名发出了一封《致中国“秘密机构”头头的公开信》( 见“附件二” )。

毫无疑问,中国政府有责任按照中国宪法载明的:“国家尊重和保障公民人权”等法律条款,立即调查并严惩这帮滥用特权的秘密罪犯。然而,遗憾的是,我们受害者所进行的这些揭露控诉努力,并没有得到应有的重视和回应。

《世界人权宣言》(联合国大会 一九四八年十二月十日 第217A(III)号决议通过并颁布) 的有关条款规定:

第三条|
人人有权享有生命、自由和人身安全。
第五条
任何人不得加以酷刑,或施以残忍的、不人道的或侮辱性的待遇或刑罚。
第六条
人人在任何地方有权被承认在法律前的人格。
第十二条
任何人的私生活、家庭、住宅和通信不得任意干涉,他的荣誉和名誉不得加以攻击。人人有权享受法律保护,以免受这种干涉或攻击。
第十九条
人人有权享有主张和发表意见的自由;此项权利包括持有主张而不受干涉的自由,和通过任何媒介和不论国界寻求、接受和传递消息和思想的自由。

中国是联合国的创始国之一;中国是联合国安理会常任理事国;中国是联合国人权理事会成员;中国也是联合国有关《人权公约》的签署国之一。因此,中国理应严格恪守、认真执行“联合国人权宣言”等有关维护公民人权文件的规定。

现在,世界各国的受害者数量呈现越来越多之势。成千上万的受害者强烈要求对目前正在全世界范围内发生的这一罪大恶极的侵犯人权事件进行调查。从大量揭露出来的事实表明,这些恣意践踏人类尊严和基本人权的秘密法西斯罪犯是全人类的共同敌人。他们这一疯狂的秘密罪恶正在严重威胁和侵犯着全世界人民最基本的生活和生存权利。

面对这一空前的世界性人权浩劫,全世界人民必须紧急行动起来,团结一致,同仇敌忾,与这帮秘密法西斯罪犯进行坚决斗争!认清他们的秘密罪恶面目,揭露他们秘密侵犯、残害人类的滔天罪行,将他们押上国际刑事法庭的审判台!!

全球所有的新闻媒体和有识之士有责任向受害者表示声援支持;世界各国的法律界人士有责任挺身而出,为受害者提供法律援助;联合国人权理事会有责任捍卫人权,维护全人类的思想自由权、睡眠休息权、身体健康权和生命生存权;联合国海牙国际刑事法院有责任接受和调查受害者提起的诉讼,并将这帮严重危害人类基本权利的秘密法西斯罪犯绳之以法!!

我们中国受害者,以自己的实际斗争行动,坚决支持“禁止使用秘密遥控人体(大脑)技术武器”滥施于民的世界性运动;坚决要求联合国制止这一使用“秘密遥控人体(大脑)技术”武器针对普通平民,实施秘密肉体和精神残酷虐待折磨迫害的滔天罪恶。

我们强烈要求联合国秘书长 潘基文 先生从维护“联合国宪章”及有关“人权宣言和公约”的尊严出发,履行自己维护全世界人民基本人权的神圣职责,紧急召开“禁止使用秘密遥控人体(大脑)技术武器”的国际会议。我们要求欧盟人权委员会立即开展其A40005/1999第27款的工作!

我们强烈呼吁世界各国新闻媒体挺身而出,主持正义,对众多的受害事件进行深入认真调查,并真实地向全世界公众揭露曝光这帮秘密法西斯罪犯的罪恶事实真相!

我们强烈呼吁全世界的法律工作者勇敢地站出来,以“联合国宪章”和有关“人权宣言和公约”为依据,对受害者提供法律援助,替所有受害者伸张正义!

我们强烈要求联合国人权理事会,对这种滥用特权,肆无忌惮地使用“秘密遥控人体(大脑)技术”,丧心病狂地侵犯人类最基本人权的秘密法西斯罪恶行为,立即进行紧急国际调查!

我们强烈要求“国际刑事法院”,对受害者的控诉立即立案调查,并依据联合国有关“维护人权”的文件法规,将这帮凶恶的秘密法西斯罪犯押上国际刑事法庭提起公诉,为保障人类的基本人权做出历史性的贡献!

附件(一):致胡锦涛主席的集体控诉信》

尊敬的胡锦涛主席:

   我们是一些被“秘密遥控人体和大脑(精神)技术” 折磨迫害的受害者。网络使我们相识,受害的遭遇让我们走到了一起。

    我们集体向您——胡主席进行强烈控诉!!

    在现今的中国,有着一帮无法无天的秘密罪犯。

   长期以来,他们恣意践踏宪法尊严,非法侵犯中国公民人权,肆无忌惮地使用“秘密遥控人体和大脑(精神)技术”,对受害者的身体和大脑(精神)日夜不停地实施种种秘密控制骚扰,惨无人道的进行折磨迫害和阴谋暗害,致使许多受害者每天生活在极为痛苦恐怖的精神状况中生不如死,身心遭受极度的摧残和伤害。不少受害者因他们制造出的各种莫明其妙的怪病而无辜冤死。 

    这种秘密“遥控技术手段” 包括:制造我们身体内日夜交替出现:痛、痒、冷、热、颤抖、难受等人为的“生理疾病和生理行为”痛苦;制造我们的大脑(精神)日夜出现被遥控的所谓“幻听、幻觉”的骚扰折磨痛苦。他们还竭尽无耻、卑鄙、下流的变态伎俩,窃取传播受害者大脑思维的隐私信息,并且,疯狂地对受害者进行秘密恐吓和种种人格侮辱。所有这一切,都给受害者的肉体和精神带来了无与伦比的巨大创痛!

     由此,造成我们中的许多受害者如今在工作单位受到了极不公正的对待:有的受到严重岐视;有的被剥夺了工作权利,失去了生计。一些受害者向公安司法部门报案时,也被错认为“精神有问题”而不予理睬。同时,也给我们的家庭带来了极其严重的损害,使不少受害者的家庭因此而出现裂痕,甚至造成家破人亡的惨痛后果。

    据不完全的网络统计,在我国,现今公开站出来揭露曝光的受害者已有几百人之多。而更多的受害者正在逐步认清这帮秘密罪犯的“庐山真面目”,积极加入到揭露曝光他们罪恶的战斗行列来。

     这种无法无天的秘密恐怖犯罪行为的泛滥,正在引发广泛的社会恐慌,给整个社会的稳定与和谐带来严重的破坏。这种伤天害理的秘密恐怖犯罪行为的泛滥,必将对国家、对民族造成巨大的危害!

