All Posts (12225)

Sort by

Remote Neural Monitoring : A Technology Used For Controlling Human Brain

80

By hassam


HAVE you ever thought about something you never shared with anyone, and havebeen horror-struck at the mere thought of someone coming to know aboutyour little secret? If you have, then you probably have all the morereason to be paranoid now thanks to new and improved security systemsbeing developed around the world to deal with terrorism thatinadvertently end up impinging on one's privacy.

Some of the countries involved in such programmes include USA, UK, Spain,Germany and France. Recently, the National Security Agency (NSA) of theUS has developed a very efficient method of controlling the humanbrain. This technology is called Remote Neural Monitoring (RNM) and isexpected to revolutionise crime detection and investigation.

What is it?

RNM works remotely to control the brain in order to read and detect anycriminal thought taking place inside the mind of a possibleperpetrator. Research studies have shown that the human brain thinks ata rate of about 5000 bits per second and does not have the capacity tocompete with supercomputers performing via satellites, implants andbiotelemetry. The human brain has a distinctive set of bioelectricresonance system. For the RNM system, supercomputers are being usedand, thus, with its help, supercomputers can send messages through animplanted person's nervous system in order to influence theirperformance in a desired way.

RNM has been developed after about 50 years of neuro-electromagnetic involuntary humanexperimentations. According to many scientists, within a few years itis expected that DNA microchips will be implanted in the human brainwhich would make it inherently controllable. With RNM, it will bepossible to read and control a person's emotional thought processesalong with the subconscious and dreams. At present, around the world,supercomputers are monitoring millions of people simultaneously withthe speed of 20 billion bits per second especially in countries likeUSA, Japan, Israel and many European countries.RNM has aset of certain programs functioning at different levels, like thesignals intelligence system which uses electromagnetic frequencies(EMF), to stimulate the brain for RNM and the electronic brain link(EBL). The EMF Brain Stimulation system has been designed as radiationintelligence which means receiving information from inadvertentlyoriginated electromagnetic waves in the environment. However, it is notrelated to radioactivity or nuclear detonation. The recording machinesin the signals intelligence system have electronic equipment thatinvestigate electrical activity in humans from a distance. Thiscomputer-generated brain mapping can constantly monitor all electricalactivities in the brain. The recording aid system decodes individualbrain maps for security purposes.

What does it do?

For purposes of electronic evaluation, electrical activity in the speechcentre of the brain can be translated in to the subject's verbalthoughts. RNM can send encoded signals to the auditory cortex of thebrain directly bypassing the ear. This encoding helps in detectingaudio communication. It can also perform electrical mapping of thebrain's activity from the visual centre of the brain, which it does bybypassing the eyes and optic nerves, thus projecting images from thesubject's brain onto a video monitor. With this visual and audiomemory, both can be visualised and analysed. This system can, remotelyand non-invasively, detect information by digitally decoding the evokedpotentials in 30-50Hz, 5 millwatt electromagnetic emissions from thebrain. The nerves produce a shifting electrical pattern with a shiftingmagnetic flux which then puts on a constant amount of electromagneticwaves. There are spikes and patterns which are called evoked potentialsin the electromagnetic emission from the brain. The interesting partabout this is that the entire exercise is carried out without anyphysical contact with the subject.

The EMF emissions from the brain can be decoded into current thoughts, images and sounds in thesubject's brain. It sends complicated codes and electromagnetic pulsesignals to activate evoked potentials inside the brain, thus generatingsounds and visual images in the neural circuits. With its speech,auditory and visual communication systems, RNM allows for a completeaudio-visual brain to brain link or a brain-to-computer link.

Of course, the mechanism needs to decode the resonance frequency of eachspecific site to modulate the insertion of information in that specificlocation of the brain. RNM can also detect hearing via electromagneticmicrowaves, and it also features the transmission of specific commandsinto the subconscious, producing visual disturbances, visualhallucinations and injection of words and numbers in to the brainthrough electromagnetic radiation waves. Also, it manipulates emotionsand thoughts and reads thoughts remotely, causes pain to any nerve ofthe body, allows for remote manipulation of behaviour, controls sleeppatterns through which control over communication is made easy. Thiscan be used for crime investigation and security management.


Concerns

With all the given benefits of RNM for tracking the illicit and treacherousactivities, there are many concerns and risks being pointed out byhuman rights activists and other scientists. The agencies of humanrights around the world have criticised RNM as a violation of basichuman rights because it violates privacy and the dignity of thoughtsand activities of life. Several countries have protested against it andrefer to it as an attack on their human and civil rights. Thescientists protesting against the use of RNM believe that people whohave been implanted involuntarily become biological robots and guineapigs for RNM activities in the guise of security. This is an importantbiological concern related to microchip implantation, which is a hiddentechnology using microwave radiations for the control of the mind.

Scientists believe that like leukemia and the cancerous risks posed by mobilephones which also emit microwaves, RNM can also pose similar threats toa subject's overall health as the heating effect of tissues with thespeed of light is a known effect of high powered microwave andelectromagnetic pulse weapons.

Thus, RNM remains a controversial technology which is being used in many countries for security maintenance and surveillance.

(http://hubpages.com/hub/Remote-Neural-Monitoring--A-Technology-Used-For-Controlling-Human-Brain)


Read more…

More Threats On My Son's Life

August 13, 2010

Federal Bureau of Investigation

Federal Building

11 Elmwood Avenue

Burlington, Vermont 05402

Re: Violations of Civil Rights of Lynn Clarise Bahrenburg

Criminal Stalking – Electronic Harassment


To Whom It May Concern:

The FBI is the lead agency for investigating violations of federal civil rights laws. Your website states that your agency takes that responsibility seriously yet I have seen no evidence of it.

I have not heard from you regarding previous correspondence advising you that U. S. military stealth weapons are being used against me for the purpose of intending to do the following: Frighten, terrorize, threaten, harass, injure and kill. This applies to family members as well. I am asking once again for your agency to do its job and look into the matter.

My son has had his Driver’s License stolen as well as his U. S. Passport and cell phone containing an extensive listing of friends and business acquaintances. They have threatened to do harm to my son and in the past year alone he has been caused great bodily distress including projectile vomiting on (3) separate occasions. He is also being subjected to enormous stress and subliminal messaging into his brain in an effort to destroy not only our relationship but his career at a time when he needs to be healthy and focusing on a career change.

