All Posts (12234)

Sort by

SOLEILMAVIS, LET CONCENTRATE ON INFORMING YOUR ARMY FORCES, POLICE FORCE, AUTHORITY, GOVERMENT ABOUT THIS THREAT TO YOUR NATIONAL SECURITY !!! ONLY THESE CAN HELP YOU REVENGE YOUR 12-YEARS IN GRAVE !!!

SOLEILMAVIS, LET CONCENTRATE ON INFORMING YOUR ARMY FORCES, POLICE FORCE, AUTHORITY, GOVERMENT ABOUT THIS THREAT TO YOUR NATIONAL SECURITY !!! ONLY THESE CAN HELP YOU REVENGE YOUR 12-YEARS IN GRAVE !!!

SOLEILMAVIS, LET CONCENTRATE ON INFORMING YOUR ARMY FORCES, POLICE FORCE, AUTHORITY, GOVERMENT ABOUT THIS THREAT TO YOUR NATIONAL SECURITY !!! ONLY THESE CAN HELP YOU REVENGE YOUR 12-YEARS IN GRAVE !!!

SOLEILMAVIS, LET CONCENTRATE ON INFORMING YOUR ARMY FORCES, POLICE FORCE, AUTHORITY, GOVERMENT ABOUT THIS THREAT TO YOUR NATIONAL SECURITY !!! ONLY THESE CAN HELP YOU REVENGE YOUR 12-YEARS IN GRAVE !!!

SOLEILMAVIS, LET CONCENTRATE ON INFORMING YOUR ARMY FORCES, POLICE FORCE, AUTHORITY, GOVERMENT ABOUT THIS THREAT TO YOUR NATIONAL SECURITY !!! ONLY THESE CAN HELP YOU REVENGE YOUR 12-YEARS IN GRAVE !!!

...

Read more…

A Cute Vid to Watch...(Relaxation)

I am not endorsing Evian water here ( I don't even drink bottled water), but these cuties are the best! Doctored vid but still the best to me if you want to overlook the technology. I try to live my life and enjoy what I can while I can. So please, enjoy this vid if you love babies, especially ones that dance this cool.

Wish I danced like that when I was a babe myself, many rains ago. Best to you all.

http://blog.petflow.com/hands-down-this-is-the-cutest-most-fun-commercial-of-all-time-watch-this/

Read more…
Ok here it is, it's all about money, power and shutting people up. Make them scared to speak out. You work hard to keep me a prisoner in a very negative environment until I kill myself but THAT WIll NEVER GONNA HAPPEN. I am still strongly standing my ground.
Read more…

Who is doing it??

Secret society members ( as in my neighborhood : 42 rue Sibuet/ Picpus Paris 12) who work hand to hand with the corrupt elements from army, secret agencies ( French FBI), local police ( the ones in my area know exactly what's going on but acted the opposit),They first black list you ( corrupt Romanian ones did it and sent the corrupt bogus file to their friends in France). They pretend you are a threat to the others, a terrorist. It gives them the right to stalk, torture, put you in psychiatry and destroy you life under the guise of national security. What the criminal people in my area have to do with my case? Why are they so in? Who gives the neighbors the very high tech military devices to burn me a live 24/7 with no fear to be arrested? Who protect them? Fed up with this shit
Read more…

Local mafia

Being targeted has nothing to do with "national security". It's all about making money ( a lot) once they corrupt secret agency/law enforcement/ military and the mafia secret society members managed to get your name on the hit list. You only need to meet the wrong person in the wrong place ( I was first targeted in Romania then the worse came while in France. Here in Paris it seems every one has sold himself to the criminals. They monitor, torture and stalk me non stop.If it was not the shady gov who targets me, if it was a real investigation then things should have stopped long time ago simply because the truth would come stating that I am a normal citizen who wants to care about my life PERIOD, but the reality is that THEY DON'T CARE about you. Their ultimate Goal is your body, they want to use your body as a laboratory monkey and make a lot of money out of it.They are so evil.
Read more…

Did The Scarborough Hospital and its psychiatrist conspired with Toronto Police and Canadian torturers to commit “medical torture”? Did the College of Physicians and Surgeons of Ontario lie to dismiss your complaint?   How is it possible?
 
Here you are, Page 3 of  decision letter from the College of Physicians and Surgeons of Ontario. You have seen other part of its decision letter.
 
1) “As already noted, he refused to consent to the release of his medical record.”
 
2) “He sought access to any voice recording of the medical examination that may exist.”
 
3) “Dr. Choy provided a letter of response dated April 28, 2008. He noted that his response was restricted due to the lack of the consent.”
 
4)    “ The Committee notes that, without consent…” I filed a complaint against The Scarborough Hospital and its psychiatrist who committed “medical torture”. I refused them both, the College and the psychiatrist? Am I having problem? Or, they are having problem? This was the way they refused my request for the access to my full medical record. This was the way they dismissed my complaint against the doctor who committed medical torture. This is the way they commit systematic torture.
 
 
 
Canadian torture victim Robin Yan
Read more…

IF THE SIGNAL IS WIRELESS

IF THE SIGNAL IS WIRELESS AND SEEMS AS IF THEY SEE WHAT WE SEE THAN IT GOES BOTH WAY

MEANING

IF WE ARE BEEN FOLLOWED AND ATACKED WITH THIS DEVICE WIRELESSLY, AND THEY APARENTLY SEE WHAT WE VISUALIZE SEE AND KNOW WHEN THEY HAVE CAUSED US PAIN OR TORMENT, THEN THAT MEANS WE ARE ALSO TRANSMITING THAT INFORMATION FOR THEM TO SEE

THE QUESTION I HAVE FOR YOU GUYS IS THIS

CAN WE  ALSO USE THAT TECHNOLOGY TO OUR ADVANTAGE?