    而这样广泛的滥用“特权”,非法侵犯公民人权的秘密犯罪行为,在其技术性、恐怖性和反人类性上都已经成为中国和世界历史上空前的人权浩劫。毫无疑问,这是对人类良知、对法律的严重挑战,是国家的宪法和法律所绝对不能允许的!

    中华人民共和国宪法第三十三条法定:凡具有中华人民共和国国藉的人都是中华人民共和国公民。
   中华人民共和国公民在法律面前一律平等。

    国家尊重和保障公民人权。

     中华人民共和国宪法第三十八条法定:中华人民共和国公民的人格尊严不受侵犯。禁止用任何方法对公民进行侮辱、诽谤和诬告陷害。

      中华人民共和国宪法第五条法定:中华人民共和国实行依法治国,建设社会主义法治国家。 
      国家维护社会主义法制的统一和尊严。 
      一切法律、行政法规和地方性法规都不得同宪法相抵触。

     一切国家机关和武装力量、各政党和各社会团体、各企业事业组织都必须遵守宪法和法律。一切违反宪法和法律的行为,必须予以追究。

     任何组织或者个人都不得有超越宪法和法律的特权。

     中华人民共和国民法第九十八条法定:公民享有生命健康权。

  然而,这帮秘密罪犯,根本无视《宪法》等这些法律条款规定,有恃无恐地凌驾于法律之上,滥用手中掌握的所谓“特权”,丧心病狂地对广大受害者的身体和大脑(精神)进行摧残式的秘密遥控折磨骚扰迫害,恣意蹂躏剥夺受害者的思想自由权、休息睡眠权、身体健康权等公民基本人权;无耻地侵犯侮辱受害者个人所有的隐私和人格尊严……。

     我们受害者在他们的日夜秘密控制折磨中倍受煎熬,“唤天天不应,唤地地不灵”。在这种极度痛苦,举目无助情况下,才不得不集体向您投诉控告。敬请胡主席您能体察民苦民愤,为民做主。 

     据悉,在当今世界上,俄罗斯、美国以及欧盟等许多国家和地区,都不同程度地制订和正在制订一些具体的决议或法规,明确制止这种“秘密遥控人体和大脑(精神)技术武器”对普通平民实施秘密酷刑虐待折磨迫害。如俄罗斯议会的“决议” 就是一例。

http://www.geocities.com/capecanaveral/campus/2289/webpage.htm
http://mindjustice.org/1-02-6.htm

     在此,我们强烈要求国家紧急立法,制订更具体的法律法规,坚决制止这种滥用“秘密遥控人体和大脑(精神)技术”手段,悍然对公民的身体和大脑(精神)实施疯狂骚扰折磨迫害的秘密恐怖犯罪行为!! 

    这种滥用”特权”的无法无天秘密恐怖罪行,是疯狂的秘密“违反宪法和法律的行为”!我们强烈要求国家从“尊重和保障公民人权”的法律出发, 坚决“必须予以追究”这帮秘密犯罪分子的刑事责任,挖除这些“秘密毒瘤”,将他们绳之以法!为建立一个法治的和谐社会铺平道路!! 

    此致

    敬礼!
    受害者:(签名)


中国受害者告全世界人民
秘密脑控试验—人类生存基本价值被破坏MK-Ultra类秘密试验(脑控试验)常常在试验目标(受害者)不知情或者不同意的情况下进行的。脑控很容易让受害者精神不正常。加拿大巴士杀人案的李伟光就是脑控秘密试验受害者。

脑控常常涉及微小芯片植入到大脑和身体的其它部位,常常用电磁波作为激发的能量,是RFID和晶振技术的充分应用,不需要传统电池。部分只做控制试验的受害者们身体里没有芯片。脑控涉及定向能(Directed Energy),例如X-射线、微波信号和穿墙高能微波。定向能试验的方式非常隐蔽,可能会产生致命的效果。静态造影如MRI和CT可以造假。

Victim几乎都不知道自己是试验目标。一般症状例如,催眠,剥夺正常睡眠,诱导腹泻,诱导分神,产生头痛及其他部位的疼痛,诱导情绪变化等等。受害者往往将异常归结为普通的健康问题,他们常常不认为他们自己是Victim。

各国特工之间往往互相合作。有人在中国成为受害者,在加拿大继续受到试验,那往往就是中加特工在合作脑控。移民很可能成为脑控的几内亚猪。脑控试验不仅从身体上直接打击受害者,而且使用技术手段来破坏一个人的精神心理。脑控常常被用来暗害敌人,并且能杀人于无形,例如杀死主神经和制造癌症,特别是肺癌。

“Lida”技术:脉冲射频发射器,可以导致严重的疲劳和昏睡,或者失眠。可以穿墙瞄准目标发射.  LIDA技术在1950年代由苏联发明,后来在各国得到了发展。声音直达大脑(Voice to skull)技术:可以传送说话声和其它声音,直达目标的头部,旁边的人听不到,可以穿过墙壁发射。该技术可以在没有脑控芯片的情况下实现。(该技术的美国军方代号是“V2K”。) 

读取和破解脑波:通过高科技脑控激励芯片(或特定的帽子)来读取受害者的脑波,通过无线传输到附近的接收设备。再过滤出特定的波形来破解受害者的思维和记忆。这项技术已经非常先进。

意念传输:(Thoughts  Transmission) 通过无线传输特定的脑控波曲线到受害者的大脑,实现意念的传输,一般需要有脑控微芯片植入在受害者的大脑。意念传输也叫潜意识(subliminal)传输,例如“受辱感”,能破坏人际关系。默念传输:(Subvocal Transmission) 通过电磁波传输来影响受害者的说话器官和抑制思维器官,来影响受害者说话。这种话不经过大脑的思考说出,特别细心的受害者能够发现。这种传输可以通过脑控激励芯片(又叫脑控钉)或不用脑控激励芯片进行。受害者的主要特点是说话不经过思考或者说错话。武器化的微波技术:可以导致一系列的身体的伤害反应,可以悄悄地,穿过墙壁进行。穿墙雷达扫描技术(例如机场安检。)高级无线计算机控制技术:通过探测主板的特定的电磁辐射和向特定的线路端子发射X波段电磁脉冲,实现输出和输入。相当于别人的计算机通过串口连到了你的计算机。在没有无线网卡的情况下就能够实现无线遥控计算机。潜意识“无声的声音”(Subliminal “Silent Sound”) 设备:可以传送催眠式建议到受害者,但受害者耳朵听不到,声波的频率介于超声波和人可听声波之间。