IT IS THE RESPONSIBILITY OF THE FEDERAL BUREAU OF INVESTIGATION TO PROTECT MY SON, AND I, THEREFORE, HOLD YOU TO THAT OBLIGATION.

As you know, it is being carried out by devices used to emit or radiate an electronic or electromagnetic pulse, current, beam, signal or microwave intended to cause harm to me and my family and also to destroy or disrupt my electronic equipment.

There seems to be no punishment for these criminals and their stalking cohorts who have caused me great personal injury and property damage. Criminals in high places who are allowed to go about freely without penalty and the Federal Bureau of Investigation keeps silent about the assault and abuse that targets me 24/7 compliments of United States government agents and agencies.

Enclosed are identities of a few lead stalkers here in your Burlington area. You may or may not be interested in adding their names to the FBI’s list of criminals allowed to roam the streets freely stalking single men and women and young girls.

Very truly yours,

Lynn Bahrenburg

Enclosures

cc: Attorney General Eric Holder, U.S. Department of Justice 950 Pennsylvania Avenue, NW, Washington, DC 20530-0001

Read more…

recording stalkers

I live in an area called the university district. It is specifically frat row. All my immediate naieghbors salnder me and harrass me. They at times have said they are only saying what they are told to say. there have been parties at every house surrounding my residence that seem to be aimed at makinf fun of me. If you have immediate neighbors who are taking part in gang stalking, you can get recordings of the things they say.
Read more…

perps' methods of operation


There are sights that show proof to the fact that the "perps" can see through your eyes and hear through your ears. For years I believed in cameras, and I do believe it started that way, but I no longer get the feeling I'm being watch. How big is the city you live in? I live in Seattle and am announced several minutes before I actually arrive at a place so they can be ready to do their work as gang stalkers. If you can catch some of the things certain people say on a recorder, and use that combined with a journal(this works best with somebody like a direct neighbor that harasses you) you can make a huge step in personal assertiveness by gettint a no contact order. If you can get them ever using your name you can make it stick, especially if they ever threaten you in any way.
Paul Philp "The New Abolitionist Movement
Read more…
There are many people's name listed on "To You Our Selected Witness" email protesting material. I'm wondering about the possibility of asking them to join a SSN to be able to communicate within the people on the list. It could be here or Monika's SSN, or somewhere else. When the survey was first introduced to the victims, we did not have social network. It was marely some website and forums like Fedame.

Social network website has many features like blogging and others. It would be nice to know others who are on the list more, so that only few active people from the list is not the ones capable of communicating to each other. If it's possible, the people on the list might be able to create a group to join and to know each other in the discussion. Because the list has been awhile on the net, and we don't know what happened to all the people who voluntary filled the form. I thought it helps to keep the victims tied in one place together.

The point is that the survey was done by the mail team and some team members have own social networks, so it would be nice if one of them who is interested in this option could take the responsibility and contact the people on the list for invitation to the network to belong.

Like, I've been a TI since 2006, so it's already 4 years for me. I am just curious how others who have been on the lists doing. Like it's a chance of reunion, you know.
Read more…

INTERGENERATIONAL STALKING

08/25/10 What do I know?

* No sleep last night but did go into a light trance.
* No communication from ma wonderful "frey-ends"
* My left arm works after some self acupressure.
* Tortureboy is watching my every word.

* It helps to know that most of the stuff downloaded
into my head is all software derived & it helps
to keep in mind there is a time delay, and much of it is an
automatic reaction where my mind generates it's
own responses....thought broadcasting in the voice
of our mercenary "friends".

So much crap has
been downloaded into my brain that anytime
I'm not concentrating on a particular thing
my brain mechanically and automatically goes into repetitive
machine generated talk. This sounds like out loud
speech but it isn't. It's thought broadcasting
which comes about when you are sleep deprived.

How much of my "conversation" with tortureboys
is just me generating both ends of the conversation?
A lot. This is why "they" don't want you talking out loud.
My mind is entrained to generate responses that I
think are V2K but it's just me talking to myself.

Anyone unfamiliar with remote torture will
naturally conclude that, 'yes you are talking
to yourself and yes you are crazy'.
This is why it is so easy to get away with this stuff.
It can never be proved that I am not crazy b/c
it is common for ppl with scz to say just that.
This is why


How devious is that?
Read more…
http://wikileaks.org/wiki/WikiLeaks:SubmissionsDelete Comment


WikiLeaks accepts classified, censored or otherwise restricted material of political, diplomatic or ethical significance. WikiLeaks does not accept rumour, opinion or other kinds of first hand reporting or material that is already publicly available.

Submitting confidential material to WikiLeaks is safe, easy and protected by law.
We have several methods, but the best for most submissions is:

Click here to securely submit a file online
(bank grade encrypted submission, no logs kept and protected under Swedish and Belgium press secrecy laws)

You can also use secure TOR network
(secure, anonymous, distributed network for maximum security)


Join our chat and we will answer any questions or problems you might have
Our chat is secure and anonymous. Visitors are protected on many layers, they can't see each other,
there is an anti-logging mechanism in place and the server forbids using any potentially dangerous commands that could reveal other user's identity.
Communication is secured with SSL encryption.

Over 100,000 articles catalyzed world-wide. Every source protected. No documents censored. All legal attacks defeated.
Read more…

Did anyone experience sexual harassment


 A
psychiatrist at xxx Hospital, xxx , CA. He put me on 14 days hold without seeing me for diagnosis. Few days later from my  admission to the hospital, he asked me to sign the voluntary patient  form and promised me to discharge from the hospital on next Monday.
However, he went on to the trip to the child psychology meeting on next  week (10/23/2006), and the substitute, Dr. xxx  tried to keep me  in the hospital.
I wonder if I was used for his study without informed consent. What I know is that after I signed the voluntary
patient form, I woke up in the morning with stomach pain and the  bleeding from the bottom. It was like I was raped while I was under the  deep sleep from  the sleeping pills I received from the nurse.

In the diagnosis, his information about me was half wrong and he only mentioned his sexual  interest. I supposed be claimed as suicidal, but he did not write  anything about destructive behavior nor any reason he thought me as
gravely disabled. It was much like his diagnosis did not show the reason  of what he thought as danger to others nor gravely disabled.

My concern is that he is a professional of child psychology. I wonder if  his diagnosis on children are the same as what happened to me. Also, if  he is working for the government's covert operation on mind control, I  can tell the possibility from his interest on child as well as legally  kidnapping patients like me with bogus diagnosis.

