All Posts (12250)

Sort by
http://en.wikipedia.org/wiki/Retroviral_Psi_packaging_element

Retroviral Psi packaging element
From Wikipedia, the free encyclopedia
Human immunodeficiency virus type 1 dimerisation initiation site

Predicted secondary structure and sequence conservation of HIV-1_DIS
Identifiers
Symbol HIV-1_DIS
Alt. Symbols Retroviral_psi
Rfam RF00175
Other data
RNA type Cis-reg
Domain(s) Viruses
SO 0000233


A 3D representation that includes the retroviral psi packaging element. This is a solution RNA structure model of the HIV-1 dimerization initiation site in the kissing-loop dimer.[1]
Retroviral Psi packaging element is a cis-acting RNA element identified in the genomes of the retroviruses Human immunodeficiency virus (HIV) [2] and Simian immunodeficiency virus (SIV). [3] It is involved in regulating the essential process of packaging the retroviral RNA genome into the viral capsid during replication.[4][5] [6][7] The final virion contains a dimer of two identical unspliced copies of the viral genome.
In HIV, the Psi element is ∼80–150 nucleotides in length, and located at the 5' end of the genome just upstream of the gag initiation codon.[8] It has a known secondary structure composed of four hairpins called SL1 to SL4 (SL is for Stem-loop) which are connected by relatively short linkers. All four stem loops are important for genome packaging and each of the stem loops SL1 [8] , SL2 [9],SL3 [10][11] and SL4 [12] has been independently expressed and structurally characterised.
Stem loop 1 (SL1) (also referred to as HIV-1_DIS) consists of a conserved hairpin structure with a palindromic loop sequence which was predicted and confirmed by mutagenesis.[13] This palindromic loop is known as the primary dimer initiation site (DIS) as it is believed to promote dimerization of the viral genome through formation of a "kissing dimer" intermediate. [14] The Rfam structure shown is based on a covariation model.
It has been shown that SL1 may provide a secondary binding site for the viral Rev protein. [15] The Rev protein is an essential HIV regulatory protein which increases the stability and transport of the unspliced viral RNA.[16]
Stem-loop 2 (SL2) (also referred to as HIV-1 SD) consists of a highly conserved 19 nt stem-loop which has been shown by mutatagenis to modulate the splicing efficiency of HIV-1 mRNAs. [17]
Stem-loop 3 (SL3) consists of a highly conserved 14 nt stem-loop which was predicted and confirmed by mutagenesis and mass spectrometric detection (MS3D). HIV-1 SL3 is sufficient by itself to induce heterologous RNA into virus-like particles but its deletion does not completely eliminate encapsidation. [17]
Stem-loop 4 (SL4) consists of a highly conserved 14 nt stem-loop that is located just downstream of the gag start codon. The structure was confirmed by mutagenesis and has an NMR and mass spectrometric detection (MS3D).[17] It also may have coding and non-coding roles.
[edit]References