(二)受害者们总结的常见的身体症状和经验:(在读取和破解脑波阶段,受害者们通常没有严重的症状,但是他们至少有一颗芯片在身体里面,部分只做控制试验的受害者们身体里没有芯片。)• 头皮发麻。头晕, 头痛。

• 无理由的极度疲劳,腿肌及关节的酸痛。

• 梦境制造和操纵,剥夺睡眠。

• 电击感以及肌肉的振动和抽动。

• 不通过思考的说话 (subvocal transmission),语言能力受到影响,经常结结巴巴。

• 没有道理的出现心跳过速和过缓。• 记忆力减退,记忆消失 。

• 强迫肌肉收缩和舒张,由调制神经信号所引起,会导致身体和四肢移动。/模拟脑波产生情绪突变。

• 烧灼皮肤,身体的不同部位出现烧灼感或出现不明切口。

• 脸色变暗,头发变稀。 (与信号发射有关)• 与声音交谈,听见声音(Voice to skull, 美国军方代号V2K。)

•不能集中注意力。/眼睛发花。

• 物体振动,如门、窗户、床和椅子(由声波脉冲或芯片模拟所引起。)。• 电子产品的被控制现象,包括计算机、电视机、汽车和家用电器。(例如电视机自动打开或关闭,由电磁脉冲波所引起)



中国受害者签名:
 With best regards
Yours   Truly

南京 忻中庆  13776686557 zwt762000@yahoo.com.cn  http://blog.sina.com.cn/xdj88
云南 王荣海  15008719951          baiyun024@vip.qq.com
湖南 李春泽  13435768567          myinno@126.com

 丹东 高晓维  13898510756          cwzpp@yahoo.cn

上海 郁荣建  13120847702          ayeeyo1226669043@yahoo.com.cn

襄樊 喻峰     13995768279          yunfan201@sina.com

桂林 易胜林  13978302663          yfsb987@sina.com

 北京 张蕾       13691103510           zlvever@yahoo.cn

  湖北 刘炜     13597878369          liuw71@163.com

 上海 余灵波  13321981271          lingbo-yu@163.com

山东 祁昌玲  15154602071           635602318@qq.com

 广州 蒋进     13535358871          65141399@qq.com

 湖南 郭汝泉  15974413876          guoruquan163@yahoo.com.cn

 江苏 孙玮     13917698052          108322515@QQ.com

四川 郑芸     13559949568          854195278@qq.com

浙江 曹世杰  0576-86814070        847654242@qq.com

福建 甘志恒 (05962302076      gzhxwq.xwqgzh@yahoo.com.cn

辽宁 石宇       0410-2828530               minamijie@163.com

 河北 李冠萍   0310-2326981         ligp741212@163.com

郑州 赵枫      13903863768.         zfhb369@yahoo.com.cn

湖南 范丽      13646218013           fan0769@yahoo.cn

广西 邱勇进    0778-2565332          qyjcvn@sina.com

珠海 张路        15812708601          jamesroad9@sina.com

 烟台 孙波        15064528015          dcxq@tom.com

安庆 周连宏      13685568645          372330036@163.com

 江西 赖启星      13712207193         lgs369369@163.com

驻马店 沅元      13525333332          aney0011@yahoo.cn

 四川 陈小意      15982732725           babyhl@vip.qq.com

  湖北 龙伟           13469765313            longwei_312657421@qq.com

 州 裴维传       13033539006          105118758@qq.com

黑龙江 张晓亮    13634601784          928318548@qq.com

南宁 黄鄯兵                                              843622736@qq.com

Germany  Wenxiu Zhou  +49 162 7550 955   zhouwenxiu@yahoo.com

荆州 张四海        15927724461           739394881@qq.com.cn

宜昌 王洋            13307203797          972188722@qq.com

秦皇岛 马欣岚     13230383403          yunzhongyu546@163.com

江西 熊璐      0795-7032879/7585069   615806775@qq.com

徐州 白露            13685161290                 bailu8585@sina.com

福建 林振                                     283704958@qq.com

李选忘                                      tonyqq66@yahoo.cn

 昆明 马超                                                  18536361@qq.com

安徽 彭宜杉          13275779355           pys624@126.com

 南京 陈世伟        13211355448           329588460@qq.com

上海 刘华茗之      13818051167          274735961@qq.com

  湖北 张承柱            13545372812          793556424@qq.com

湖南 朱卓雄            13187326593           514546363@qq.com

贵州 心语                                                    865403168@qq.com

湖北 任丹婷          13872825547            420663268@qq.com

河北 狄曼琦                                       zheduandechibang2008@yahoo.cn

吉林 王雅清         13894726370        picture_window@hotmail.com

福建 陈媚             0595-87058567       234824602@163.com

 辽宁 刘威      13842729284        liuweiruanjian1986@yahoo.com.cn
Nanjing Xin Zhongqing 13776686557  zwt762000@yahoo.com.cn (http://blog.sina.com.cn/xdj88
Yunnan Wang Ronghai     15008719951      baiyun024@vip.qq.com
Hunan Li Chunze            13435768567      myinno@126.com

