All Posts (12226)

Sort by

"MK Ultra Thang"-1/27/2008

27. Jän. 2008 22:31MK Ultra ThangFree us Martin Luther King from that MK ultra thang..Where you are are now in heaven above,You know we are not free you know we need loveThe thing that has us trapped has always had us strapped,It is called slavery and it just aint a maybe..The ones that are a fallin are stumbling and a crawling...To the inner cities they find no peace of mind..It is the MK ultra that has spoiled us tota..llyWe seek freedom of speech, freedom to protest..Our rights is guaranteed by the one that rode the steed...Paul Revere rode to warn us bout a toad..A man that was called King George took away our forge..Where we blacksmithed freedom is where we shall free them..To the people we do call, a signal to us allTo sit idle and lay back.. will cause them to attack..Out sons our daughters, they do seek.. to take away the meek...God is on our side, and to that we all do ride..Into the written word and wit we shall seek God's advice to knitA web of freedom we shall weave where all are released from the sieve.. shaken loose from the noose and given the rightsfree from Abuse..(c)Ron AngellPacifist... and believer in the Constitution.. 1/27/2008
Read more…

Singapore Mind Control Victim

Please go here for updated torture account.Adapted from my blog:http://chip-implanted-mc-victim.blogspot.comMC Victim ProfileI am a chip-implanted mind-control victim(Singapore) who have been constantly harrassed since 2006 after the "accidental death" of my Industrial attachment in a government defence company,DSO National Laboratory,in which i was condemned to take "medicine" for the rest of my life for many kinds of diseases like AIDS,amnesia,schizoprenia,ADHD,PSTD,Pakinsan's disease,reading disability,learning disability,"blindness"(cannot see),whatever types of diseases or illness you can name of,I was being rumoured to have or "diagnosed of"(believe to have illegally forged self report).Realized that it was actually a conspiracy probably to use me as slaves in the name of religious purposes,charity organisations ,mental health institute,"experiments","personality changes","election","nation building","investigation","nation security","you are a God","common purposes conspiracy","psyops warfare experiments subjects",assasination attempt to cover up crimes and many many others committed by these evil liars/criminals.Only realized that i was chip-implanted and the perpetrators can actually remotely read my mind from a distance just a few months ago, when a perpetrator tries to "threathen me" for their purposes.They have psychologically abused me not only at home but public places as well.Public PlacesThese perpetrators have tried to torture me in many many ways even in public places.Perpetrators are everywhere on the streets,all stationed at almost every streets and corners in my country waiting for me.They would show me some kinds of weird hand signals like numbers 4,6,8,1,2,5,finger pointing up,pointing down.Constant verbal abuses by these perpetrators are very often.They normally come together with hundreds of people,including young children,adults,elderly,students and people from all walks of life and professions.They will take turns to follow me in wherever i go be it,shopping centres, buses or trains.They will come into the train that i board in hundreds.They will send me suicide,sublimal messages whenever they walk past me.I was seemed to be under the "monarch mind-control/MKULTRA project" which i had read somewhere.Home AbuseAt home,my "robot family members" will also often mumble some weird mouth and hand signals in front of me purposely in sychronization with "TV Talking","neighbours who try to produce loud thug noises directly above my room","deliberate car bangings near my neighbourhood which is full of carpark".Weird telephone rings picked up by my "family members" with common words "embedded in their conversations with the same words as mentioned above" are almost an everyday thing.I have experienced tons and tons of psychological abuse by "my family members" whereby they always give me all sorts of "stupid contradicting advices" which they themselves do not even know,showing "hot" and "cold" emotions in different time intervals.Sometimes they will force me to watch the "tv programs that actually talks to me" and then add in some "fully planned conversations" so as to manipulate me.Whenever , I try to contact similiar victims in the internet whereby it was secretly monitored by those "invisble perpetrators",the next moment they will call up a group of people including strangers to my house for their "verbal abuse session".There will be many attempts to force me to go and "pray to the god".There are also many attempts by my family to tamper with my things while i was asleep or while i was out.Frequent deliberate tampering of my computer and belongings are also not a rare phenonemon.TV media and newspapersI realized that the TV is actually "talking to my mind" in 2008 as mentioned earlier on after a death threat from a "staged perpetrator".The TV can instantly reply me in whatever my mind is thinking.When i try to capture the TV program with my Camcorder,it stops immediately.At that point of time, I can be100% sure that the TV is actually "talking to me".Sometimes the TV show even "tell me what i am wearing" as soon as i reach home.Deliberate Sirens,banging of car doors and people screamingLate at night, sometimes there will be people screaming with a very high-pitch sound which seem like a "woman voice" with verbal abuse or insulting message.In the past, ambulance or police sirens will come following a death threat,abuse that come from nearby passerbys.Invisible voices out of nowhereInvisible voices suspected that come from the v2k technology often comes in while i was working on my computer or when i try to sleep at night.They have tried to deprive me of sleeps for countless nights but lately do not know why i was being put into a "curfew of 12pm ligths off policy".Lately,I can even hear these "invisible voices" at public places and shopping centres.
Read more…
The media stalks children. Especially children who star on reality t.v. shows, because American wants to see these kids at their leisure, and not when they are acting, but to see them as they are, so much so that their parents are revealed of everything that they might want to keep private.Private? I think it was George Bush who took away all of our privacy, and he certainly indirectly ushered in an era of reality television that would eventually know no boundaries, and now, I wonder, will it finally implode upon itself and end by going to far?The media has seen my children naked, and some have suggested this is ultimate pornography that they are taking part in, but they will never come forward and admit what their eyes have seen. They have also seen me naked, going to the bathroom, taking a shower, having sex, dining out, making dinner, going to movies, etc. The media has since gone way to far with targeted individuals and I think many times they forget that they can’t do this stuff with average citizens like Jon and Kate and their kids. They forget that we all cherish our privacy.I haven’t had a moment alone to myself in 15 years. Neither, likely, have my children. And what does the media do? They blame me for this, the same way that the media likes to blame Jon for supposedly inviting people here. The media will blame anyone but themselves, they are incorrigible, and insufferable. The media are not real, and the people they exploit, are. Funny.
Read more…

Anger management

What I told my psychiatrist, "Yeah, I need help with anger management...the truth is, I'm not angry enough."We need soldiers here people!We need people who have been butchered so long and so thoroughly that they can't even think straight anymore!We need to fight!There is no rational way to talk about being tortured!Fight on! Fight on!
Read more…

What we know and how it effects us

From my personal experience with electronic torture, the first thought I had of it, the first I knew that it even existed and could be done, was when I emailed EducateYourself.com and the editor, Ken Adachi, emailed me back, "Are you experiencing electronic torture?" And then very soon after, I did.Many times during this long trial of terrible pain, weeks I had it, if my mind went toward that thought of torture, more torture would happen. There were many other things attached to my thoughts and feelings, but torture was one of them that was drawn up through thought. It isn't consistent though, other times, other weapons are used beyond the mental perception.This is a very dangerous thing to tell others because others will say then its your schizophrenic mind playing tricks on you, you are actually causing the majority of your pain through your own dwelling on the power they have over you and the infliction is based upon your enlightenment that it actually exists and is happening.Lately, I'm finding day upon day of terrible head pain, (some?) most of which is alleviated through reading books and not thinking about the pain, not dwelling on it, engaging in activities, purposefully forgetting about what I am going through, and then the effects are not nearly as bad. Its very difficult to do when the pain is so excruciating, and it doesn't always work, but its something we can all try.
Read more…

HUMAN PERFORMANCE-The Dept of Defense Jason Program, the NON profit Mitre corp, Lehman Brothers mind control

VIP VIP VIP

The Mitre Corp HUMAN PERFORMANCEEvidence of TortureEvidence of TorturePlease look at the Document (Human Performance) Human.pdf That is the Mitre Corporation. The Chairman of the Board of the Mitre corp as well as formerly being in the US DoD Defense dept as well as being on the board of directors of Lehman Brothers is Dr. James R. Schlesingerhttp://www.mitre.org/about/trustees.htmlChairmanBoard Member Since 1985Dr. James R. Schlesinger currently divides his time between MITRE, where he serves as chairman of the board, and the investment banking firm of Barclays Capital, where he serves as senior advisor. He is also a consultant to the Departments of Defense and State, and a member of the Defense Policy Board and the International Security Advisory Board.Dr. Schlesinger is a fellow of the National Academy of Public Administration and a member of the American Academy of Diplomacy. He is a director for Evergreen Energy and Sandia National Corporation. He is also a counselor and trustee of the Center for Strategic and International Studies, a trustee of the Atlantic Council, the Nixon Center, the National Cryptologic Museum Foundation, the Center for Global Energy Studies, and the Henry M. Jackson Foundation.Google The Dept of Defense Jason Program. The 60 or so members have formed the Mitre Corporation based out of McLean VA as well as a Fusion Center and mind control center outside of Boston. http://www.mitre.orgEvidence of TortureEvidence of Torture
Read more…
The Library of Congress > THOMAS Home > Bills, Resolutions > Search Resultshttp://thomas.loc.gov/cgi-bin/query/z?c111:S.773:--------------------------------------------------------------------------------THIS SEARCH THIS DOCUMENT GO TONext Hit Forward New Bills SearchPrev Hit Back HomePageHit List Best Sections HelpContents Display--------------------------------------------------------------------------------GPO's PDF Display References to this bill in the Congressional Record Link to the Bill Summary & Status file. Printer Friendly DisplayS.773Cybersecurity Act of 2009 (Introduced in Senate)--------------------------------------------------------------------------------BeginningApril 1, 2009SECTION 1. SHORT TITLE; TABLE OF CONTENTS.Sec. 1. Short title; table of contents.Sec. 18. Cybersecurity responsibilities and authorities.Sec. 21. International norms and cybersecurity deterrence measures.SEC. 2. FINDINGS.SEC. 3. CYBERSECURITY ADVISORY PANEL.SEC. 4. REAL-TIME CYBERSECURITY DASHBOARD.SEC. 5. STATE AND REGIONAL CYBERSECURITY ENHANCEMENT PROGRAM.SEC. 6. NIST STANDARDS DEVELOPMENT AND COMPLIANCE.SEC. 7. LICENSING AND CERTIFICATION OF CYBERSECURITY PROFESSIONALS.SEC. 8. REVIEW OF NTIA DOMAIN NAME CONTRACTS.SEC. 9. SECURE DOMAIN NAME ADDRESSING SYSTEM.SEC. 10. PROMOTING CYBERSECURITY AWARENESS.SEC. 11. FEDERAL CYBERSECURITY RESEARCH AND DEVELOPMENT.SEC. 12. FEDERAL CYBER SCHOLARSHIP-FOR-SERVICE PROGRAM.SEC. 13. CYBERSECURITY COMPETITION AND CHALLENGE.SEC. 14. PUBLIC-PRIVATE CLEARINGHOUSE.SEC. 15. CYBERSECURITY RISK MANAGEMENT REPORT.SEC. 16. LEGAL FRAMEWORK REVIEW AND REPORT.SEC. 17. AUTHENTICATION AND CIVIL LIBERTIES REPORT.SEC. 18. CYBERSECURITY RESPONSIBILITIES AND AUTHORITY.SEC. 19. QUADRENNIAL CYBER REVIEW.SEC. 20. JOINT INTELLIGENCE THREAT ASSESSMENT.SEC. 21. INTERNATIONAL NORMS AND CYBERSECURITY DETERRANCE MEASURES.SEC. 22. FEDERAL SECURE PRODUCTS AND SERVICES ACQUISITIONS BOARD.SEC. 23. DEFINITIONS.----------------------------------------------------------------------------------------------------------------------------------------------------------------THIS SEARCH THIS DOCUMENT GO TONext Hit Forward New Bills SearchPrev Hit Back HomePageHit List Best Sections HelpContents Display--------------------------------------------------------------------------------THOMAS Home | Contact | Accessibility | Legal | USA.govComputer Crime andIntellectual Property Section (CCIPS) Email this Document!Provisions of Section 225 (“The Cyber Security Enhancement Act”)of theHomeland Security Act of 2002, H.R. 5710That Amend Title 18 of the United States CodeSEC. 225. CYBER SECURITY ENHANCEMENT ACT OF 2002.(a) SHORT TITLE.—This section may be cited as the ‘‘Cyber Security Enhancement Act of 2002’’.(b) AMENDMENT OF SENTENCING GUIDELINES RELATING TO CERTAIN COMPUTER CRIMES.—(1) DIRECTIVE TO THE UNITED STATES SENTENCING COMMISSION.—Pursuant to its authority under section 994(p) of title 28, United States Code, and in accordance with this subsection, the United States Sentencing Commission shall review and, if appropriate, amend its guidelines and its policy statements applicable to persons convicted of an offense under section 1030 of title 18, United States Code.(2) REQUIREMENTS.—In carrying out this subsection, the Sentencing Commission shall— (A) ensure that the sentencing guidelines and policy statements reflect the serious nature of the offenses described in paragraph (1), the growing incidence of such offenses, and the need for an effective deterrent and appropriate punishment to prevent such offenses;(B) consider the following factors and the extent to which the guidelines may or may not account for them—(i) the potential and actual loss resulting from the offense;(ii) the level of sophistication and planning involved in the offense;(iii) whether the offense was committed for purposes of commercial advantage or private financial benefit;(iv) whether the defendant acted with malicious intent to cause harm in committing the offense;(v) the extent to which the offense violated the privacy rights of individuals harmed;(vi) whether the offense involved a computer used by the government in furtherance of national defense, national security, or the administration of justice;(vii) whether the violation was intended to or had the effect of significantlyinterfering with or disrupting a critical infrastructure; and(viii) whether the violation was intended to or had the effect of creating a threat to public health or safety, or injury to any person;(C) assure reasonable consistency with other relevant directives and with other sentencing guidelines;(D) account for any additional aggravating or mitigating circumstances that might justify exceptions to the generally applicable sentencing ranges;(E) make any necessary conforming changes to the sentencing guidelines; and(F) assure that the guidelines adequately meet the purposes of sentencing as set forth in section 3553(a)(2) of title 18, United States Code.(c) STUDY AND REPORT ON COMPUTER CRIMES.— Not later than May 1, 2003, the United States Sentencing Commission shall submit a brief report to Congress that explains any actions taken by the Sentencing Commission in response to this section and includes any recommendations the Commission may have regarding statutory penalties for offenses under section 1030 of title 18, United States Code.(d) EMERGENCY DISCLOSURE EXCEPTION.—(1) IN GENERAL.—Section 2702(b) of title 18, United States Code, is amended—(A) in paragraph (5), by striking ‘‘or’’ at the end;(B) in paragraph (6)(A), by inserting ‘‘or’’ at the end;(C) by striking paragraph (6)(C); and(D) by adding at the end the following: ‘‘(7) to a Federal, State, or local governmental entity, if the provider, in good faith, believes that an emergency involving danger of death or serious physical injury to any person requires disclosure without delay of communications relating to the emergency.’’.(2) REPORTING OF DISCLOSURES.—A government entity that receives a disclosure under section 2702(b) of title 18, United States Code, shall file, not later than 90 days after such disclosure, a report to the Attorney General stating the paragraph of that section under which the disclosure was made, the date of the disclosure, the entity to which the disclosure was made, the number of customers or subscribers to whom the information disclosed pertained, and the number of communications, if any, that were disclosed. The Attorney General shall publish all such reports into a single report to be submitted to Congress 1 year after the date of enactment of this Act.(e) GOOD FAITH EXCEPTION.—Section 2520(d)(3) of title 18, United States Code, is amended by inserting ‘‘or 2511(2)(i)’’ after ‘‘2511(3)’’.(f) INTERNET ADVERTISING OF ILLEGAL DEVICES.— Section 2512(1)(c) of title 18, United States Code, is amended—(1) by inserting ‘‘or disseminates by electronic means’’ after ‘‘or other publication’’; and(2) by inserting ‘‘knowing the content of the advertisement and’’ before ‘‘knowing or having reason to know’’.(g) STRENGTHENING PENALTIES.—Section 1030(c) of title 18, United States Code, is amended—(1) by striking ‘‘and’’ at the end of paragraph (3);(2) in each of subparagraphs (A) and (C) of paragraph (4), by inserting ‘‘except as provided in paragraph (5),’’ before ‘‘a fine under this title’’;(3) in paragraph (4)(C), by striking the period at the end and inserting ‘‘; and’’; and(4) by adding at the end the following:‘‘(5)(A) if the offender knowingly or recklessly causes or attempts to cause serious bodily injury from conduct in violation of subsection(a)(5)(A)(i), a fine under this title or imprisonment for not more than 20 years, or both; and‘‘(B) if the offender knowingly or recklessly causes or attempts to cause death from conduct in violation of subsection (a)(5)(A)(i), a fine under this title or imprisonment for any term of years or for life, or both.’’