Read more…

Genie (Arabic: جني jinnī, or djinni)


science technology engineering influenced by a jinn

technology developed by man ... For the jinn or he would influence, and the report of the jinn ... Because he does good and evil.

for help read the manzil

Genie (Arabic: جني jinnī, or djinni) is a supernatural creature in Pre-islamic and Islamic mythology which (according to both mythology) occupies aparallel world to that of mankind, and together with humans and angels makes up the three sentient creations of Allah. According to the Qur’ān, there are two creations that have free will: humans and jinn. Religious sources don't mention much about them; however, the Qur’an mentions that jinn are made of smokeless flame, and their form being just similar to humans, which also can be good or evil.[1]

The jinn are mentioned frequently in the Qur’an, and there is a surah entitled Sūrat al-Jinn in the Quran. It is a frequent misconception that Islam says that Iblīs was a jinn; however, like Christian tradition, Islam also suggests that Iblīs was an angel that rebelled against God's orders.[2] After the rebellion, he was granted a respite to lead humans astray until the Day of Judgment. However, Iblis has no power to mislead true believers in Allah. Some Islamic scholars have ruled that it is apostasy to disbelieve in one of Allah's creations. Some research by the American Jewish Committee has shown that the belief in jinn has fallen compared to the belief in angels in other Abrahamic traditions.


for help read the manzil

If you want , you can read this :


Manzil (Arabic: منزل‎, plural منازل manāzil) is the word for one of seven parts of roughly equal length into which the Qur'an is divided for the purpose of reciting the entire text in one week.

They are:

  1. Al-Fatihah (1) through An-Nisa' (4)
  2. Al-Maida (5) through At-Tawba (9)
  3. Yunus (10) through An-Nahl (16)
  4. Isra' (17) through Al-Furqan (25)
  5. Ash-Shuara' (26) through Ya-Seen (36)
  6. As-Saffat (37) through Al-Hujarat (49)
  7. Qaf (50) through An-Nass (114)

It follows this pattern:

  1. The first 4 chapters
  2. The next 5 chapters
  3. The next 7 chapters
  4. The next 9 chapters
  5. The next 11 chapters
  6. The next 13 chapters
  7. The remaining 65 chapters.

A second meaning is a set of verses from different parts of the Qur'an which help in curing or preventing Sihr(evil magic). The collection of these verses is available in booklet form from various publishers.

Read more…
Emerging Picture of War in Iraq and Afghanistan from Wikileaks Files: DevastatingPDFPrintE-mail
Monday, 26 July 2010 16:11
Share Link:Share Link: BookmarkGoogleYahoo MyWebDel.icio.usDiggFacebookMyspaceRedditMa.gnoliaTechnoratiStumble UponYahoo BookmarksMSN LiveYigg

Wikileaks.org, over the past few months, has released some of the most damning evidence yet against theongoing occuptions in Iraq and Afghanistan.

Collateral Murder (released April 5, 2010)

Collateral Murder is the military's own video of 12 Iraqis being shot and killed from a UShelicopter circling above. No one has been charged in connection withthese killings. However, 22 yr. old Pfc. Bradley Manninghas been held incommunicado on military bases for several months now,suspected of leaking this incriminating video to Wikileaks. World Can'tWait is distributing copies of this harrowing video so that many morepeople in the US see what is being done in their names. For a copy, write to us.

More:

How to Show "Collateral Murder" Outside in Public

Ethan McCord: Memories of “Collateral Murder” - by Someone who was There

Anthony Wagner: Collateral Murder

Message from Iraq Veterans Against the War:

What stands out to us at IVAW is the regular, seemingly commonplaceoccurance of civilian death depicted in the body of Wikileaksdocuments...

In a recent interview on Democracy Now, Wikileaks' founder, Julian Assange put out a call: "We really need the public, other journalists and especially formersoldiers to go through this material and say, 'Look, this connects tothat,' or 'I was there. Let me tell you what really happened. Let metell you the rest of the detail.' And over the next few days, we'll beputting up easier- and easier-to-use search interfaces, the same onesthat our journalistic teams use to extract this data."

These search tools will allow any soldier or veteran to look through thetrove of documents on Wikileaks and find reports of incidents they wereinvolved in to check for their accuracy and provide more details.
IVAW members are answering the call to humanize these 'war incidents.'Right now, we are mobilizing our membership to look through therelevant Wikileaks materials, and provide additional information forthe public.

For more information, see: ivaw.org

To help sift through the evidence released by Wikileaks, go to wardiary.wikileaks.org.

Afghan War Diary (released July 26, 2010)

Wikileaks released 76,000 military records exposing the truth of the unjust, illegitimate war in Afghanistan: revealing hundreds of civiliandeaths, execution squads, other war crimes. They have 15,000 morerecords from Afghanistan that they are holding back for the timebeing. For more on the developing picture emerging, see The Afghanistan War Logs on the Guardian UK and Wikileaks.org (both are being regularly updated). If Wikileaks is down, it may be overloaded. To see the files, go directly to wardiary.wikileaks.org.

Webcast: Anti-War Leaders and Veterans Respond to the WikiLeaks Revelations (recorded August 1, 2010)

Watch recording now: www.livestream.com/worldcantwait

World Can't Wait presents a national webcast of anti-war leaders and veterans responding to the WikiLeaks revelations. What should we doNOW, immediately to end the occupations of Afghanistan & Iraq?

Featuring:

  • Dahr Jamail, journalist, author of "Beyond the Green Zone"
  • Cindy Sheehan, antiwar leader, author, Director, Peace of the Action
  • Josh Stieber, Army veteran of Bravo Company 2-16
  • Matthis Chiroux, Army veteran, Iraq war resister
  • Mike Ferner, President, Veterans for Peace
  • Ray McGovern, former CIA Agent, Veteran Intelligence Professionals for Sanity
  • Elaine Brower, military mother, World Can't Wait
  • Debra Sweet, Director, World Can't Wait

Julian Assange on the Afghan War Logs: "They Show the True Nature of this War"

Democracy Now! July 26th

The New Pentagon Papers: WikiLeaks Releases 90,000+ Secret Military Documents Painting Devastating Picture of Afghanistan War

With independent British journalist Stephen Grey; Pentagon Paperswhistleblower, Daniel Ellsberg; former State Department official inAfghanistan, Matthew Hoh; independent journalist Rick Rowley; andinvestigative historian Gareth Porter.