Dandong Gao Xiaowei     13898510756       cwzpp@yahoo.cn

Shanghai Yu Rongjian     13120847702       ayeeyo1226669043@yahoo.com.cn

Xiangfan Yu Feng         13995768279       yunfan201@sina.com

Guilin Yi Shenglin         13978302663       yfsb987@sina.com

Beijing Zhang Lei         13691103510       zlvever@yahoo.cn

Hubei Liu Wei                13597878369      liuw71@163.com

Shanghai Yu Lingbo       13321981271       lingbo-yu@163.com

Shandong Qi Changling    15154602071      635602318@qq.com

Guangzhou Jiang Jin      13535358871        65141399@qq.com

Hunan Guo Ruquan       15974413876        guoruquan163@yahoo.com.cn

Jiangsu Sun Wei            13917698052       108322515@QQ.com

Sichuan Zheng Yun       13559949568        854195278@qq.com

Zhejiang Cao Shijie       0576-86814070      847654242@qq.com

Fujian Gan Zhiheng     05962302076     gzhxwq.xwqgzh@yahoo.com.cn

Liaoning Shi Yu                  0410-2828530         minamijie@163.com

Hebei Li Guanping        0310-2326981        ligp741212@163.com

Zhengzhou Zhao Feng    13903863768         zfhb369@yahoo.com.cn

Hunan Fan Li               13646218013          fan0769@yahoo.cn

Guangxi Qiu Yongjin      0778-2565332       qyjcvn@sina.com

Zhuhai Zhang Lu           15812708601        jamesroad9@sina.com

Yantai Sun Bo               15064528015         dcxq@tom.com

Anqing Zhou Lianhong    13685568645         372330036@163.com

Jiangxi Lai Qixing           13712207193        lgs369369@163.com

Zhumadian Yuan Yuan    13525333332         aney0011@yahoo.cn

Sicuan Chen Xiaoyi       15982732725          babyhl@vip.qq.com

Hubei Long Wei          13469765313      longwei_312657421@qq.com

Xuzhou Pei Weichuan     13033539006          105118758@qq.com

Heilongjiang sky            13634601784          928318548@qq.com

Nanning  Huang Shanbing                                    843622736@qq.com

Germany Wenxiu Zhou  +49 162 7550 955  zhouwenxiu@yahoo.com

Jingzhou Zhang Sihai      15927724461          739394881@qq.com.cn

Yichang Wang Yang       13307203797          972188722@qq.com

Qinhuangdao Ma Xinlan    13230383403   yunzhongyu546@163.com

Jiangxi Xiong Lu     0795-7032879/7585069    615806775@qq.com

Xuzhou Bai Lu                     13685161290            bailu8585@sina.com

Fujian Lin Zhen                                       283704958@qq.com

Li Xuanwang                                 tonyqq66@yahoo.cn

Kunming Ma Chao                                                  18536361@qq.com

Anhui Peng Yishan          13275779355         pys624@126.com

Nanjing Chen Shiwei       13211355448         329588460@qq.com

Shanghai Liu Huamingzhi   13818051167      274735961@qq.com

Hubei Zhang Chengzhu      13545372812        793556424@qq.com

Hunan Zhu Zhuoxiong       13187326593        514546363@qq.com

Guizhou Xin Yu                                         865403168@qq.com

Hubei Ren Danting           13872825547        420663268@qq.com

Hebei Di Manqi                                        zheduandechibang2008@yahoo.cn

Gilin Wang Iacing  13894726370  picture_window@hotmail.com         
Liaoning Liu Wei       13842729284      
liuweiruanjian1986@yahoo.com.cn
XU, Yan (Hong Kong) Mobile: (+852) 98501119; Office (+852)27666572; Home (+852) 27742824
TSANG, Yuk Lam (Hong Kong)
Tel:(+852)****1307
LI, Xiao Na (Beijing) Mobile: (+86)13718204206         
YU, Rong Jian (Shanghai) (+86)13120847702   ,   
YE, Guo Zhao (Shanghai) Mobile: (+86)13816428606
ZHOU, Xiao Jiang (Shanghai) Mobile: (+86)13564968621
ZHANG, Hong (Shanghai) Mobile: (+86)13818941950
YU, Ling Bo (Shanghai) Mobile: (+86)13321981271
GAO, Xiao Wei (Dandong City, Liaoning Province) Mobile: (+86)13898510756
YU, Xiao Wei (Yunnan Province) Mobile: (+86)13628872885   
WANG, Rong Hai (Yunnan Province) Mobile: (+86)15008719951    ,   
GAO, Rui Qiang (Inter-Mongolia SAR) Mobile: (+86)15847178974,    
XI, Zhong Qing (Nanjing City) Mobile: (+86)13776686557          
KE, Jian Cheng (Nanjing City) Mobile: (+86)15850554926      
REN, Jun Jun (Nanchang City) Mobile: (+86)13767158887      
WANG, Ya Qing (Jilin Province) Mobile: (+86)13894726370     
LI, Song Lin (Jilin Province) Mobile: (+86)13064465176     
LUO, Qin Jun (Sichuan Province) Tel: (+86)817-2515184
ZHENG,Yun(Sichuan Province) Mobile: (+86)13559949568              
JI, Wang (Dalian City, Liaoning Province) Mobile: (+86)15940925971
LI, Chao(Tianjin) Mobile: (+86)13072085730     
ZHOU, Lian Hong (Anqing Anhui Province) Mobile: (+86)13685568645   
HAN, Bing (Anhui Province) Tel: (+86)559-6534219       
ENG,Yi Shan (Anhui Province) Tel: (+86) 13275779355     
CHEN, Da Song(Anhui Province) Tel: (+86)563-2210350     
WANG, Wei Kang (Anhui Province) Mobile: (+86)13067635771       
WANG, Yang(Yichang City, Hubei Province) Mobile: (+86)13307203797 
QI, Chang Ling (Shandong Province)Tel: (+86)546-8597279       ,   
GU, Lu Lu (Guangdong Province) Mobile: (+86)13268018561 
PENG, Xu (Guangdong Province) Mobile: (+86)13533298544       
GUANG, Yu You (Guangdong Province)Tel: (+86)768-2252948       
LUO, Jian Bo (Guangdong Province) Mobile: (+86)13226449087      
JIANG, Jin (Guangzhou City, Guangdong Province) Mobile: (+86) 13535358871      
QIU, Yong Jin (Guangxi Province) ****2565332
PEI, Wei Chuan (Xuzhou City, Jiangsu Province) Mobile: (+86)13033539006    
PENG, Jin(Chengdu City, Sichuan Province) Mobile: (+86)13568819725; ?   
CHENG, Guang Hui (Xinjiang Province) Tel: (+86) 997-4960621     
LOU, Yan Hang (Hangzhou City, Zhejiang Province) Tel: (+86)469 5628422      ,   
LUO, Xiao Bo (Hangzhou City, Zhejiang Province) Mobile: (+86)13906527643    ,   
CAO, Shi Jie (Zhejiang Province) Tel: (+86)576-86814070    
YI, Sheng Lin (Guiling City, Guangxi Province) Mobile: (+86)13978302663      
SUN, Wei (Jiangsu Province) Mobile: (+86)13917698052      ,   
XIONG, Lu (Jiangxi Province)Tel: (+86) 795-7032879/7585069,   
LI, Guan Ping (Hebei Province)Tel: (+86)310-2326981    
CAI, Ya Li (Hebei Province)Tel: (+86)3118650280



INFORMATION IN CHINESE

红和平 - CHINA – PEACEPINK
WEB:  https://peacepink.ning.com/   http://groups.google.com/group/soleilmavis (IN CHINESE)          

