All Posts (12238)
SOLEILMAVIS, LET CONCENTRATE ON INFORMING YOUR ARMY FORCES, POLICE FORCE, AUTHORITY, GOVERMENT ABOUT THIS THREAT TO YOUR NATIONAL SECURITY !!! ONLY THESE CAN HELP YOU REVENGE YOUR 12-YEARS IN GRAVE !!!
SOLEILMAVIS, LET CONCENTRATE ON INFORMING YOUR ARMY FORCES, POLICE FORCE, AUTHORITY, GOVERMENT ABOUT THIS THREAT TO YOUR NATIONAL SECURITY !!! ONLY THESE CAN HELP YOU REVENGE YOUR 12-YEARS IN GRAVE !!!
SOLEILMAVIS, LET CONCENTRATE ON INFORMING YOUR ARMY FORCES, POLICE FORCE, AUTHORITY, GOVERMENT ABOUT THIS THREAT TO YOUR NATIONAL SECURITY !!! ONLY THESE CAN HELP YOU REVENGE YOUR 12-YEARS IN GRAVE !!!
SOLEILMAVIS, LET CONCENTRATE ON INFORMING YOUR ARMY FORCES, POLICE FORCE, AUTHORITY, GOVERMENT ABOUT THIS THREAT TO YOUR NATIONAL SECURITY !!! ONLY THESE CAN HELP YOU REVENGE YOUR 12-YEARS IN GRAVE !!!
SOLEILMAVIS, LET CONCENTRATE ON INFORMING YOUR ARMY FORCES, POLICE FORCE, AUTHORITY, GOVERMENT ABOUT THIS THREAT TO YOUR NATIONAL SECURITY !!! ONLY THESE CAN HELP YOU REVENGE YOUR 12-YEARS IN GRAVE !!!
...
https://www.facebook.com/HumanRightsWatch
You all understand ?
I am not endorsing Evian water here ( I don't even drink bottled water), but these cuties are the best! Doctored vid but still the best to me if you want to overlook the technology. I try to live my life and enjoy what I can while I can. So please, enjoy this vid if you love babies, especially ones that dance this cool.
Wish I danced like that when I was a babe myself, many rains ago. Best to you all.
http://blog.petflow.com/hands-down-this-is-the-cutest-most-fun-commercial-of-all-time-watch-this/
copy and paste if it will not open
www.eventjoy.com/e/los-angeles-event-speaker--matt-barasch-234471
IF THE SIGNAL IS WIRELESS AND SEEMS AS IF THEY SEE WHAT WE SEE THAN IT GOES BOTH WAY
MEANING
IF WE ARE BEEN FOLLOWED AND ATACKED WITH THIS DEVICE WIRELESSLY, AND THEY APARENTLY SEE WHAT WE VISUALIZE SEE AND KNOW WHEN THEY HAVE CAUSED US PAIN OR TORMENT, THEN THAT MEANS WE ARE ALSO TRANSMITING THAT INFORMATION FOR THEM TO SEE
THE QUESTION I HAVE FOR YOU GUYS IS THIS
CAN WE ALSO USE THAT TECHNOLOGY TO OUR ADVANTAGE?
AS I SEE IT, WE HAVE MANY OF US BEEN UNDER ATTACK BY THIS INDIVIDUALS,
HAS ANYONE TRIED TO FLIP IT AGAINST THEM?
SOME PEOPLE HEAR VOICES AS NIKI MINAJ AND ALSO THE GIRL ON THIS VIDEO https://www.youtube.com/watch?v=U9EdPvgb-Oo
IF THAT IS SO IF WE ARE ALSO TRANSMITING TO THEM, HAVE YOU GUYS TRIED TORMENTING THEM USING THE SAME SOUND METHODS YOU HEAR FROM THEM?
FRUSTRAIT THEM THE SAME WAY THEY FRUSTRAIT YOU
ALSO SINCE THEY ARE ALREADY TOMENTING US AND FOLLOWING US WATCHING WHAT WE DO, THEN TRY TO SPREAD THE INFORMATION EVERYWHERE, EVERY SOCIAL NETWORK, AND WARN THE MULTITUDES.