AS I SEE IT, WE HAVE MANY OF US BEEN UNDER ATTACK BY THIS INDIVIDUALS,

HAS ANYONE TRIED TO FLIP IT AGAINST THEM?

SOME PEOPLE HEAR VOICES AS NIKI MINAJ AND ALSO THE GIRL ON THIS VIDEO https://www.youtube.com/watch?v=U9EdPvgb-Oo

IF THAT IS SO IF WE ARE ALSO TRANSMITING TO THEM, HAVE YOU GUYS TRIED TORMENTING THEM USING THE SAME SOUND METHODS YOU HEAR FROM THEM?

FRUSTRAIT THEM THE SAME WAY THEY FRUSTRAIT YOU

ALSO SINCE THEY ARE ALREADY TOMENTING US AND FOLLOWING US WATCHING WHAT WE DO, THEN TRY TO SPREAD THE INFORMATION EVERYWHERE, EVERY SOCIAL NETWORK, AND WARN THE MULTITUDES.

SIMPLY THROWING IDEAS THERE 

Read more…

In the State party, I and we tried everything I/we could, hoping:

1) The State party and politicians in charge can stop their ongoing acts of torture
  2) Investigate our allegations of torture, or cruel, inhumane, degrading treatment com...mitted by anyone

However, they don’t do anything. So, their torture keeps going. They refuse to investigate any allegations.

In 2006, I filed complaint against The Scarborough Hospital’s psychiatrist with the College of Physicians and Surgeons of Ontario, who helped Toronto Police, Canadian Torturers commit “ torture”, “ medical torture” with The Scarborough Hospital.( I believe you have read some documents about my torture case.) They fabricated my medical report, and refused my request for my full medical record. He even stated: “ You don’t trust police. That testifies you are having mental problems.”

It took me so long, and in the end they refused me. This is their conspiracy. How did they refuse me? How did they violate my/our basic human rights regardless of facts and law? Please see The College’s decision:

“ The investigator reviewed the report and his concerns with him. Mr. Yan refused to provide the consents required for the College to undertake an investigation…”


Is this logical? Is this a lie? I filed a complaint. I refused to provide the consents. Actually, I singed and mailed it to them. Why did they do this? Some people were behind them. In the “ presentation of Canada’s Sixth Report to the Committee against Torture”, dated May 21, 2012, “ the State party promised on behalf of its all provinces to the Committee: “ Review bodies exist.” Do these or those bodies really review?


This is our situation. If you need their full decision letter, I will forward it to you. Thanks.


https://www.facebook.com/photo.php?fbid=654133807975247&set=a.170010383054261.50133.100001359027296&type=1&theater

or,


https://www.facebook.com/photo.php?fbid=654133974641897&set=o.84508919453&type=1&theater




Canadian torture victim




Robin Yan
 

Read more…

This is a continuing dialogue on the Greenwald vs Hayden Munk Debates debate. This comment (modified in one sentence or two) was added on 05.06.2014.

----------------------------------------------------------------------------------------

What I wrote was intended, in part, to generate precisely this healthy dialogue. Had I been writing a paper, I would have elaborated much more on the idea…

Although an observation of the political state of affairs of many nations suggests that an inverse relationship that you reference (and which I appear to imply in my post) generally exists specifically in nations where liberties are seriously curtailed or close to non-existent, the appearance of this relationship is truly a facade. The ‘security’ achieved, and often cited as a justification for gross abuses in these nation-states, is in fact a perverted form since the ‘security’ practices seldom seek to, nor ever accomplish, political security for the individual. Instead, the perverted ‘security’ practices are used to secure the political and economic positions and agendas of the non-representative regimes or governments in non-democratic states. And to secure ‘secret’ agendas in governments, agencies, as well as other entities in democratic states who stand to benefit from suppressing the civil liberties.

The resultant societal product is something quite contorted. In both cases (democracies and non-representative states), loss of liberties due to practices that masquerade as serving the overall security do not lead to gains in security. In both cases, the people live in environments of fear and feelings of being under chronic a threat, from their own governments.

Civil liberties fall in the political security,  an element in the framework, the stability of the social order (Buzzan et al), an erosion of liberties under the camouflage of security becomes itself, a threat - an internal threat -  the very threat that, paradoxically,  balanced security is intended to keep at bay, and it is the obligation of the citizenry, democracy or dictatorship, to address and correct.

 

Civil liberties cannot thrive in an environment that is devoid of security and security needs civil liberties to effectively function. One cannot exist without the other, hence my allusion to the mean.

Best to you.

Read more…

Dear All

Have a look at this article

http://www.presstv.ir/detail/2014/05/02/360915/time-to-end-us-torture-once-and-for-all/

Then please contact the organisations involved.

Please send them your petition, information and/or torture and abuse case summaries -

THE PSYCHOLOGISTS FOR SOCIAL RESPONSIBILITY
tlong@psysr.org, info@psysr.org,

THE COALITION FOR AN ETHICAL PSYCHOLOGY
ssoldz@ethicalpsychology.org, sreisner@ethicalpsychology.org, bolson@ethicalpsychology.org, jmarrigo@ethicalpsychology.org, bwelch@ethicalpsychology.org, reidelson@ethicalpsychology.org, tbond@ethicalpsychology.org, coalitionfep@ethicalpsychology.org,

The aim of our activism is exposure of these crimes and weapons, and judicial and human rights intervention and protection.

Please tell all these organisations that this electronic torture, abuse and experimentation, and organized stalking, is a crime against humanity and that we need their humanitarian and legal assistance urgently.