Welcome to join 欢迎加入 https://peacepink.ning.com/
Here is a group for members who speak Chinese
以下是一个专门为说中文的受害者设的讨论组
https://peacepink.ning.com/group/chinese

受害博客
http://guopeixi167.blog.163.com/            http://mcvictimsworld.ning.com/profile/wixngpynodinb

CHINA – MINDCONTROL     http://worldvictimsofstalkingsupportunion.webs.com/     http://mindcontrol.com.cn/                  http://blog.sina.com.cn/u/2769498521

于精神侵害技现实存在亟需新的精神疾病 http://user.99114.com/225990/Cooperate_643954.html


PLEASE CONTACT US FOR FURTHER INFORMATION:-
Yours in the search for openness and respect for universal human rights
John Finch, 5/8 Kemp St, Thornbury, Vic 3071, Australia, TEL: 0424009627
EMAIL:
tijohnfinch@gmail.com,MCmailteam@gmail.com
FACEBOOK: http://www.facebook.com/john.finch.16547?ref=profile

TARGETED INDIVIDUALand a member of THE WORLDWIDE CAMPAIGN AGAINST ELECTRONIC TORTURE, ABUSE AND EXPERIMENTATION

 

Read more…

Edinburgh Zersetzung

"Loads of guys in Edinburgh have been put through it.", said angela d

"That shouldn't be getting talked about openly.", said pamela b.

'Decomposition' is the name given to the secret system of covert surveillance and harassment of targeted individuals in Edinburgh, that is designed to punish those targeted and in some cases 'make' the target into their attackers vision of the kind of person they believe they should be.

Although originating in communist East Germany under the name 'Zertsetzung', rather than being confined to history it seems that 'Zersetzung' (German speak for 'Decomposition') has been enhanced over time with developments in modern technology, including electronic surveillance, directed energy weapons and remote monitoring, and is now being used by corporations, private security contractors and governments across the globe.

'Decomposition' is a people and technology based system of harassment and is available to anyone with the right contacts and enough money to procure the use of it. There are people/organisations concurrently procuring the use of these services to stalk and harass people in Edinburgh, and the rest of the UK.

"It depends on what they've done.", said angela d "Instead of getting them back in a quick hit, they get them back slowly, over a long time, sometimes years.", she continued. "They call it a form of 'Capital' Punishment, if you mess around in Edinburgh, and are not being dealt with by the police, then they can target you."

Depending on what the targeted person has done, the objective is to 'decompose' or 'corrode' them over a longer period and make them suffer slowly for what they have supposedly done. The targets, usualy men, are chosen for a range of reasons that are not being dealt with by the law, for example, cheating on your wife/partner is one of the most common reasons for this happening in Edinburgh, and is the basis for the experiences that I outline in detail in the remainder of this blog.

I also believe targets can be chosen for historical instances of rape, domestic abuse, child abuse and child pornography that are not being processed by law. Scenarios which invoke a much more serious programme of harassment, and can result in a far more serious outcome for the individuals involved. I have not heard, but do expect that people put through this kind of process have been institutionalised and made to commit suicide.

"It's a bit different in Edinburgh.", said one guy. He was referring to the fact that, although the same strategy is used to destroy lives all over the world, that in Edinburgh it can also be a process used to 'make' people for the benefit of them and their family. In the process of the target being made they are harassed by certain groups, including a group made up of old friends and previous victims of the same strategy.

He was also referring to the fact that in Edinburgh, unlike in other parts of the world, targets are only given short bursts of 'cooking' and are not given a regular voice to hear inside their head. All over the internet you can find people being put through the same kind of thing but claiming to be hearing voices and getting 'cooked' inside 24 hours a day with their body burning.

In Edinburgh, based on the conversations I've heard, the use of this technology does not appear to make the targets hear regular voices, and they don't complain of being cooked inside on a regular basis. However, as mentioned before, it all depends on what the target has done, and I have heard of people who've been 'cooked' for a short while. One guy I've heard about woke up during the night and his brain was getting fried, feeling like his head had been "put in a microwave oven."

It's also a bit different in Edinburgh in terms of the fact that, for those being 'made' as part of the process, they are subjected to what I can only describe as an attempted 'Ghost Writing' experience, where their attackers try to manipulate them into doing certain pieces of writing or creativity in order to better themselves or to be provided to their company as 'gifts' in return for being made. I've heard of one person from one company being able to do one thing, and by all accounts it wasn't very good, so I'm not too sure how well that works.

"If they haven't done anything bad, then it's not much fun.", said pearl mc. Although not all of them, most of the people who participate 'on the ground' are women. Women who've either been cheated on, abused or raped in some way. Women who, because of what they have been subjected to, "foam at the mouth" given the opportunity to get their own back on someone, anyone, and can hide behind the fact that they have mind rapists on their side.

"Yes, I'm one of those werido's", claimed one woman. One of the women who was following a target was stopped by him and asked if she was, to quote, 'a Gang Stalking Weirdo', to which she was extremely happy to reply "Yes, I'm one of those weirdo's."

In Edinburgh it appears to be something that is participated in by a lot of hopeless cases, pathetic enough to be happy calling themselves a 'weirdo'. Women, and men, who are all too often extremely ugly or hideously fat. Most of them seem to lack a basic intelligence and are often vulnerable in some way, due to alcohol or drug dependency.

The information I provide on this blog is based on conversations heard at one particular company in Edinburgh who appear to have procured the use of this service for the purposes of punishing and then making their own staff, and includes anecdotes from what I've heard happening to victims, discussed by people who work at this company, including two people who were subjected to it.

************************************************************************************************

Over a period of five years I worked for a large financial organisation in Edinburgh, from here on referred to as xxxxxxxx xxxx.

During this time I heard numerous accounts (from people who work at this company) of how people who work at this company had been put through a secretive recruitment/training strategy that attempted to change them and ‘make’ them into what this company believe a man should be.

At the same time they also get punished for anything that they have done in their life that this company believe they should be punished for.

Some of the people subjected to this strategy by xxxxxxxx xxxx were made to leave the company before being ‘made’ to return again, and at the same time were given a substantial amount of money and a job for life when they did.

The problem is in relation to the organised harassment and mind raping that takes place as part of the process of this company ‘making’ them.

