http://www.technovelgy.com/ct/Science-Fiction-News.asp?NewsNum=1252
All Posts (12223)
http://www.huffingtonpost.com/2013/12/04/google-robot_n_4383802.html
My Book of Life
What is the Book of Life?
The Book of Life, which is stored in your double Ethereal Body, has written in it your Life Path. Your Life Path has in it many secondary paths that you choose to walk during your lifetime, based on your resolutions. These paths determines the people you will meet and also will lead you to goals you will try to accomplish.
All Books of Life have been subjected to hacking by IF – Invisible Forces (to the extent of their interest) to accomplish their goals, instead of yours. So, today you have your Life Path with corrupted paths, with bad people and with destructive goals.
What is the proposed work?
Your Book of Life will be opened and worked on with the following objectives:
remove all corruption from your Book of Life;
circumvent all bad personal relations that are written in your Book of Life;
replace the destructive goals with constructive goals.
Put you back into your Life Path;
create a bond between you and your Life Path;
seal your Book of Life so that no one can hack it during your life time;
After the work is accomplished, the process takes around 30 days to take into effect in the Organic Layer of Existence.
How to request?
my Book of Life – Work Request Procedure
I am releasing at this moment a channel for who wants to request the work my Book of Life. All the procedure for request and payment invoice will be done via email. If you want to request send an email to myBookOfLife_request@reclaix.com.br with the following info:
A) Full name (First name, middle name, last name):
B) birth date (DD Month YYYY):
C) Country:
D) State:
E) email primary contact:
After I receive the email I will check if it is possible to work on your case and send you a result. If I can work on your case you will receive the invoice for payment. Then, after payment I will work on your case. The invoice and payment is done once via Paypal, US$157. For the HPSS Luminous Users, the work my Book of Life is complimentary, and done once, when requested. After payment the request may take around 7 days to be worked on.
Payment Refund?
For this work no payment Refund is available.
Akashic Records – What is?
“The person’s Book of Life has nothing to do with the Akashic Records. The Book of Life carries your future path and it is part of Creation, while the Akashic Records was built to be implanted in an organic body to spy on that person and to record that info. The Akashic Records it is real on itself and was built by one IF Group. On its inception was built to monitor and acquire knowledge from any organic body that was born in the Organic Layer. Later on in history, the Akashic Records infrastructure was hacked by many others IF Groups. These groups started to develop new interfaces to have access to the records, as well as many implants related to it. Today these records are highly corrupted and the real clean records have been taken away. People still carry those implants related to the Akashic Records.” Mell Mellhedek
Limitation Fluxes Removal – Work Request Procedure
The 6 Elements of Life and the Limitation Fluxes
What are Elements of Life?
The 6 Elements of Life are found in the person’s organic body (double ethereal). These elements, which exert strong influence in the person’s life are: Love, Prosperity, Health, Thought, Happiness and Relationship.
What are Limitation Fluxes?
Limitation Fluxes are fluxes of material generated and emitted by sources built in the environment, in the Double Ethereal Layer of Existence. These fluxes are tied to a person’s bio signature. These sources, when built in the environment, start emitting the limitation fluxes that reaches the person, then envelopes and permeates the double ethereal body. These fluxes can limit/supress one or more of the person’s Elements of Life, just depending on the objective it was built for.
How to protect?
To overcome this, it is necessary to remove the sources of those fluxes in the environment.
HPSS Luminous users, when targeted by limitation fluxes, are protected from these permeating fluxes by the Human Protection Dome. But that is not enough, because, those would continue to exist around (enveloping) the protection dome and would exert limitations on the Relationship element, which needs to interact via the environment. So, the user is continuously protected by the HPSS Luminous – CounterAttack component which does identify and remove all the sources that are emitting those limitation fluxes against the user, whenever they are built in the environment.