The more petitions, information and torture and abuse case summaries they receive the better.

PLEASE CONTACT US FOR FURTHER INFORMATION:-
Yours in the search for openness and respect for universal human rights
John Finch, 5/8 Kemp St, Thornbury, Vic 3071, Australia, TEL: 0424009627
EMAIL: tijohnfinch@gmail.com,MCmailteam@gmail.com
FACEBOOK: http://www.facebook.com/john.finch.16547?ref=profile
GROUP FORUM: https://peacepink.ning.com/

TARGETED INDIVIDUAL and a member of THE WORLDWIDE CAMPAIGN AGAINST ELECTRONIC TORTURE, ABUSE AND EXPERIMENTATION

Read more…

1. First of all, there is no biological test for any of the known mental disorders right now.

2. In the field of clinical psychology we have a number of different ways, kind of heuristics that we use to label things as abnormal or unhealth...y or troubling. And three of these characteristics are what we often call the three Ds: distress, dysfunction, and deviance. So, behaviors that cause the individual or others significant distress often get labeled as abnormal or unhealthy. Depression is a prime example, as we'll see when we talk about the characteristics of it. It's a miserable state of being; you're unhappy, you're sad, you may even feel so badly you want to kill yourself. And that very, very high level of distress is part of the reason why it's labeled as a mental disorder. Other mental disorders don't cause the individual distress, but they may cause other people distress. So, one example of this is something called "antisocial personality disorder," where the individual has no regard for the rights of other people, has no hesitation to steal or — steal from or hurt other people, has no empathy or sympathy for other people's feelings and so can inflict a lot of harm on other people and has absolutely no distress over this whatsoever. But this behavior causes other people distress, and that's one of the reasons why that's labeled an abnormal behavior or a mental health problem. The second general criterion is "dysfunction." If a set of behaviors prevents the person from functioning in daily life, then it might be labeled as abnormal or might end up being labeled as a mental health problem. Again, depression is a good example. People who are depressed often become completely non-functional. They can't get up and go to class; they can't go to work; they can't interact with their friends; they withdraw and become totally isolated socially. So, they might lose their job; they might flunk out of school. And this complete decline in functioning is one of the major reasons that we consider depression one of the most debilitating disorders. And then finally, "deviance," the behaviors or feelings are highly unusual. This is probably the most controversial of the three because it weighs, it is so heavily influenced by the social norms. What's deviant in one culture is not deviant in another culture. But if a set of behaviors is completely unacceptable to a culture, highly unusual, they're more likely to end up getting labeled as abnormal.

http://webcache.googleusercontent.com/search?q=cache%3AzjiDCx5kF0cJ%3Aoyc.yale.edu%2Ftranscript%2F325%2Fpsyc-110+&cd=2&hl=en&ct=clnk&gl=ca
Read more…

COVERT OPERATIONS OF THE US...

NATIONAL SECURITY AGENCY

(NSA)
                                                                         

by John St Clair Akwei

John St Clair Akwei
vs
National Security Agency
Ft George G. Meade, MD, USA
(Civil Action 92-0449)
 

From an article in Nexus Magazine April/May 96

from MindControlForums Website

Editor:  George Farquhar
    Project Freedom 
  

 A lawsuit filed against the U.S. National Security Agency reveals a frightening array of technologies and programs designed to keep tabs on individuals.

John St Clair Akwei
vs
National Security Agency
Ft George G. Meade, MD, USA
(Civil Action 92-0449) 

The following document comprises evidence for a lawsuit filed at the U.S. Courthouse in Washington, DC, by John St Clair Akwei against the National Security Agency, Ft George G. Meade, Maryland (Civil Action 92-0449), constitutes his knowledge of the NSA's structure, national security activities proprietary technologies and covert operations to monitor individual citizens Ed.

   1. THE NSA'S MISSION AND DOMESTIC INTELLIGENCE OPERATION

 

  •   Communications Intelligence (COMINT)
      Blanket   coverage of all electronic communications in the US and the world to ensure   national security.  The NSA at Ft   Meade, Maryland has had the most advanced computers in the world   since the early 1960s. NSA technology is developed and implemented in secret   from private corporations, academia and the general public.
       
  •   Signals Intelligence (SICINT)
    The Signals Intelligence mission  of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping   into computers and track persons with the electrical currents in their bodies.   Signals Intelligence is based on fact that everything in the   environment with an electric current in it has a magnetic flux around it   which gives off EMF waves. The NSA/DoD [Department of Defense]   developed proprietary advanced digital equipment which can remotely analyze   all objects whether manmade or organic, that have electrical activity.

       
  •   Domestic Intelligence (DOMINT) 
     
    The NSA   has records on all US citizens. The NSA gathers information on US citizen who   might be of interest to any of the over 50,000   NSA agents (HUMINT). These agents are authorized by executive   order to spy on anyone. The NSA has a permanent national security   anti-terrorist surveillance network in place. This surveillance network is   completely disguised and hidden from the public.


Tracking individuals in the US is easily and cost-effectively implemented   with NSA's electronic surveillance network. This network (DOMINT)   covers the entire US, involves tens of thousands of NSA personnel, and tracks   millions of persons simultaneously . Cost-effective implementation of   operations is assured by NSA computer technology designed to minimize   operations costs. NSA personnel serve in quasi-public positions in their   communities and run cover businesses and legitimate businesses that can   inform the intelligence community of persons they would want to track.

 

NSA personnel in the community   usually have cover identities such as social workers, lawyers and  business       owners. 

  •   Individual Citizens Occasionally Targeted for Surveillance by Independently Operating NSA   Personnel


NSA personnel can control the lives of hundreds of thousands of individuals in the US by using the NSA's domestic intelligence network and cover businesses. The operations independently   run by them can sometimes go beyond the bounds of law.  Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen.