^ Baba S, Takahashi K, Noguchi S, Takaku H, Koyanagi Y, Yamamoto N, Kawai G (2005). "Solution RNA structures of the HIV-1 dimerization initiation site in the kissing-loop and extended-duplex dimers.". J Biochem 138 (5): 583–92. doi:10.1093/jb/mvi158. PMID 16272570.
^ Lever A, Gottlinger H, Haseltine W, Sodroski J (1989). "Identification of a sequence required for efficient packaging of human immunodeficiency virus type 1 RNA into virions". J Virol 63 (9): 4085–7. PMC 251012. PMID 2760989.
^ Strappe PM, Greatorex J, Thomas J, Biswas P, McCann E, Lever AM (2003). "The packaging signal of simian immunodeficiency virus is upstream of the major splice donor at a distance from the RNA cap site similar to that of human immunodeficiency virus types 1 and 2". J Gen Virol 84 (9): 2423–30. doi:10.1099/vir.0.19185-0.
^ McBride MS, Panganiban AT (1997). "Position dependence of functional hairpins important for human immunodeficiency virus type 1 RNA encapsidation in vivo". J. Virol. 71 (3): 2050–8. PMC 191293. PMID 9032337.
^ McBride MS, Schwartz MD, Panganiban AT (1997). "Efficient encapsidation of human immunodeficiency virus type 1 vectors and further characterization of cis elements required for encapsidation". J. Virol. 71 (6): 4544–54. PMC 191676. PMID 9151848.
^ McBride MS, Panganiban AT (1996). "The human immunodeficiency virus type 1 encapsidation site is a multipartite RNA element composed of functional hairpin structures". J. Virol. 70 (5): 2963–73. PMC 190155. PMID 8627772.
^ Lever AM (2007). "HIV-1 RNA packaging". Adv. Pharmacol. Advances in Pharmacology 55: 1–32. doi:10.1016/S1054-3589(07)55001-5. ISBN 978-0-12-373610-9. PMID 17586311.
^ a b Lawrence DC, Stover CC, Noznitsky J, Wu Z, Summers MF (2003). "Structure of the intact stem and bulge of HIV-1 Psi-RNA stem-loop SL1". J. Mol. Biol. 326 (2): 529–42. doi:10.1016/S0022-2836(02)01305-0. PMID 12559920.
^ Amarasinghe GK, De Guzman RN, Turner RB, Chancellor KJ, Wu ZR, Summers MF (2000). "NMR structure of the HIV-1 nucleocapsid protein bound to stem-loop SL2 of the psi-RNA packaging signal. Implications for genome recognition". J. Mol. Biol. 301 (2): 491–511. doi:10.1006/jmbi.2000.3979. PMID 10926523.
^ Zeffman A, Hassard S, Varani G, Lever A (2000). "The major HIV-1 packaging signal is an extended bulged stem loop whose structure is altered on interaction with the Gag polyprotein". J Mol Biol 297 (4): 877–93. doi:10.1006/jmbi.2000.3611. PMID 10736224.
^ Pappalardo L, Kerwood DJ, Pelczer I, Borer PN (1998). "Three-dimensional folding of an RNA hairpin required for packaging HIV-1". J. Mol. Biol. 282 (4): 801–18. doi:10.1006/jmbi.1998.2046. PMID 9743628.
^ Kerwood DJ, Cavaluzzi MJ, Borer PN (2001). "Structure of SL4 RNA from the HIV-1 packaging signal". Biochemistry 40 (48): 14518–29. doi:10.1021/bi0111909. PMID 11724565.
^ Berkhout, B; Van Wamel, JL (1996). "Role of the DIS hairpin in replication of human immunodeficiency virus type 1". Journal of Virology 70 (10): 6723–32. PMC 190715. PMID 8794309.
^ Skripkin, E.; Paillart, J. C.; Marquet, R.; Ehresmann, B.; Ehresmann, C. (1994). "Identification of the primary site of the human immunodeficiency virus type 1 RNA dimerization in vitro". Proceedings of the National Academy of Sciences of the United States of America 91 (11): 4945–4949. PMC 43906. PMID 8197162. edit
^ Gallego J, Greatorex J, Zhang H et al. (2003). "Rev binds specifically to a purine loop in the SL1 region of the HIV-1 leader RNA". J. Biol. Chem. 278 (41): 40385–91. doi:10.1074/jbc.M301041200. PMID 12851400.
^ Felber, B. K.; Hadzopoulou-Cladaras, M.; Cladaras, C.; Copeland, T.; Pavlakis, G. N. (1989). "Rev protein of human immunodeficiency virus type 1 affects the stability and transport of the viral mRNA". Proceedings of the National Academy of Sciences of the United States of America 86 (5): 1495–1499. PMC 286723. PMID 2784208. edit
^ a b c Abbink, T. E. M.; Berkhout, B. (2007). "RNA Structure Modulates Splicing Efficiency at the Human Immunodeficiency Virus Type 1 Major Splice Donor". Journal of Virology 82 (6): 3090–3098. doi:10.1128/JVI.01479-07. PMC 2258995. PMID 18160437. edit
[edit]External links

Page for HIV-1_DIS at Rfam
Page for HIV-1_SD at Rfam
Page for HIV-1 SL3 at Rfam
Page for HIV-1 SL4 at Rfam
Read more…

human poem

humans so sensitive
more complicated
than some
some with a good heart
some of us have none
none in the meaning
they don't really  care
whilst others have hearts
you can tell because they share
the same passions and same pain
and emotions too
you hurt when they do
like in the same  shoes
think aswell and feel for that person
in time of need
dont think about yourself
others appeal
theres some on the other hand
just dont give a damn
dont feel remorse
normally a man
most women have feelings
much stronger and true
whilst some of us blokes
havent a clue
so this poem relates
to all of us a rule
whether your fat,slim
tall or your small
we are all human
think differently
our own opinons
with a vision to see
we are deffinately a world
come all agree
when theres trauma
theres a you and a me
we pity the sufferers
for what they havent got
some of us lucky
some of us not
so humans arent strange
we have hearts and feelings
gay,straight,black or white
different religions
same meanings
we dont use enough of our minds
as they say
only a bit,
frightening how much power
that we have got
isnt it
whilst most struggle to make ends meat
others are more happy and  dont struggle
tend to be more stable
and land on there feet
we different us humans
and i am glad that i am
to be truthful,trustworthy
be a better  man
we learn and we live
sometimes maybe disagree
a human is woman and a man
adam and eve


 best wishes n love lots

denny

Read more…

Identifying the perps

Main Player/Informant: Neighbor

- conduit for electric flip-flop

- receiver of stuff meant for us

- entry point of social-engineering tools/food (tried to "pawn" several gadgets to me. didn't take those, just gave her the money)

- transmitter of wiretapped info, sound bytes, etc...

- cousin of IT dean of school connected to this harassment (owned by a powerful political/economic figure worldwide)

-niece of professor in the school benefiting from the certification program of the organization/agency involved in the hypnosis/profiling stuff I mentioned in other entries.


- my batchmate

-saw her staying right next door at the house we were staying in at the metro (12 hours drive from here). that's too much of a coincidence, knowing that she is not supposed to have any relatives or contacts there (unless it was intentional that they looked for contacts there.

-at a time when we were young, she was supposed to be placed in an institution because she was ( don't wanna describe in respect of her vulnerability).... During that time, when I talked to her to show that people around her care, that's when I realized that all she was talking about was us, our family, that we were lucky we had this and that, etc... that she wanted such things too, etc...She said it's not her but the dwarf in her talking, etc...