Democracy Now! July 28th

We spend the hour with Julian Assange, the founder of WikiLeaks, talkingabout the biggest leak in US history: the release of more than 91,000classified military records on the war in Afghanistan.

Democracy Now! August 3rd

Julian Assange Responds to Increasing US Government Attacks on WikiLeaks

Further Coverage:

Watch Julian Assange at press conference July 26.

Kevin Gosztola: Nearly 92,000 Classified Documents Leaked, Expose Truth of Afghan War

Wikileaks files 'may reveal thousands of war crimes' (Independent.co.uk)

US condemns Wikileaks: Julian Assange says "this is the story of the war" (BBC)

Chris Floyd: Leaky Vessels: Wikileaks "Revelations" Will Comfort Warmongers, Confirm Conventional Wisdom

Ray McGovern: WikiLeaks Bombshell Docs Paint Afghan War as Utter Disaster -- Will We FinallyStop Throwing Money and Lives at This Catastrophe?

Jason Ditz: Pentagon Launches ‘Manhunt’ for Document Leaker

Kenneth J. Theisen: Use the WikiLeaks Afghan War Diary to Mobilize Resistance to the U.S. War of Terror

Kevin Gosztola: The Danger of the Wikileaks' Leak: You Might Stop Thinking Like an American

Cindy Sheehan: I Have Become Uncomfortably Numb

Debra Sweet: More War Crimes Exposed - Now, What Do We Do?

Revolution editorial: WikiLeaks: Exposing War Crimes of a Criminal War

Read more…

We Stand With Bradley Manning

We Stand With Bradley Manning

Bradley Manning If Bradley Manning is the sources of any or all of the recentinformation about Afghanistan and/or the "Collateral Murder" videoreleased by Wikileaks, he is a hero. Whether or not he is the leaker,he should be released immediately.

For more background information, see Wikileaks reveals video showing US air crew shooting down Iraqi civilians and Army Intelligence Analyst Charged for Releasing Wikileaks Video: Killers Remain Free

Also see: bradleymanning.org where you can donate to his legal defense.

Join savebradley on Facebook

Write to Bradley with your support:

Inmate Bradley Manning
USMC Base Quantico Brig
3247 Elrod Avenue
Quantico, VA 22134

Sign on to this statement of support:

Bradley Manning is the U.S. soldier held in a USmilitary prison in Kuwait (moved to Quantico VA on July 29, 2010) whohas been arrested and charged with two violations for releasingclassified information (the Wikileaks "Collateral Murder" video) andfacing 54 years in prison. He is being held in isolation from theoutside world – with no contact with his civilian attorneys working todefend him. If the allegations are true, we believe that BradleyManning is a hero for bringing to light the realities of the crimesbeing committed in the U.S. occupation. We call for his immediaterelease and that his attorneys be allowed to talk to him.
Read more…
Before the Protests Tommorrow at Fort HoodPDFPrintE-mail
Saturday, 21 August 2010 19:12
Share Link:Share Link: BookmarkGoogleYahoo MyWebDel.icio.usDiggFacebookMyspaceRedditMa.gnoliaTechnoratiStumble UponYahoo BookmarksMSN LiveYigg

By Emma Kaplan

I am in Killeen, TX at Under The Hood Cafe near the Fort Hood military base tonight. I am down here for the protests happening onSunday being called by the Disobedient.

The Disobedient is made up of Iraq era war vets and others anti- war activists, mainly young people. These protests are going to includevisible non-violent resistance to the 3,000 troop surge being headed toIraq. They are acting to create a situation where the U.S. cannotcontinue this illegitimate and illegal war - that deployments not onlystop but that the military withdraws immediately.

This town is really intense. It is about 100 degrees outside and incredibly humid. There is a whole military culture throughout the townthat is shaped by unthinking allegiance to the military, and anobsession with the American flag. I have been told that Christianfundamentalism has a firm hold on most people. It is also verydepressing with nothing but strip clubs, bars and fast food chains. Themajority of people here are employed by the military. Some local youthtold me that they have heard reactionary people say that the namestands for Kill Each And Every N*****.

I spent the day at Under The Hood Cafe, which is a GI coffeehouse run by anti-war Iraq veterans and others. It was a day of debate anddiscussion, with all of us thinking very deeply about how we can stopthese wars and what should our message be to the people of the world?One Iraq veteran spoke about orders he received to break down the doorsof families and the internal turmoil he went through when he was toldto search an innocent woman's underwear drawer. He got the word “Human”tattooed on his arm after he got out of the military. I talked to ayoung woman who is in her early 20's and did 2 tours of Iraq. She saidthat one of the first things she did when she got out of the militarywas to dye her hair pink. I have a hard time picturing her and any ofthese other people in the military because they have a great deal ofhumanity. She has a lot of urgency to stop these wars and refreshingrefusal to accept the world as it is. She talks about how she wishedthere was some kind of switch you could turn on in people to make themsee the crimes that the military is committing. Many who are here aredealing with pretty heavy PTSD and have trouble sleeping. They talkabout how their bodies have been forever changed by being in themilitary. Those participating in Sunday's action are filled with a deepdesire to tell the truth to people living in this country and people inthe military.

While many wonder, "what is it going to take to wake people," they AREwaking people up. In my opinion, the military is petrified of somethinglike this busting out, particularly on the day they are sending a troopsurge for this war that they have tried to re-brand as ending.

People protesting tomorrow are acting with great determination and aretaking risks to stop these wars much like Julian Assange of WikiLeaksand whoever has been leaking from within the military, as BradleyManning is accused of doing. There is the sense of being very strategicand serious about these actions. I think it's true what Assange says,"courage is contagious." It's contagious when you see it where you getyour coffee, it's contagious when you look at your window and you seemillions in the streets, it's contagious when you decide to be theperson who doesn't look away from the crimes of your government, andit's contagious when you see veterans resisting for the sake ofhumanity like this.

Many more people needing to be acting with this kind of resolve to stopthese wars. The Obama administration is not ending the Iraq war - theyare sending surges of troops to Iraq. They are standing against all whooppose these wars, including the anti-war vets.

Many more people need to hear about what is going on down here, payattention to what's going on in the world and support these protests.This will be the first time in history that Iraq veterans will attemptto stop a deployment. I am very anxious to see what happens and I hopeyou are too. More tomorrow.