 

NSA DOMINT has the ability to assassinate US citizens  covertly or run covert psychological control operations to cause   subjects to be diagnosed with ill mental health.

         

(FAILED TO APPEAR HERE)

 

The above symptoms highlight a fraction of the vast array of
  Neuro-Electromagnetic Frequency Assaults perpetuated by the Police and
  Military Intelligence Agencies toward
  Remote Mind Control Experiments, Behavioral Manipulation and Murder.
 
 

 2. NSA'S DOMESTIC   ELECTRONIC SURVEILLANCE NETWORK
   
 As of the early 1960s, the most advanced computers in the world were at the NSA,   Ft Meade. Research breakthroughs   with these computers were kept for the NSA. At the present time the NSA has   nanotechnology computers that are 15 years ahead of present computer   technology. The NSA obtains blanket coverage of information in the US by   using advanced computers that use artificial intelligence to screen all   communications, regardless of medium, for key words that should be brought to   the attention of NSA agents/cryptologists.

 

These computers monitor all   communications at the transmitting and receiving ends. This blanket coverage   of the US is a result of the NSA's   Signals Intelligence (SIGINT) mission. The NSA's electronic surveillance network   is based on a cellular arrangement of devices that can monitor the entire EMF   (electromagnetic frequency) spectrum. This equipment was developed,   implemented and kept secret in the same manner as other electronic warfare   programs.

 

  •   Signals Intelligence Remote   Computer Tampering


The NSA keeps track of all PCs and other computers sold in the US.

 

This is an integral part of the   Domestic Intelligence network.   The NSA's EMF equipment can tune  in RF (remote frequency) emissions from personal computer circuit   boards (while filtering out emissions from monitors and power sup- plies).

 

The RF emission from PC circuit   boards contains digital information in the PC. Coded RF waves from the NSA's   equipment can resonate PC circuits and change data in the PCs. Thus the NSA   can gain wireless modem-style entry into any computer in the country for   surveillance or anti-terrorist electronic warfare.
   

  •   Detecting EMF Fields in Humans for Surveillance

 

A  subject's bioelectric field can be remotely detected, so subjects can be   monitored anywhere they are.

 

With special EMF   equipment NSA cryptologists   can remotely read evoked potentials (from EEGs).  These can be   decoded into a person's brain-states and thoughts.  The subject is then perfectly monitored from   a distance.  NSA personnel can dial up   any individual in the country on the Signals Intelligence EMF scanning   network and the NSA's computers will then pinpoint and track that  person 24 hours a day.

 

The NSA can pick out and track anyone in the US.     

MIND CONTROL INFORMATION FEEDBACK PATHS:  DISPARITY AND REPRESSION

(FAILED TO APPEAR HERE)

   

3. NSA SIGNALS INTELLIGENCE USE OF EMF BRAIN STIMULATION
 

  NSA Signals Intelligence   uses EMF Brain Stimulation   for Remote Neural Monitoring   (RNM) and Electronic Brain Link (EBL).

 

EMF Brain Stimulation has been in development since  the MKULTRA program of the early 1950s, which   included neurological research into radiation (non-ionizing EMF) and   bioelectric research and development.  The   resulting secret technology is categorized at the National Security   Archives as "Radiation Intelligence", defined as,

"information   from unintentionally emanated electromagnetic waves in the environment, not   including radioactivity or nuclear detonation".

 

Signals Intelligence implemented and kept this  technology secret in the same manner as other electronic warfare programs of  the US Government.

 

The NSA monitors available  information about this technology and withholds scientific research from the  public. There are also international intelligence agreements to keep this  technology secret. 
  
The NSA has proprietary electronic equipment that analyze electrical activity  in humans from a distance. NSA computer generated brain mapping can   continuously monitor all of the electrical activity in the brain   continuously.  The NSA records and decode individual brain maps (of hundreds   of thousands of persons) for national security purposes.  EMF Brain Stimulation is also secretly used by the military for  brain-to-computer link (in military fighter aircraft, for example). 

For electronic surveillance purposes, electrical activity in the speech  center of the brain can be translated into the subject's verbal thoughts. RNM  can send encoded signals to the brain's auditory cortex, thus allowing audio   communications direct to the brain (bypassing the ears). NSA operatives can  use this covertly to debilitate subjects by simulating auditory  hallucinations characteristic of paranoid schizophrenia.
 
  
Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject's brain and  show images from the subject's brain on a video monitor.  NSA operatives see   what the surveillance subject's eyes are seeing. Visual memory can  also be seen. RNM can send images direct to the visual cortex,  bypassing the eyes and optic nerves.

 

NSA operatives can use this  surreptitiously to put images into a surveillance subject's brain while  they are in REM sleep for brain-programming purposes.

 

  •   Capabilities of NSA Operatives Using RNM


There  has been a Signals Intelligence network in the US since the 1940s.

 

The NSA, Ft Meade has in place a vast two-way wireless RNM  system which is used to track subjects and non-invasively monitor  audio-visual information in their brains.  This is all done with no  physical contact with the subject.  RNM is the ultimate method of surveillance and domestic intelligence.  Speech, 3D sound and subliminal   audio can be sent to the auditory cortex of the subject's brain (bypassing the ears), and images can be sent into the visual cortexRNM can  alter a subject's perceptions, moods and motor control. 

Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community.  RNM allows for a complete  audio-visual brain-to-brain link or brain-to-computer link.

 

(FAILED TO APPEAR HERE)

 

The above is a simple flowchart of Nuero-Electromagnetic Frequency   Assaults

showing methods that can be perpetuated by the Police and Military   Intelligence Agencies

toward Remote Mind Control Experiments, Behavioural Manipulation and   Murder.
   