I list below a summary of the things that I’ve heard happen to the people subjected to this harassment strategy. Heard from people who actually work at xxxxxxxx xxxx:-

-They get spied on 24 hours a day, 7 days a week.
-They get followed wherever they go. Supermarket etc.
-They get ‘street theatre’, where people act out in public the things that the target has said in private in order to make the target aware they are being spied on 24/7. 
-They get brain washed so that thoughts and actions seem to coincide with external noises. E.g. Engines, banging noises, doors closing, the central heating going on/off, coughing etc.
-They get brain washed into having changes in facial expression in response to certain thoughts/actions. E.g. bottom lip dropping in certain scenarios.
-They get made to think that their wife can read their mind.
-They get zapping sensations (electric shocks) in their body in response to certain thoughts/actions.
-The get their brain ‘fried’ using microwave technology.
-They get brainwashed into analysing words/sentences in terms of their mnemonic or reverse mnemonics, in line with an altered alphabet. The altered alphabet = No vowels, B is B or D, C is C or K, D is D or B, F, G is G or J, H, J is J or G,K is K or C, L, M is M or W, N, P, No Q, R, S, T, No V, W is W or M, No X, No Y, No Z.
The resulting mnemonic then somehow being used to deliver a message in the form of a new word or sentence, or a command (possibly covertly).
-They get brainwashed into seeing flashing red or blue lights in front of their eyes to signify good or bad. (Although James C says that not everyone can see the lights.)
-Wherever they go they get emergency services sirens around them. Ambulances, Police Fire Brigade etc.
-They get followed around by parents with babies in buggies.
-They get their internet and phone monitored.
-They get covertly hypnotised and sensitized to the time, making them compelled to do things at certain times.
-They get covertly hypnotised and sensitized to colours, dates, numbers, people coughing, loud bangs etc, making them compelled to do things at certain times.
-They get set up for arrest. To quote Pearl M, “They even got him arrested”.
-Radio stations are used to send them messages. The message being dependant on the lyrics before or after the word ‘baby’ in the lyrics. The ‘baby’ reference is supposed to refer to the fact that the victims of the strategy (those getting made) get referred to as a ‘baby’, as they are supposedly meant to be getting taken in as part of ‘the family’. The music element of the strategy is dependant on sensitizing their target to be known by particular names. In the case of one victim who was being made, he was known by a number of names, such as 'Luke', 'Night', 'Baby', 'Son', 'House', and 'Bourne' among others. According to Pearl M, there are people at xxxxxxxx xxxx who are close with people who run radio stations. Songs are played in return for money that are directed by xxxxxxxx xxxx at their rape victim. xxxxxxxx xxxx supposedly also provide a ‘mum’ and a ‘dad’ to look after the baby. When the ‘baby’ is born they also have a ‘baby shower’ where all the other victims join in on a party for xxxxxxxx xxxx’s latest mind rape victim. To quote Pearl M, “Aye they were all smoking cigars and that, eh.”
-They get made to blink in response to certain thoughts/actions.
-They have their dreams manipulated (Lucid Dreaming).
–They get covertly hypnotised and made to scratch/itch in response to certain thoughts/actions.
-They get forced to smoke tobacco, for the purpose of forcing them to give up again.
-They get zapping/tingling sensations in their genitals and have forced arousals.
-They get brainwashed so that chewing noises coincide with thoughts appearing in the head.
-They get made to cough, once for a 'yes', twice for a 'no'.
-Their head gets made to shake.
-They get made to move the mouse cursor up and down to signify yes and side to side for no.
-They get made to itch in response to certain thoughts.
- They get made to shake objects up and down in time with certain thoughts/actions.
- Their head appears to sway up and down in response to certain thoughts/actions.
-They get made to sniff in line with certain speech/thoughts to signify them as bullshit.
-Their wife can be made sniff in line with their thoughts. E.g. The wife can be made to sniff in line with her husbands thoughts to signify them as bullshit. It's an illusion. The thoughts are forced into the husbands head, the wife is then forced to sniff at the same time. There is no mind reading, the wife does not know what the husband is thinking, and the only thoughts his attackers know are the ones they force into his head.
-They get made to hear noises. Usually alterations/distortion to existing noises.
-They get made to hit enter on the keyboard as another external noise clicks.
-They get itching under the right eye in suggestion that the target is 'crying'.
-They get itching under the left eye in suggestion that the people doing it are 'crying'.
-They get brainwashed into reading a news article to read certain words as an engine roars past outside.
-If they have cats their cats get electronically harassed to make their heads twitch, as if in response to their speech/actions.
-They get made to think of the word 'now' as certain things happen around them. 
-They get made to type 'now' just as an engine roars off outside. (The guy with the engine isn't involved.)
-They get made to forget something they were just thinking about.
-They get made to look at the clock just at it changes.
-They get made to think that their TV is talking to them. 
-They get made to think of things throughout the day, which then coincide with things on TV later that night.
-They get compelled to do things at certain times.
-They get songs 'beamed' into their heads to try and send them messages. The title 'Mind Rape FM' is a phrase given to the use of electronic weapons in order to beam songs into the heads of people. Not sure how this happens but songs appear in their heads supposedly.
-Their emotions are altered. They can be made to feel happy or sad.
-They get made to respond angrily to certain smells, colours and noises.

Each of these elements of torture and harassment are designed to slowly decompose the target and force them into degrading situations. The many degrading situations that I’ve heard the people at xxxxxxx xxxx talk about are:

• the guy from xxxxxxx xxxx who was made to…….Cover his hand in shit and walk about with it in a bag all day.
• the guy from xxxxxxx xxxx who was made to……Shower so much that his skin peeled off in large chunks. It was part of an attempt at suggestion through the song 'The Only Living Boy In New Cross - Carter USM' The lyrics "Take 5 or 6 hot baths and showers and come on home." were supposed to suggest to the guy that he was to take his daily showers at numbers 5 or 6 to make sure he didn't get Body Order from too much heat. As crazy as it sounds, this was part of his attackers vision of what would make him a better man. However, it's also a sick game as he didn't work that out and instead ended up taking 5 or 6 hot baths and showers each day! Which eventually made his skin peel off in large chunks!
• the guy from xxxxxxx xxxx who was made to……go and see a prostitute and ended up having to run home naked.
• the guy from xxxxxxx xxxx who was made to……shave all his hair off.
• the guy from xxxxxxx xxxx who was made to……resist food and ended up in hospital on a drip. If you notice, or know them, a few of the people on the list in this letter are quite thin. There’s a reason for that. They were tricked into resisting food.
• the guy from xxxxxxx xxxx who was made to……believe that he was talking to god.
• the guy from xxxxxxx xxxx who was made to……believe that the people who were raping his mind had a time machine.
• the guy from xxxxxxx xxxx who was made to……believe that he had a ‘bug’ or tracking device implanted into him. Declaring “I’m just glad I don’t have a bug stuck up my arse”, when he found out he was being 'remotely monitored' instead of being electronically implanted. Just a big joke to xxxxxxx xxxx supposedly, but the same mind rape trick is used across the globe to make people self-harm in an attempt to dig out a chip/implant that they’ve been tricked into believing was inside them. This guy was tricked into receiving a procedure on the NHS that he didn’t need.
• the guy from xxxxxxx xxxx who was made to……believe that his cats were talking to him.
• the guy from xxxxxxx xxxx who was made to……believe that his wife could read his mind.
• the guy from xxxxxxx xxxx who was made to……start drinking alcohol really bad.
• the guy from xxxxxxx xxxx who was made to……take drugs.
• the guy from xxxxxxx xxxx who was made to……stop speaking for a month.
• the guy from xxxxxxx xxxx who was made to……stop washing for 3 months.
• the guy from xxxxxxx xxxx who was made to……stick lego up his bum.
• the guy from xxxxxxx xxxx who was made to……stick a banana up his bum.
• the guy from xxxxxxx xxxx who was made to……sit on the toilet for 3 days.
• the guy from xxxxxxx xxxx who was made to……eat used lard.
• the guy from xxxxxxx xxxx who was made to……stay still for 24 hrs and pretend he was dead.
• the guy from xxxxxxx xxxx who was made to……drink his own urine and eat his own poop.

James C also declares an interest in regularly watching children’s TV, and whilst working at xxxxxxx xxxx, I’ve witnessed a colleague be harassed into dancing with a child at someone’s birthday party.

Apparently, there is also a guy at xxxxxxx xxxx called craig s who Pearl M claims is “Really into all that dark arts stuff”. One guy even claimed to have had his own dreams manipulated by craig.

Angela in Finance says, “If you don’t do it, they will force you to do it”. “If you still don’t do it then they make your life a living hell.” She also claims that when people have a baby at xxxxxxx xxxx that they get asked if they would like to use them to participate in the harassment strategy, for some reason.

Stuart and Leanne also participated in the conversation on this subject with Angela. They seemed to have an understanding of what goes on, and seemed to discuss of their being ‘gypsies’ and ‘celebrity mentalists/magicians’ involved.

I’ve worked at other companies in Edinburgh and had people making sly comments about ‘how weird a place it is to work’. I’ve worked for xxxxxxx xxxx myself and heard their own people talk about this strategy, calling it ‘Dodgy’ and ‘Shady’.
According to Pearl, James and Archie, xxxxxxx xxxx systematically ruin the life of the person they target, make sure they lose their home and make them move house a number of times. If the target is married they also force the target to split up from his wife. To quote Pearl M, “They were made to split up, but they are back together now, it’s alright now after they were given a few quid and that, eh”

It’s almost as though the people in search of the chicken soup for their soul at xxxxxxxx xxxx like to break their target until they have nothing. Meaning a much greater margin for feeling good about themself when they’re finally brave enough to ‘make’ them, and much tastier chicken soup for their rich and guilty souls when they do.

In each of the occasions listed above the targets were purportedly ‘made’ at the end of it, told what had been happening to them, given a large sum of cash and given a job for life at xxxxxxx xxxx (Those who accepted).

One guy was reported to have taken a bag of money home, after being ‘made’, and him and his wife were throwing it over their bed with excitement.

Supposedly one guy bought himself a petrol station with the money he received, another guy bought himself a car like james bond!

Some of the people at xxxxxxx xxxx who it’s been suggested have been 'made' by being put through this harassment strategy:

Andy K
Grant R
Archie Gladstone
James C
David A
David H
Raymond A
Craig L
Keith S
Keith R
Chris S

It would also appear that the people who get tricked into supporting the mind rape strategy are also told a pack of lies as a stratagem to hide the real methods behind it. The people involved get told stories of their being ‘Gypsies’ and ‘Mind Readers’ when in fact it’s covert hypnosis and the dark arts. To note, Covert Hypnosis is the process of hypnotising people covertly, without them knowing, i.e. when they are sleeping. They also get told that people go around with ear pieces in when in fact they are using Remote Neural Monitoring.

From what I’ve heard from people who work for xxxxxxx xxxx, ‘making someone’ appears to be a process that involves the use of ‘Gang Stalking’, ‘Covert Hypnosis’, Electronic Harassment, ‘Directed Energy Weapons’ and generally what is known as ‘The Dark Arts’ to rape the minds of the people targeted, in an attempt to manipulate/control them into what they believe they should be.

During my research on what I’ve heard the people of xxxxxxx xxxx say is happening in Edinburgh, I’ve found that the information I reviewed onhttp://www.stopeg.com resonates the most with what I’ve heard happening in Edinburgh, although, as the guy mentioned above said, "it's a bit different in Edinburgh.

Conclusion - England is 'The 51st State'. Edinburgh is 'Little England'. The big problem they have is that it's a cowardly system that relies on having cowards to join the group and participate in the harassment of the next target. Unfortunately for them, not everyone they pick to go through it is a coward, and not everyone wants to join the group.

Read more…

"This is a gripping read but a really difficult book to categorise because it’s so quirky. It is a terrifying story about the abuse technology by people who are prepared to extinguish the lives of others for fun, yet this is revealed through the opposite extreme, the silence of a Quaker meeting. The reader shares the experience and confusion of the protagonist, never quite sure what is real, and what is not, but desperately trying to discover the truth, before she is destroyed. It is scary, disturbing, mysterious, and darkly humorous. It certainly makes you think about the technological age we are in; a world where new and remote crimes seem to be light years ahead of the law and most of us live in ignorance – the silence in the title - of the risks, until potentially it is too late."

"I found this book one minute very disturbing, others funny. One minute I thought she was just insane, the next it was to easy to believe it could really be happening, felt that right to the end. Book very well written, draws you in very quickly. ...."

Read more…

DARPA Cortical Modem connects brain directly to computer for 'electronic telepathy and telekinesis'

http://www.ibtimes.co.uk/darpa-cortical-modem-connects-brain-directly-computer-electronic-telepathy-telekinesis-1488476

DARPA cortical modem augmented realityDARPA's cortical modem implant could restore sight loss and provide eyes with a heads-up displayGetty Images

A brain-computer interface has been developed by the US Defence Research Projects Agency (DARPA) that is capable of laying a heads-up display over a user's natural vision.