SIMPLY THROWING IDEAS THERE
In the State party, I and we tried everything I/we could, hoping:
1) The State party and politicians in charge can stop their ongoing acts of torture
2) Investigate our allegations of torture, or cruel, inhumane, degrading treatment com...mitted by anyone
However, they don’t do anything. So, their torture keeps going. They refuse to investigate any allegations.
In 2006, I filed complaint against The Scarborough Hospital’s psychiatrist with the College of Physicians and Surgeons of Ontario, who helped Toronto Police, Canadian Torturers commit “ torture”, “ medical torture” with The Scarborough Hospital.( I believe you have read some documents about my torture case.) They fabricated my medical report, and refused my request for my full medical record. He even stated: “ You don’t trust police. That testifies you are having mental problems.”
It took me so long, and in the end they refused me. This is their conspiracy. How did they refuse me? How did they violate my/our basic human rights regardless of facts and law? Please see The College’s decision:
“ The investigator reviewed the report and his concerns with him. Mr. Yan refused to provide the consents required for the College to undertake an investigation…”
Is this logical? Is this a lie? I filed a complaint. I refused to provide the consents. Actually, I singed and mailed it to them. Why did they do this? Some people were behind them. In the “ presentation of Canada’s Sixth Report to the Committee against Torture”, dated May 21, 2012, “ the State party promised on behalf of its all provinces to the Committee: “ Review bodies exist.” Do these or those bodies really review?
This is our situation. If you need their full decision letter, I will forward it to you. Thanks.
https://www.facebook.com/photo.php?fbid=654133807975247&set=a.170010383054261.50133.100001359027296&type=1&theater
or,
https://www.facebook.com/photo.php?fbid=654133974641897&set=o.84508919453&type=1&theater
Canadian torture victim
Robin Yan
This is a continuing dialogue on the Greenwald vs Hayden Munk Debates debate. This comment (modified in one sentence or two) was added on 05.06.2014.
----------------------------------------------------------------------------------------
What I wrote was intended, in part, to generate precisely this healthy dialogue. Had I been writing a paper, I would have elaborated much more on the idea…
Although an observation of the political state of affairs of many nations suggests that an inverse relationship that you reference (and which I appear to imply in my post) generally exists specifically in nations where liberties are seriously curtailed or close to non-existent, the appearance of this relationship is truly a facade. The ‘security’ achieved, and often cited as a justification for gross abuses in these nation-states, is in fact a perverted form since the ‘security’ practices seldom seek to, nor ever accomplish, political security for the individual. Instead, the perverted ‘security’ practices are used to secure the political and economic positions and agendas of the non-representative regimes or governments in non-democratic states. And to secure ‘secret’ agendas in governments, agencies, as well as other entities in democratic states who stand to benefit from suppressing the civil liberties.
The resultant societal product is something quite contorted. In both cases (democracies and non-representative states), loss of liberties due to practices that masquerade as serving the overall security do not lead to gains in security. In both cases, the people live in environments of fear and feelings of being under chronic a threat, from their own governments.
Civil liberties fall in the political security, an element in the framework, the stability of the social order (Buzzan et al), an erosion of liberties under the camouflage of security becomes itself, a threat - an internal threat - the very threat that, paradoxically, balanced security is intended to keep at bay, and it is the obligation of the citizenry, democracy or dictatorship, to address and correct.
Civil liberties cannot thrive in an environment that is devoid of security and security needs civil liberties to effectively function. One cannot exist without the other, hence my allusion to the mean.
Best to you.
Dear All
Have a look at this article
http://www.presstv.ir/detail/2014/05/02/360915/time-to-end-us-torture-once-and-for-all/
Then please contact the organisations involved.
Please send them your petition, information and/or torture and abuse case summaries -
THE PSYCHOLOGISTS FOR SOCIAL RESPONSIBILITY
tlong@psysr.org, info@psysr.org,
THE COALITION FOR AN ETHICAL PSYCHOLOGY
ssoldz@ethicalpsychology.org, sreisner@ethicalpsychology.org, bolson@ethicalpsychology.org, jmarrigo@ethicalpsychology.org, bwelch@ethicalpsychology.org, reidelson@ethicalpsychology.org, tbond@ethicalpsychology.org, coalitionfep@ethicalpsychology.org,
The aim of our activism is exposure of these crimes and weapons, and judicial and human rights intervention and protection.