There's a reason why even when I knew before she's part of those harassing me, I refrained from pinpointing her because much as I know she's a main perp, I believe she's a victim, too.

This technology tries to control people. The moral, character and intellectual fiber of a person defines which side he'll take - that of an agressor or that who is pummeled by aggression.

The time she had her major attacks, there were talks about a doppelganger, her being seen somewhere else, etc. There were also arguments on the identification of the real problem so she can be helped since the attacks were considered as her being "posessed", too.

Looking back now, juxtaposing what happened before with what I know now, I notice the timeline.


Her attacks happened along the same phase when I first got frightened of my dreams.

You see, I am not one who is fearful of dreams, or mostly anything. That time though, it was so surreal, I could see myself sleeping , I could see exactly what position I am in , I could describe the minutest details like I am watching myself from atop my bed or from the side of my room. It was also the time when I felt a shadow looming over me whose presence engulfed me with fear I cannot explain - like the shadow figure looming over me is a threat and will harm me. I was awake yet I could not move. I tried to talk but my tongue wouldn't move. I tried to move my fingers but they wouldn't move either. I prayed so hard and that's when I was able to move my head , trying to rise, but when i was already half-sitting, I was drawn to sleep again, and the dream continued. Same thing happened. I prayed again. I was able to stand, then I changed my position, head now where my feet was earlier. Same thing happened. That's when I decided to go to my parent's room to sleep.

I remembered this because there's one thing this neighbor said which is so vivid: she was afraid to sleep.


I would always remember that dream because that's the first time I got frightened of sleeping. After I shared it with somebody I trusted though and she told me to pray and she said she would pray for me, it ceased. It would happen again in the metro where I stayed with the cousin who asked me to accompany her to look for a carmen san diego CD (which i now know is ARG) but that's another story.




That period in our high school years where these things happened coincided with one thing : A NEW NEIGHBOR'S TRANSFER


These new neighbors are fond of tinkering with electronic gadgets. They are the ones who have friends and direct contact to the electric provider in this place. They are the ones who keep tying out phone and cable lines to their wires, and when found out (and we would request the service provider to fix the connections removing the neighbor's wires strapped to our wires), they would place antennas or iron rods, in direct contact to our lines.

Most of their family members now go to the same church my family goes to. They are the ones giving/selling electronic gadgets to my mother which, when connected, makes my pc activities go haywire.

There was a time when the entire family was out of the house and only the workers were here, when we went back there were wires outside of my window and wires in my room that were not there before. They came to our house asking my mother if they can look at our electric meter. They also asked about a gadget given to my mother (the same gadget was given to the pastor I believe), which they say lowers electric consumption. When I looked it up on the net, it was an intelli-gadget that allows a user to be part of a smart grid, one that allows a central system to monitor and control electronic consumption in the house of the user.

They are also the ones with pigeons and doves with rfid bands around their feet. I discovered this because two pigeons holed in on our ceiling atop my room, and they would move when I moved, they would stay directly overhead where I stayed. What I did was get the foldable stairs and looked at the birds. I saw the band. I looked it up and researched and discovered they were RFID bands, meant to act as timers for the racing pigeons.

I noticed too that in our cieling where my room and my parent's room are were food containers with food for birds. We were not the ones who placed it there (which explains the noise I would hear in the ceiling before, like the shuffling of feet). I also saw a bunch of dried stalks which have some of the stalks burnt in some parts, and when I googled it, it looked like the stalk of the marijuana plant. I am not sure if it's indeed one but the main question is, wha's it doing in the ceiling? What are the food containers doing in the ceiling? What are the burnt newspaper outside my window, clearly from the roof beam/ceiling doing there?
Read more…

Would the women who commentted

on my blog "Pastor and Pastors"  please resend the web address of the ministry she made reference to.  Thank you.

                                                                                      Michael

Read more…

life poem

what could i say
on a day to day basis
not seein friends
not seeing faces
familiar themes
exhausting,frustrating
no one to call
so tired of the waiting
now its all changed
life could be so much better
freedom and rights gone
now complaing and letters
no ifs or maybes
life not planned
no one to listen
to lend a helping hand
struggle to even go to the shops
a struggle to clean
harrassment
won't stop
worst i felt
if you know what i mean
torture now seems the rest of our days
read up more research
it goes a long way
isolation and war
seems to be most ti's ways
knowing you live with fear
can't have your say
but as we live in our darkest days yet
try meet some more people
with similar problems
and lets
try and stay calmer
be the best that we can be
bring down the goverments
its more than just free
we are tired of living as
experiments that not even
animals have been
the sadness of once
a beautiful country
now anger and mean
i know most of us
all had a life
no struggle
discomfort
married,a husband a wife
now all gone
its all in the past
goverments everyday
put up more masts
to obey
to give in
robots
borrowed minds
bring back our happiness
paying for other peoples crimes
my life was fantastic
great job and a wife
been married seemed simple
now backsabbed with a knife
when you have everything
what more could you wish
my life turned from been
happy and bliss
so now questions upon us
why?how?upsetting?dismay?
sleep in your bed at  night
stay awake and just lay
your head hits the pillow
but now its like brick
discomfomfort
terror
too much makes you sick
once a happy hard working
get up and go
things were so different
memory lapses
we all want to know
so all of theses questions
not an answer in sight??
to keep you awake,age you
sleepless nights
give back our lives
to make things
vivid and more clear
as now just a blurr
and struggle to hear
i know one thing for sure
not just a maybe
how sad that it is
we tried for a baby
dont you just wish
to grasp everyting back
with a  clenching
a fist
wake up its over
a hug and a kiss
i know one thing for certain
even more troubles ahead
sleep in a coffin
or awake in your bed
grant me a wish
i would ask for my wife
cos i dreamed it all really
and got back my fantatic life