  

4. NATIONAL   SECURITY AGENCY SIGNALS INTELLIGENCE ELECTRONIC BRAIN LINK TECHNOLOGY

 

NSA SIGINT can remotely detect, identify   and monitor a person's bioelectric fields. 

The NSA's Signals Intelligence   has the proprietary ability to monitor remotely and non-invasively   information in the human brain by digitally decoding the evoked   potentials in the 30-50 Hz, 5 milliwatt electromagnetic emissions from the   brain. 
  
Neuronal activity in the brain creates a shifting electrical pattern that has   a shifting magnetic flux. This magnetic flux puts out a constant 30-50 Hz, 5   milliwatt electromagnetic (EMF) wave.

 

Contained in the  electromagnetic emission from the brain are spikes and patterns called  "evoked potentials". Every thought, reaction, motor command,   auditory event and visual image in the brain has a corresponding "evoked  potential" or set of "evoked potentials". The EMF emission  from the brain can be decoded into the current thoughts, images and sounds in   the subject's brain. 
  
NSA SIGINT uses EMF-transmitted   Brain Stimulation as a communications system to transmit   information (as well as nervous system messages) to intelligence  agents and also to transmit to the brains of covert operations  subjects (on a non-perceptible level). 
  
EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger  evoked potentials (events) in the brain, thereby forming sound and visual  images in the brain's neural circuits. EMF Brain Stimulation can also change  a person's brain-states and affect motor control
  
Two-way electronic Brain Link is done by remotely monitoring neural   audio-visual information while transmitting sound to the auditory cortex  (bypassing the ears) and transmitting faint images to the visual cortex  (bypassing the optic nerves and eyes). The images appear as floating 2D  screens in the brain. 
  
Two-way electronic Brain Link has become the ultimate communications  system for CIA/NSA personnel. Remote neural monitoring (RNM, remotely  monitoring bioelectric information in the human brain) has become the ultimate  surveillance system.

 

It is used by a limited number   of agents in the US Intelligence Community.

 

( FAILED TO APPEAR HERE)

 

The above is a simple flowchart of Nuero-Electromagnetic Frequency   Assaults

showing methods that can be perpetuated by the Police and Military   Intelligence Agencies toward
  Remote Mind Control Experiments, Behavioral Manipulation and Murder.
   

  

5. [NO HEADING IN   ORIGINAL DOCUMENT] 
  

RNM requires decoding the  resonance frequency of each specific brain area.

 

That frequency is then   modulated in order to impose information in that specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz.   Only NSA Signals Intelligence modulates signals in this frequency  band. (See Table 1 below)

 

This modulated information can  be put into the brain at varying intensities from subliminal to perceptible.   Each person's brain has a unique set of bioelectric resonance/entrainment frequencies.  Sending audio information to a person's brain at the frequency  of another person's auditory cortex would result in that audio information  not being perceived. 
  
The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome   group at the NSA, Ft Meade.
  
 They used RNM 3D sound  direct to the brain to harass the Plaintiff from October 1990 to May 1991. 
  
 As of 5/91 they have had two-way RNM communications with the Plaintiff and  have used RNM to attempt to incapacitate the Plaintiff and hinder the  Plaintiff from going to the authorities about their activities against the Plaintiff in the last 12 years.  The Kinnecome group has about 100  persons working 24 hours a day at Ft Meade.

 

They have also brain-tapped  persons the Plaintiff is in contact with to keep the Plaintiff isolated.  

 

This is the first time ever  that a private citizen has been harassed with RNM and has been able to bring   a lawsuit against NSA personnel misusing this intelligence operations  method.

 

( FAILED TO APPEAR HERE)

 

click above image

 

  

6. NSA TECHNIQUES   AND RESOURCES 
  
Remote monitoring/tracking of individuals in any location, inside any  building, continuously, anywhere in the country.

 

A system for inexpensive  implementation of these operations allows for thousands of persons in every  community to be spied on constantly by the NSA.

 

  •    Remote RNM Devices

 

NSA's   RNM equipment remotely reads the evoked potentials (EEGs) of the human   brain for tracking individuals, and can send messages through the nervous  systems to affect their performance.  RNM can electronically identify  individuals and track them anywhere in the US.

 

This equipment is on a network  and is used for domestic intelligence operations, government security and  military base security, and in case of bioelectric warfare.  

  •   Spotters and Walk-Bys in   Metropolitan Areas


Tens of thousands of persons in each area working as spotters and   neighbourhood/business place spies (sometimes unwittingly) following  and checking on subjects who have been identified for covert control  by NSA personnel
  
Agents working out of offices can be in constant communication with  spotters who are keeping track of the NSA's thousands of subjects in  public. NSA agents in remote offices can instantly identify  (using~ RNM) any individual spotted in public who is in contact with  surveillance subject.    

  •   Chemicals and Drugs into  Residential Buildings with Hidden NSA Installed and Maintained Plastic   Plumbing lines.


The NSA has kits for running  lines into residential tap water and air ducts of subjects for the delivery  of drugs (such as sleeping gas or brainwashing-aiding drugs).

 

This is an outgrowth of CIA pharmapsychology (psychopharmacology).   

  •   Brief Overview of Proprietary   US Intelligence/Anti-Terrorist Equipment Mentioned


Fixed network of special EMF equipment that can read EEGs  in human brains and identify/track individuals by using digital computers. ESB  (Electrical Stimulation to the Brain) via EMF signal from  the NSA Signals Intelligence is  used to control subjects. 