.(h) PROVIDER ASSISTANCE.—(1) SECTION 2703.—Section 2703(e) of title 18, United States Code, is amended by inserting ‘‘, statutory authorization’’ after ‘‘subpoena’’.(2) SECTION 2511.—Section 2511(2)(a)(ii) of title 18, United States Code, is amended by inserting ‘‘, statutory authorization,’’ after ‘‘court order’’ the last place it appears.(i) EMERGENCIES.—Section 3125(a)(1) of title 18, United States Code, is amended—(1) in subparagraph (A), by striking ‘‘or’’ at the end;(2) in subparagraph (B), by striking the comma at the end and inserting a semicolon; and(3) by adding at the end the following:‘‘(C) an immediate threat to a national security interest; or‘‘(D) an ongoing attack on a protected computer (as defined in section 1030) that constitutes a crime punishable by a term of imprisonment greater than one year;’’.--------------------------------------------------------------------------------More information on: Federal Statutes Related to Computer IntrusionsGo to . . . CCIPS Home Page || Justice Department Home Page--------------------------------------------------------------------------------Updated page May22, 2003usdoj-crm/mis/krr--------------------------------------------------------------------------------| home | who we are | our mission | secure area | training | volunteer | contact | links| 911 report |CLEO LinksLaw Enforcement LinksUnited States Legal LinksCanadian LinksAustralian LinksUnited Kingdom LinksCyber Criminals most Wantedhttp://www.cyberlawenforcement.org/links.htmlCheck out our sister site!wiredpatrol.org© CyberLawEnforcement.org--------------------------------------------------------------------------------Law Enforcement SitesNational Criminal Justice Reference ServiceFederal Law Enforcement Training CenterUnited States Department of JusticeAgency Search EngineDepartments in the USArkansas State PoliceFlorida Department of Law EnforcementBack to TopBack to Main PageUnited States Legal LinksDarby and Darby LawFindLaw.comAmerican Law Sources On-lineBack to TopBack to Main PageCanadian LinksACJ NetThe Criminal Code Of CanadaBack to TopBack to Main PageAustralian LinksThe Police Law BulletinCommonwealth Director of Public ProsecutionsBack to TopBack to Main PageUnited Kingdom LinksPolice LawHome Office LegislationBack to TopBack to Main Page-----------------------------------------------------------------------------_____ _____ _______/ ____| __ \__ __| ____ ___ ____ __| | | | | | | | / __ \____ / (_)______ __ / __ \____ _____/ /_| | | | | | | | / /_/ / __ \/ / / ___/ / / / / /_/ / __ \/ ___/ __/| |____| |__| | | | / ____/ /_/ / / / /__/ /_/ / / ____/ /_/ (__ ) /_\_____|_____/ |_| /_/ \____/_/_/\___/\__, / /_/ \____/____/\__/The Center for Democracy and Technology /____/ Volume 2, Number 5----------------------------------------------------------------------------A briefing on public policy issues affecting civil liberties online----------------------------------------------------------------------------CDT POLICY POST Volume 2, Number 5 February 1, 1996CONTENTS: (1) Congress Passes Online Indecency Bill, Clinton Expected to Sign,CDT Plans Court Challenge(2) Subscription Information(3) About CDT, contacting ushttp://www.cdt.org/publications/pp_2.5.htmlThis document may be redistributed freely provided it remains in its entirety** Excerpts may be re-posted by permission (editor@cdt.org) **-----------------------------------------------------------------------------(1) Congress Passes Online Indecency Bill, Clinton Expected to Sign,CDT Plans Court ChallengeBy overwhelming margins in both the House and Senate, Congress today (2/1) approvedlegislation to dramatically restrict the First Amendment rights of Internet users.With this act of Congress, the very same materials which are legally available todayin book stores and libraries would be illegal if posted on World Wide Web sites orusenet newsgroups. If signed by President Clinton as expected, this bill will transformthe Internet overnight from the freest communications medium to the most heavilyregulated medium in the United States.CDT believes this legislation is unconstitutional. We are committed to challengingit in the courts at the earliest possible opportunity.Despite the sustained effort over the past 12 months by Senators Leahy (D-VT),Feingold (D-WI), and Representatives Chris Cox (R-CA), Rick White (R-WA), and RonWyden (D-OR) to defeat the bill, the House passed the measure on a vote of 414 - 16,while the Senate concurred a few hours later on a vote of 91 - 5. Ironically, thevote comes exactly one year to the day that Senator Exon (D-NE) originally introducedthe proposal (2/1/95).CONGRESS MAKES CRIMINALS OF MOST INTERNET USERSThe Communications Decency Act, enacted as part of a massive telecommunicationsreform legislation, will impose $250,000 fines and prison terms for anyone whoposts "indecent" material, including the "7 dirty words", the text of classicworks of fiction such as The Catcher In The Rye or Ulysses, artwork containingimages of nudes, or rap lyrics, in a public forum.CDT strongly opposes this legislation. We believe the bill threatens the veryexistence of the Internet as a means for free expression, education, and politicaldiscourse. The bill is an unwarranted, unconstitutional intrusion by the Federalgovernment into the private lives of all Americans.Although the free speech rights of Internet users and the free flow of informationonline received a major setback today, the battle is far from over. President Clintonis expected to sign the legislation in the coming days. Several civil liberties andpublic interest advocacy groups, including CDT, People for the American Way, EFF, andthe ACLU are already preparing to challenge these new restrictions in court. Otheraffected entities, including commercial content providers, Internet Service Providers,and the commercial online services industries, are also expected to mount courtchallenges to this legislation. CDT is confident that the courts will find theCommunications Decency Act unconstitutional and reject it outright.INTERNET COMMUNITY ACTIVISM MADE A CRITICAL DIFFERENCEAlthough the CDA passed by Congress today represents a significant threat to theviability of the Internet and the free speech rights of individual users, theefforts of the Internet.community to mobilize against the bill kept it from beinga lot worse.The Christian Coalition, with the support of House Judiciary Committee ChairmanHenry Hyde (R-IL), fought hard to hold online service providers criminally liablefor materials generated by their subscribers. Fortunately, these efforts were notsuccessful. Holding providers liable would have forced them to pre-screen allmaterial on their networks, or, worse yet, shut down entire parts of their servicesfor fear of massive fines and prison sentences. The Christian Coalition was alsounsuccessful in their efforts to remove provisions encouraging the development anddeployment of parental control applications.Due to the efforts of the 115,000 Internet users who signed the petition againstthe CDA, the more than 20,000 users who in one day flooded Congress with phonecalls, faxes, and email messages, and those who throughout 1995 regularly calledtheir Congresspeople to express concerns about the various proposals, the Internetcommunity showed itself to be a true political force with real influence over thelegislative process. Although we did not accomplish all of our most importantobjectives, we have become a powerful force. This is not the last time Congresswill consider issues vital to the interests of Internet users across the UnitedStates. We must never loose sight of the fact that, despite the apparent defeattoday, there is still a tremendous amount of work to be done.SEVERAL KEY MEMBERS OF CONGRESS FOUGHT FOR THE RIGHTS OF INTERNET USERSAlthough a majority of Congress today demonstrated a complete lack of understandingof the Internet and the implications of the Communications Decency Act, severalmembers deserve credit for standing up for freedom of speech and the free flow ofinformation online.During the course of the debate over the last year on the CDA, Senators PatrickLeahy (D-VT) and Russ Feingold (D-WI), along with Representatives Chris Cox (R-CA),Rick White (R-WA), Michael Oxley (R-OH), Ron Wyden (D-OR), and Ed Markey (D-MA),showed courage and conviction by working to support enlightened alternatives togovernment content restrictions. These members have shown themselves to be friendsof the Internet, and we look forward to working with them on other issues which lieahead.ANALYSIS OF THE COMMUNICATIONS DECENCY ACT PASSED TODAYThe legislation approved today was not changed from a previous version releasedDecember 21, 1995 (See CDT Policy Post No. 33). Briefly, the proposal containsseveral troubling elements. Among other things, the bill:* Relies on the vague and blatantly unconstitutional "indecency"standard (Sec 502 (a) - (c))* Prohibits sending "indecent" material directly to a minor or makingindecent material available for display in a manner available to aminor (including World Wide Web pages, ftp sites, or usenetnewsgroups) (Sec 502 (d)).* No longer contains the provision of the Cox/Wyden/White billprohibiting the FCC from imposing content or other regulations on theInternet or other interactive media.* Would allow states to impose additional restrictions on non-commercialactivities such as free-nets, BBS's, and non-profit content providers(Sec 502 (h)).* Creates a new crime for the solicitation of minors using a computer,the US mail, or any other means of interstate or foreign commerce (Sec508).The full text of the bill, along with other relevant background information(including final vote tallies when available) can be found at CDT's InternetCensorship Issues Web Page (http://www.cdt.org/cda.html).As CDT prepares to fight this issue in court, we will continue to update you onour progress as information becomes available.For More Information Contact:Jerry Berman, Executive DirectorDaniel Weitzner, Deputy Director+1.202.637.9800-----------------------------------------------------------------------(3) SUBSCRIPTION INFORMATIONBe sure you are up to date on the latest public policy issues affecting civilliberties online and how they will affect you! Subscribe to the CDT Policy Postnews distribution list. CDT Policy Posts, the regular news publication of theCenter For Democracy and Technology, are received by more than 9,000 Internetusers, industry leaders, policy makers and activists, and have become the leadingsource for information about critical free speech and privacy issues affecting theInternet and other interactive communications media.To subscribe to CDT's Policy Post list, send mail topolicy-posts-request@cdt.orgwith a subject:subscribe policy-postsIf you ever wish to remove yourself from the list, send mail to theabove address with a subject of:unsubscribe policy-posts-----------------------------------------------------------------------(3) ABOUT THE CENTER FOR DEMOCRACY AND TECHNOLOGY/CONTACTING USThe Center for Democracy and Technology is a non-profit public interestorganization based in Washington, DC. The Center's mission is to developand advocate public policies that advance democratic values andconstitutional civil liberties in new computer and communicationstechnologies.Contacting us:General information: info@cdt.orgWorld Wide Web: URL:http://www.cdt.org/FTP URL:ftp://ftp.cdt.org/pub/cdt/Snail Mail: The Center for Democracy and Technology1001 G Street NW * Suite 500 East * Washington, DC 20001(v) +1.202.637.9800 * (f) +1.202.637.0968-----------------------------------------------------------------------End Policy Post 2.5 2/1/96-------------------------------------------------------------------------------------------------------------------------------------------------------Return to the Net-Censorship Issues PageReturn to the CDT Home Page
Read more…
Text of H.R.1913 as Referred in SenateLocal Law Enforcement Hate Crimes Prevention Act of 2009To provide Federal assistance to States, local jurisdictions, and Indian tribes to prosecute hate crimes, and for other purposes.current 111st session of congressBack to Bill DetailsVersion HistoryVersion Word Count Changes From Previous Version Percent ChangeIntroduced in House 2,718 n/a n/aReported in House 2,443 19 39%Engrossed in House 2,166 24 34%Referred in Senate 2,150 5 Show Changes Hide Changes 7%Key: changed or removed text inserted or modified text--------------------------------------------------------------------------------Loading Bill TextHR 1913 EHRFSCommentsClose CommentsPermalink111th CONGRESSCommentsClose CommentsPermalink1st SessionCommentsClose CommentsPermalinkH. R. 1913CommentsClose CommentsPermalinkIN THE SENATE OF THE UNITED STATESCommentsClose CommentsPermalinkApril 30, 2009CommentsClose CommentsPermalinkReceived; read twice and referred to the Committee on the JudiciaryCommentsClose CommentsPermalink--------------------------------------------------------------------------------AN ACTCommentsClose CommentsPermalinkTo provide Federal assistance to States, local jurisdictions, and Indian tribes to prosecute hate crimes, and for other purposes.CommentsClose CommentsPermalinkBe it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, CommentsClose CommentsPermalinkSECTION 1. SHORT TITLE.This Act may be cited as the ‘Local Law Enforcement Hate Crimes Prevention Act of 2009’.CommentsClose CommentsPermalinkSEC. 2. DEFINITION OF HATE CRIME.In this Act--CommentsClose CommentsPermalink(1) the term ‘crime of violence’ has the meaning given that term in section 16, title 18, United States Code;CommentsClose CommentsPermalink(2) the term ‘hate crime’ has the meaning given such term in section 280003(a) of the Violent Crime Control and Law Enforcement Act of 1994 (28 U.S.C. 994 note); andCommentsClose CommentsPermalink(3) the term ‘local’ means a county, city, town, township, parish, village, or other general purpose political subdivision of a State.CommentsClose CommentsPermalinkSEC. 3. SUPPORT FOR CRIMINAL INVESTIGATIONS AND PROSECUTIONS BY STATE, LOCAL, AND TRIBAL LAW ENFORCEMENT OFFICIALS.(a) Assistance Other Than Financial Assistance-CommentsClose CommentsPermalink(1) IN GENERAL- At the request of a State, local, or tribal law enforcement agency, the Attorney General may provide technical, forensic, prosecutorial, or any other form of assistance in the criminal investigation or prosecution of any crime that--CommentsClose CommentsPermalink(A) constitutes a crime of violence;CommentsClose CommentsPermalink(B) constitutes a felony under the State, local, or tribal laws; andCommentsClose CommentsPermalink(C) is motivated by prejudice based on the actual or perceived race, color, religion, national origin, gender, sexual orientation, gender identity, or disability of the victim, or is a violation of the State, local, or tribal hate crime laws.CommentsClose CommentsPermalink(2) PRIORITY- In providing assistance under paragraph (1), the Attorney General shall give priority to crimes committed by offenders who have committed crimes in more than one State and to rural jurisdictions that have difficulty covering the extraordinary expenses relating to the investigation or prosecution of the crime.CommentsClose CommentsPermalink(b) Grants-CommentsClose CommentsPermalink(1) IN GENERAL- The Attorney General may award grants to State, local, and Tribal law enforcement agencies for extraordinary expenses associated with the investigation and prosecution of hate crimes.CommentsClose CommentsPermalink(2) OFFICE OF JUSTICE PROGRAMS- In implementing the grant program under this subsection, the Office of Justice Programs shall work closely with grantees to ensure that the concerns and needs of all affected parties, including community groups and schools, colleges, and universities, are addressed through the local infrastructure developed under the grants.CommentsClose CommentsPermalink(3) APPLICATION-CommentsClose CommentsPermalink(A) IN GENERAL- Each State, local, or Tribal law enforcement agency that desires a grant under this subsection shall submit an application to the Attorney General at such time, in such manner, and accompanied by or containing such information as the Attorney General shall reasonably require.CommentsClose CommentsPermalink(B) DATE FOR SUBMISSION- Applications submitted pursuant to subparagraph (A) shall be submitted during the 60-day period beginning on a date that the Attorney General shall prescribe.CommentsClose CommentsPermalink(C) REQUIREMENTS- A State, local, or Tribal law enforcement agency applying for a grant under this subsection shall--CommentsClose CommentsPermalink(i) describe the extraordinary purposes for which the grant is needed;CommentsClose CommentsPermalink(ii) certify that the State, local government, or Indian tribe lacks the resources necessary to investigate or prosecute the hate crime;CommentsClose CommentsPermalink(iii) demonstrate that, in developing a plan to implement the grant, the State, local, or Tribal law enforcement agency has consulted and coordinated with nonprofit, nongovernmental violence recovery service programs that have experience in providing services to victims of hate crimes; andCommentsClose CommentsPermalink(iv) certify that any Federal funds received under this subsection will be used to supplement, not supplant, non-Federal funds that would otherwise be available for activities funded under this subsection.CommentsClose CommentsPermalink(4) DEADLINE- An application for a grant under this subsection shall be approved or denied by the Attorney General not later than 180 business days after the date on which the Attorney General receives the application.CommentsClose CommentsPermalink(5) GRANT AMOUNT- A grant under this subsection shall not exceed $100,000 for any single jurisdiction in any 1-year period.CommentsClose CommentsPermalink(6) REPORT- Not later than December 31, 2011, the Attorney General shall submit to Congress a report describing the applications submitted for grants under this subsection, the award of such grants, and the purposes for which the grant amounts were expended.CommentsClose CommentsPermalink(7) AUTHORIZATION OF APPROPRIATIONS- There is authorized to be appropriated to carry out this subsection $5,000,000 for each of fiscal years 2010 and 2011.CommentsClose CommentsPermalinkSEC. 