 

best wishes n love lots

denny

 

 

Read more…

in loving memory

in loving memory
of  my brother who died
chased up a pylon
till he was fried
burnt to a cinder
only socks you could see
didnt find the lad who
chased him
my brother is free
only 14 years old
not much of a life
people harrassed him
everywhere that he went
god came a calling
with some intent
heavens gates opened
peace he now rests
fantastic brother
simply the best
always a victim
of his own downfall
nothing too big
nothing too small
unreal,he was tortured
makes you sit back and think
was  he a target
this goverments stinks
they grasp at  your weakness
twist it till it snaps
my brother still with me
no memory lapse
sadness is worst
when close people die
always ask questions
time passes by
my sister another
a baby too small
buried beneath
a few foot tall
its worst now its xmas
families unite
for some,so unlucky
cant say good nite
ponder and thoughts
celebrations now calm
for the xmas that was
now pain and alarmed
so bless you brother peter
and sister helen too
my prayers are now answered
peace eternal
to you both
i love you

 

best wishes and love lots

denny

if you want any poems done,just mention any subject and i will do them

prayers to all who lost that somebody special,my heart goes out to you!!

Read more…

First mind-controlled, bone-mounted robotic arms to be implanted in 2013

Image1
 

A postdoctoral student has developed a technique for implantingthought-controlled robotic arms and their electrodes directly to the bones and nerves of amputees, a move which he is calling "the future of artificial limbs". The first volunteers will receive their new limbs early in 2013.

"The benefits have no precedent," Max Ortiz Catalan, who carries out research in biomedicine and artificial intelligence at the Chalmers University of Technology in Sweden, told Wired.co.uk. "They will be able to simultaneously control several joints and motions, as well as to receive direct neural feedback on their actions. These features are today not available for patients outside research labs, our aim is to change that."

Ordinary myoelectric prostheses work by placing electrodes over the skin to pick up nerve signals that would ordinarily be sent by the brain to the limb. An algorithm then translates these signals, and sends instructions to motors within the electronic limb. Since the electrodes are applied to the skin surface, however, they will undoubtedly encounter countless issues in maintaining the fluid transferal of information back and forth between the brain and the limb. By implanting those electrodes directly to the patient's nerves, Catalan is hoping to get one step closer than anyone else to replicating natural movement.

"Our technology helps amputees to control an artificial limb, in much the same way as their own biological hand or arm, via the person's own nerves and remaining muscles," he said.

Using the Osseointegrated Prosthesis for the Rehabilitation of Amputees(OPRA) method developed by Rickard Brånemark at Sahlgrenska University Hospital in Gothenburg, Catalan and his team plan to forgo traditional sockets in place of bone-anchored prostheses attached via titanium screws. It was a method inspired by Brånemark's father, who was the first to discover that titanium can fuse with bone tissue.

"The operation will consist of placing neural and muscular electrodes on the patients stumps, as well as placing the bidirectional interfaces into the human body."

A titanium implant acts as the bidirectional interface, transmitting signals from the electrodes, placed on nerves and muscles, to the limb. It is a truer replication of how the arm was designed to work, with information from existing nerves being transferred to the limb and to the implant, where algorithms can translate thought-controlled instructions into movement. It is, Catalan told Wired.co.uk, a "closed loop control" that moves us "one step further to providing natural control of the artificial limb". Add to this the fact that every finger is motorised and can be individually controlled, and Catalan's bold statement might just be accurate.

The first surgeries, due to be carried out by Brånemark in January or February 2013, will all be on patients that had limbs amputated several years prior. Asked whether or not this will make success harder, Catalan said it was one question they are looking to answer.

"The possibilities are higher in recent amputation. Our first patients however, have been amputated for several years. This project aims to answer several very interesting scientific questions in neurorehabilitation."

In preparation, for both the amputees' learning and the algorithm's, Catalan has been training his subjects in the lab using virtual reality simulations. "It provides real-time feedback to the patients on their performance executing different motions. It is definitely very important for them to re-learn some motions, and for us to quantitatively qualify our algorithms' performance."

The work echoes that of the Centre for Bionic Medicine in Chicago. In October Zac Vawter highlighted the centre's work by climbing 103 flights of stairs using his bionic leg, attached following an amputation technique called targeted muscle reinnervation (TMR). This involves transferring amputated nerves to remaining muscle and skin so that they can provide additional signals the limb's inbuilt microprocessor can process -- it dramatically improves the reactivity of a robotic prosthetic. Catalan is in touch with the Centre and plans to collaborate and combine the two technologies to help create an "osseointegrated human-machine gateway".