EMF equipment that gathers information from PC circuit boards by deciphering  RF emissions, thereby gaining wireless modem-style entry into any personal computer in the country.  All equipment hiddenall technology   secretall scientific research unreported (as in electronic  warfare research).

 

Not known to the public at all, yet complete and thorough  implementation of this method of domestic intelligence has been in place  since the early 1980s.

 

Editor's Note:

I tried ringing Mr Akwei to  find out what was the out-come, if any, of his court case. He firmly but  kindly told me that he could not speak about anything to do with the case   over the phone and hung up. A subsequent conversation of similar length   resulted in the information that he did not wish his address or phone number   published with this article.

So, if we hear of any   developments, we'll let you know. 
            

   

Its totally obvious from the  above article that the US National Security Agency  is none other than a covertly run terrorist organization.
   
    Their highly sophisticated technology that is used to monitor and  manipulate the minds of millions of innocent people daily, is a blatant expression of the dominating and authoritarian mentality that exists behind the facade of our so called democratic society.
   
    George Orwell's "THOUGHT POLICE" is an absolute reality in today's world.
   
    Whether we realize it or not, every individual within our society is  negatively effected by this dictatorship attitude.
   
    It has to change - It will change - It starts with you!
   
    George Farquhar
    Project Freedom 


     

An example of EMF Brain Stimulation

Table 1

                                                                                                           

   

Brain Area

   
   

Bioelectric Resonance Frequency

   
   

Information Induced Through Modulation

   
   

Motor Control Cortex

   
   

10 Hz

   
   

Motor Impulse co-ordination

   
   

Auditory Cortex

   
   

15 Hz

   
   

Sound which bypasses the ears

   
   

Visual Cortex

   
   

25 Hz

   
   

Images in the brain bypassing the eyes

   
   

Somatosensory

   
   

9 Hz

   
   

Phantom touch sense

   
   

Thought Center

   
   

20 Hz

   
   

Imposed subconscious thoughts

   

  

RESOURCES 
  
These publications have only been discovered since December 1991,   after Plaintiff had already notified authorities (Dept of Justice, etc.) of   Public Corruption by named NSA   employees.

 When no action was taken   against the NSA employees, I researched the Intelligence Community   electronic surveillance technology involved and discovered the following   publications.

  •   The Body Electric: Electromagnetism and the   Foundation of Life, by Robert Becker, M.D. Monitoring neuroelectric   information in the brain ESB. (p. 265,313,318)
  •   Cross currents, by Robert Becker. Simulating   auditory hallucinations. Remote computer tampering using RF emissions from   the logic board. (p. 70,78,105,174,210,216,220,242,299,303)
  •   Currents of Death, by Paul Brodeur. Driving brain   electrical activity with external EM; magnetophosphenes; Delgado. (p. 27,93)
  •   The Zapping of America, by Paul Brodeur. DoD EM   ESB research; simulating auditory hallucinations.
  •   Of Mice, Men and Molecules, by John H. Heller   1963 Bioelectricity; probing the brain with EM waves. (p, 110)
  •   The Three-Pound Universe, by Judith Hooper. CIA   EEG research; EEGs for surveillance. (p.29,132,137)
  •   In the Palaces of Memory, by George Johnson. EM   emissions from the brain; the brain as an open electromagnetic circuit.
  •   The Puzzle Palace, by James Bamford. Signals   Intelligence; most advanced computers in the early 'sixties.
  •   The US Intelligence Community. Glossary terms at   National Security Archives; Radiation Intelligence (information from   unintentionally emanated electromagnetic energy, excluding radioactive   sources).
  •   The Search for   the "Manchurian Candidate", by John Marks. Electrical or   radio stimulation to the brain; CIA R&D in bioelectrics. (p.227)
  •   Secret Agenda, by Jim Hougan. National security   cult groups.
  •   Crimes of the Intelligence Community, by Morton   Halperin. Surreptitious entries; intelligence agents running operations   against government workers.
  •   War in the Age of Intelligent Machines, NSA   computer supremacy, complete control of information.
  •   Alternate Computers, by Time-Life Books. Molecule   computers.
  •   The Mind, by Richard Restak, M.D. EEG Systems   inc.; decoding brain EM emanations, tracking thoughts on a computer. (p. 258)  
  •   MedTech, by Lawrence Galton. Triggering events in   the brain, direct to auditory cortex signals.
  •   Cyborg, by D.S. Halacy, Jr, 1965.   Brain-to-computer link research contracts given out by the US government.
  •   Psychiatry and the CIA: Victims of Mind Control,   by Harvey M. Weinstein M.D. Dr. Cameron; psychic driving; ultraconceptual   communications.
  •   Journey Into Madness: The True Story of Secret   CIA Mind Control and Medical Abuse, by Gordon Thomas, Intelligence R&D;   Delgado; psychic driving with radio telemetry. (p. 127,276,116,168,169)
  •   Mind Manipulators, by Alan Scheflin and Edward M.   Opton. MKULTRA brain research for information-gathering.
  •   The Brain Changers, by Maya Pines. Listening to   brain EM emissions. (p.19)
  •   Modern Bioelectricity. Inducing audio in the   brain with EM waves; DoD cover-up; EM wave ESB; remote EEGs
  •   Magnetic Stimulation in Clinical Neurophysiology,   by Sudhansu Chokroverty. Magnetophosphenes; images direct to the visual   cortex.
  •   The Mind of Man, by Nigel Calder. US intelligence   brain research.
  •   Neuroelectric Society Conference, 1971. Audio   direct to the brain with EM waves; 2-way remote EEGs.
  •   Brain Control, by Elliot S. Valenstein. ESB.,   control of individuals.
  •   Towards Century 21, by C.S. Wallia. Brain   Stimulation for direct-to-brain communications (p21)
  •   Mind Wars, by Ron McRae (associate of Jack   Anderson). Research into brain-to-brain electronic communications., remote   neural EM detection (PP. 62 106, 136).
  •   Mind Tools, by Rudy Rucker. Brain tapping;   communications with varying biomagnetic fields (p82).
  •   US News and World report, January 2nd 1984. EM   wave brain stimulation; intelligence community hi-tech (p38).
  •   Ear Magazine. Article on extremely low   frequencies radio emissions in the natural environment; radio emissions from   the human body.
  •   City Paper, Washington DC January 17, 1992.   Article FCC and NSA "complete radio spectrum" listening posts.
  •   Frontiers in Science, by Edward Hutchings Jr 1958   (p48).
  •   Beyond Bio Feedback, by Elmer and Alyce Green,   1977 (p118)
  •   The Body Quantum, by Fred Alan Wolf
  •   Cloning; A Biologist Reports, by Robert Gillmore   McKinnell. Ethical review of cloning humans.
  •   Hoovers' FBI, by Former agent William Turner.   Routines of electronic surveillance work. (p280).
  •   July 20th 2019, by Arthur C. Clarke LIDA;   Neurophonics; Brain-computer link.
  •   MegaBrain, by Michael Hutchison. Brain   stimulation with EM waves; CIA research and information control.   (pp.107,108,117,120,123).
  •   The Cult of Information, by Theodore Rosnak,   1986. NSA Directive #145; personal files in computers; computer automated   telephone tapping.
  •   The Body Shop, 1986 implantation of an electrode   array on the visual cortex for video direct to the brain; other 1960's   research into electronically triggering Phosphenes in the brain, thus   bypassing the eyes.
  •   Evoked Potentials, by David Regan. Decoding   neuroelectric information in the brain.  