4. GRANT PROGRAM.(a) Authority To Award Grants- The Office of Justice Programs of the Department of Justice may award grants, in accordance with such regulations as the Attorney General may prescribe, to State, local, or tribal programs designed to combat hate crimes committed by juveniles, including programs to train local law enforcement officers in identifying, investigating, prosecuting, and preventing hate crimes.CommentsClose CommentsPermalink(b) Authorization of Appropriations- There are authorized to be appropriated such sums as may be necessary to carry out this section.CommentsClose CommentsPermalinkSEC. 5. AUTHORIZATION FOR ADDITIONAL PERSONNEL TO ASSIST STATE, LOCAL, AND TRIBAL LAW ENFORCEMENT.There are authorized to be appropriated to the Department of Justice, including the Community Relations Service, for fiscal years 2010, 2011, and 2012, such sums as are necessary to increase the number of personnel to prevent and respond to alleged violations of section 249 of title 18, United States Code, as added by section 7 of this Act.CommentsClose CommentsPermalinkSEC. 6. PROHIBITION OF CERTAIN HATE CRIME ACTS.(a) In General- Chapter 13 of title 18, United States Code, is amended by adding at the end the following:CommentsClose CommentsPermalink‘Sec. 249. Hate crime acts‘(a) In General-CommentsClose CommentsPermalink1‘(1) OFFENSES INVOLVING ACTUAL OR PERCEIVED RACE, COLOR, RELIGION, OR NATIONAL ORIGIN- Whoever, whether or not acting under color of law, willfully causes bodily injury to any person or, through the use of fire, a firearm, a dangerous weapon, or an explosive or incendiary device, attempts to cause bodily injury to any person, because of the actual or perceived race, color, religion, or national origin of any person--CommentsClose CommentsPermalink‘(A) shall be imprisoned not more than 10 years, fined in accordance with this title, or both; andCommentsClose CommentsPermalink‘(B) shall be imprisoned for any term of years or for life, fined in accordance with this title, or both, if--CommentsClose CommentsPermalink‘(i) death results from the offense; orCommentsClose CommentsPermalink‘(ii) the offense includes kidnaping or an attempt to kidnap, aggravated sexual abuse or an attempt to commit aggravated sexual abuse, or an attempt to kill.CommentsClose CommentsPermalink‘(2) OFFENSES INVOLVING ACTUAL OR PERCEIVED RELIGION, NATIONAL ORIGIN, GENDER, SEXUAL ORIENTATION, GENDER IDENTITY, OR DISABILITY-CommentsClose CommentsPermalink‘(A) IN GENERAL- Whoever, whether or not acting under color of law, in any circumstance described in subparagraph (B), willfully causes bodily injury to any person or, through the use of fire, a firearm, a dangerouse weapon, or an explosive or incendiary device, attempts to cause bodily injury to any person, because of the actual or perceived religion, national origin, gender, sexual orientation, gender identity, or disability of any person--CommentsClose CommentsPermalink‘(i) shall be imprisoned not more than 10 years, fined in accordance with this title, or both; andCommentsClose CommentsPermalink‘(ii) shall be imprisoned for any term of years or for life, fined in accordance with this title, or both, if--CommentsClose CommentsPermalink‘(I) death results from the offense; orCommentsClose CommentsPermalink‘(II) the offense includes kidnaping or an attempt to kidnap, aggravated sexual abuse or an attempt to commit aggravated sexual abuse, or an attempt to kill.CommentsClose CommentsPermalink‘(B) CIRCUMSTANCES DESCRIBED- For purposes of subparagraph (A), the circumstances described in this subparagraph are that--CommentsClose CommentsPermalink‘(i) the conduct described in subparagraph (A) occurs during the course of, or as the result of, the travel of the defendant or the victim--CommentsClose CommentsPermalink‘(I) across a State line or national border; orCommentsClose CommentsPermalink‘(II) using a channel, facility, or instrumentality of interstate or foreign commerce;CommentsClose CommentsPermalink‘(ii) the defendant uses a channel, facility, or instrumentality of interstate or foreign commerce in connection with the conduct described in subparagraph (A);CommentsClose CommentsPermalink‘(iii) in connection with the conduct described in subparagraph (A), the defendant employs a firearm, explosive or incendiary device, or other weapon that has traveled in interstate or foreign commerce; orCommentsClose CommentsPermalink‘(iv) the conduct described in subparagraph (A)--CommentsClose CommentsPermalink‘(I) interferes with commercial or other economic activity in which the victim is engaged at the time of the conduct; orCommentsClose CommentsPermalink‘(II) otherwise affects interstate or foreign commerce.CommentsClose CommentsPermalink‘(3) ADDITIONAL FEDERAL NEXUS FOR OFFENSE- Whoever, in the special maritime or territorial jurisdiction of the United States, or in Indian country, engages in conduct described in paragraph (1) or in paragraph (2)(A) (without regard to whether that conduct occurred in a circumstance described in paragraph (2)(B)) shall be subject to the same penalties as those provided for offenses under those paragraphs.CommentsClose CommentsPermalink‘(b) Certification Requirement- No prosecution of any offense described in this subsection may be undertaken by the United States, except under the certification in writing of the Attorney General, the Deputy Attorney General, the Associate Attorney General, or any Assistant Attorney General specially designated by the Attorney General that--CommentsClose CommentsPermalink‘(1) such certifying individual has reasonable cause to believe that the actual or perceived race, color, religion, national origin, gender, sexual orientation, gender identity, or disability of any person was a motivating factor underlying the alleged conduct of the defendant; andCommentsClose CommentsPermalink‘(2) such certifying individual has consulted with State or local law enforcement officials regarding the prosecution and determined that--CommentsClose CommentsPermalink‘(A) the State does not have jurisdiction or does not intend to exercise jurisdiction;CommentsClose CommentsPermalink‘(B) the State has requested that the Federal Government assume jurisdiction;CommentsClose CommentsPermalink‘(C) the State does not object to the Federal Government assuming jurisdiction; orCommentsClose CommentsPermalink‘(D) the verdict or sentence obtained pursuant to State charges left demonstratively unvindicated the Federal interest in eradicating bias-motivated violence.CommentsClose CommentsPermalink‘(c) Definitions-CommentsClose CommentsPermalink‘(1) In this section--CommentsClose CommentsPermalink‘(A) the term ‘explosive or incendiary device’ has the meaning given such term in section 232 of this title;CommentsClose CommentsPermalink‘(B) the term ‘firearm’ has the meaning given such term in section 921(a) of this title; andCommentsClose CommentsPermalink‘(C) the term ‘State’ includes the District of Columbia, Puerto Rico, and any other territory or possession of the United States.CommentsClose CommentsPermalink‘(2) For the purposes of this chapter, the term ‘gender identity’ means actual or perceived gender-related characteristics.CommentsClose CommentsPermalink‘(d) Statute of Limitations-CommentsClose CommentsPermalink‘(1) OFFENSES NOT RESULTING IN DEATH- Except as provided in paragraph (2), no person shall be prosecuted, tried, or punished for any offense under this section unless the indictment for such offense is found, or the information for such offense is instituted, not later than 7 years after the date on which the offense was committed.CommentsClose CommentsPermalink‘(2) DEATH RESULTING OFFENSES- An indictment or information alleging that an offense under this section resulted in death may be found or instituted at any time without limitation.CommentsClose CommentsPermalink‘(e) Rule of Evidence- In a prosecution for an offense under this section, evidence of expression or associations of the defendant may not be introduced as substantive evidence at trial, unless the evidence specifically relates to that offense. However, nothing in this section affects the rules of evidence governing impeachment of a witness.’.CommentsClose CommentsPermalink(b) Technical and Conforming Amendment- The table of sections at the beginning of chapter 13 of title 18, United States Code, is amended by adding at the end the following new item:CommentsClose CommentsPermalink‘249. Hate crime acts.’.CommentsClose CommentsPermalinkSEC. 7. SEVERABILITY.If any provision of this Act, an amendment made by this Act, or the application of such provision or amendment to any person or circumstance is held to be unconstitutional, the remainder of this Act, the amendments made by this Act, and the application of the provisions of such to any person or circumstance shall not be affected thereby.CommentsClose CommentsPermalinkSEC. 8. RULE OF CONSTRUCTION.Nothing in this Act, or the amendments made by this Act, shall be construed to prohibit any expressive conduct protected from legal prohibition by, or any activities protected by, the Constitution.CommentsClose CommentsPermalinkPassed the House of Representatives April 29, 2009.CommentsClose CommentsPermalinkAbstracthttp://www.google.com/patents?id=BQsBAAAAEBAJ&dq=neurologicalDisclosed is a multiple electrode, closed-loop, responsive system for the treatment of certain neurological diseases such as epilepsy, migraine headaches and Parkinson's disease. Brain electrodes would be placed in close proximity to the brain or deep within brain tissue. When a neurological event such as the onset of an epileptic seizure occurs, EEG signals from the electrodes are processed by signal conditioning means in a control module that can be placed beneath the patient's scalp, within the patient's chest, or situated externally on the patient. Neurological event detection means in the control module will then cause a response to be generated for stopping the neurological event. The response could be an electrical signal to brain electrodes or to electrodes located remotely in the patient's body. The response could also be the release of medication or the application of a sensory input such as sound, light or mechanical vibration or electrical stimulation of the skin. The...Patent number: 6016449Filing date: Oct 27, 1997Issue date: Jan 18, 2000Inventors: Robert E. Fischell, David R. Fischell, Adrian R. M. UptonAssignees: NeuroPace, Inc.U.S. Classification607/45International ClassificationA61N 136What is claimed is:1. A system for the treatment of neurological disorders of a human patient, the system comprising:at least two electrodes adapted to be located within the cranium of the human patient;a control module adapted to be implanted beneath the patient's scalp for transmitting output electrical signals from the control module to the patient's brain responsive to input electrical signals received by the control module, the input electrical signals originating in the patient's brain;electrical conducting means for providing electrical connections between the electrodes and the control module; andexternal equipment means adapted to be located external to the human patient for providing two-way communication between the external equipment means and the control module for (1) receiving data transmission from the control module and (2) transmitting electrical signals to be received by the control module for defining the output electrical signals from the control module, whereby said output electrical signals provide a stimulation signal to terminate a neurological event.2. The system of claim 1 wherein there are exactly two electrodes. electrical conducting means.3. The system of claim 1 wherein there are at least three electrodes.4. The system of claim 3 wherein the control module has an outer surface and at least part of that outer surface is electrically conducting and at least one of the other electrodes is an active electrode connected to the control module by the electrical conducting means.5. The system of claim 1 wherein there are at least four electrodes.6. The system of claim 1 wherein the electrical conducting means includes at least one insulated conducting wire, the wire having a proximal end and a distal end, the proximal end of each wire being joined to the control module and the distal end of each wire being joined to an electrode, the path of the wire from the control module to the electrode including passage between the patient's scalp and cranium.7. The system of claim 1 wherein at least one electrode is positionally located within the brain of said patient defining a deep electrode.8. The system of claim 7 wherein the deep electrode is positionally located within a hippocampus region of said brain.9. The system of claim 1 wherein the control module includes an event detection sub-system means for identifying an occurrence of a neurological event by processing of at least one EEG signal detected from at least one electrode.10. The system of claim 9 wherein the event detection sub-system means includes a signal conditioning means for operating on the at least one EEG signal from the at least one electrode to produce an output signal having an optimized signal to noise ratio and an event detection means for detecting a neurological event, the event detection means having an input signal and an output signal, the input signal to the event detection means being the output signal of the signal conditioning means.11. The system of claim 10 wherein the signal conditioning means includes at least one signal conditioning transformation for transforming the EEG signal from said electrode to said output signal for producing said optimized signal to noise ratio.12. The system of claim 11 wherein at least one of the signal conditioning transformations is signal squaring for increasing the signal amplitude and eliminating signals having a negative value thereby improving the signal to noise ratio.13. The system of claim 10 wherein the signal conditioning means includes at least two time delay circuits for inputting at least two EEG signals from the at least two electrodes and outputting a time synchronized signal to said event detection means.14. The system of claim 10 wherein the at least two electrodes adapted to be located within the cranium of the human patient are placed at two different locations within the cranium, each of the locations being such that the propagation times of the EEG signals from the focus of a neurological event to each of the at least two electrodes is different, the signal conditioning means including at least two time delay circuits, adapted to provide an appropriate time delay for each EEG signal from each electrode in order to produce a set of time synchronized EEG signals.15. The system of claim 14 wherein the event detection sub-system means includes means for altering the time duration of the time delay for the at least two time delay circuits.16. The system of claim 15 wherein the event detection sub-system means includes means for selecting at least one EEG signal to be processed by the signal conditioning means.17. The system of claim 15 wherein the control module includes control processor means for programming changes in at least one of said signal conditioning transformations, the central processor means being coupled to the event detection sub-system means.18. The system of claim 10 wherein the event detection means includes at least one event detection transformation means having a plurality of event detection transforms for detecting said occurrence of the neurological event.19. The system of claim 18 wherein the at least one of the event detection transformations is a comparison of the output of the signal conditioning means with an event detection threshold whereby the exceeding of the event detection threshold is the indication that a neurological event has been detected.20. The system of claim 19 including means for adjusting the level of the event detection threshold.21. The system of claim 1 wherein the stimulation signal to terminate the neurological event is applied to at least one electrode located within the cranium.22. The system of claim 21 wherein at least two signals are applied to at least two electrodes located within the cranium.23. The system of claim 22 wherein the at least two signals applied to the at least two electrodes have substantially the same signal strength as a function of time.24. The system of claim 23 wherein the at least two signals applied to the at least two electrodes have substantially different signal strength as a function of time.25. The system of claim 21 wherein the electrical signal has a biphasic waveform.26. The system of claim 1 wherein the control module includes data recording means coupled to the at least two electrodes for recording the input electrical signals originating in the patient's brain.27. The system of claim 26 wherein the data recording means is adapted to record at least one EEG signal.28. The system of claim 26 wherein the data recording means is adapted to simultaneously record at least two EEG signals.29. The system of claim 26 wherein the data recording means includes an analog-to-digital converter coupled to the two electrodes within the cranium of the human patient and a digital memory serially coupled to the analog to digital converter.30. The system of claim 29 wherein the digital memory records data for a first time period defining a time period prior to the detection of a neurological event and a second time period defining a time period after the detection of the neurological event.31. The system of claim 30 wherein the first time period is between 0.1 and 30 minutes and the second time period is between 0.1 and 30 minutes.32. The system of claim 29 wherein the digital memory stores the number of neurological events that have occurred.33. The system of claim 1 wherein the two-way communication for receiving data transmission and transmitting electrical signals reversibly from the control module to the external equipment is by electromagnetic waves.34. The system of claim 1 wherein the control module includes alarm means for signaling the patient that a neurological event has occurred.35. The system of claim 34 wherein the alarm means is a mechanical vibrator for producing mechanical vibrations for sensing by the patient.