Fora person who does not use the HPSS Luminous, it is necessary to remove those sources, manually, whenever they are built against the person. Usually, those sources are built in the environment on Tuesdays. Those sources, whenever built, do stay in the environment persisting for lifetimes, until they are removed. They continue tolimit the person’s elements of life every lifetime the person is inthe organic layer of existence. Past lifetime built sources, have lesser limitation effects on the person. That happens because of the slight bio signature changes that occur in each lifetime.
This work will remove all sources of limitation fluxes built in the planet environment, against the person bio signature identified
The level of targeting will depend on the interest of one or many IF Groups, on the person being targeted. The higher the interest, the more resources will be used for the targeting. So, if the person is not of high interest by the IF – Invisible Forces, then, after the sources are removed, those won’t be built again, so soon. But, if the person is of high interest, those will probably be built again (usually happens 2 weeks).
Estimated time for results?
After the work is accomplished, the process takes around 24 hours to take into effect in the Organic Layer of Existence.
Payment Refund?
For this work no payment Refund is available.
How to request?
Limitation Fluxes Removal – Work Request Procedure
I am releasing at this moment a channel for who wants to request Limitation Fluxes Removal. All the procedure for request and payment invoice will be done via email. If you want to request send an email to LimitationFluxesRemoval_request@reclaix.com.br with the following info:
A) Full name (First name, middle name, last name):
B) Birth Date (DD Month YYYY):
C) Country:
D) State:
After I receive the email I will check if it is possible to work on your case and send you a result. If I can work on your case, you will receive the invoice for payment, and also a simple complimentary result analysis. Then, after payment I will work on your case. The invoice and payment is done once via Paypal, US$79. For the HPSS Luminous Users, there is no need for this work to be done. After payment, the request may take around 7 days to be worked on.
Take care,
Mellhedek.
Your freedom starts here. Reclaix.
www.reclaix.com.br
www.mellhedek.com
www.twitter.com/mellhedek
No governments, media or human rights organisations will admit these electronic crimes and technologies exist and are being used to torture and abuse people.
There is a conspiracy of silence regarding these.
The two most important references regarding these technologies and crimes -
REMOTE NEURAL MONITORING & ELECTRONIC BRAIN LINK (RNM & EBL)
John St. Clair Akwei vs NSA
http://www.freedomfchs.com/remoteneuralmonitoring.pdf
http://www.iahf.com/nsa/20010214.html
http://www.greatdreams.com/RNM.htm
ON THE NEED FOR NEW CRITERIA OF DIAGNOSIS OF PSYCHOSIS IN THE LIGHT OF MIND INVASIVE TECHNOLOGY, CAROLE SMITH, JOURNAL OF PSYCHO-SOCIAL STUDIES , VOL 2(2) NO 3 2003
http://www.globalresearch.ca/index.php?context=va&aid=7123
1996 - OUR LATEST STEPPING STONE TO JUSTICE
In the mid-1990s, our first stepping stone to justice was the article titled "Microwave Harassment and Mind Control Experimentation" by Julianne McKinney,
www.raven1.net/microwav.htm
Our second stepping stone was (and is) the exhaustive and scholarly research into "non-lethal weapons," (clearly the birthplace of the living nightmare Ms. Naylor and many other victims are living,) ... of law student Cheryl Welsh,
www.mindjustice.org
The third stepping stone was the 2001 book about vigilante stalking by David Lawson, a private investigator, titled "Terrorist Stalking in America", reviewed here:
www.multistalkervictims.org/terstalk.htm
Ms. Naylor's book, with some material provided by Cheryl Welsh, is clearly a fourth and major stepping stone, by which the targets of vigilante stalking and electronic mind/body harassment hope to see the day the criminals are stripped of their cover, and justice will be served.