Please tell all these organisations that this electronic torture, abuse and experimentation, and organized stalking, is a crime against humanity and that we need their humanitarian and legal assistance urgently.
The more petitions, information and torture and abuse case summaries they receive the better.
PLEASE CONTACT US FOR FURTHER INFORMATION:-
Yours in the search for openness and respect for universal human rights
John Finch, 5/8 Kemp St, Thornbury, Vic 3071, Australia, TEL: 0424009627
EMAIL: tijohnfinch@gmail.com,MCmailteam@gmail.com
FACEBOOK: http://www.facebook.com/john.finch.16547?ref=profile
GROUP FORUM: https://peacepink.ning.com/
TARGETED INDIVIDUAL and a member of THE WORLDWIDE CAMPAIGN AGAINST ELECTRONIC TORTURE, ABUSE AND EXPERIMENTATION
2. In the field of clinical psychology we have a number of different ways, kind of heuristics that we use to label things as abnormal or unhealth...y or troubling. And three of these characteristics are what we often call the three Ds: distress, dysfunction, and deviance. So, behaviors that cause the individual or others significant distress often get labeled as abnormal or unhealthy. Depression is a prime example, as we'll see when we talk about the characteristics of it. It's a miserable state of being; you're unhappy, you're sad, you may even feel so badly you want to kill yourself. And that very, very high level of distress is part of the reason why it's labeled as a mental disorder. Other mental disorders don't cause the individual distress, but they may cause other people distress. So, one example of this is something called "antisocial personality disorder," where the individual has no regard for the rights of other people, has no hesitation to steal or — steal from or hurt other people, has no empathy or sympathy for other people's feelings and so can inflict a lot of harm on other people and has absolutely no distress over this whatsoever. But this behavior causes other people distress, and that's one of the reasons why that's labeled an abnormal behavior or a mental health problem. The second general criterion is "dysfunction." If a set of behaviors prevents the person from functioning in daily life, then it might be labeled as abnormal or might end up being labeled as a mental health problem. Again, depression is a good example. People who are depressed often become completely non-functional. They can't get up and go to class; they can't go to work; they can't interact with their friends; they withdraw and become totally isolated socially. So, they might lose their job; they might flunk out of school. And this complete decline in functioning is one of the major reasons that we consider depression one of the most debilitating disorders. And then finally, "deviance," the behaviors or feelings are highly unusual. This is probably the most controversial of the three because it weighs, it is so heavily influenced by the social norms. What's deviant in one culture is not deviant in another culture. But if a set of behaviors is completely unacceptable to a culture, highly unusual, they're more likely to end up getting labeled as abnormal.
http://webcache.googleusercontent.com/search?q=cache%3AzjiDCx5kF0cJ%3Aoyc.yale.edu%2Ftranscript%2F325%2Fpsyc-110+&cd=2&hl=en&ct=clnk&gl=ca
COVERT OPERATIONS OF THE US... NATIONAL SECURITY AGENCY by John St Clair Akwei John St Clair Akwei From an article in Nexus Magazine April/May 96 from MindControlForums Website Editor: George Farquhar
1. THE NSA'S MISSION AND DOMESTIC INTELLIGENCE OPERATION
NSA personnel in the community usually have cover identities such as social workers, lawyers and business owners.
NSA DOMINT has the ability to assassinate US citizens covertly or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.
(FAILED TO APPEAR HERE)
The above symptoms highlight a fraction of the vast array of 2. NSA'S DOMESTIC ELECTRONIC SURVEILLANCE NETWORK
These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the US is a result of the NSA's Signals Intelligence (SIGINT) mission. The NSA's electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF (electromagnetic frequency) spectrum. This equipment was developed, implemented and kept secret in the same manner as other electronic warfare programs.
This is an integral part of the Domestic Intelligence network. The NSA's EMF equipment can tune in RF (remote frequency) emissions from personal computer circuit boards (while filtering out emissions from monitors and power sup- plies).
The RF emission from PC circuit boards contains digital information in the PC. Coded RF waves from the NSA's equipment can resonate PC circuits and change data in the PCs. Thus the NSA can gain wireless modem-style entry into any computer in the country for surveillance or anti-terrorist electronic warfare.