The "cortical modem" also holds the potential to cure sight loss and enable "electronic telepathy and telekinesis" according to noted futurist Peter Rothman, writing for H+ Magazine.

While still a long way from production, the direct neural interface (DNI) chip would be shaped like a coin, around 1cm wide, and could conceivably cost as little as $10 (£6.50).

As outlined at the Biology is Technology conference in Silicon Valley last week, the interface provides a direct link between the brain and an external device or software through manipulation of the visual cortex.

Phillip Alvelda, chief of DARPA's Biological Technologies, told the conference how the device could replace all virtual reality glasses, such as the Oculus Rift, by bypassing the visual sensory system entirely

DARPA Projects

The project builds on the work of Karl Deisseroth in the field of optogenetics, according to H+ Magazine which was in attendance at the California conference.

Optogenetics involves the controlling of light-responsive proteins within the brain through targeted light emission.

DARPA has led the way in a number of futurist and transhumanist projects, including a tiny implant that assists the body's organs in healing themselves when injured.

The secretive agency was established by the US Government in 1958 in response to the launch of Sputnik by the USSR.

DARPA described its purpose in a 2005 document as follows: "DARPA's original mission, established in 1958, was to prevent technological surprise like the launch of Sputnik, which signalled that the Soviets had beaten the US into space.

The mission statement has evolved over time. Today, DARPA's mission is still to prevent technological surprise to the US, but also to create technological surprise for our enemies."

Read more…

This helped me some

Calling on higher beings or benevolent ETs have helped me some. You still need to be careful because other beings imitate them. So, try calling on ones that are interested in free will and Universal Law like the Piladeans, the Orion Council of Light, or the Annunaki Council of Twelve. Think, for example: " I call on the Piladeans for help". Please don't ask me questions. I won't talk about my personal experience.

Read more…

attached DEW

Here's something that has temporarily worked to cut back on the 24 hour ultra/infrasonic DEW attached to my house.  Although this information may only be useful to a few TIs, it is a way to fight back and resist, instead of quiet isolated suffering we do most of the time.

Locate the most likely access places where perps may have attached ultrasonic transducers (look like little speakers) to one of the roof rafters or floor joists, and start beating on your support beam w/a heavy hammer.  If you see the device - REMOVE & DESTROY IT!  Otherwise, depending on how well the device is attached, hitting the beam w/a heavy hammer may either dislodge or disrupt the ultra/infrasonic vibrations and sonic effects you feel round the clock.

If you get the right supporting beam w/the hammer, you should notice the difference in short order.  Look for any decrease in vibration intensity as an indication you are on the right track.

Good luck

Read more…

Keeping a log until whenever....

     This is February,  and 2016 has merely begun-  yet I have a string of new 'hurts' for the year, in these New year days.  Yesterday, I turned a corner to leave a shopping aisle to move to another one...  there was a flash of shock-  came up my legs through my body and out my fingertips and brain in about 1 second or even less. Then the immediate pressure began on my eyes and emotions, "Cry, fool, cry it hurts" AS I stood shaken, and trying to recover, I began praying AS I ALWAYS DO IN THE INCIDENCE OF HELLISH HARASSMENT....And I was capable of not crying until the trauma passed.  A blessing indeed.

Trying to get into the vehicle and disembark from it, to go ANYWHERE, I am given painful knees, jelly legs and hurting toes. Trying to walk to shop, I am mostly short of breath, or coughing, or expelling phlegm from my bronchi. Tortured with bronchial asthma and sinusitus, I snort along.

Last two evenings, I had painful neck, tension, legs hurting and terrible jabs of stinging and itching until my sleep med put me out of the misery.  There is a splotch of RED skin, just above my left breast and just under the collar bone that looks like I have a DISEASE. It is burned there by laser or whatever they use, and is MADE to itch on their command. I put cortisone on it, and get a measure of relief for a few minutes but they can override most medication. Medication works on the nerves and senses in the area, but the perps can put such SUGGESTION in the mind, that you believe it is still bothering you.

Most of us realize that much of our 'thinking',  feeling sleepy,  depressed, or angry... is a lot of subliminal suggestion hitting our brain like a tsunami.  We know that we are being 'controlled' to the extent they can succeed.  But I am here to tell you,  it is NOT suggestion when a laser beam pops me in the head,  when they tip over the bile from the gall bladder or start stomach acid flowing until I burn like drinking drano:  and it is not mental suggestion when I am pushed and almost fall on steps or graded walkways, just because I am old and somewhat unstable in gait.  It is NOT suggestion when my nose begins to bleed all over my face and stops just as suddenly.  Nor is it them just 'telling me' when I am stirring dinner and my sinus is tweaked and a stream of hot mucus just drops out of a nostril  and I barely avoid throwing a dish away, (or maybe i have to).                                 Then some of my most hateful moments are running to the bathroom, while I am 'going' all down my legs. And it has happened in my bed, but I am NOT having a problem with kidneys or stool. Just the things he does to me.   All these are followed by laughing up my ear on the right side.
But there is the other side of the coin,  the times they work HARD FOR THE SEX, the reason they bother with their program on me.  They can put their arms around me, I feel them hug, and stretch me as I get the relaxing feeling of a great stretch and sigh.  All the time they are doing that, I have a large member placed in both orifices and pressed. It is NOT as pressuring as it would be if a person was here and it be literal, but it is powerfully suggestive.  My problem is NOT with having sex.... my problem is their attempt to force me to worship them, to hold them in the highest place in my life and drop ALL my family needs to do whatever they wish WHENEVER.  And yes,  I was told that ON THE FORUM where I met one of them,  "I am your SHAMAN"   "You are my slave"  This was supposed to be fun and a crazy crone thread... but In my heart I knew it went deeper than that.
I am not a part of any forum or chat room anymore. and the "Abuzz" was taken down from the NYT partly because of this kind of thing.  I wrote to the people and the paper, and they were not able to do anything about it but they got out of the business fast.
During this past evening, I was woken and my hands made to hurt horribly. It is like they are in a vise, and they press as hard as they can to just not break the bones.  My legs are jumping and my head hurting, and no amount of sleep med will allow me to sleep. So I am living with about 3 to 4 hours in the night and one hour to two in the day-- and my health is going down of course, due to lack of sleep.
I have prayed a lot for the Lord to have them KNOW I am deeply troubled and continuously busy with a daughter slowly dying and a lot of work to care for. But they pay little attention to such things.









Read more…