http://www.amazon.com/1996-Gloria-Naylor/dp/0883782782/ref=sr_1_6?s=books&ie=UTF8&qid=1386026805&sr=1-6&keywords=gloria+naylor
Also ‘Twelve Years in the Grave’ by Soleilmavis
http://letsrollforums.com/blog.php?b=1479
http://www.lulu.com/shop/soleilmavis-liu/twelve-years-in-the-grave-mind-control-with-electromagnetic-spectrums-the-invisible-modern-concentration-camp/ebook/product-21281027.html;jsessionid=44933D2849A18B2A02CE646D8E6A0933
These references are also important -
THE SHOCKING MENACE OF SATELLITE SURVEILLANCE by John Fleming
http://www.sianews.com/modules.php?name=News&file=article&sid=1068
http://www.theforbiddenknowledge.com/hardtruth/satellite_surveillance.htm
REMOTE NEURAL MONITORING : A TECHNOLOGY USED FOR CONTROLLING HUMAN BRAIN
http://hassam.hubpages.com/hub/Remote-Neural-Monitoring--A-Technology-Used-For-Controlling-Human-Brain
http://sites.google.com/site/illegallywired/home
http://remoteneuralmonitoringindia.blogspot.in/2011/11/remote-neural-monitoring-in-india.html
INTERNATIONAL COMMITTEE ON OFFENSIVE MICROWAVE WEAPONS
http://www.icomw.org/
VIDEO – DR NICK BEGICH: THE TECHNOLOGIES OF MIND CONTROL
http://youtu.be/zVJwG0D7urA
MIND JUSTICE
http://www.mindjustice.org/
PEACEPINK https://peacepink.ning.com/
THE ASSOCIATION AGAINST THE ABUSE OF PSYCHOPHYSICAL WEAPONS http://psychophysical-torture.de.tl/Home.htm
SURVEILLANCE ISSUES
www.surveillanceissues.com
FREEDOM FROM COVERT HARASSMENT AND SURVEILLANCE http://freedomfchs.com/
INTERNATIONAL ALLIANCE AGAINST COVERT ELECTRONIC ABUSE
http://www.iaacea.org/index.html
ORGANISED STALKING AND ELECTRONIC HARASSMENT
http://electronicharassment.weebly.com/index.html
VIDEO:- HUMAN BRAIN PROJECT/ROBERT NAESLUND
https://www.youtube.com/watch?v=ei3zla5hS9o&list=UUvaAu9cZ7WH8uQSmAUC9Low&index=1&feature=plcp
PLEASE CONTACT US FOR FURTHER INFORMATION:-
Yours in the search for openness and respect for universal human rights
John Finch, 5/8 Kemp St, Thornbury, Vic 3071, Australia, TEL: 0424009627
EMAIL: tijohnfinch@gmail.com,MCmailteam@gmail.com
FACEBOOK: http://www.facebook.com/john.finch.16547?ref=profile
GROUP FORUM: https://peacepink.ning.com/
TARGETED INDIVIDUAL and a member of THE WORLDWIDE CAMPAIGN AGAINST ELECTRONIC TORTURE, ABUSE AND EXPERIMENTATION
REVELATION%207%20144000.txt 7%20Trumpets%20%28Revelation%29.txt
PEACE ON EARTH.
NEW ALLIANCES ARE FORMED — Marcel, deeply conflicted by recent events, is surprised when Klaus opens up to him about some of his past indiscretions. Cami tries to make sense of cryptic messages she’s come across and is disturbed when she gains some insight into Klaus’ past. Meanwhile, in a surprising turn of events, the human faction takes matters into their own hands, resulting in a violent confrontation. Elsewhere, when Hayley learns of a plan to harm the werewolves in the bayou, she turns to Elijah and Rebekah for help. After heading to the bayou, they run into a werewolf named Eve, who has information that leads them to a shocking discovery.
http://www.disclose.tv/forum/microwave-mind-control-eliminating-human-rights-and-privacy-t8335.html
http://freethought.tripod.com/nrpubl.html
http://targetedindividualseurope.wordpress.com/ti-symptoms/
Here we try to classify all kind of symptoms that tageted individuals experience on one page.