"We definitely see the combination of these technologies as the future of artificial limbs," he told Wired.co.uk. "They have done excellent work, a lot of very useful scientific research has come from Todd Kuiken's group. We have complementing technologies, while targeted muscle TMR is useful to provide additional control signals in the muscles, it still needs surface electrodes."

Ultimately, Catalan hopes the surgical trials will prove the potential for dramatic progress in prosthetics and secure the university more funding to take that progress from a clinical setting, to a real world one on a far larger scale.

"This technology can then become a reality for lots of people. We want to leave the lab and become part of the patients' everyday life. If the first operations this winter are successful, we will be the first research group in the world to make 'thought-controlled prostheses' a reality for patients to use in their daily activities, and not only inside research labs."

best wishes and love lots

denny

Read more…

How the police copy and keep your phone secrets

mobile phone - Uncle Saiful/Flickr

UK police are hacking suspects phones, even when they’re released without charge.

The police routinely copy and keep the contents of suspects’ mobile phones, according to this week’s Sunday Times.

In under half an hour the police could get from your phone your call history, all your text messages and your whole contacts book and put them into a vast database, the article claimed. And there the information stays, even if you are released without charge after a night in the cells.

The disturbing report claimed that as many as 22 English and Welsh police forces, including the Metropolitan Police and British Transport Police, are using off-the-shelf technology to do this. It claimed that the Metropolitan Police alone have 16 extraction terminals across London with 300 officers trained to use them.

In many ways it is a golden age for detective work. The police can access data from all kinds of sources because smartphones are both incredibly versatile and ubiquitous. Besides the emails and candid snaps from a night out, they can trawl your apps like Facebook or LinkedIn.

The Sunday Times report suggests that British police forces are treating the contents of citizens’ phones like they treated peoples’ DNA. For much of the previous decade British police collected DNA from arrested suspects and kept the samples even after the suspect was acquitted. In this way they collected and stored 1 million samples before the law stopped them.

In 2008 the European Court of Human Rights overturned a House of Lords ruling and decided it is illegal for the police to store innocent citizens’ DNA. The Sunday Times’ argues that ’there is a direct parallel’ between keeping DNA records and ‘keeping the mobile phone data of those who have never been convicted of any offence.’

Civil liberties group Big Brother Watch agrees. They are adamant it is outside the law, saying so both to the paper and in a letter sent to Christopher Graham the Information Commissioner in May this year. Recently Graham told a committee of MPs and Peers he is investigating the legality of this mass data storage. He said: ‘This may not only circumvent existing safeguards but also put the personal information of third parties who are not suspected of any wrongdoing into the hands of the police.’

While the authorities argue the legality of this new policing technique users can take steps protect their data.

Certain handsets have sufficient encription to keep some content safe says Rick Ferguson from cyber security company Trend Micro. The Metropolitan Police is using a product called Aceso made by British company Radiotactics, he told the Bureau.

‘Depending on the handset, you can configure it to reduce the amount that is withdrawn,’ he said.

But ultimately if your device is seized no matter what you do at least some of your data will be exposed.

 

best wishes n love lots

denny

Read more…

Image by ps_images via Flickr Creative Commons

Could your browsing history tell the government more than you’d like them to know?

For the past 18 months, I’ve been investigating the export of surveillance technologies from Western countries to despotic regimes, but I never thought I’d see a democratic government proposing to install the kind of mass surveillance system favoured by Al-Assad, Mubarak and Gaddafi.

Yet proposals reported this weekend would allow the authorities unprecedented levels of access to the entire population’s phone records, emails, browsing history and activity on social networking sites, entirely unfettered by the courts. This is a system that has no place in a country that would call itself free and democratic.

The idea of a ‘modernised’ (read, ‘more invasive’) surveillance law was first proposed by the Labour government in 2009.

The Coalition agreement clearly stated that mass surveillance was unacceptable, but now the old policy seems to have risen from the grave.

It argued that changes were required in order to restore the status quo of the early 1990s, when we all used landlines and BT ran all the networks. Call and location records were generated and stored by BT for commercial purposes, and the police thus had ready access to pretty much every communication in Britain.

But in the era of Google, Facebook and Twitter, the authorities have been cut off from significant chunks of people’s communications and a lot of data resides on foreign servers.

The government designed the Interception Modernisation Programme to give itself access to all this new information, but after controversy about the cost, ethics and feasibility of the project it was ditched in the run-up to the 2010 general election.

The Coalition agreement that formed the current government clearly stated that IMP-style mass surveillance of the British public was unacceptable, but now the old policy seems to have risen from the grave as the innocuously named Communications Capabilities Development Programme.

The Home Office will try to pretend that the CCDP is a brand new idea, in that it forces companies to store data locally and make it accessible to police whenever they request, rather than automatically transferring data from ISPs and mobile network providers to GCHQ for centralised storage. But the idea of a central database was abandoned before IMP was formally proposed, so in fact the two projects are basically identical.

More importantly, the principle is the same: the government should have the right to intercept everyone’s communications, all of the time, without the inconvenient requirement of judicial warrants.