Read more…

GSS Thursday Night 11 PM EST Conference Call

GSS Thursday Night 11 PM EST Conference Call

Dear Comrades,

The conference call was a success. We were able to interview two TI's about the crimes happening to them. Affidavits are currently being prepared for them, which they agree to take to a notary next week.

We do hope that you follow their direction, as we are close to starting the coalition.

Next conference call will be Thursday at 11PM on talkshoe.com. Or call 724-444-7444 id 83319 # pin 1 #

Affidavits and descriptions outlining your crimes should be submitted to: bmarkforce@yahoo.com

If you will like to be place on the talkshoe list for future conference call, contact me at Bmarkforce@yahoo.com

Our website is located at: http://govsponsoredstalking.info
Our Affidavit is located at: http://www.govsponsoredstalking.info/AFFIDAVIT.pdf

Thanks for your time and hope you attend the next conference call.

Chris J. Brunson
KWALSPONI
GSS3
Read more…




Over 1200 cases of torture globally from directed energy weapons and psycothonic weapons..

I am number 16 on one of the 450 cases of Torture in The AMERICAS
Over 450 Cases of torture in the Americas

Over 450 Cases of torture in the Americas

http://www.4shared.com/account/document/H1rPV-sN/over_450_TORTURE_CASES_from_TH.html?sId=1869lxYK37f8jDVW

Over 1200 cases of torture globally from directed energy weapons and psycothonic weapons..
Download

Over 250 Cases of Torture in Europe

http://www.4shared.com/account/document/HlIAHs_J/over_250_TORTURE_CASES_from_EU.html

over 60 TORTURE CASES from RUSSIA, UKRAINE & BELARUS.doc
http://www.4shared.com/account/document/PmBD78Fk/over_60_TORTURE_CASES_from_RUS.html

Over 20 Torture Cases from India and Asia
http://www.4shared.com/account/document/P9egBlAY/over_20_TORTURE_CASES_from_IND.html?sId=1869lxYK37f8jDVW
Read more…



scalartech12_top1.gif

by John St Clair Akwei
From an article in NexusMagazine April/May 96

fromMindControlForums Website

A lawsuitfiled against the U.S. National Security Agency revealsa frightening array of technologies and programsdesigned to keep tabs on individuals.
.

John StClair Akwei
vs
National Security Agency
Ft George G. Meade, MD, USA
(Civil Action 92-0449)
.

Thefollowing document comprises evidence for a lawsuitfiled at the U.S. Courthouse in Washington, DC, by JohnSt Clair Akwei against the National Security Agency, FtGeorge G. Meade, Maryland (Civil Action 92-0449),constitutes his knowledge of the NSA's structure,national security activities proprietary technologiesand covert operations to monitor individual citizens Ed.



1. THE NSA'SMISSION AND DOMESTIC INTELLIGENCE OPERATION

  • Communications Intelligence (COMINT)
    Blanket coverage of all electronic communications in the US andthe world to ensure national security. The NSA at Ft Meade,Maryland has had the most advanced computers in the world sincethe early 1960s.

    NSA technology is developed and implemented insecret from private corporations, academia and the generalpublic.


  • Signals Intelligence (SICINT)
    The Signals Intelligence mission of the NSA has evolved into aprogram of decoding EMF waves in the environment for wirelesslytapping into computers and track persons with the electricalcurrents in their bodies. Signals Intelligence is based on factthat everything in the environment with an electric current init has a magnetic flux around it which gives off EMF waves.

    TheNSA/DoD [Department of Defense] developed proprietary advanceddigital equipment which can remotely analyze all objects whethermanmade or organic, that have electrical activity.


  • Domestic Intelligence (DOMINT)
    The NSA has records on all US citizens. The NSA gathersinformation on US citizen who might be of interest to any of theover 50,000 NSA agents (HUMINT). These agents are authorized byexecutive order to spy on anyone. The NSA has a permanentnational security anti-terrorist surveillance network in place.This surveillance network is completely disguised and hiddenfrom the public.


    Tracking individuals in the US is easily and cost-effectivelyimplemented with NSA's electronic surveillance network. Thisnetwork (DOMINT) covers the entire US, involves tens ofthousands of NSA personnel, and tracks millions of personssimultaneously . Cost-effective implementation of operations isassured by NSA computer technology designed to minimizeoperations costs. NSA personnel serve in quasi-public positionsin their communities and run cover businesses and legitimatebusinesses that can inform the intelligence community of personsthey would want to track.

    NSA personnel in the community usuallyhave cover identities such as social workers, lawyers andbusiness owners.


  • Individual Citizens OccasionallyTargeted for Surveillance by Independently Operating NSAPersonnel
    NSA personnel can control the lives of hundreds of thousands ofindividuals in the US by using the NSA's domestic intelligencenetwork and cover businesses.

    The operations independently runby them can sometimes go beyond the bounds of law. Long-termcontrol and sabotage of tens of thousands of unwitting citizensby NSA operatives is likely to happen.

    NSA DOMINT has theability to assassinate US citizens covertly or run covertpsychological control operations to cause subjects to bediagnosed with ill mental health.

scalartech12_01.gif

The above symptomshighlight a fraction of the vast array of
Neuro-Electromagnetic Frequency Assaults perpetuated by the Policeand
Military Intelligence Agencies toward
Remote Mind Control Experiments, Behavioral Manipulation andMurder.

2. NSA'SDOMESTIC ELECTRONIC SURVEILLANCE NETWORK

As of the early 1960s, the most advanced computers in the world wereat the NSA, Ft Meade. Research breakthroughs with these computerswere kept for the NSA.

At the present time the NSA hasnanotechnology computers that are 15 years ahead of present computertechnology. The NSA obtains blanket coverage of information in theUS by using advanced computers that use artificial intelligence toscreen all communications, regardless of medium, for key words thatshould be brought to the attention of NSA agents/cryptologists.

These computers monitor allcommunications at the transmitting and receiving ends.

This blanketcoverage of the US is a result of the NSA's Signals Intelligence (SIGINT)mission. The NSA's electronic surveillance network is based on acellular arrangement of devices that can monitor the entire EMF(electromagnetic frequency)spectrum.

This equipment was developed, implemented and kept secretin the same manner as other electronic warfare programs.

  • Signals Intelligence RemoteComputer Tampering
    The NSA keeps track of all PCs and other computers sold in theUS.