We refer to “symptoms” as both “effects” and “control mechanisms”. They have both functions at once.
Mind Control
Control and manipulation of thoughts, feelings and ultimately behavior
- Control of thoughts and thought patterns; feelings and their expression; behavior control.
- Dark NLP and gang stalking (street theater) that anchor feelings to certain words, and sometimes colors, certain types of people or objects… Creating the illusion of ”guilt”.
- Hypnotic ”trigger words” that results in specific sensations, feelings or behaviors.
- Monitoring attention both where to look but also what to think about and in what terms.
- Real time mind reading before it becomes aware; erasing thoughts and memories; short time memory problems.
- Induced memories and ”synthetic” associations (that are believed to be made by a computer that is aware of the context).
- Induced dreams or manipulation of dreams.
Social Control
Isolation of individuals through social and societal systems of control
- Fabrication of false evidence that justifies ”Crime prevention” (fabrication of evidence of crime and rumor spreading); In almost most case, Targeted Individuals are accused of a sex crime with no chance to defend oneself.
- Sudden unemployment.
- Loss of friends, because of rumors or direct control.
- The perpetrators take over the friendship and social life of the TI. They are always rude, and manipulative and not real friends.
- Creating ”symptoms” of Mental Illness (voices in the subcounscious, V2K; trying to describe what is happening for others) putting the individual in psychiatric care.
- Creating ”symptoms” of Substance Abuse (tampering food with drugs, poisons or medication; blurred vision; read eyes; disorientation; head aches; memory loss; difficulty talking or making sense) destroying the targeted individuals reputation;
- Creating ”symptoms” of Insuline related diseases (pain in the spinal cord, back of the head, terrible head aches, high blood sugar levels, enormous fatigue) creating early retirement or poverty because of inability to work.
- Creating “symptoms” or dementia because of apparent difficulty, sometimes, to express one’s feelings and thoughts; memory problems when the “attacks” are enormous.
Surveillance
- Thought surveillance. TI:s thoughts are read in real time.
- Looking though Targeted Individuals eyes and seeing what the targeted individual sees. Knowing where the targeted individual directs attention.
- GPS surveillance. The Targeted Individual is tracked down at any time all the time, in real time.
- Remote Neural Monitoring: Some targeted individuals claim that a person’t brain can function as a fingerprint and that can be picked up by satellites. That enables both surveillance of the individual and thoughts.
- Gang stalkers often let the Targeted Individual know that he / she is under surveillance and can’t escape. They can come up and insult the TI, or say something that is only known by the Targeted Individual, as an indication of ”remote (real time) mind reading”.
- Financial surveillance. It looks like every penny a Targeted Individual has is counted and only a certain amount is allowed for the Targeted Individual to gain.
Torture: Physical, Mental & Psychological
Psysical pain due to ICT-Implants or non-lethal weapons
- Direct pain in the body around the clock and that only gets worse and worse due to ICT-Implants or other kind of devices, often labeled by Targeted Individuals as non-lethal weapons, Directed Energy Weapons (DEWs), Electromagnetic Frequency (EMF) or simply radiation.
- Pain in the spinal cord.
- Pain in the back of the head.
- Pain in the “amygdala” or the limbic system.
- Pain in the forehead.
- “Cooked” brain.
- Electroshocks in the brain.
- Pain in the chest.
- Tooth ache.
- “Heart attacks”
- Pain in vital organs: liver, stomach, heart, lungs, eyes.
- Iching eyes – leading to tears and red eyes.
- Food is poisoned.
- Electronic sexual “rapes” during sleep or while awake, probably with ICT-implants.
Hypnotical trigger words
- Can mimick any of the above symptoms: radiation, pain, bad tastes, head aches, and so on or trigger unbearable fatigue.
- The trigger words come in whole sequences, like they were taking out of a dictionary with all synonims and all words that sound alike.