Eric King is head of research at Privacy International

 

best wiishes n love lots

denny

Read more…

under attack

under attack
my god don't it hurt
all on the left side
all down to them perps
twisted and torment
frequency high
cant take all this pain
another  year by
lay in your bed
torture more n more
is there a problem
feeling so sore
what can you do
nobody to help
conspiracy theory
scream and you yelp
secluded not bothered
this pain will kill us all
everyday different torture
they watch as you fall
lose bits of your life
till everythings gone
we just there pets
but for how long
with the world at there mercy
you cringe with a shudder
its like bloody prison
eat bread and butter
can i make it tomorrow
only time will tell
please help me get away
from this permanent hell
there devils
they are death
no mercy
just fear
torture your left side
and even your ear
stop you from sleeping
for days upon end
they make you lose it
drive you round the bend
finally sleep
no dreams
nightmares and all
you wake up another day
what for,to look at the walls
so how can you save me
and also you
cos frankly i am so sick
of this permanent dew
fighting aint easy
it gets worse and worse
put me in a coffin
there goes my hearse
research has made things
far too much pain
your mind not settled
neither your brain
so whats to live for
when torture so bad
sending you loopy
sending you mad
life is a struggle
without torture
like this
tortured my heart
the beam hits me
not miss
so find yourself
in my shoes
it aint all that good
pain so bad
i cant eat no food
can only take so much
death stares at your door
electronic magnetic warfare
has hit me for four
its raining outside
inside put on your mac
inprisoned
illegal torture
under attack

 

best wishes n love lots

denny

hope i make it to my birthday 22nd december

pray that i dont

Read more…

Silencing Witnesses: Economic Harassment

 Years ago I was harassed by a bank i had a credit card account in. I made online purchases that were deducted by the gateway but were rejected by the merchant so the funds were supposed to be reverted. When I called customer service, I was informed it will be returned the next pay period, with the my monthly charges deducted. The next payment cycle, they didn't return it. Again, another purchase went the same way, it was deducted, the purchase did not push thru. I called again and I was informed they will but offset my next months' charges from the reversals.

This coincided with my transfer to another place since I was being harassed in that building (plus somebody broke into the unit by removing the aircon chute cover).

The next thing I knew, family members were telling me somebody was calling the house non-stop, saying rude things, claiming they are from the credit card company, threatening legal action. I asked why, they said the callers left a number to call.

They said they handle the legal matters of the company and that my account has been forwarded to them because it was already the third month and I haven't paid the 2 months of my monthly charges. I told them I was instructed the reversals on my account will offset the monthly charges (the monthly charges were but minimal compared to the amount charged to my account which was supposed to be returned because no purchase was actually made. The transaction wasn't fulfilled).

I also asked them why, if there were any change in the agreed-upon reversal, I was not informed. They also did not give me the bills for that period. Not in the place I left. Not in the permanent address where they send my bank records to. They could contact me to harass me yet they could not contact me to inform me about the reversals they were supposed to offset nor send me my bills so I would know what happened? (The one calling was so rude he told me I should not get credit cards if I can not pay and that I was a liar, etc.... I told him he could so easily check with their records if they indeed sent me any bill because I have already checked with the building I used to stay in and the personnel said all mail meant for me are being returned to the sender since I left).

*** I have to indicate one important thing here which I will discuss in another entry. I have discovered a pattern which may prove to be VERY, VERY IMPORTANT.

The owner of the unit I rented has the same surname as the people who are figuring in the economic harassment being done on me, and the person who told me to beware of landlords who install cameras for voyeuristic and commercial purposes. He said such landlords sell access to the cameras on a pay-per-view basis to buddies who are into said voyeuristic addiction. He said they cover such cases in the field he is in.  

 

What do I discover years later?

 

This office mate who told me it is so easy to hack my account without anyone knowing who actually did it because it can be pinned on someone else, IS WORKING in the very office of an owner who shares the same surname as the landlord of the place I rented.

 

And there's more.

 

One of his colleagues - a top honcho there - has in his linkedin a description taken off the letter I send to my clients. I will write about this in another entry because there are a lot of people with this surname connected to the harassment.

 

I was trying to trace who in my circle has a connection to this family and what do I find? Person #2 and person #1.

 

More about this on another entry but suffice it to say, they asked me for a very large amount of money and they did so by harassing me and calling the house of my family members non-stop. I did not know any better back then. They were but starting to escalate the economic harassment at that time so I had no idea what was happening. Initially. just to stop the harassment and the rude attacks , I agreed to settle the entire amount in installments, with the agreement they would stop adding interest. However, after a number of payments, I noticed it was not decreasing but instead the amount was getting bigger. That's when I started to notice what was going on.

 

Then I remembered what a cousin and an uncle by affinity told me about the nature of their work (the latter worked in a company dating back to my young years that gave them the avenue to do a background check and credit investigations, a company which I found out later is owned by a person who figures in on this entwined stories). Their work is to do credit investigations and to exact payment from people for companies they represent. They are not lawyers but company agents. They try all sorts of tacks , mostly threats, to get people to pay. That's when I realized what was happening.

 

I called the company, asked them why they continued adding to the charges , not following the agreement.

 

I told them I already wanted to talk to the top executives in the bank. I asked for the number (I can't contact the bank, I am but directed to customer service and customer service is instructed to direct me back to this third party company). I told them I wanted to talk to the bank's lawyers so they could check that  they forwarded my account to legal and charged me such a huge amount for their fees when they were supposed to be giving me back reversals.