Read more…
Space Command officials exceed GPS standardPosted 5/26/2009 Updated 5/26/2009 Email story Print storyhttp://www.af.mil/news/story.asp?storyID=1231507115/26/2009 - PETERSON AIR FORCE BASE, Colo. (AFNS) -- Air Force Space Command officials here maintain the Global Positioning System constellation that now has 30 operational satellites, six more than the standard."I have high confidence we will continue to sustain at least the 24 satellites required to maintain our current performance standard," said Gen. C. Robert "Bob" Kehler, the Air Force Space Command commander.The current number of satellites being used by Air Force for global positioning is the most satellites and the greatest capability to date, since GPS came into fruition in the 1970s."We are committed to maintaining our current level of service, while striving to increase and improve service and capability through on-going modernization efforts," said Lt. Gen. John T. "Tom" Sheridan, commander of the Space and Missile Systems Center, which is the acquisitions arm for Air Force Space Command. "The Air Force will continue to execute an achievable growth path maintaining GPS as the premier provider of positioning, navigation and timing for the military and civilian users around the world."Just as it was reported in the Government Accountability Office's report May 7, Air Force Space Command officials acknowledged the potential for an availability gap years ago, and has actively pursued and institutionalized procedures and processes to mitigate the potential gap or minimize any impact. Command officials developed key processes within the operational community as well as the acquisition community to extend the life of on-orbit assets and to ensure GPS capability is delivered in a timely manner.The Air Force launched the seventh of its current block of IIR-M satellites in April, and will launch another one this fall followed by the first of 12 Block IIF satellites in early fiscal 2010. The IIF's sophisticated L-band payload will include new hardware that serves the civil user community. The next generation of GPS satellites, the GPS IIIA, with additional navigation signals for both civilian and military users will improve the accuracy and availability for all users. GPS IIIA is scheduled for first launch in 2014."New acquisition approaches, including phased acquisition and prototyping, will reduce risk to constellation sustainment in the future," General Sheridan said."Let me state emphatically; since we declared Full Operational Capability in 1995, the Air Force has maintained the constellation above the required 24 GPS satellites on orbit at 95 percent. In fact, we have achieved sub-three meter accuracy," General Kehler said. "The Air Force has been a good GPS steward continually providing 'better than expected' service to our GPS users. At this point, we foresee no significant loss of service in the future, near or far."Space operations vital to Air Force, nationPosted 5/26/2009 Updated 5/26/2009 Email story Print storyhttp://www.af.mil/news/story.asp?storyID=123150936by Staff Sgt. J.G. BuzanowskiSecretary of the Air Force Public Affairs5/26/2009 - WASHINGTON (AFNS) -- Air Force officials discussed the importance of space as a warfighting domain before members of the Senate May 20 on Capitol Hill.Senior Air Force leaders in the space realm answered questions from the Senate Armed Services Committee Strategic Force Subcommittee, telling them that Air Force officials were postured to make the most of their assets as part of the joint fight.Gen. C. Robert "Bob" Kehler, the Air Force Space Command commander, told the subcommittee that the command's efforts to provide the services with resources to maintain a strong presence in space have been and continue to be a vital part of the national defense strategy."Our mission is to provide an integrated constellation of space and cyberspace capabilities at the speed of need," General Kehler said. "Our vision is to be the leading source of emerging and integrated space and cyberspace capabilities."General Kehler spoke of two key decisions the Air Force made: The creation of Air Force Global Strike Command and the assignment of cyberspace tasks to AFSPACE."Space capabilities contribute across the spectrum of regular and irregular combat and noncombat operations, and provide joint commanders a decisive advantage," he said. "The cyberspace domain is inextricably linked to the other domains in which the U.S. military operates."With the recent budget release and the cancellation of the TSAT program, the Air Force is "harvesting" the technologies, systems and lessons learned so it can apply them to the next generation of satellites."What's important is that we synchronize capabilities with needs," General Kehler said.Gary E. Payton, the deputy undersecretary of the Air Force for space programs, also testified."Our space systems are the envy of the world," he wrote in his official statement. "Our surveillance satellites are able to detect missile launches anywhere in the world, our communications systems allow the president precise and assured control over nuclear forces, our wideband systems rapidly transmit critical information to our warfighters, our weather satellites allow us to predict future weather half a world away, our Global Positioning Systems enable knowledge down to centimeters and timing down to nanoseconds."Mr. Payton said a strong space presence enhances the joint fight."These sophisticated systems make each Soldier, Sailor, Marine and Airman safer and more capable."Space Preservation Act of 2005(H.R. 2420)(See also: GN Response)http://thomas.loc.gov/home/search.htmlTitle: To preserve the cooperative, peaceful uses of space for the benefit of all humankind by prohibiting the basing of weapons in space and the use of weapons to destroy or damage objects in space that are in orbit, and for other purposes.Sponsor: Rep Kucinich, Dennis J. [OH-10] (introduced 5/18/2005) Cosponsors (34)Latest Major Action: 5/18/2005 Referred to House committee. Status: Referred to the Committee on Science, and in addition to the Committees on Armed Services, and International Relations, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned.COSPONSORS(34), ALPHABETICAL [followed by Cosponsors withdrawn]: (Sort: by date)Rep Abercrombie, Neil [HI-1] - 5/18/2005Rep Baldwin, Tammy [WI-2] - 5/18/2005Rep Brown, Sherrod [OH-13] - 5/26/2005Rep Conyers, John, Jr. [MI-14] - 5/18/2005Rep Davis, Danny K. [IL-7] - 5/18/2005Rep Fattah, Chaka [PA-2] - 5/18/2005Rep Filner, Bob [CA-51] - 5/18/2005Rep Frank, Barney [MA-4] - 5/26/2005Rep Grijalva, Raul M. [AZ-7] - 5/18/2005Rep Hinchey, Maurice D. [NY-22] - 5/18/2005Rep Holt, Rush D. [NJ-12] - 5/18/2005Rep Honda, Michael M. [CA-15] - 5/18/2005Rep Jackson, Jesse L., Jr. [IL-2] - 5/18/2005Rep Lee, Barbara [CA-9] - 5/18/2005Rep Maloney, Carolyn B. [NY-14] - 5/26/2005Rep McDermott, Jim [WA-7] - 5/18/2005Rep McGovern, James P. [MA-3] - 5/18/2005Rep McKinney, Cynthia A. [GA-4] - 5/18/2005Rep Meeks, Gregory W. [NY-6] - 5/18/2005Rep Michaud, Michael H. [ME-2] - 5/18/2005Rep Miller, George [CA-7] - 5/18/2005Rep Moore, Gwen [WI-4] - 5/18/2005Rep Nadler, Jerrold [NY-8] - 5/26/2005Rep Owens, Major R. [NY-11] - 5/18/2005Rep Rahall, Nick J., II [WV-3] - 5/18/2005Rep Sanders, Bernard [VT] - 5/26/2005Rep Serrano, Jose E. [NY-16] - 5/18/2005Rep Stark, Fortney Pete [CA-13] - 5/18/2005Rep Tierney, John F. [MA-6] - 5/18/2005Rep Towns, Edolphus [NY-10] - 5/26/2005Rep Velazquez, Nydia M. [NY-12] - 5/26/2005Rep Waters, Maxine [CA-35] - 5/18/2005Rep Watson, Diane E. [CA-33] - 5/18/2005Rep Woolsey, Lynn C. [CA-6] - 5/18/2005REP. DENNIS KUCINICH:STOP THE WEAPONIZATION OF SPACE-- (House of Representatives - May 19, 2005)[Page: H3586] GPO's PDF CONGRESSIONAL RECORD(Mr. KUCINICH asked and was given permission to address the House for 1 minute and to revise and extend his remarks.)Mr. KUCINICH. Mr. Speaker, the administration, through senior Air Force officials, wants the U.S. to achieve military supremacy in outer space. Dominating all earth from outer space will have an out-of-world price tag, perhaps more than $1 trillion.A question: Why reach for the stars with guns in our hands? Are there weapons of mass destruction on Mars?Yesterday 28 Members of Congress signed on to H.R. 2420, a bill to stop the weaponization of space, urging the President to sign an international treaty to ban such weapons. If we work together towards creating peace on earth, we would not bring war to the high heavens.While some fantasize about being ``masters of the universe,'' there are 45 million Americans without health insurance. Corporations are reneging on pension obligations. Social Security is under attack. We are headed towards a $400 billion annual budget deficit, a $600 billion trade deficit, an $8 trillion national debt. The cost of the war in Iraq is over $200 billion. While we build new bases in Iraq, we close them in the United States.Earth to Washington, D.C. Earth to Washington, D.C. D.C., call home.TEXT OF Space Preservation Act of 2005 (Introduced in House)HR 2420 IH109th CONGRESS1st SessionH. R. 2420To preserve the cooperative, peaceful uses of space for the benefit of all humankind by prohibiting the basing of weapons in space and the use of weapons to destroy or damage objects in space that are in orbit, and for other purposes.IN THE HOUSE OF REPRESENTATIVESMay 18, 2005Mr. KUCINICH (for himself, Mr. ABERCROMBIE, Mr. GEORGE MILLER of California, Mr. TIERNEY, Mr. HOLT, Mr. FATTAH, Ms. WOOLSEY, Mr. MICHAUD, Mr. RAHALL, Mr. SERRANO, Ms. LEE, Ms. MOORE of Wisconsin, Mr. CONYERS, Mr. HINCHEY, Ms. MCKINNEY, Mr. DAVIS of Illinois, Mr. STARK, Mr. OWENS, Mr. HONDA, Ms. WATERS, Mr. MCGOVERN, Mr. JACKSON of Illinois, Ms. WATSON, Mr. FILNER, Ms. BALDWIN, Mr. GRIJALVA, Mr. MEEKS of New York, and Mr. MCDERMOTT) introduced the following bill; which was referred to the Committee on Science, and in addition to the Committees on Armed Services and International Relations, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concernedA BILLTo preserve the cooperative, peaceful uses of space for the benefit of all humankind by prohibiting the basing of weapons in space and the use of weapons to destroy or damage objects in space that are in orbit, and for other purposes.Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,SECTION 1. SHORT TITLE.This Act may be cited as the `Space Preservation Act of 2005'.SEC. 2. REAFFIRMATION OF POLICY ON THE PRESERVATION OF PEACE IN SPACE.Congress reaffirms the policy expressed in section 102(a) of the National Aeronautics and Space Act of 1958 (42 U.S.C. 2451(a)), stating that it `is the policy of the United States that activities in space should be devoted to peaceful purposes for the benefit of all mankind.'.SEC. 3. BAN ON BASING OF WEAPONS IN SPACE AND THE USE OF WEAPONS AGAINST OBJECTS IN SPACE IN ORBIT.The President shall--(1) implement a ban on space-based weapons of the United States and the use of weapons of the United States to destroy or damage objects in space that are in orbit; and(2) immediately order the termination of research and development, testing, manufacturing, production, and deployment of all space-based weapons of the United States.SEC. 4. INTERNATIONAL TREATY BANNING SPACE-BASED WEAPONS AND THE USE OF WEAPONS AGAINST OBJECTS IN SPACE IN ORBIT.The President shall direct the United States representatives to the United Nations and other international organizations to immediately work toward negotiating, adopting, and implementing an international treaty banning space-based weapons and the use of weapons to destroy or damage objects in space that are in orbit.SEC. 5. REPORT.The President shall submit to Congress not later than 90 days after the date of the enactment of this Act, and every 6 months thereafter, a report on--(1) the implementation of the ban on space-based weapons and the use of weapons to destroy or damage objects in space that are in orbit required by section 3; and(2) progress toward negotiating, adopting, and implementing the treaty described in section 4.SEC. 6. SPACE-BASED NONWEAPONS ACTIVITIES.Nothing in this Act may be construed as prohibiting the use of funds for--(1) space exploration;(2) space research and development;(3) testing, manufacturing, or production that is not related to space-based weapons or systems; or(4) civil, commercial, or defense activities (including communications, navigation, surveillance, reconnaissance, early warning, or remote sensing) that are not related to space-based weapons or systems.SEC. 7. DEFINITIONS.In this Act:(1) The term `space' means all space extending upward from an altitude greater than 110 kilometers above the surface of the earth and any celestial body in such space.(2) The terms `space-based weapon' and `space-based system' mean a device capable of damaging or destroying an object or person (whether in outer space, in the atmosphere, or on Earth) by--(A) firing one or more projectiles to collide with that object or person;(B) detonating one or more explosive devices in close proximity to that object or person; or(C) any other undeveloped means.