- While some trigger words have effects on the mind and body, other’s have emotional effects only (sensibilisation of the Targeted individual to certain words, that trigger negative emotions, like disgust, fear, anger).
- The trigger words are sometimes reinforced through dark NLP and gang stalking.
- Trigger words are in the beginning very difficult to discover because they are coupled with the TIs routines. The brain can’t differentiate always between what it is made to believe and what really happens.
- Once discovered, they are “released”; becoming aware of the “truth” wins over the lie that the mind has been told. When they are discovered, new trigger words will be programmed into the subcounscious.
Mental pain
- Loud syntethic telepathy. The attackers talk with some of the victims 24/7. They use interrogation techniques that are only used in the CIA or secret service. That is labeled also V2K (voice to skull, or loud synthetic telepathy). A learning computer with a synthetic voice that can be modulated in any voice, can take over partially or full time, after the initial stages. This keeps the victim awaken and always tired.
- Silent synthetic telepathy. The victim doesn’t hear the attackers but there is thought manipulation, directing their attention.
Psychological pain
- Bullying at work, friends and family suddenly lost leading to Isolation. Bullying in general.
- Because of what appears, as social problems with other people, the Targeted Individul moves to a place where the “attackers” and the “manipulators” can spread around any kind of rumor for people in the neighborhood and can take control in another way.
- Gang stalking (rude people in crowds that appear and insult the individual, using both verbal and non-verbal communication). Having 20 people, or more, strategically placed to for example look with a hateful look at the Targeted Individual. They are all strangers, they are all rude. They appear every time the TI is outside, and it can take many different expressions. Sometimes it looks like they have some kind of scheme and the harassment follows a pattern, and when it achieves a certain stage, they reset themselves and it startes all over again.
- Street Theater: A group of people playes a whole show for the individual, and it appears to follow a predetermined plot.
- Following the Targeted Individual’s thinking. The thought surveillance is perceived as humiliating.
- The home is entered and the perpetrators don’t steal things, but can destroy them or they can leave objects that don’t belong there. They often seem to enter with a key, because the doors are not forced.
- Thefts in town, at airports: money of belongings.
- Destroyed means of transportation: car or bike.
Total lack of support
- When the Targeted Individual meets health professionals they are not interested in what the TI tells them. Symptoms are treated in the “old fashioned” way. Many times TIs are forced to take the wrong medication and to agree to sometimes stigmatizing labels in order to receive their pension.
- In certain countries, the TI, can be forced into psychiatry, where total loss of human rights occurs.
- Blacklisting often leads to inability for the TI to find work, or has to accept a job way under their specialization. At the new job, the TI is constantly under harassment and is bullied.
- The police participates in the harassment and is totally insensitive to what the TI goes through.
- The media ignores the TI-cause.
Other symptoms
- Strange coincidences happen all the time, several times a day.
- The TI can in his thoughts intercept what it’s going to be on TV in a while, depending on subject of interest. Some TIs are sure that the people on TV are copying them or harassing them.
- “What you think about becomes reality”
- Expectations turn out exactly to the opposite leading to cognitive
http://www.avisen.dk/blogs/julean/svenskeu-org-advarer-nanopartikler-i-vores-kroppe_42672.aspx
No governments, media or human rights organisations will admit these electronic crimes and technologies exist and are being used to torture and abuse people.
There is a conspiracy of silence regarding these.