 

They said they could not do that. They are making money off the legal cases forwarded to them so they can't help me with contacting the bank.

 

I said it's not right, the contract i had was with the bank, not them, why can't I talk to the bank?

 

They threatened if I do not continue to give them the installment, they would file a case.

 

That's when I finally said I've had enough. "Okay, tell me the name of your lawyer, give me your address and I will go there."

 

They said I need not do that anymore and stopped the harassment.

 

Months or a year after, when I finally told somebody about the harassment I went through, coincidence of coincidences occurred!

 

I received a mail saying they have selected me for a condonation program whatever - and have lowered the charges to the actual rate I only had to pay, about 200,000 or so lower than what they were charging me. Since the charges  already reflect my actual credit card transactions, I agreed to pay it in full AFTER YEARS OF TORMENT, of harassment, of destroying my persona in the people they called and harassed as well (house of my kins and my previous office).

 

*** I noticed that they have also done the same thing to people in my circle who they know have money and who were a bit more understanding of me as others were.

 

 

The link to the bank I only know about?

 

THE ROMANTIC PARTNER  OF PERSON #1. He's a programmer / top honcho (?) in this bank's regional branch in another country.

 

 

 

And an office mate who went on board the company I was in at that period I was sent the  condonation mail by the bank. 

 

1. This colleague had some work mates meet with "his aunt". This got my attention when he mentioned this because that's the time he also mentioned his bet amounted to 150,000.

 

He's from the same place being indicated by #1 as the town she took her college education in.

 

2. He is friends with and connected to another girl colleague. The girl's EX is this colleague's cousin, so their connection goes way back even before they became my work mates.

 

The girl's ex apparently comes from the same school I came from, and the same exclusive group I was supposed to be a part of but did not join, as per the GF.

 

The girl colleague is the one benefiting from the accounts and projects that are mine but I am being blocked from taking. I also read in one of her posts that she met with people closely linked to my business partners at a time when I could not communicate with anyone because I was being blocked from accessing my real account, and I was chained by the same circumstances I am in now.

 

I discovered before that she has tagged my name so every time the clients will look for me, they would find her, too. Quite an unethical tack.  

 

More on this in another entry. 

 

 

Read more…

Winners and Losers

If we ever get out of the experiment, there will be winners and losers.  The winners who get a cash award will be the ones who had their minds read, heard, watched and surveilled by millions of people coupled with electronic torture to the head, radiation poisoning to the heart and internal organs, sexual attacks and unanswerable domestic spies in every day life.  The losers will be people who claim they are being electronically harassed with voices and no apparent tampering to their bodies, mainly their heads.  The losers are misguided.  They have mental illness or other reasons for being here.

Read more…

Dear Fellow Activists and Targeted Citizens,

As a matter of urgency I personally recommend that you see the digital premiere of Jeff Warrick's superb feature documentary, "PROGRAMMING THE NATION?" on-line. You can now access and view this work at my website: http://www.surveillanceissues.com  

Jeff Warrick has agreed to make a sequel to this highly successful movie

***More importantly, Jeff has also agreed to make a sequel to this highly successful movie, (that was first released theatrically in 2011) I want every victim or campaigner to help themselves to an early Christmas present and WATCH this film, (for only $4.99), and to DONATE whatever they can afford, (be it $5, $10 or more), to the film appeal; to produce a sequel.

 Dr. Rauni Kilde and Dr. John Hall and many other experts

have agreed to be in this documentary

(Donations needed to get this movie produced - Please help if you can)

Every dollar will help to pay for pre-production expenses and to begin interviewing the experts, (like Dr. Rauni Kilde and Dr. John Hall), who've agreed to take part in the project. 

More information about the movie and how to donate  visit:

 http://us2.campaign-archive1.com/?u=a4af2b6a1ce42fea91e1229f5&id=c610fc4e3b&e=0d74f7076f

 

 

Thanks in advance,

Paul Baird for
Jeff Warrick
writer / producer / director
"PROGRAMMING THE NATION?"
Ignite Productions, LLC
 (831) 247-0729
http://www.programmingthenation.com
https://www.youtube.com/IgniteTheMind
jeffw@igniteproductions.net

Read more…

battle poem

battles are won
battles are lost
electronic torture
spying
cops
no rest
no sleep
accidents
weak
tumours
cancer
heart attacks too
fighting diseases
its the goverments true
cant think
complain
fight when your weak
try to rest
regain energy,sleep
through our troubles
panic
left side attacked
to win this fight
regain our lives back
dont despair
dont stop believing
united we are
our love
our feelings
take what they want
not our hearts
but our minds
research your troubles
the truth,you shall find
our daily problems
like forest gump run
dont give up our fights
till our battle is won!

 

best wishes n love lots

denny

Read more…

For more than a decade now, by employing various forms of multi-media - the strongest of which is the internet - the perps  have managed to enjoin a lot of people in the entertainment-bullying they have designed and crafted. Purveyors of these industries, they were able to enjoin politically-powerful and moneyed people in a game of bullying and voyeurism that later turned out to be a gambling and stealing money-machine.