 

         
   

 

 

 

 

 

 

 

 

 

 

 

 

   

               

   

 

   

 

         
   

 

         
   

 

 

 

Read more…

The police in my condo and Chinese couple, my neighbor listen up:

You will be responsible for what you are doing.

This Chinese couple, their status was so vague.They both don't work over 8 years. They are not only helping Toronto police ,Canadian torturers torture me, but they are harassing their downstairs neighbor, who was over 65. They let their two kids jump and run over his head and over his room . He talked to the Condo's office. This couple keep going. Why? There are two policemen in our condo.

 

Read more…

Everyone is under surveillance now, says whistleblower Edward Snowden

People's privacy is violated without any suspicion of wrongdoing, former National Security Agency contractor claims

  • Edward Snowden Meets With German Green Party MP Hans-Christian Stroebele
Edward Snowden joined a debate on surveillance, by video link from Russia. Photograph: Sunshinepress/Getty Images

The US intelligence whistleblower Edward Snowden has warned that entire populations, rather than just individuals, now live under constant surveillance.

“It's no longer based on the traditional practice of targeted taps based on some individual suspicion of wrongdoing,” he said. “It covers phone calls, emails, texts, search history, what you buy, who your friends are, where you go, who you love.”

Snowden made his comments in a short video that was played before a debate on the proposition that surveillance today is a euphemism for mass surveillance, in Toronto, Canada. The former US National Security Agency contractor is living in Russia, having been granted temporary asylum there in June 2013.

The video was shown as two of the debaters – the former US National Security Administration director, General Michael Hayden, and the well-known civil liberties lawyer and Harvard law professor, Alan Dershowitz – argued in favour of the debate statement: “Be it resolved state surveillance is a legitimate defence of our freedoms.”

Opposing the motion were Glenn Greenwald, the journalist whose work based on Snowden’s leaks won a Pulitzer Prize for the Guardian last month, and Alexis Ohanian, co-founder of the social media website Reddit.

The Snowden documents, first leaked to the Guardian last June, revealed that the US government has programs in place to spy on hundreds of millions of people’s emails, social networking posts, online chat histories, browsing histories, telephone records, telephone calls and texts – “nearly everything a typical user does on the internet”, in the words of one leaked document.

Greenwald opened the debate by condemning the NSA’s own slogan, which he said appears repeatedly throughout its own documents: “Collect it all.”

“What is state surveillance?” Greenwald asked. “If it were about targeting in a discriminate way against those causing harm, there would be no debate.

“The actual system of state surveillance has almost nothing to do with that. What state surveillance actually is, is defended by the NSA's actual words, that phrase they use over and over again: 'Collect it all.’ ”

Dershowitz and Hayden spent the rest of the 90 minutes of the debate denying that the pervasive surveillance systems described by Snowden and Greenwald even exist and that surveillance programs are necessary to prevent terrorism.

“Collect it all doesn't mean collect it all!” Hayden said, drawing laughter.

Greenwald sparred with Dershowitz and Hayden about whether or not the present method of metadata collection would have prevented the terrorist attacks on 11 September, 2001.

While Hayden argued that intelligence analysts would have noticed the number of telephone calls from San Diego to the Middle East and caught the terrorists who were living illegally in the US, Greenwald argued that one of the primary reasons the US authorities failed to prevent the attacks was because they were taking in too much information to accurately sort through it all.

Before the debates began, 33% of the audience voted in favour of the debate statement and 46% voted against. It closed with 59% of the audience siding with Greenwald and Ohanian.

• This article was amended on 6 May 2014 to correct the date of the terrorist attacks that happened on 11 September, 2001, from 2011 as the original said.

http://www.theguardian.com/world/2014/may/03/everyone-is-under-surveillance-now-says-whistleblower-edward-snowden

Read more…

 

Authenticity, consistency and logicality of the following proofs from Toronto Police, The Scarborough Hospital, Toronto Police Headquarters, Canadian torturers and me, putting them together, can testify that Toronto Police, Canadian torturers have committed hair- raising systematic torture and crimes against humanity.