Read more…
Children's Online Privacy Protection Act of 1998TITLE XIII-CHILDREN'S ONLINE PRIVACY PROTECTIONSEC. 1301. SHORT TITLE.This title may be cited as the "Children's Online Privacy Protection Act of 1998".SEC. 1302. DEFINITIONS.In this title:(1) CHILD.—The term "child" means an individual under the age of 13.(2) OPERATOR.—The term "operator"—(A) means any person who operates a website located on the Internet or an online service and who collects or maintains personal information from or about the users of or visitors to such website or online service, or on whose behalf such information is collected or maintained, where such website or online service is operated for commercial purposes, including any person offering products or services for sale through that website or online service, involving commerce—(i) among the several States or with 1 or more foreign nations;(ii) in any territory of the United States or in the District of Columbia, or between any such territory and—(I) another such territory; or(II) any State or foreign nation; or(iii) between the District of Columbia and any State, territory, or foreign nation; but(B) does not include any nonprofit entity that would otherwise be exempt from coverage under section 5 of the Federal Trade Commission Act (15 U.S.C. 45).(3) COMMISSION.—The term "Commission" means the Federal Trade Commission.(4) DISCLOSURE.—The term "disclosure" means, with respect to personal information—(A) the release of personal information collected from a child in identifiable form by an operator for any purpose, except where such information is provided to a person other than the operator who provides support for the internal operations of the website and does not disclose or use that information for any other purpose; and(B) making personal information collected from a child by a website or online service directed to children or with actual knowledge that such information was collected from a child, publicly available in identifiable form, by any means including by a public posting, through the Internet, or through—(i) a home page of a website;(ii) a pen pal service;(iii) an electronic mail service;(iv) a message board; or(v) a chat room.(5) FEDERAL AGENCY.—The term "Federal agency" means an agency, as that term is defined in section 551(1) of title 5, United States Code.(6) INTERNET.—The term "Internet" means collectively the myriad of computer and telecommunications facilities, including equipment and operating software, which comprise the interconnected world-wide network of networks that employ the Transmission Control Protocol/ Internet Protocol, or any predecessor or successor protocols to such protocol, to communicate information of all kinds by wire or radio.(7) PARENT.—The term "parent" includes a legal guardian.(8) PERSONAL INFORMATION.—The term "personal information" means individually identifiable information about an individual collected online, including—(A) a first and last name;(B) a home or other physical address including street name and name of a city or town;(C) an e-mail address;(D) a telephone number;(E) a Social Security number;(F) any other identifier that the Commission determines permits the physical or online contacting of a specific individual; or(G) information concerning the child or the parents of that child that the website collects online from the child and combines with an identifier described in this paragraph.(9) VERIFIABLE PARENTAL CONSENT.—The term "verifiable parental consent" means any reasonable effort (taking into consideration available technology), including a request for authorization for future collection, use, and disclosure described in the notice, to ensure that a parent of a child receives notice of the operator's personal information collection, use, and disclosure practices, and authorizes the collection, use, and disclosure, as applicable, of personal information and the subsequent use of that information before that information is collected from that child.(10) WEBSITE OR ONLINE SERVICE DIRECTED TO CHILDREN.—(A) IN GENERAL.—The term "website or online service directed to children" means—(i) a commercial website or online service that is targeted to children; or(ii) that portion of a commercial website or online service that is targeted to children.(B) LIMITATION.—A commercial website or online service, or a portion of a commercial website or online service, shall not be deemed directed to children solely for referring or linking to a commercial website or online service directed to children by using information location tools, including a directory, index, reference, pointer, or hypertext link.(11) PERSON.—The term "person" means any individual, partnership, corporation, trust, estate, cooperative, association, or other entity.(12) ONLINE CONTACT INFORMATION.—The term "online contact information" means an e-mail address or an-other substantially similar identifier that permits direct contact with a person online.SEC. 1303. REGULATION OF UNFAIR AND DECEPTIVE ACTS AND PRACTICES IN CONNECTION WITH THE COLLECTION AND USE OF PERSONAL INFORMATION FROM AND ABOUT CHILDREN ON THE INTERNET.(a) ACTS PROHIBITED.—(1) IN GENERAL.—It is unlawful for an operator of a website or online service directed to children, or any operator that has actual knowledge that it is collecting personal information from a child, to collect personal information from a child in a manner that violates the regulations prescribed under subsection (b).(2) DISCLOSURE TO PARENT PROTECTED.—Notwithstanding paragraph (1), neither an operator of such a website or online service nor the operator's agent shall be held to be liable under any Federal or State law for any disclosure made in good faith and following reasonable procedures in responding to a request for disclosure of per-sonal information under subsection (b)(1)(B)(iii) to the parent of a child.(b) REGULATIONS.—(1) IN GENERAL.—Not later than 1 year after the date of the enactment of this Act, the Commission shall promulgate under section 553 of title 5, United States Code, regulations that—(A) require the operator of any website or online service directed to children that collects personal information from children or the operator of a website or online service that has actual knowledge that it is collecting personal information from a child—(i) to provide notice on the website of what information is collected from children by the operator, how the operator uses such information, and the operator's disclosure practices for such information; and(ii) to obtain verifiable parental consent for the collection, use, or disclosure of personal information from children;(B) require the operator to provide, upon request of a parent under this subparagraph whose child has provided personal information to that website or online service, upon proper identification of that parent, to such par-ent—(i) a description of the specific types of personal information collected from the child by that operator;(ii) the opportunity at any time to refuse to permit the operator's further use or maintenance in retrievable form, or future online collection, of personal information from that child; and(iii) notwithstanding any other provision of law, a means that is reasonable under the circumstances for the parent to obtain any personal information collected from that child;(C) prohibit conditioning a child's participation in a game, the offering of a prize, or another activity on the child disclosing more personal information than is reasonably necessary to participate in such activity; and(D) require the operator of such a website or online service to establish and maintain reasonable procedures to protect the confidentiality, security, and integrity of personal information collected from children.(2) WHEN CONSENT NOT REQUIRED.—The regulations shall provide that verifiable parental consent under paragraph (1)(A)(ii) is not required in the case of—(A) online contact information collected from a child that is used only to respond directly on a one-time basis to a specific request from the child and is not used to recontact the child and is not maintained in retrievable form by the operator;(B) a request for the name or online contact information of a parent or child that is used for the sole purpose of obtaining parental consent or providing notice under this section and where such information is not maintained in retrievable form by the operator if parental consent is not obtained after a reasonable time;(C) online contact information collected from a child that is used only to respond more than once directly to a specific request from the child and is not used to recontact the child beyond the scope of that request—(i) if, before any additional response after the initial response to the child, the operator uses reasonable efforts to provide a parent notice of the online contact information collected from the child, the purposes for which it is to be used, and an opportunity for the parent to request that the operator make no further use of the information and that it not be maintained in retrievable form; or(ii) without notice to the parent in such circumstances as the Commission may determine are appropriate, taking into consideration the benefits to the child of access to information and services, and risks to the security and privacy of the child, in regulations promulgated under this subsection;(D) the name of the child and online contact information (to the extent reasonably necessary to protect the safety of a child participant on the site)—(i) used only for the purpose of protecting such safety;(ii) not used to recontact the child or for any other purpose; and(iii) not disclosed on the site, if the operator uses reasonable efforts to provide a parent notice of the name and online contact information collected from the child, the purposes for which it is to be used, and an opportunity for the parent to request that the operator make no further use of the information and that it not be maintained in retrievable form; or(E) the collection, use, or dissemination of such information by the operator of such a website or online service necessary—(i) to protect the security or integrity of its website;(ii) to take precautions against liability;(iii) to respond to judicial process; or(iv) to the extent permitted under other provisions of law, to provide information to law enforcement agencies or for an investigation on a matter related to public safety. 1815(3) TERMINATION OF SERVICE.—The regulations shall permit the operator of a website or an online service to terminate service provided to a child whose parent has refused, under the regulations prescribed under paragraph (1)(B)(ii), to permit the operator's further use or maintenance in retrievable form, or future online collection, of personal information from that child.(c) ENFORCEMENT.—Subject to sections 1304 and 1306, a violation of a regulation prescribed under subsection (a) shall be treated as a violation of a rule defining an unfair or deceptive act or practice prescribed under section 18(a)(1)(B) of the Federal Trade Commission Act (15 U.S.C. 57a(a)(1)(B)).(d) INCONSISTENT STATE LAW.—No State or local government may impose any liability for commercial activities or actions by operators in interstate or foreign commerce in connection with an activity or action described in this title that is inconsistent with the treatment of those activities or actions under this section.SEC. 1304. SAFE HARBORS.(a) GUIDELINES.—An operator may satisfy the requirements of regulations issued under section 1303(b) by following a set of self-regulatory guidelines, issued by representatives of the marketing or online industries, or by other persons, approved under subsection (b).(b) INCENTIVES.—(1) SELF-REGULATORY INCENTIVES.—In prescribing regulations under section 1303, the Commission shall provide incentives for self-regulation by operators to implement the protections afforded children under the regulatory requirements described in subsection (b) of that section.(2) DEEMED COMPLIANCE.—Such incentives shall include provisions for ensuring that a person will be deemed to be in compliance with the requirements of the regulations under section 1303 if that person complies with guidelines that, after notice and comment, are approved by the Commission upon making a determination that the guidelines meet the requirements of the regulations issued under section 1303.(3) EXPEDITED RESPONSE TO REQUESTS.—The Commission shall act upon requests for safe harbor treatment within 180 days of the filing of the request, and shall set forth in writing its conclusions with regard to such requests.(c) APPEALS.—Final action by the Commission on a request for approval of guidelines, or the failure to act within 180 days on a request for approval of guidelines, submitted under subsection (b) may be appealed to a district court of the United States of appropriate jurisdiction as provided for in section 706 of title 5, United States Code.SEC. 1305. ACTIONS BY STATES.(a) IN GENERAL.—(1) CIVIL ACTIONS.—In any case in which the attorney general of a State has reason to believe that an interest of the residents of that State has been or is threatened or adversely affected by the engagement of any person in a practice that violates any regulation of the Commission prescribed under section 1303(b), the State, as parens patriae, may bring a civil action on behalf of the residents of the State in a district court of the United States of appropriate jurisdiction to—(A) enjoin that practice;(B) enforce compliance with the regulation;(C) obtain damage, restitution, or other compensation on behalf of residents of the State; or(D) obtain such other relief as the court may consider to be appropriate.(2) NOTICE.—(A) IN GENERAL.—Before filing an action under paragraph (1), the attorney general of the State involved shall provide to the Commission—(i) written notice of that action; and(ii) a copy of the complaint for that action.(B) EXEMPTION.—(i) IN GENERAL.—Subparagraph (A) shall not apply with respect to the filing of an action by an attorney general of a State under this subsection, if the attorney general determines that it is not feasible to provide the notice described in that subparagraph before the filing of the action.(ii) NOTIFICATION.—In an action described in clause (i), the attorney general of a State shall provide notice and a copy of the complaint to the Commission at the same time as the attorney general files the action.(b) INTERVENTION.—(1) IN GENERAL.—On receiving notice under subsection (a)(2), the Commission shall have the right to intervene in the action that is the subject of the notice.(2) EFFECT OF INTERVENTION.—If the Commission intervenes in an action under subsection (a), it shall have the right—(A) to be heard with respect to any matter that arises in that action; and(B) to file a petition for appeal.(3) AMICUS CURIAE.—Upon application to the court, a person whose self-regulatory guidelines have been approved by the Commission and are relied upon as a defense by any defendant to a proceeding under this section may file amicus curiae in that proceeding.(c) CONSTRUCTION.—For purposes of bringing any civil action under subsection (a), nothing in this title shall be construed to prevent an attorney general of a State from exercising the powers conferred on the attorney general by the laws of that State to—(1) conduct investigations;(2) administer oaths or affirmations; or(3) compel the attendance of witnesses or the production of documentary and other evidence.(d) ACTIONS BY THE COMMISSION.—In any case in which an action is instituted by or on behalf of the Commission for violation of any regulation prescribed under section 1303, no State may, during the pendency of that action, institute an action under subsection (a) against any defendant named in the complaint in that action for violation of that regulation.(e) VENUE; SERVICE OF PROCESS.—(1) VENUE.—Any action brought under subsection (a) may be brought in the district court of the United States that meets applicable requirements relating to venue under section 1391 of title 28, United States Code.(2) SERVICE OF PROCESS.—In an action brought under subsection (a), process may be served in any district in which the defendant—(A) is an inhabitant; or(B) may be found.SEC. 1306. ADMINISTRATION AND APPLICABILITY OF ACT.(a) IN GENERAL.—Except as otherwise provided, this title shall be enforced by the Commission under the Federal Trade Commission Act (15 U.S.C. 41 et seq.).(b) PROVISIONS.—Compliance with the requirements imposed under this title shall be enforced under—(1) section 8 of the Federal Deposit Insurance Act (12 U.S.C. 1818), in the case of—(A) national banks, and Federal branches and Federal agencies of foreign banks, by the Office of the Comptroller of the Currency;(B) member banks of the Federal Reserve System (other than national banks), branches and agencies of foreign banks (other than Federal branches, Federal agencies, and insured State branches of foreign banks), commercial lending companies owned or controlled by foreign banks, and organizations operating under section 25 or 25(a) of the Federal Reserve Act (12 U.S.C. 601 et seq. and 611 et seq.), by the Board; and(C) banks insured by the Federal Deposit Insurance Corporation (other than members of the Federal Reserve System) and insured State branches of foreign banks, by the Board of Direc- tors of the Federal Deposit Insurance Corporation;(2) section 8 of the Federal Deposit Insurance Act (12 U.S.C. 1818), by the Director of the Office of Thrift Supervision, in the case of a savings association the deposits of which are insured by the Federal Deposit Insurance Corporation;(3) the Federal Credit Union Act (12 U.S.C. 1751 et seq.) by the National Credit Union Administration Board with respect to any Federal credit union;(4) part A of subtitle VII of title 49, United States Code, by the Secretary of Transportation with respect to any air carrier or foreign air carrier subject to that part;(5) the Packers and Stockyards Act, 1921 (7 U.S.C. 181 et seq.) (except as provided in section 406 of that Act (7 U.S.C. 226, 227)), by the Secretary of Agriculture with respect to any activities subject to that Act; and(6) the Farm Credit Act of 1971 (12 U.S.C. 2001 et seq.) by the Farm Credit Administration with respect to any Federal land bank, Federal land bank association, Federal intermediate credit bank, or production credit association.(c) EXERCISE OF CERTAIN POWERS.—For the purpose of the exercise by any agency referred to in subsection (a) of its powers under any Act referred to in that subsection, a violation of any requirement imposed under this title shall be deemed to be a violation of a requirement imposed under that Act. In addition to its powers under any provision of law specifically referred to in subsection (a), each of the agencies referred to in that subsection may exercise, for the purpose of enforcing compliance with any requirement imposed under this title, any other authority conferred on it by law.(d) ACTIONS BY THE COMMISSION.