A subject's bioelectric field can be remotely detected, so subjects can be monitored anywhere they are.
With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person's brain-states and thoughts. The subject is then perfectly monitored from a distance. NSA personnel can dial up any individual in the country on the Signals Intelligence EMF scanning network and the NSA's computers will then pinpoint and track that person 24 hours a day.
The NSA can pick out and track anyone in the US. MIND CONTROL INFORMATION FEEDBACK PATHS: DISPARITY AND REPRESSION (FAILED TO APPEAR HERE)
3. NSA SIGNALS INTELLIGENCE USE OF EMF BRAIN STIMULATION
EMF Brain Stimulation has been in development since the MKULTRA program of the early 1950s, which included neurological research into radiation (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as "Radiation Intelligence", defined as, "information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation".
Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the US Government.
The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agreements to keep this technology secret.
NSA operatives can use this surreptitiously to put images into a surveillance subject's brain while they are in REM sleep for brain-programming purposes.
The NSA, Ft Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brains. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech, 3D sound and subliminal audio can be sent to the auditory cortex of the subject's brain (bypassing the ears), and images can be sent into the visual cortex. RNM can alter a subject's perceptions, moods and motor control.
(FAILED TO APPEAR HERE)
The above is a simple flowchart of Nuero-Electromagnetic Frequency Assaults showing methods that can be perpetuated by the Police and Military Intelligence Agencies toward Remote Mind Control Experiments, Behavioural Manipulation and Murder.
4. NATIONAL SECURITY AGENCY SIGNALS INTELLIGENCE ELECTRONIC BRAIN LINK TECHNOLOGY
NSA SIGINT can remotely detect, identify and monitor a person's bioelectric fields. The NSA's Signals Intelligence has the proprietary ability to monitor remotely and non-invasively information in the human brain by digitally decoding the evoked potentials in the 30-50 Hz, 5 milliwatt electromagnetic emissions from the brain.
Contained in the electromagnetic emission from the brain are spikes and patterns called "evoked potentials". Every thought, reaction, motor command, auditory event and visual image in the brain has a corresponding "evoked potential" or set of "evoked potentials". The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject's brain.
It is used by a limited number of agents in the US Intelligence Community.
( FAILED TO APPEAR HERE)
The above is a simple flowchart of Nuero-Electromagnetic Frequency Assaults showing methods that can be perpetuated by the Police and Military Intelligence Agencies toward
5. [NO HEADING IN ORIGINAL DOCUMENT]
That frequency is then modulated in order to impose information in that specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band. (See Table 1 below)
This modulated information can be put into the brain at varying intensities from subliminal to perceptible. Each person's brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person's brain at the frequency of another person's auditory cortex would result in that audio information not being perceived.
They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated.
This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.
( FAILED TO APPEAR HERE)
6. NSA TECHNIQUES AND RESOURCES
A system for inexpensive implementation of these operations allows for thousands of persons in every community to be spied on constantly by the NSA.
NSA's RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals, and can send messages through the nervous systems to affect their performance. RNM can electronically identify individuals and track them anywhere in the US.
This equipment is on a network and is used for domestic intelligence operations, government security and military base security, and in case of bioelectric warfare.
This is an outgrowth of CIA pharmapsychology (psychopharmacology).
Not known to the public at all, yet complete and thorough implementation of this method of domestic intelligence has been in place since the early 1980s.
Editor's Note: I tried ringing Mr Akwei to find out what was the out-come, if any, of his court case. He firmly but kindly told me that he could not speak about anything to do with the case over the phone and hung up. A subsequent conversation of similar length resulted in the information that he did not wish his address or phone number published with this article. So, if we hear of any developments, we'll let you know.
An example of EMF Brain Stimulation Table 1
RESOURCES When no action was taken against the NSA employees, I researched the Intelligence Community electronic surveillance technology involved and discovered the following publications.
|
The police in my condo and Chinese couple, my neighbor listen up:
You will be responsible for what you are doing.
This Chinese couple, their status was so vague.They both don't work over 8 years. They are not only helping Toronto police ,Canadian torturers torture me, but they are harassing their downstairs neighbor, who was over 65. They let their two kids jump and run over his head and over his room . He talked to the Condo's office. This couple keep going. Why? There are two policemen in our condo.