1996 - OUR LATEST STEPPING STONE TO JUSTICE
In the mid-1990s, our first stepping stone to justice was the article titled "Microwave Harassment and Mind Control Experimentation" by Julianne McKinney,
www.raven1.net/microwav.htm
Our second stepping stone was (and is) the exhaustive and scholarly research into "non-lethal weapons," (clearly the birthplace of the living nightmare Ms. Naylor and an estimated three million North Americans are living,) ... of law student Cheryl Welsh,
www.mindjustice.org
The third stepping stone was the 2001 book about vigilante stalking by David Lawson, a private investigator, titled "Terrorist Stalking in America", reviewed here:
www.multistalkervictims.org/terstalk.htm
Ms. Naylor's book, with some material provided by Cheryl Welsh, is clearly a fourth and major stepping stone, by which the targets of vigilante stalking and electronic mind/body harassment hope to see the day the criminals are stripped of their cover, and justice will be served.
http://www.amazon.com/1996-Gloria-Naylor/dp/0883782782/ref=sr_1_6?s=books&ie=UTF8&qid=1386026805&sr=1-6&keywords=gloria+naylor
Also ‘Twelve Years in the Grave’ by Soleilmavis
http://letsrollforums.com/blog.php?b=1479
http://www.lulu.com/shop/soleilmavis-liu/twelve-years-in-the-grave-mind-control-with-electromagnetic-spectrums-the-invisible-modern-concentration-camp/ebook/product-21281027.html;jsessionid=44933D2849A18B2A02CE646D8E6A0933
These references are also important -
THE SHOCKING MENACE OF SATELLITE SURVEILLANCE by John Fleming
http://www.sianews.com/modules.php?name=News&file=article&sid=1068
http://www.theforbiddenknowledge.com/hardtruth/satellite_surveillance.htm
REMOTE NEURAL MONITORING & ELECTRONIC BRAIN LINK (RNM & EBL)
John St. Clair Akwei vs NSA
http://www.iahf.com/nsa/20010214.html
http://www.freedomfchs.com/remoteneuralmonitoring.pdf
http://www.greatdreams.com/RNM.htm
ON THE NEED FOR NEW CRITERIA OF DIAGNOSIS OF PSYCHOSIS IN THE LIGHT OF MIND INVASIVE TECHNOLOGY, CAROLE SMITH, JOURNAL OF PSYCHO-SOCIAL STUDIES , VOL 2(2) NO 3 2003
http://www.globalresearch.ca/index.php?context=va&aid=7123
REMOTE NEURAL MONITORING : A TECHNOLOGY USED FOR CONTROLLING HUMAN BRAIN
http://hassam.hubpages.com/hub/Remote-Neural-Monitoring--A-Technology-Used-For-Controlling-Human-Brain
http://sites.google.com/site/illegallywired/home
http://remoteneuralmonitoringindia.blogspot.in/2011/11/remote-neural-monitoring-in-india.html
INTERNATIONAL COMMITTEE ON OFFENSIVE MICROWAVE WEAPONS
http://www.icomw.org/
VIDEO – DR NICK BEGICH: THE TECHNOLOGIES OF MIND CONTROL
http://youtu.be/zVJwG0D7urA
MIND JUSTICE
http://www.mindjustice.org/
SURVEILLANCE ISSUES
www.surveillanceissues.com
INTERNATIONAL ALLIANCE AGAINST COVERT ELECTRONIC ABUSE
http://www.iaacea.org/index.html
ORGANISED STALKING AND ELECTRONIC HARASSMENT
http://electronicharassment.weebly.com/index.html
VIDEO:- HUMAN BRAIN PROJECT/ROBERT NAESLUND
https://www.youtube.com/watch?v=ei3zla5hS9o&list=UUvaAu9cZ7WH8uQSmAUC9Low&index=1&feature=plcp
PLEASE CONTACT US FOR FURTHER INFORMATION:-
Yours in the search for openness and respect for universal human rights
John Finch, 5/8 Kemp St, Thornbury, Vic 3071, Australia, TEL: 0424009627
EMAIL: tijohnfinch@gmail.com,MCmailteam@gmail.com
FACEBOOK: http://www.facebook.com/john.finch.16547?ref=profile
GROUP FORUM: https://peacepink.ning.com/
TARGETED INDIVIDUAL and a member of THE WORLDWIDE CAMPAIGN AGAINST ELECTRONIC TORTURE, ABUSE AND EXPERIMENTATION