 

With lots of people now involved in this, I will start with the ones closest to the core of it all and the ones who had access to me and the people they can control:

 

1. My PC supplier way back early 2000s and my family's supplier till now. Her staff was already giving me hints before, asking me if she really was my friend, etc, but I didn't listen. I thought he was but badmouthing her.

 

I found the PCs in this network had hidden volumes on them. That's how I found out about the banana boot and Intel AMT. Even the new laptop my mother bought before couldn't be configured. It referred to a hidden volume every time there was an attempt to secure it. All PCs are controlled by the Trusted Platform Module and EHome, I discovered. Whenever I tried to secure it and change ownership to admin or actual PC owner. it reverts to TPM or it malfunctions. I saw in a usb she gave to my mother a file which, when I researched on it, showed that it's an app that allows remote control of PCs and it will hide itself when installed.

 

2. This supplier is related by affinity to the friend I referred to here: 

 

 

 

https://peacepink.ning.com/profiles/blogs/may-i-copy-this-and-may-i-ask-for-more-info-on-this-may-be-very
https://peacepink.ning.com/profiles/blogs/comment-on-project-blue-beam
https://peacepink.ning.com/profiles/blogs/darn-you
https://peacepink.ning.com/profiles/blogs/war-victims-fund-do-they-reach-the-real-victims
https://peacepink.ning.com/profiles/blogs/if-for-some-people-this-is-about-the-money-here-s-my-last-will

3. She was involved in a FOREX scam before and she lost everything because of it. She said she was able to get back on her feet again because she was helped by a top honcho at Intel who gave her good deals on Intel products. This helped her position her companies in the IT industry.

4.Her best-friend/classmate is the wife of THE GUY WHO HAD MY FATHER AMBUSHED early 2000s. I only knew they knew each other when she told me this person owned the biggest aquarium in the land. 

a. This guy was a colleague of my father's. 

This is what I remember of him:

When I was in high school, first year I believe, he saw my friend and I waiting for a public utility vehicle along the road in front of a beach resort. He stopped and told me we could ride in his car. I knew he worked with my father and I treated my father's colleagues as uncles and aunts. 

The entire trip, he bombarded me with spiteful talk about my father, I could not say anything, I did not know why he was doing that. My classmate, who was with me, asked me why he was doing that. She said "doesn't he even consider you are your father's daughter and you are but a child? why would he talk to you about your father that way?"

After that I realized what he was doing every time he would ask his brother to go to our house to leave a message, he wanted to have us go against each other. He wanted to break up our family.  

His brother would look for my mom and when I'd ask why :he'd say "my brother asked me to tell your mom your father left his travel bag in the office. (To be fair to his brother, he always looked apologetic and he seemed like he didn't like what he was doing every time he did this.)

As it turned out,these were the times when,  my father said he's on a travel trip but he was actually with his mistress. Apparently, every time he'd get a chance, he would attack my father by  destroying him in the eyes of his family and harming us as well (why would he involve a child who does not know anything about their power struggle just so he could hit at my father covertly?)

b. The one who was heading the harassment on me in the office I worked in, the one who was giving instructions to the ones playing the game there, has the same family name as this guy, and they are from the same general area.

When I discovered the proof of the online fraud there, the person left to be with an uncle who died. This may be coincidental and may be completely unrelated EXCEPT that I have to write this down because in their game, birth is when one project or app is created, marriage is when there's union between parties, and death is when one is caught or had to be stopped.

c. Coincidentally, person B's connection to me is not limited to the office or to the shared surname with person A.Apparently, a classmate way back in college come from their circle, as  emails indicate.

This classmate is the cousin of my housemate while I was still in school . My 2nd mobile phone - back when mobile phones are but starting here - was from this classmate's BF. I brought it from him

5.  THE ROMANTIC PARTNER  OF PERSON # 1 is a programmer / top honcho (?) in a bank that made me go through YEARS OF TORMENT and harassment.

6. She may have been trying to program me early 2006. She told me if she only had what I have, she's gonna use it to her advantage. She told me I can use it to get rich. She told me I can be with old guys who will be willing to buy the world for me. She actually told me how I could do it by setting as an example what her friend did. She said I can go to bars and buy a drink or two and just wait till a guy approaches me, then after that they'd the drinks and more.

She also introduced me to a guy friend who went with us in another town. She said that was the type of guy I should date. The guy was her age or her senior, which means the guy's way way older than I am.

Read more…

BND

You who left me with no trace,
Who are you?
Will you allow me your name and your person
before I go?
Once in my darkest moment
you became my light.
Once in the sea of hopelessness,
you became my hope.
I am now ready to embrace the void,
Will you allow me a glance
before I go?

Read more…

FBI, Authorities: My perps are posting here

The ones who have stopped me from saving my files (evidence) and the ones who have stolen this are posting in this site to again controvert issues and destroy any access point I have to escape from their prison.

They have used Remote Management and also coursed through the router to control the files here. The insider moles also physically delete files and install trojan to allow remote control by their cohorts.  I believe there will be data of who is accessing the PC I am using and visiting the sites I have visited PLUS who posted in these sites to attack me.

They have been doing this ever since, ensuring everywhere I go, even online, I will be harassed.

Read more…