    This is an integral part of the Domestic Intelligencenetwork. The NSA's EMF equipment can tune in RF (remotefrequency) emissions frompersonal computer circuit boards (while filtering out emissionsfrom monitors and power sup- plies).

    The RF emission from PCcircuit boards contains digital information in the PC. Coded RFwaves from the NSA's equipment can resonate PC circuits andchange data in the PCs. Thus the NSA can gain wirelessmodem-style entry into any computer in the country forsurveillance or anti-terrorist electronic warfare.


  • Detecting EMF Fields in Humansfor Surveillance
    A subject's bioelectric field can be remotely detected, sosubjects can be monitored anywhere they are.

    With special EMFequipment NSA cryptologists can remotely read evoked potentials(from EEGs). These can be decoded into a person's brain-statesand thoughts. The subject is then perfectly monitored from adistance. NSA personnel can dial up any individual in thecountry on the Signals Intelligence EMF scanning network and theNSA's computers will then pinpoint and track that person 24hours a day.

    The NSA can pick out and track anyone in the US.

scalartech12_02.gif

3. NSA SIGNALSINTELLIGENCE USE OF EMF BRAIN STIMULATION

NSA Signals Intelligence uses EMF Brain Stimulation forRemoteNeural Monitoring (RNM) and Electronic Brain Link (EBL).

EMF BrainStimulation has been in development since theMKULTRA program of theearly 1950s, which included neurological research into radiation(non-ionizing EMF) and bioelectric research and development.

Theresulting secret technology is categorized at the National SecurityArchives as "Radiation Intelligence", defined as,

"information from unintentionallyemanated electromagnetic waves in the environment, not includingradioactivity or nuclear detonation".

Signals Intelligence implemented andkept this technology secret in the same manner as other electronicwarfare programs of the US Government.

The NSA monitors availableinformation about this technology and withholds scientific researchfrom the public. There are also international intelligenceagreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyze electricalactivity in humans from a distance. NSA computer generated brainmapping can continuously monitor all of the electrical activity inthe brain continuously. The NSA records and decode individual brainmaps (of hundreds of thousands of persons) for national securitypurposes. EMF Brain Stimulation is also secretly used by themilitary for brain-to-computer link (in military fighter aircraft,for example).

For electronic surveillance purposes, electrical activity in thespeech center of the brain can be translated into the subject'sverbal thoughts. RNM can send encoded signals to the brain'sauditory cortex, thus allowing audio communications direct to thebrain (bypassing the ears). NSA operatives can use this covertly todebilitate subjects by simulating auditory hallucinationscharacteristic of paranoid schizophrenia.

Without any contact with the subject, Remote Neural Monitoring canmap out electrical activity from the visual cortex of a subject'sbrain and show images from the subject's brain on a video monitor.NSA operatives see what the surveillance subject's eyes are seeing.Visual memory can also be seen. RNM can send images direct to thevisual cortex, bypassing the eyes and optic nerves.

NSA operativescan use this surreptitiously to put images into a surveillancesubject's brain while they are in REM sleep for brain-programmingpurposes.

  • Capabilities of NSA OperativesUsing RNM
    There has been a Signals Intelligence network in the US sincethe 1940s.

    The NSA, Ft Meade has in place a vast two-waywireless RNM system which is used to track subjects andnon-invasively monitor audio-visual information in their brains.This is all done with no physical contact with the subject. RNMis the ultimate method of surveillance and domesticintelligence. Speech, 3D sound and subliminal audio can be sentto the auditory cortex of the subject's brain (bypassing theears), and images can be sent into the visual cortex. RNM canalter a subject's perceptions, moods and motor control.

    Speech cortex/auditory cortex link has become the ultimatecommunications system for the intelligence community. RNM allowsfor a complete audio-visual brain-to-brain link or brain-to-computer link.

scalartech12_03.gif

The above is a simpleflowchart of Nuero-Electromagnetic Frequency Assaults

showing methods thatcan be perpetuated by the Police and Military Intelligence Agencies

toward Remote MindControl Experiments, Behavioural Manipulation and Murder.

4. NATIONALSECURITY AGENCY SIGNALS INTELLIGENCE ELECTRONIC BRAIN LINKTECHNOLOGY

NSA SIGINT can remotely detect, identifyand monitor a person's bioelectric fields.

The NSA's Signals Intelligence has the proprietary ability tomonitor remotely and non-invasively information in the human brainby digitally decoding the evoked potentials in the 30-50 Hz, 5 milliwatt electromagnetic emissions from the brain.

Neuronal activity in the brain creates a shifting electrical patternthat has a shifting magnetic flux. This magnetic flux puts out aconstant 30-50 Hz, 5 milliwatt electromagnetic (EMF) wave.

Containedin the electromagnetic emission from the brain are spikes and patternscalled "evoked potentials". Every thought, reaction, motor command,auditory event and visual image in the brain has a corresponding"evoked potential" or set of "evoked potentials". The EMF emission fromthe brain can be decoded into the current thoughts, images and soundsin the subject's brain.

NSA SIGINT uses EMF-transmitted Brain Stimulation as acommunications system to transmit information (as well as nervoussystem messages) to intelligence agents and also to transmit to thebrains of covert operations subjects (on a non-perceptible level).

EMF Brain Stimulation works by sending a complexly coded and pulsedelectromagnetic signal to trigger evoked potentials (events) in thebrain, thereby forming sound and visual images in the brain's neuralcircuits. EMF Brain Stimulation can also change a person'sbrain-states and affect motor control.

Two-way electronic Brain Link is done by remotely monitoring neuralaudio-visual information while transmitting sound to the auditorycortex (bypassing the ears) and transmitting faint images to thevisual cortex (bypassing the optic nerves and eyes). The imagesappear as floating 2D screens in the brain.

Two-way electronic Brain Link has become the ultimate communicationssystem for CIA/NSA personnel. Remote neural monitoring (RNM,remotely monitoring bioelectric information in the human brain) hasbecome the ultimate surveillance system.

It is used by a limitednumber of agents in the US Intelligence Community.

scalartech12_04.gif

The above is a simpleflowchart of Nuero-Electromagnetic Frequency Assaults

showing methods thatcan be perpetuated by the Police and Military Intelligence Agenciestoward
Remote Mind Control Experiments, Behavioral Manipulation andMurder.

5. [NO HEADINGIN ORIGINAL DOCUMENT]

RNM requires decoding the resonance frequency of each specific brainarea.