—The Commission shall prevent any person from violating a rule of the Commission under section 1303 in the same manner, by the same means, and with the same jurisdiction, powers, and duties as though all applicable terms and provisions of the Federal Trade Commission Act (15 U.S.C. 41 et seq.) were incorporated into and made a part of this title. Any entity that violates such rule shall be subject to the penalties and entitled to the privileges and immunities provided in the Federal Trade Commission Act in the same manner, by the same means, and with the same jurisdiction, power, and duties as though all applicable terms and provisions of the Federal Trade Commission Act were incorporated into and made a part of this title.(e) EFFECT ON OTHER LAWS.—Nothing contained in the Act shall be construed to limit the authority of the Commission under any other provisions of law.SEC. 1307. REVIEW.Not later than 5 years after the effective date of the regulations initially issued under section 1303, the Commission shall—(1) review the implementation of this title, including the effect of the implementation of this title on practices relating to the collection and disclosure of information relating to children, children's ability to obtain access to information of their choice online, and on the availability of websites directed to children; and(2) prepare and submit to Congress a report on the results of the review under paragraph (1).SEC. 1308. EFFECTIVE DATE. Sections 1303(a), 1305, and 1306 of this title take effect on the later of—(1) the date that is 18 months after the date of enactment of this Act; or(2) the date on which the Commission rules on the first application filed for safe harbor treatment under section 1304 if the Commission does not rule on the first such application within one year after the date of enactment of this Act, but in no case later than the date that is 30 months after the date of enactment of this Act.The CIA, Mind Control & ChildrenA Talk by John RappoportCKLN FM 88.1 Ryerson Polytechnic University Toronto, Ontario, Canada International ConnectionProducer: Wayne MorrisToday we are going to hear from investigative journalist Jon Rappoport give a talk entitled The CIA, Mind Control, and Children about the CIA’s use of children for creating mind control agents. Author of U.S. Government Mind Control Experiments on Children, he talks about the impact of the mind control testimony submitted to the Presidential hearings on radiation experiments. Jon also speaks about the mindset of those responsible for these horrors and the implications to society.JOHN RAPPOPORT:We are going to launch into this subject, but with a few comments before we start. Mind control is one of those things people don’t like to talk about, including yours truly frankly. I got into it, and I saw the evidence, and it was … you know, there it was.OfÞcially MKULTRA was a CIA mind control project that lasted about 10 years … let’s say from 1952 to 1962-63 … Before it started, there was ARTICHOKE AND BLUEBIRD … those were other CIA mind control projects. After it ended, supposedly in 1963, an ofÞce called ORD OfÞce of Research and Development took it over. Their job we don’t know about … we are not sure of everything they did because that information is not available. It is in 130 boxes of material somewhere … maybe in Langley, Virginia but they won’t release it. Various people have said that they employed more sophisticated measures than MKULTRA to do mind control on people.I think one of the reasons that this is such an important subject is because we are looking at people here who have a certain attitude about life itself, and these people are in the government and they are in important positions in the government … and in order to understand what they are really about, we get a look at them that is unprecedented by looking at what they did with this kind of experimentation on humans. In other words, they hate life. That’s pretty clear. They have their own version of life, which is like “death” and that’s where their life is … that’s what they feed off of. I would say that most, if not all, secret societies are based on the same concept. Once you cut through all the paraphenalia and symbology of secret societies, you are basically dealing with people who have, for one reason or another, given up on life completely. They are now into the form of life that is involved with death … that’s their territory. And it’s a pretty horrendous thing to say, but I think that would be borne out. My own feeling is that we are talking about a conþuence of different inþuences here on individuals that go back a long way into the past … into the history of families in which they grew up … I am talking about long term history of what those families are … and these people who are entirely functional, but entirely psychotic if you want to use that term. It doesn’t really do it justice but it tells you something about them. I am talking about John Foster Dulles and Allen Dulles … I would say they are very good examples. Look at their faces … look at what you see there … you see almost nothing. There is a kind of mask-like quality about these people, an emptiness — very competent people who go about their business, who seem to have no feeling or “juice” for life. And I would say these people are often born into families who go back centuries possibly in that kind of disconnected condition from life. While they are able to function very successfully in society and deal with power, because that is their ticket and their coinage, they Þnd that control and destruction of life is the only thing really that gives them life.Since I have read this information that I will be sharing with you tonight, I am beginning to come to the conclusion that the people who were involved in the nuclear weapons scenario really wanted to destroy the world. It may seem obvious to say but they see that as “liberation” if you can wrap your mind around that … as a release from, what they consider to be an oppressive situation that just simply can’t be tolerated. They see destruction as liberation and so the only thing that would hold them back, I think, from destroying the world is the feeling that they may not have the playground left in which to enact their scenarios of destruction. There would only be one, and that would be the explosion that would take care of the planet.I would say that this is what we are dealing with. I would put up as a model against that, on the other side, although this man is not a messiah by any means, but if you know any of the work by Wilhelm Reich, the psychiatrist who broke away from Freud, he developed an entire psychology around the concept of liberation of energy … from within the person … that was locked up. It was really the Þrst time … he was the main Þgure in the history of Western psychology, let’s put it that way … which was a recent effort. To simply say that we are talking about energy here, and that freedom and the release of free energy from a human being against blocked up channels gives you what is called “life” — that’s life. And he was, of course, destroyed by the government. He had a device that was an energy accumulator device. He was arrested because a federal agent posing as a buyer or distributor of that device offered to take off his hands and bring it through state lines and so he was served a su bpoena to appear before the federal government that involved illegal interstate commerce, and his comment was rather native, he said, “how can they possibly serve me … that’s politics … I am talking about science.” He didn’t honour the subpoena, they put him in jail, and he died. He was talking about fantastical things like plumes of blue energy shooting out of the top of a person into the sky and this kind of liberation of energy would occur. He said that energy creates clouds, and storms, and weathers, the same energy that we have inside ourselves is identical and he called the unit of it an “orgone”. He invented these wild machines that were able to, supposedly, manoeuvre this energy around. He is a fascinating person, and I always hold him up as a person who ultimately stands for the other side of things — which is life.The reason that you Þnd some of these fascist lunatics involved with magic and occult sciences and heavy, heavy, heavy symbology and all of that … is because within these secret societies, they are dealing in death as life.If you could imagine life as a kind of hourglass and they fall through the top and through the skinny part and out the bottom and they see that as being a form of living, and they take their sensation and their thrills from some sort of upside down version of life. I wanted to paint that little sketch before I started, because we are going to get into some pretty strange territory here. I want to say that I think this is basically what is going on. It’s important to know that these people occupy key positions in our government and still do and they are not accountable. It tells you something about what is called a democracy …I have brought some testimony together into this book called, US Government Mind Control Experiments on Children. It’s a compilation basically of testimony that was given in Washington and before I read from it while I can still remember … I want to make a few announcements, a little bit about myself and the people who are here tonight. This is Deep River Books. She Who Remembers is taping this talk … the tape is available afterwards. I will probably forget to remind you and Jeannie will stand up and say something. Ralph Cole of Justice Vision is taping. He has also been taping meetings of Heal, an alternative AIDS group which is doing some excellent work about bringing the truth about AIDS to people and he has some of those tapes available too. This book is available upstairs at Deep River, and so is another book of mine, called AIDS Inc. which I wrote in 1988.I am investigative reporter, for about the last Þfteen years, and I basically have been investigating what I call medical fascism which I believe is the mechanism by which people are going to be dragged into Brave New World if that is the outcome that we unfortunately end up with. That issue is not decided, but because the medical world has such great authority with people, they believe so much in doctors and experts, they are going to try to make that move … they are going to try to bring people to heel under the aegis of medicine … they are going to try to say that they know science, and therefore you have to listen to what they say, and if they say take a drug, or you are suffering from a germ, there is no questioning that. If they say you are detained or quarantined, there is no questioning that … I see that as being something that is coming around here.This testimony was given before the President’s Committee on Radiation on March 15, 1995. We had three people who went up there from New Orleans … Valerie Wolf, a therapist and two of her clients, Claudia Mullen and Chris Denicola. God only knows how they got in and testiÞed. I have heard the story from Valerie, and I still don’t even believe it, but … basically she told me the screener up there, the person who was screening applicants to speak about cruel and unusual radiation experiments on Americans … she said, well I have clients and they are saying that some of these doctors who administered radiation, administered mind control to them so we want to talk. And they said okay. They testiÞed, from what I can gather, for a very short period of time verbally. They submitted a lot of testimony to the Committee from other therapists and other patients, and they somehow got in … nobody knows how … but they got in and that opens a certain kind of door for us, because it puts it on th e record and it gives it a certain legitimacy and what these patients essentially said was, from the time they were 4 years old, 7 years old, they were tortured by the CIA and the military. You can call it something more sophisticated, but it really isn’t. It involved electroshock, physical torture, lights, spinning tables, hallucinogenic drugs, sleep deprivation, isolation tanks, hypnosis, mind programming with commands, layers of trauma that induced buffer zones of amnesia between the traumas, and essentially thereby created multiple personalities. As one psychological theory has it, if you induce enough trauma, you get a split in the personality because the person can’t face the pain, so they put that part out of it, and they come with a new personality. If you keep doing it, you invoke or create different personalities, and then if you are the CIA you try to program these sub-personalities to do different things like memorize information photographi cally and not remember it, do courier operations, assassinations, sex agents, blackmail operations, all of this.Now I must say that I think some representations of this kind of operation are a little too neat and clean … that is people assume it is like (clicks Þngers …) … okay we will create 37 personalities now and program each one … do these commands and call it up and da da da da … I really doubt that it works that way. I think that in many cases, it is a total wash-out. In many cases, it is just psychosis time, madness. (In many cases people are killed because they just won’t respond, and they will not stand for it no matter what is induced …) There are two tracks here … and these are the tracks. There is testimony by the people saying this was done to me … and then you decide if you believe that or not. Then over here, there are attempts to verify through obtaining documents from the CIA and the military that such experiments did in fact go on to create a parallel track of research to give credence to what these people are saying over here because there are many good people w ho want to say this is all nut-case territory over here, and we don’t want to know about it, and frankly, I don’t blame them. So the researchers have said, the ones who are really into this, we want to try to document it as well on the other side and efforts have been made in that direction, and continue to be made in that direction.Let me introduce into the record, and it would be nice if we were all sitting here in front of an Arlen “Single Bullet Theory” Spector and people like that … something called Volume Seven, Recent Advances in Biological Psychiatry, the Proceedings of the19th Annual Convention and ScientiÞc Program of the Society of Biological Psychiatry, Los Angeles, May 13, 1964. The OfÞcers of this group include Ewen Cameron, M.D., Psychiatrist from Canada many will recognize as possibly the major monster on the planet as far as mind control … much has been written about him … I am not going to talk much about him tonight. In Part One in the Table of Contents, we have the following paper: “Automatic Nervous System Responses in Hospitalized Children Treated with LSD and UML” and one of the researchers is Loretta Bender. Loretta Bender cannot be nailed down as being a CIA employee. She was in fact, in 1961, a president of the Society of Biological Psychiatry, but she was part of a small group of researchers who were doing early LSD research … most of whom were doing it for the CIA. She attended conferences where those people showed up … like this, and she attended at least one conference by the Josiah Macey Foundation which was a conduit and front for CIA money. The paper is rather lengthy but I am just going to read you a few things from it. This is not part of the book.“In the children’s unit of Creedmore State Hospital with a resident population of 450 patients, ages 4 to 15, we have investigated the responses of some of these children to lysergic acid and related drugs in the psychiatric, psychological and biochemical areas. Two groups of boys receiving daily LSD, UML (which is a methylated derivative of LSD) or psilocybin … at Þrst the medication was given weekly but was eventually given daily for periods of up to several months. Dosages remain constant throughout, LSD 150 mcg. (which is a standard for an adult trip), psilocybin 20 mg. daily or UML 12 mg. daily, all given in two divided doses. The average duration of treatment was 2 to 3 months.” Daily. Children, 7, 9 , 11 years old …The psychiatrist who sent me this told me that he has a statement at home which he is going to fax me which shows that in several cases at least with these children, this was carried on for several years daily. Of course, all of the testimony here about what happened to the children is they got nothing but better … these were autistic, retarded (a loose term signiÞying really nothing), but autistic or schizophrenic children … that was the diagnosis. They all “responded, became more straightforward, and here” and whatever. You decide …That is a very signiÞcant piece of evidence here. That shows that as early as 1964, the CIA was in fact experimenting … or a person with probable CIA connections … was experimenting on young children with LSD and other similar drugs.Now I have here a staff memorandum given to me by Harlan Girard, a very active researcher in his Þeld, to Members of the Advisory Committee on Human Radiation Experiments from the Advisory Committee staff on June 27, 1994, and this is a summary of the CIA, its history and its activities. In other words, members of the Committee on Radiation staff submitted this to the Committee at large to kind of clue them in on what the CIA is prior to the 1995 Hearing of the President’s Committee on Radiation, and they say, “In the 1950’s and 60’s the CIA engaged in an extensive program of human experimentation using drugs, psychological and other means, in search of techniques to control human behaviour for counter intelligence and covert action purposes.” This is quite an admission. In other words, they are training agents, it says here, by using mind control on them. It doesn’t say they are using mind control just to sort of get information from foreign agents. The possibility that the CIA itself engaged in human radiation experiments emanates from references in a 1963 CIA Inspector General’s report on project MKULTRA which was a “program concerned with research and development of chemical, biological and radiological materials capable of deployment in clandestine operations to control human behaviour.” Now in the rest of this report, they indicate that they cannot Þnd any records of speciÞc radiological experiments carried out by the CIA, and obviously they are looking. This doesn’t look like a total whitewash.But that doesn’t mean that you believe them, it just means that those records have been destroyed or hidden away deep hidden away … because everybody agrees that radiation is a bad thing … and the CIA … the last thing they want is for people to believe that they used radiation on people. But this does indicate that there was a reference about research and development of radiation by the CIA for purposes of deployment in clandestine operations to control human behaviour. How the hell do you use radiation in clandestine operations to control human behaviour? Well, I would suggest that you use it to traumatize people whom you are training as agents so that you can gain control of them and you therefore have them under your thumb, and they do what you want them to do. The testimony here tends to bear that out … that radiation was used on people as a method of inducing trauma, not as a way of testing … you know … does radiation cause harm? Which is sort of the gist of the President ‘s Committee on Radiation … they went half-way. They said “terrible things were done to unwitting Americans … radiation was used by doctors on them in hospitals” but this goes further, we are now talking about a whole other