 

1) My first report. They hid and refused to disclose and forward when being asked.(Why? I have explained.)

 

https://plus.google.com/photos/114731102020557937402/albums/5548544777141405873?banner=pwa&gpsrc=pwrd1#photos/114731102020557937402/albums/5548544777141405873/5548545976066786738?pid=5548545976066786738&oid=114731102020557937402

 

 

2) Toronto Police’s memo. They hid most part of this piece. And, my neighbor was changed to one handicapped lady who couldn’t speak after I reported to them about this suspect.

 

https://www.facebook.com/photo.php?fbid=665432303524085&set=a.150339425033378.34750.100001719652877&type=1&theater

 

 

3) The Scarborough Hospital, a public hospital of Ontario intervened without my informed consent after Toronto Police induced. During mental status examination by its nurse in my home, something strange happened. They sated: My suspect neighbor was female. When I confirmed with them. They were surprised and refused to answer my question. They refused to say whether my suspect neighbor was male or female. That means The Scarborough Hospital and its nurse must see my changed neighbor before visiting my home. Or, Toronto Police delivered disinformation about my neighbor to them.

 

 

Page 1:

 

https://www.facebook.com/photo.php?fbid=666735186727130&set=a.150339425033378.34750.100001719652877&type=1&theater

 

 

Page 2: ( Hacked? )

 

https://www.facebook.com/photo.php?fbid=665432303524085&set=a.150339425033378.34750.100001719652877&type=1&theater#!/photo.php?fbid=666742220059760&set=pcb.666742306726418&type=1&theater 

 

Page: 3 ( Hacked ?)

 https://www.facebook.com/photo.php?fbid=665432303524085&set=a.150339425033378.34750.100001719652877&type=1&theater#!/photo.php?fbid=666742273393088&set=pcb.666742306726418&type=1&theater

 

 

4) Toronto Police Headquarters’ letter which refused my request for:

 

a) Any information about my suspect neighbor, even, male or female.

 

b) …

 

 

https://plus.google.com/photos/114731102020557937402/albums/5548544777141405873?banner=pwa&gpsrc=pwrd1#photos/114731102020557937402/albums/5548544777141405873/5548544973848817042?pid=5548544973848817042&oid=114731102020557937402

 

 

Toronto Police, Canadian torturers have committed hair-raising systematic torture over 9 years, even till today. Their acts of torture are rare and atrocious. And, the consequences are serious. What can we do about these torturers? And what can we do about me and other victims? Here are some facts:

 

1) From “ presentation of Canada’s Sixth Report to the Committee against Torture”, dated May 21, 2012, “ Canada is not aware of any current disciplinary investigations into allegations of torture, or cruel, inhumane, degrading treatment committed by Canadian law enforcement agent.”

 

2) The State refuses to investigate into any allegations of torture, or cruel, inhumane, degrading treatment committed by Canadian law enforcement agent. So, of course, they are not aware of “ any…”

 

3) All Canadian media reported: They have one torture list in their office. Actually, worse than that torture list.

 

4 ) UN Committee against Torture has also expressed concern about the role played by Canadian officials in torture perpetrated by other protagonists and Canada’s failure to implement measures to prevent torture in some situations.

 

5) Up till now, the State refused to provide to this committee, “ Data Collection on complaints, investigations, prosecutions and convictions of cases of torture and ill treatment by law enforcement.”

 

6) Up till now, the State refused to provide to this committee, “Statistical data on any complaints, investigations, prosecutions, convictions and penalties imposed for alleged excessive use of force by law enforcement personnel.”

 

7) Up till now, Toronto Police, Canadian torturers continue torturing me physically, mentally, and economically, such as, heavily hitting my roof and ceiling over my head and body. Their purpose is simple and obvious, make you lose the ability to fight back, then, destroy you. This is not “ deduction ” according to imagination. It is the fact.

 

 

 

 

Canadian torture victim

 

Robin Yan

 

05/05/2014

Read more…

Today May 3, 2014, is a day after the much watched video debate at 'Munk Debates' between Greenwald and Ohanian on the 'Con' side, and Hayden and Dershowitz on the 'Pro' side, was held in Canada. The Greenwald team will  "argue against the motion “be it resolved state surveillance is a legitimate defense of our freedoms.” I watched this debate, took notes, and voted at the end of the debate. The Greenwald team won the debate by a resounding 4 % margin, which is statistically significant.

 

Today I revisit the debate. The computer screen is having multiple screen capture events as the torturers want to see what I am typing, saying, doing, keen to make sure that their crime is protected and not exposed online. Today I have managed to post my Comment to the "Glenn Greenwald Debates Former NSA Director Michael Hayden" debate, and in line to my decision to put my comments there on my blog here, this is what it reads like:

 

 

" There is a choice among three basic options. To give up one's liberties in order to gain security. Or to give up security in order to preserve one's liberties. Or to seek to move towards the mean where one preserves one's liberties while having proven security and effective measures to guard against threats to one's liberties.

One can choose to give up one's liberties in order to gain security but the outcome is such that one will not need the security because there will be no liberties left to protect. Or one can choose to give up security in order to preserve one's liberties but the outcome is such that one will not have any liberties left because the uncountered threats will have wiped them all away. Or one could choose to seek to move towards the mean where one preserves one's liberties while having proven effective security measures to guard against threats to one's liberties. The last option preserves both liberties and security.

I am not a civil rights lawyer but have survived by street wit. Sometimes it is all I need to make my way through the haze and smoke others construct around events so as to blurr my vision. "

Best to you all.

Read more…