That frequency is then modulated in order to imposeinformation in that specific brain area. The frequency to which thevarious brain areas respond varies from 3 Hz to 50 Hz. Only NSASignals Intelligence modulates signals in this frequency band. (SeeTable 1 below)

This modulated information can be putinto the brain at varying intensities from subliminal toperceptible. Each person's brain has a unique set of bioelectricresonance/entrainment frequencies. Sending audio information to aperson's brain at the frequency of another person's auditory cortexwould result in that audio information not being perceived.

The Plaintiff learned of RNM by being in two-way RNM contact withthe Kinnecome group at the NSA, Ft Meade.

They used RNM 3D sound direct to the brain to harass the Plaintifffrom October 1990 to May 1991.

As of 5/91 they have had two-way RNM communications with thePlaintiff and have used RNM to attempt to incapacitate the Plaintiffand hinder the Plaintiff from going to the authorities about theiractivities against the Plaintiff in the last 12 years. The Kinnecomegroup has about 100 persons working 24 hours a day at Ft Meade.

Theyhave also brain-tapped persons the Plaintiff is in contact with tokeep the Plaintiff isolated.

This is the first time ever that aprivate citizen has been harassed with RNM and has been able tobring a lawsuit against NSA personnel misusing this intelligenceoperations method.

scalartech12_05.gif

click above image

6. NSATECHNIQUES AND RESOURCES

Remote monitoring/tracking of individuals in any location, insideany building, continuously, anywhere in the country.

A system forinexpensive implementation of these operations allows for thousandsof persons in every community to be spied on constantly by the NSA.

  • Remote RNM Devices
    NSA's RNM equipment remotely reads the evoked potentials (EEGs)of the human brain for tracking individuals, and can sendmessages through the nervous systems to affect theirperformance. RNM can electronically identify individuals andtrack them anywhere in the US.

    This equipment is on a networkand is used for domestic intelligence operations, governmentsecurity and military base security, and in case of bioelectricwarfare.


  • Spotters and Walk-Bys inMetropolitan Areas
    Tens of thousands of persons in each area working as spottersand neighbourhood/business place spies (sometimes unwittingly)following and checking on subjects who have been identified for covert control by NSA personnel.

    Agents working out of offices can be in constant communicationwith spotters who are keeping track of the NSA's thousands ofsubjects in public. NSA agents in remote offices can instantlyidentify (using~ RNM) any individual spotted in public who is incontact with surveillance subject.


  • Chemicals and Drugs intoResidential Buildings with Hidden NSA Installed and MaintainedPlastic Plumbing lines.
    The NSA has kits for running lines into residential tap waterand air ducts of subjects for the delivery of drugs (such assleeping gas or brainwashing-aiding drugs).

    This is an outgrowthof CIA pharmapsychology (psychopharmacology).


  • Brief Overview of Proprietary USIntelligence/Anti-Terrorist Equipment Mentioned
    Fixed network of special EMF equipment that can read EEGs inhuman brains and identify/track individuals by using digitalcomputers. ESB (Electrical Stimulation to the Brain) via EMFsignal from the NSA Signals Intelligence is used to controlsubjects.

    EMF equipment that gathers information from PC circuit boards bydeciphering RF emissions, thereby gaining wireless modem-styleentry into any personal computer in the country. All equipmenthidden, all technology secret, all scientific researchunreported (as in electronic warfare research).

    Not known to thepublic at all, yet complete and thorough implementation of thismethod of domestic intelligence has been in place since theearly 1980s.

Editor's Note:

I tried ringing MrAkwei to find out what was the out-come, if any, of his court case.He firmly but kindly told me that he could not speak about anythingto do with the case over the phone and hung up. A subsequentconversation of similar length resulted in the information that hedid not wish his address or phone number published with thisarticle.

So, if we hear of any developments, we'll let you know.

Its totallyobvious from the above article that the US NationalSecurity Agency is none other than a covertly runterrorist organization.

Their highly sophisticated technology that is used tomonitor and manipulate the minds of millions of innocentpeople daily, is a blatant expression of the dominatingand authoritarian mentality that exists behind thefacade of our so called democratic society.

George Orwell's "THOUGHT POLICE" is an absolutereality in today's world.

Whether we realize it or not, every individual withinour society is negatively effected by this dictatorshipattitude.

It has to change - It will change - It starts with you!

George Farquhar
Project Freedom


An example of EMF Brain Stimulation

Table 1

Brain Area
BioelectricResonance Frequency
Information Induced Through Modulation
Motor Control Cortex
10 Hz
Motor Impulse co-ordination
Auditory Cortex
15 Hz
Sound which bypasses the ears
Visual Cortex
25 Hz
Images in the brain bypassing the eyes
Somatosensory
9 Hz
Phantom touch sense
Thought Center
20 Hz
Imposed subconscious thoughts

RESOURCES

These publications have only been discovered sinceDecember 1991, after Plaintiff had already notifiedauthorities (Dept of Justice, etc.) of Public Corruption by named NSA employees.

When no action was taken against the NSAemployees, I researched the Intelligence Community electronicsurveillance technology involved and discovered the followingpublications.

  • The Body Electric: Electromagnetismand the Foundation of Life, by Robert Becker, M.D. Monitoringneuroelectric information in the brain ESB. (p. 265,313,318)

  • Cross currents, by Robert Becker.Simulating auditory hallucinations. Remote computer tamperingusing RF emissions from the logic board. (p.70,78,105,174,210,216,220,242,299,303)

  • Currents of Death, by Paul Brodeur.Driving brain electrical activity with external EM;magnetophosphenes; Delgado. (p. 27,93)

  • The Zapping of America, by PaulBrodeur. DoD EM ESB research; simulating auditoryhallucinations.

  • Of Mice, Men and Molecules, by JohnH. Heller 1963 Bioelectricity; probing the brain with EM waves.(p, 110)

  • The Three-Pound Universe, by JudithHooper. CIA EEG research; EEGs for surveillance. (p.29,132,137)

  • In the Palaces of Memory, by GeorgeJohnson. EM emissions from the brain; the brain as an openelectromagnetic circuit.

  • The Puzzle Palace, by James Bamford.Signals Intelligence; most advanced computers in the early'sixties.

  • The US Intelligence Community.Glossary terms at National Security Archives; RadiationIntelligence (information from unintentionally emanatedelectromagnetic energy, excluding radioactive sources).

  • The Search for the "Manchurian Candidate",by John Marks. Electrical or radio stimulation to the brain; CIAR&D in bioelectrics. (p.227)

  • Secret Agenda, by Jim Hougan.National security cult groups.

  • Crimes of the IntelligenceCommunity, by Morton Halperin. Surreptitious entries;intelligence agents running operations against governmentworkers.

  • War in the Age of IntelligentMachines, NSA computer supremacy, complete control ofinformation.

  • Alternate Computers, by Time-LifeBooks. Molecule computers.

  • The Mind, by Richard Restak, M.D.EEG Systems inc.; decoding brain EM emanations, trackingthoughts on a computer. (p. 258)

  • MedTech, by Lawrence Galton.Triggering events in the brain, direct to auditory cortexsignals.

  • Cyborg, by D.S. Halacy, Jr, 1965.Brain-to-computer link research contracts given out by the USgovernment.

  • Psychiatry and the CIA: Victims ofMind Control, by Harvey M. Weinstein M.D. Dr. Cameron; psychicdriving; ultraconceptual communications.

  • Journey Into Madness: The True Storyof Secret CIA Mind Control and Medical Abuse, by Gordon Thomas,Intelligence R&D; Delgado; psychic driving with radio telemetry.(p. 127,276,116,168,169)

  • Mind Manipulators, by Alan Scheflinand Edward M. Opton. MKULTRA brain research forinformation-gathering.

  • The Brain Changers, by Maya Pines.Listening to brain EM emissions. (p.19)

  • Modern Bioelectricity. Inducingaudio in the brain with EM waves; DoD cover-up; EM wave ESB;remote EEGs

  • Magnetic Stimulation in ClinicalNeurophysiology, by Sudhansu Chokroverty. Magnetophosphenes;images direct to the visual cortex.

  • The Mind of Man, by Nigel Calder. USintelligence brain research.

  • Neuroelectric Society Conference,1971. Audio direct to the brain with EM waves; 2-way remoteEEGs.

  • Brain Control, by Elliot S.Valenstein. ESB., control of individuals.

  • Towards Century 21, by C.S. Wallia.Brain Stimulation for direct-to-brain communications (p21)

  • Mind Wars, by Ron McRae (associateof Jack Anderson). Research into brain-to-brain electroniccommunications., remote neural EM detection (PP. 62 106, 136).

  • Mind Tools, by Rudy Rucker. Braintapping; communications with varying biomagnetic fields (p82).

  • US News and World report, January2nd 1984. EM wave brain stimulation; intelligence communityhi-tech (p38).

  • Ear Magazine. Article on extremelylow frequencies radio emissions in the natural environment;radio emissions from the human body.

  • City Paper, Washington DC January17, 1992. Article FCC and NSA "complete radio spectrum"listening posts.

  • Frontiers in Science, by EdwardHutchings Jr 1958 (p48).

  • Beyond Bio Feedback, by Elmer andAlyce Green, 1977 (p118)

  • The Body Quantum, by Fred Alan Wolf

  • Cloning; A Biologist Reports, byRobert Gillmore McKinnell. Ethical review of cloning humans.

  • Hoovers' FBI, by Former agentWilliam Turner. Routines of electronic surveillance work.(p280).

  • July 20th 2019, by Arthur C. ClarkeLIDA; Neurophonics; Brain-computer link.

  • MegaBrain, by Michael Hutchison.Brain stimulation with EM waves; CIA research and informationcontrol. (pp.107,108,117,120,123).

  • The Cult of Information, by TheodoreRosnak, 1986. NSA Directive #145; personal files in computers;computer automated telephone tapping.

  • The Body Shop, 1986 implantation ofan electrode array on the visual cortex for video direct to thebrain; other 1960's research into electronically triggeringPhosphenes in the brain, thus bypassing the eyes.

  • Evoked Potentials, by David Regan.Decoding neuroelectric information in the brain.

Read more…

Over 1200 cases of torture globally from directed energy weapons and psycothonic weapons..I am number 16 on one of the 450 cases of Torture in The AMERICASOver 450 Cases of torture in the AmericasOver 450 Cases of torture in the Americashttp://www.4shared.com/account/document/H1rPV-sN/over_450_TORTURE_CASES_from_TH.html?sId=1869lxYK37f8jDVWOver 1200 cases of torture globally from directed energy weapons and psycothonic weapons..DownloadOver 450 Cases of torture in the Americashttp://www.4shared.com/account/document/H1rPV-sN/over_450_TORTURE_CASES_from_TH.html?sId=1869lxYK37f8jDVWover 60 TORTURE CASES from RUSSIA, UKRAINE & BELARUS.dochttp://www.4shared.com/account/document/PmBD78Fk/over_60_TORTURE_CASES_from_RUS.htmlOver 20 Torture Cases from India and Asiahttp://www.4shared.com/account/document/P9egBlAY/over_20_TORTURE_CASES_from_IND.html?sId=1869lxYK37f8jDVW
Read more…

The good perps and the bad TI strategy

The remote hypnosis might be able to persuade the TI into engage in the actions that might bring a conflict between the one and the others. This remote hypnosis might have the effect that the feeling of something like "it would be fun for destroying the effort" or "this could be bad for myself." I know this is wicked, but I think such feeling like the wishing of the third person would give the strange impact on the TI's mind. That is as if the TI feels like enjoying the destruction of one's life - such as quit going to the workplace with the strange reasoning that that would put the others at the work in trouble. This kind of desire only lasts for the moments, and the temptation is something totally different from the normal behavior of the individual.Such temptation is like the alcoholic husband trying to use all the savings of the family to buy drinks and blaming of one's parents and his wife for the past mistreatment on him. Or, a gambler trying to steal money from his friends and family members to use it on gambling and feeling the satisfaction from what the one has done to be look much like loser enough.The characteristic of these remote hypnosis is that the wicked behaviors seems to have some comfortable feeling in one's brain as if they are in the most relaxed state. Then they might be deceived to believe that such thoughts are positive due to the classical conditioning effect from the mind control.Perps might pretend themselves to be the good people by trying to solve the problem like the above ones. They might act like the moderators of the problem between the mind controlled people and the others. What they can do is to speak from the above or pretend to be the expert of such situations. What they do is to suggest the others to lock up the mind controlled victims into institutions where they are used for the human experiments. The perps attitudes are fake if the others know what their true intention is, but they would look like charming and helpful in the situation as if they are a bunch of sociopath.
Read more…