leve, because those those experiments which were supposedly carried on as a misguided effort to see what toxicity levels were like, unfortunate occurrences, things got out of control at times, isolated individuals did commit crimes, da da da da …. you know. But they were attempting to do medical research … and that’s one of those hypnotic phrases, “medical research”. I could probably put everybody to sleep just by saying “medical research, medical research …” (laughter) And people would reach into their pockets and come out with money, man … well hey, cancer and infantile paralysis and m.s. … whatever you want … I’ll give you money … medical research, medical research. Politicians know that’s the key they turn all the time … when they can’t Þgure out what to say, they say we need more money for research … and that means tax money and it means things you don’t want to be subjected to most of the time …Valerie Wolf is something else … this woman is down in New Orleans … she is seeing clients other people won’t see … therefore they tell strange stories. These are clients who have been Þred by other therapists … they are very unruly, out of control, they do not recover, nothing works, they cut themselves, they go into hospitals, they try to commit suicide … they are people that therapists generally þee from … and she says “let’s go …” That’s her scene … so it stands to reason that she would hear stories that other therapists cannot hear … and in her statement to the Committee on Radiation March 15, 1995, she says, “ … the research programs [that her clients were submitted to] included radiation, drugs, mind control and chemicals … my clients have reported all of these being used on them, although technically they were considered to be part of the mind control experiments. Generally it appears that therapists across the country are Þnding clients who have been subjected to mind control techniques. The consistency of their stories about the purpose of the mind control and the techniques such as electroshock, use of hallucinogens, sensory deprivation, spinning, dislocation of limbs, and sexual abuse is remarkable. There is almost nothing published on this aspect of mind control used on children, and these clients come from all over the country having had no contact with each other. From the small sample of therapists to whom I talked, it appears that about 25% of the clients report memories of being used in radiation experiments. It is possible that more people were exposed to radiation, but that the memories have not yet emerged because our awareness of this experimentation is so new.”Let me say now, before we get into it further, that the one organization in the United States that has tried to debunk all of this is called the False Memory Syndrome Foundation. They are based in Philadelphia. They say that any recovered memories in therapy, that is any patient who goes into therapy and recovers a memory is a liar or unintentionally lying because their therapist induced it, suggested it, guided it, okay? Now, I talked to these people and at certain levels they are very well meaning of course … that is always the way. I talked to their PR person and I asked when were you born, this organization? She said, “1992”. I said well how extensive is it? And she said, “We have a chapter in every state.” Now for anybody who has ever been an activist or worked in non-proÞt 501C3 … are you kidding me man? You have a chapter in every state in 3 years? You’re cooking, you are cooking … and in foreign countries they have chapters too. But no foundation money and no government funding … this is like, you know, they are like … walking on water … you know? (audience member: “It took McDonald’s longer …) There we go. That’s the False Memory Syndrome Foundation … (audience member: “individual contributions …”) It is true … now that organization was founded by Pamela Freyd … her daughter accused her husband of abuse as a child … and in the resultant uproar they founded this organization … Frontline on PBS did an entire episode on all of this …… and then received a letter, from I think it was the daughter’s brother who said, that was quite a presentation you put on about the FMSF and my mother … and I just wanted to tell you though that despite your sympathetic treatment of this organization, everything my sister said was absolutely true and they were abusing her from the time she was a little kid.” That’s interesting about the beginning of this organization.Now on the board of this organization we have such luminaries as Louis Joly West … Louis “I never worked for the CIA” Joly West. This guy has been documented to have done all kinds of stuff for the CIA and military on mind control stuff … gave LSD to an elephant, and killed it. Wanted to start the Centre for the Study of Violence at UCLA in the l970’s. We have letters, and this was going to be located in a used, abandoned missile base somewhere out north of LA, and part of the deal was they were going to do psychosurgery on violent offenders which is the selective melting of brain connections to keep people from being violent. And this was touted as being highly medical, very precise. This is right in the ballpark of what I am talking about here when they say “it’s all medical … we have miniaturized and we can take out certain neurons here and there, and everything’s cool.” Some people throw up their hands and say who am I to … I don’t know … maybe they are right …Peter Breggin, a psychiatrist who investigates toxic drugs and violence projects against citizens using psychiatry as a front … he lays it on psychiatrists. He discovered that the one case where they claimed a cure by psychosurgery was turned into a gibbering lunatic and that’s why he was cured of violence. He wasn’t able to even live unless somebody was taking care of him all the time and this particular patient was heralded as a cure by Frank Irvin and Bernie Sweet and these guys in the 70’s who were the doctors doing psychosurgery. That was their model, showcase cure of violence.So Louis West, who wanted to start this centre at UCLA, is on the board of FMSF and so is Martin Orne, a Harvard psychiatrist who has done contract work for the CIA in the past. And several other people who have those kinds of connections. They want to debunk this stuff right out of the box … forget it. This is the kind of stuff they want to debunk. Claudia Mullen, client of Valerie Wolf, reports to the Presidential Commission: “Between the years of 1957 and 1984 I became a pawn in a government scheme whose ultimate goal was mind control and to create the perfect spy. All through the use of chemicals, radiation, electroshock, hypnosis, drugs, isolation in tubs of water, sleep deprivation, brainwashing, and verbal, physical, emotional and sexual abuse. I was exploited unwittingly for nearly three decades of my life, and the only explanation given to me was that ‘the end justiÞes the means’ and I was serving my country in their bold effort to Þght communism. I can only summarize my circumstances by saying they took an already abused 7 year old child and compounded my suffering beyond belief. In 1958 I was to be tested, they told me, by some important doctors coming from a place called The Society [… that’s the Human Ecology Society, a known CIA front]. I was told to cooperate, answer any of their questions, then since the tests might hurt, I would be given shots, xrays, and jolts of electricity. I was also instructed not to look in anyone’s face too hard and to ignore names, as this was a very secret project … but to be brave and all those things would help me forget. Naturally as most children do, I did the opposite, and remembered as much as I could. A Dr. John Gittinger [Rapaport: these people in the testimony named names, they did not screw around …] tested me and Dr. Cameron gave me the shocks, and Dr. Green, the xrays. Then I was told by Sid Gottlieb I was right for the Big A … meaning Artichoke.”“By the time I left to go home, just like every time from then on, I would recall nothing of my tests or the different doctors. I would only remember whatever explanations Dr. Robert Heath of Tulane Medical School gave me for the odd bruises, needle marks, burns on my head and Þngers, and even the genital soreness. I had no reason to believe otherwise. Already they had begun to control my mind. The next year I was sent to a place in Maryland called Deep Creek Cabins to learn how to sexually please men. I was taught how to coerce them into talking about themselves. It was Richard Helms, Deputy Director of the CIA, Dr. Gottlieb, Capt. George White and Morse Allen who all planned on Þlming as many high government and agency ofÞcials, and heads of academic institutions and foundations as possible. So later, when the funding for radiation and mind control started to dwindle, then the project would continue at any cost [in other words, blackmail]. I was to become a regular little spy for them after that summer. Eventually trapping many unwitting men, including themselves, all with the use of a hidden camera. I was only 9 years old when this kind of sexual humiliation began. I overheard conversations about a part of the agency called ORD run by Dr. Green, Dr. Stephen Aldrich, Martin Orne and Morse Allen ….”Dr. John Gittinger was Sid Gottlieb’s protege … Gittinger tested everybody. He was like a fanatical tester, developing proÞles of humans, different types of humans, all kinds of questionnaire type tests. Sid Gottlieb was the head of MKULTRA projects for the CIA … a very high ranking bureaucrat, probably never treated a patient in his life. These people (testifying) were saying that these people were doing it … they were not supervising it alone, they were doing it. Dr. Green seems to be a name that is a cover name that many different people used. However there was a Dr. L. Wilson Green, Technical Director of US Army Chemical and Radiological Laboratories at the Army Chemical Centre … so we could have both things happening there. Richard Helms became director of the CIA … a real smooth operator. He was the person who destroyed many MKULTRA Þles before they could be revealed. Capt. George White made a statement to the effect of “nowhere else but in the CIA could a young, red-blood ed American rape, pillage and plunder without … accountability” He set up a brothel in San Francisco in the 60’s, paid off prostitutes to bring in johns to a room which he was Þlming, and these johns unwittingly drank LSD in their cocktails, and Þlming was supposedly to determine what the effects of LSD were on unwitting subjects. This is documented up and down. By the way, for those of you who want to get the background here, John Marks’ Search for the Manchurian Candidate, Walter Bowart’s Operation Mind Control now updated, are upstairs … and there is a very difÞcult book to Þnd called The Mind Manipulators by Alan Scheþin which goes into a wider arena and is a very valuable reference source. There are many other books, Journey into Madness … but the Marks’ book, Scheþin book, and the Bowart book all took off from the same revelation of the ten or so boxes of information that were Þnally released by the CIA in about 1977 … they were actually Þnancial records of MKULTRA. They didn’t think they were very incriminating, but they Þnally began to look at them and saw they were very incriminating. A mistake …Then we had Morse Allen who was the head of Project Bluebird, another mind control project. High up people here she is talking about … who planned on Þlming as many high up ofÞcials … She says “I overheard conversations about a part of the agency called ORD run by Dr. Green, Dr. Stephen Aldrich” who became Director of ORD researched remote control of brains by electrodes, he went to the college I went to, Amherst College … hope I run into him some time. Martin Orne, mentioned again … we are not stinting here on names, these people just named them … sitting here in a room in Washington, D.C. before the President’s Committee on Radiation saying that Richard Helms was involved in torture and brainwashing of children. Now, Valerie Wolf makes this comment about Claudia Mullen: “After 9 months of therapy, she came to therapy one day with MKULTRA written with other words on a piece of paper … the Þrst time … she had never mentioned any of this before. From that point on, she began to work on the mind control issues and began to improve. All of her memories have emerged spontaneously, without the use of memory enhancement techniques such as hypnosis or sodium amytal. I had told her nothing about government and CIA research projects. To the best of my knowledge, she has read nothing about mind control or CIA covert operations. Since she decided to listen carefully and remember as much as she could about conversations among the researchers, her memories are extraordinarily complete. I have sent written copies of memories to Dr. Alan Scheþin for validation [the author of The Mind Manipulators who is a professor of law at the University of Santa Clara]. He has conÞrmed that she has knowledge of events and people that are not published anywhere … that some of her memories contain new information and that some are already known and published. Some of her memories have been conÞrmed by family members. She has also shown me old scrapbooks where she wrote notes to remember what was happening to her, and hid the notes under the pictures in the scrapbooks.” Claudia Mullen states that she is still being monitored, that there is a doctor in New Orleans, who was her family doctor. She names him in her longer testimony … and she said to me, “don’t tell him you are going to do something before you do it, just do it.”Apparently as recently as a month or two ago, she feels that … it’s a strange situation … apparently she is not positive that this doctor was monitoring her, but now she is. She went to his ofÞce … she doesn’t remember what happened to her … there were marks on her when she left the ofÞce … and she feels he is still monitoring her. So there is an element of danger involved in this, for these people. Some of these statements in here are anonymous. Some therapists made statements anonymously because there was public censure by their peers for getting into this stuff. I am told that a therapist named Corey Hammond spoke at a recent convention on methods of deprogramming this kind of mind control that he has developed … Valerie Wolf says she is using these, and they are terriÞc, they work. He has been subject to a lot of censure by other psychologists, societies, whatever it is and that he doesn’t want to talk to people any more, just for making a verbal presentation at this conference.Chris Denicola, another client of Valerie Wolf. Tucson, Arizona. “I was taught how to pick locks, be secretive, use my photographic memory. Dr. Green taught me a technique to withhold information by repeating numbers to myself. He would show me information, then shock me [electroshock]. I would repeat the numbers in my head. I refused to disclose the information that he just gave me, and he found me to be very successful in that part of his mind control experiment. I was four years old. He moved on to wanting me to kill dolls that looked like real children. I stabbed a doll with a spear once, after being severely tortured. The next time I refused. Dr. Green used many torture techniques, but as a I got older, I resisted more and more. He often tied me down in a cage near his ofÞce. Between 1972 and 76, he and his assistants were sometimes careless and left the cage unlocked. At these times I snuck into his ofÞce and found Þles with reports and memos addressed to CIA and military personnel. Included in these Þles were program projects, sub-projects, subject and experiment names, with some code numbers for radiation and mind control experiments. I was caught twice and Dr. Green tortured me ruthlessly with electric shock, drugs, spinning me on a table, putting shots in my stomach and my back, dislocating my joints and hypnotic techniques to make me feel crazy and suicidal. Because of my rebellion and growing lack of cooperation, they gave up on me as a spy assassin. Consequently the last two years, 1974-76, Dr. Green had access to me. He used various mind control techniques to reverse the spy-assassin messages through self destruct and death messages if I ever remembered anything. His purpose? He wanted me dead and I have struggled to stay alive all of my adult life. I believe that it is truly by the grace of God that I am still alive.”That’s just a piece of her testimony. A statement from Alan Scheþin, lawyer, professor of law, Santa Clara: “Claudia’s therapist [Valerie Wolf] has been kind enough to send me, with her client’s informed consent, some of the pertinent records reþecting Claudia’s memories of her experiences as an unwitting subject in these experiments. I have been able to conÞrm that some of the information Claudia has provided is absolutely true and could not have been derived from any published source.” I spoke with Scheþin and he said to me, I thought he was playing it a little close to the vest with this, I understand he is writing a book on this, so I don’t know … he said, “there is one piece of information that I was able to conÞrm, and I don’t know how she could possibly have known this. It involves the connection between two government researchers that is not published anywhere” and he said “I just happened to know that they are connected and she mentioned that they knew each other.”Let me just comment on some of this here. All throughout this testimony you have other clients and patients saying similar things. Dr. Green, Dr. Green, Dr. Green, Dr. Green. Electroshock. Torture, sex abuse and all of that. About three weeks ago I met a woman who is a therapist. She works north of Los Angeles. If you met this woman and talked to her, you would say ‘she’s very on top of things, she is very smart, she seems like a real human being.’ So she looks at me and she says, “I was part of this when I was a kid, as a child.” She doesn’t want to talk about it yet, but she said, “… this business about creating perfect spies, I don’t think that’s it. I don’t think that’s why they were really doing it.” Part of the explanation about what they were supposedly trying to do was to create blank slates … that was their thinking. You can take a human being and erase their mind, then we can program it to be whatever we want it to be. Well adults just go psychotic, so let’s try children … they are more þexible and they have less in their mind to take out … how mechanistic can you get, and that would be the rationale supposedly. From that it has been assumed that the whole point of this was to create a perfect spy, with with nice neat categories of sub-personalities, and program and trigger words, manchurian candidate type stuff. You know, “we will now call up sub-personality 134. Are you there?” “Yes I am here.” “What have you learned on your recent trip to Vienna?” Start. Bing. And then sub-personality 134 says, “I boarded the train, and went to Vienna, and read the following documents that were given to me …” — like a computer? That this was the intention. But this woman said to me, “Yeah, but I think there is something beyond this. It is somewhere in the back of my mind, but I can’t get to it.” I didn’t question her about how she knows this, but she said “First of all this was a very wide-ranging project … there were echelons of the project, not just simply one level. There were children brought up from South America and Mexico. They were considered expendable. They were used with the crudest techniques of brainwashing and so forth. The idea was to learn from this techniques in a more reÞned way techniques that would be used on another echelon of children. The best and brightest in America.” I said, “Do you mean children from well-to-do families?” She said, “Not necessarily. The smartest.”They could be thinking that what they want to do is program these kids who would later, supposedly, emerge in prominent positions in society, so that they would then have long term control of society by controlling people in power positions. She said (she didn’t say “yes”) but she said, “Well, yeah, that makes sense. The Nazis got a hold of the intelligentsia. They turned the intelligentsia — they were able to either silence or bring the intelligentsia into their fold — so it was a major project. She said to me, “They brought a lot of doctors over here after the War and not just the rocket scientists … they brought a lot of doctors over here.” And all throughout this testimony you will read, sprinkled here, “a doctor with a German accent … was it Green … was it Greenburg … a German Jew? … did it look like he was a Jew? … he had blonde hair …” That kind of stuff.I would say this is a Nazi project, but a lot of the Nazis are American-born. It shouldn’t be excused or explained away on that basis because as we know, if we look at Nazi psychiatry for example, they learned a lot from the Americans, especially about eugenics. This is not something where we should say, “ … well, the Nazis took over …” This is home-grown stuff. This is Americana at its worst, at its lowest form. This is also the sub-sub-basement that you walk into when you are a materialist, when that is your philosophy. And I don’t mean you are a materialist in the sense that you want money, possessions … I mean, philosophically. The materialist position is that we are meat, and tissue, and cells, and electrical impulses, and that’s it. When that system collapses, we are gone, never to return. My own feeling is that when you espouse and embrace that philosophy, the ultimate, ultimate sub-basement that you end up in is that sub-basement … that’s where you end up. Finally, that’s where it all comes out.I must say, even though I admire many of the researchers on psychedelics, and feel that they are basically liberating types of people, I think some of them make a mistake when they start talking about, “ … well, it’s all chemicals anyway … what difference does it make? … we are only dealing with chemical reactions anyway, so what’s this nonsense about consciousness separate from chemicals?” They are using that of course to say, “why is the government trying to outlaw the use of psychedelics, if in fact all consciousness is chemical anyway, they are just being selective in their choices of chemical … they are saying ‘alcohol - yes, lsd - no’.” But I think these people have something to think about in this one area. I am not trying to put them down at all, in fact I admire them. But I think when they start talking about “well, consciousness is just chemicals anyway…” I am afraid I have to disagree. I think it is a lot more than chemicals. You can certainly make people do very bizar re things with chemicals, and you can make them suffer a great deal because we are in these bodies … it’s a lot more than that. That’s where I think you wind up. You wind up with this crazy idea about programming people … that’s where I think you wind up with this stuff.On the plus side, if we know this, if we understand what is happening here, and therapists can be brought into this whole dialogue, then we are talking about bridging something that is very un-middle-class into the middle-class and into people who normally don’t consider these kinds of things because we are talking therapists here, private practice therapists whose patients come into their ofÞce and say “I was part of CIA mind control.” I am not saying that the middle class is not some fabulous entity that we have to somehow court, but I am saying that this is an issue which can get some people involved who normally do not get involved and if they are so willing, they can create some havoc with the government and that’s my next point here.One of the reasons that I am going into this, and getting involved in it, is because I want people to begin to see the government for what it actually is and I think this is a way of doing that. Unequivocally coming to it. People say, “the government, yeah … if we just get more of the right people in … a little more funding for research … more this … more that … everything is going to work out and we will get the nice guys, elect Bill and don’t elect George, and elect Jim and don’t elect Phil …” You know … it’s all this kind of whipsawing stuff I see every time an election comes around. “We gotta vote for Bill because if we don’t we’ll get George …” and this and that … boppada bop …. It’s like a vice that people are in, and everybody knows it.I have a statement here from Colin Ross. A very interesting man. Never heard of him before. He’s a psychiatrist from Richardson, Texas. He has been researching the CIA for 20 years. Every time an MKULTRA type researcher dies, he sends away FOIA requests, because he Þgures, well the guy is dead, they will be more likely to release the documents now, and he just … he’s very cute with this, see? He accumulates a little of this, a little of that. MKULTRA had about 139 to 150 sub-projects … nobody knows what they all were, or even if that is the subtotal. It’s the basic mind control project of the CIA after WWII. He has Þles on as many of these as he can possibly get. “I have in my possession about 80 of the 149 sub-project Þles which I obtained through FOIA, Þling requests with the CIA on each deceased investigator of interest.” (I like that.) He says, “Neurosurgeons at Tulane, Yale and Harvard did extensive research on brain electrode implants with intelligence funding and combined bra in implants with large numbers of drugs including hallucinogens.” So while they were telling Tim Leary and Richard Alpert to get out of Harvard … because a few people were taking acid and enjoying it … there were other people there who were inserting electrodes in people’s brains and then giving them acid. “MKULTRA alone included four sub-projects on children, one was conducted at the International Children’s Summer Camp in Maine by an unwitting investigator. The MKULTRA sub-project Þle in my possession for this project states that “the CIA’s interest in this research was in establishing contact with foreign nationals of potential future operational use by the CIA. The children who served as subjects in the project were as young as eleven years old.”“Multiple personality disorder patients in treatment throughout the United States and Canada are describing involvement in mind control research that is much more sophisticated than MKULTRA. Deliberate sexual abuse of children to make them more dissociative … “ and then he ends up simply by saying, “I would be pleased to testify at length at any hearings on CIA and military mind control.” Colin Ross, M.D. Psychiatrist Richardson TexasHere is a statement from a therapist submitted anonymously. “One client told me that they were made to believe they had been abducted by UFO’s so that if memories were retrieved, they would be discredited by the community.” I found that kind of interesting. Hmmm. Other people mentioned satanic costumes … CIA people putting on satanic costumes while they were doing their crazy stuff here …Here’s John Boyd, Ph.D., Clinical Psychologist, practiced clinical psychology for 25 years, Ohio State, University of Virginia. “I have treated three patients whose memories of childhood abuse include detailed recall of sophisticated mind control technology being inþicted upon them by “experts” in collusion with the patients’ mentally disturbed parents. The independent reports of these individuals contain similar information of an esoteric and intricate nature concerning mind control technology which in my opinion could be gained only through personal experience.” The press says nothing. The press says zero about this.Here’s a woman operating under the pseudonym I believe of Chandra Walker-Michaels. “I learned how to handle weapons, particularly how an ice-pick left a neat hole, a hole that allowed so little blood to escape that the victim could remain in public view for hours before they would be discovered not to be napping.” “I was taken on planes to Germany and Egypt to assist Joe with arson … to Israel, along with messages … to Mexico for terrorist activities. I remember a small laboratory in a partially exposed basement of a large building I visited many times starting at age four south of Washington, D.C. At the age of fourteen I was drugged and woke up on a stretcher, and I heard men outside my door discussing how they had gotten me past the guards at Langley that night. At the age of Þfteen Joe introduced me to an elderly man who he referred to as “the Senator”. At the Mayþower Hotel in Washington, D.C. the portly gentleman was brought to the room adjoining ours. Our closet space was Þlled with photographic equipment viewing the Senator’s scene … I refused to participate. I was severely punished.”Just a word about the media, and then we will take a break. One of the best payoffs of being a reporter for Þfteen years is that I have come to see this machine called “the media” and how it operates in a way that I never thought was possible because I have talked to a lot of reporters, and they become the eyes, the mouth and the ears for everybody else. Since I am now researching the Oklahoma City bombing, and I have done a lot of research on AIDS, and now this and other topics, there is a pattern that always seems to emerge. The pattern is that there is a cover story that emerges very quickly after something is either revealed or happens. Very quickly a cover story comes to the fore and then anything that does not Þt the cover story is discarded. In the case of Oklahoma City, it happens to be basically that McVeigh and a few of his friends are rednecks … the rednecks are connected to other rednecks who belong to militias and the militias blew up the building and that’s it … we don’t w ant to know anything else … they are all kind of crazy and stupid … that’s the end of the story … they rented a Ryder truck knowing it could be traced … they bought 5000 lbs. of ammonium nitrate knowing it could be traced …(hey business is suddenly picking up … did you see that guy who suddenly came in and bought 5000 lbs. of ammonium nitrate??? Wow. I thought business was kind of slow and then all of a sudden they came in like 15 or 20 cars and they like, loaded it up in the backs of the station wagons and they kept coming back for more and they took it away … I guess April is a really good planting month you know?? They have a lot of crops in mind …) That’s the cover, right? They were that stupid, and that’s all we have to know. And McVeigh, three hours after the explosion, happens to be driving in a car with no licence, and a cop stops him and says “I will have to cite you for driving without a licence and you will have to appear …” McVeigh says “No problem”, t hen the cop looks at him and he is writing out the citation, he’s going to give it to him, and let him drive away. No problem, Driving without a licence. So what? Then the cop says, “Sir, do you have something under your windbreaker there?” And McVeigh says, “I have a weapon under my windbreaker.” Pulls down the zipper, there’s a 9mm Glock, and a Þve inch knife hanging off his belt. He has just killed 100 people … he’s on a lonely road some place … a cop stops him … he’s going to let him go … he then shows the cop his weapon … the cop then puts his service revolver to his head, disarms him, takes him to jail, puts him on ice for a few days until the Feds … they work fast these guys … three days and they know who did it, they know what happened, they come to the jail where he is, and they take him … Right? By the way, I was told that initial reports placed McVeigh at Tinker Air Force Base in Oklahoma. People who anonymously testiÞed in here, and it has been mentioned by other people, that some of the mind control that was done on them was done at Tinker Air Force Base. Tinkerbell, right?So this is the scenario that is painted by the press, see? Talk about mind control here … now the reporters that I talked to … how they slip and slide with this … once the cover story is established … how they manage to keep from discovering anything, or thinking about anything … or just considering the insanity of the cover story itself, is really something to behold. And I have been talking to a bunch of reporters down in Oklahoma City now … I just listen and we talk and it is all very chatty and everything … and for example one guy who was with the only daily in Oklahoma (The Daily Oklahoman) … all he could talk about was the federal boys … the federal boys combing through the wreckage of the building … the federal boys were there and they did this and they told me and they said this … and it was kind of like, when a sportswriter covers the Yankees … the Slugger told me this, and he told me he threw the curve ball and he holds it this way … had a beer with Mickey … you know, that kind of stuff … “the federal boys told me” that they couldn’t Þnd any other kind of bomb in the building at all … that’s it … what else is there to know … the federal boys day after day were going through the wreckage and they told him they couldn’t Þnd anything … this guy would have talked for three hours like this if I had let him … and that’s how he keeps himself from Þguring out what’s going on and each reporter has his own little scene.In the case of this one here, of course, now Valerie Wolf and one of her clients, they say “look we are not sure we really want to get this exposed all the way out because we know that the False Memory Syndrome Foundation right now has a stranglehold on the press.” That’s the cover story. Nobody cares that the FMSF board is composed of these guys with CIA, mind control connections … That’s the cover story that’s laid down, and so everything else is irrelevant. That’s what we have to bust — is that cover story — with enough people coming forward and saying, “it’s not true”.
Read more…

My life with the Catholic Church

I was born in Saint Luke's hospital in Davenport, Iowa. When I was Baptized the priest told my parents I was perfect baby. I grew up Catholic and went to Catholic grade school, though I nearly got kicked out for being a class clown and fighting with my teachers. The next year I was bullied to leave by my female peers who said in the chapel that they hated me so much they would never stop what they were doing to me. I took it all very hard. I had my first emotional breakdown, age 13.I grew very religious in High School and read from the Bible during Mass and I was in the choir and I led youth religious weekend retreats. I became very good friends again with the peers from grade school who said they would never befriend me again. Then I went to college, and slowly grew wild, and away from the church, did sinful things, then came back to the church and taught CCD to first graders.I had my twins Baptized by my church here in my town, but we never attended Mass until I moved back home for good, and then I became somewhat religious again, teaching CCD to 6th graders and praying at night with the kids, until the deacon at Mass said there are too many law suits in the world, at a time when I was desperately trying to find a lawyer to end my targeting.Along about this time, 2 or 3 priests from my area of about 5 miles radius, were accused to molesting children in the 70's and 80's. One of these priests used to come our family get togethers, he was very close to my one aunt. I attended church growing up at these places too, but was never subjected to this kind of abuse. It makes me wonder, if I'm set up as a sex slave, and the priests here are set up as sex slaves as well, and whether any of us had any control over it, it makes me wonder if I am to blame for all of this.I left the church, and started to go to another Catholic church about 10 miles away, and the kids went to CCD there. I felt the priest was avoiding me and I wanted to ask him about my targeting, what he knew, so I felt like a burden to him, so I left there. We started going to Evangelical Free, and then I feared other people there were watching me, including the pastor, so, after a long time of doing their AWANAS program for kids, and after a few nights of experiencing electronic torture inside the church, we left.I have sent emails to the Diocese of Davenport asking for anything they may know about my targeting, and I never get a single reply, its as if they are waiting for the gates to open up when we can all start talking about this. I expect to hear from them like waiting for Jesus. The difficulty now with being religious is that God and Jesus and all the saints know our thoughts, they are the ultimate mind readers,, but with the medication it doesn't bother me too much. I've recently started going back to a Catholic church in Clinton< Iowa about 20 miles away, seeking first of all forgiveness and guidance. My children still need certain sacraments if we are to stay and not leave this time.
Read more…
中国精神侵害状况极为严重北京某重点国防部门被完全控制,一个数万人的大型国防部门,全体职工被完全控制着说所有的话、做所有的事,工作已经牛头不对马嘴!每一个人说话做事都已不是自己的真实意愿,而是遵循于控制者的意愿!居然没有一个人能讲出来这一点中国精神侵害状况已经极为严重,受害人群已遍及各省市地区北京发廊打工者mary:我从我的家乡来到北京我舅舅那里打工,没有想到非常的倒霉,撞上了这帮用脑波控制犯罪的流氓恶霸。我甚至于开始骂人,有好几次,我指着那个小姐妹的鼻子,简直成了一只母老虎似的,“你他妈的…………!”。别人还以为我是在故意找那个小姐妹的茬什么的,我有苦说不出 —— 我其实对她印象很好,我根本不想骂她!再到后来我的麻烦越来越大。我在宿舍里面开始咆哮,就跟狼嚎似的撕心裂肺的嚎叫,叫声凄烈刺耳,我的脑子的中枢区域就像有橡皮筋扯着扯着,当这个信息变得很强时,我就甚至于会不能自控的嚎叫起来。然后我的腿、胳膊都不能自控的动弹,严重时成了拳打脚踢……这给我制造了很大的困扰。海南加来镇大规模受侵害人群:在中国海南省临高县加来镇,一台高值无线电机器已经被当地民众暴露。海南省籍的几个走了神的“讲人道”恐怖分子用这种机器整害人用了五年以上。“夜长梦多”,因为坚强而悲惨的受害者活现在加来镇,当地群众,干部,警察中,有着全世界最大的知情群体,有着被害得极难堪的家庭,有着苦难世界之最的受害者。恐怖武器与反人类侵害,对加来墟人民造成巨大的心灵冲击,对于七十岁之上的老人,它超过了六十多年前的日本军事侵略者在当地犯下暴行所带来与留下的刻骨铭心之记忆。广东东莞某工厂受害员工:我2005年3月9日进东莞凤岗雁田台和电子集团环宇电子厂上班,在这里工作2 个多月却被该厂的人以一些莫须有的理由用一种任何人都不能拒绝的测慌仪侵害长达7,8个月,在此期间我经历生生死死,差点成了神经病,可我总算挺过了最困难的时候,没逼疯,没逼死,直到我现在可以正常工作,上网。他们用的是一种新型测慌仪(如脑电波测慌仪和以色列测慌仪都可以(这种新型测慌仪和种种监控追踪仪器的非引用,造成对人的不法侵害。仅两岁的受害者: 我女儿2岁时就遭他们迫害,2001年我女儿2岁已经会讲话,他们怕直接用语言骚扰我女儿听见后会讲给我听,所以用摇铃发出铛铛的声音,我女儿说听到铃声,可我听了几次都没有,所以断定我女儿2岁起被他们迫害。他们除了要害死我一家或一辈子迫害外,他们说从现在起一直监视我9岁的女儿他们除了要害死我一家或一辈子迫害外,他们说从现在起一直监视我9岁的女儿。上海留日受害者胡XX:我目前不但思维,行为,言语等随时受到所谓”高科技”的控制外,而且自己的身心与健康也同时受到了残暴地摧残。更有甚者,”高科技”还通过遥控我的所有行为来直接伤害那些与我接触过的任何人(这接触过的任何人中的绝大多数都知晓我所处的被害状态却既敢怒不敢言,自己又深受其害而毫不知情)。据推算,我的这种被控状态产生于日本留学期间,大约始于1992年(或是1991年),至今已有12,3年了。这些年来,我的身心健康一直处于极大的被压迫状态。澳洲女留学生soleilmavis:秋天的景色虽然很美,但是对我来说,每天被他们酷刑折磨,只剩下痛苦和越来越绝望。从2001年12月他们开始虐待我开始,随着他们虐待我给我带来的痛苦越来越多,老天爷也痛苦越来越多,天灾越来越频繁,天灾损失越来越大。我一直在想孟江女哭长城的故事。或许当全世界的人还没有多少人了解这些使用电磁波武器,声波武器及心灵控制技术所受的非人折磨及他们的法西斯集中营,这些受害者的哭泣也只有老天爷听到,也只有老天爷懂得,也只有老天爷能够感受到他们的痛苦,也只有老天爷会跟我们一起受苦。他们这五年来不允许我读书,不允许做任何我想做的事情,晚上不允许我睡觉,或者有时他们就让我一直睡着,不让我醒来。他们虐待我们,给我们身体带来疼痛和疾病。他们严重破坏了我们的生活,但是他们却没有受到法律制裁,我们甚至找不到可以帮助我们打官司的人。北京某国家重点国防部门受侵害状况非常严重全体职工处于完全控制之下我所在的单位是国家一个重点国防单位,现在被侵害的状况非常的严重,很有可能是被脑波技术重点下手的部门之一,我发现绝大多数都受到了脑波侵害,而且很有可能是处于完全控制下的侵害。但是,没有人敢讲出来自己受到了侵害的事实,这一点很不得了!这就是整个脑波控制部署的高明所在!每一个人都会害怕别人说自己是得了精神病,虽然每一个人都看出来周围的人也被控制了,但是,还是会不敢告诉那个人自己也被控制。每一个人都是如此,就实现了大规模的控制而没有人能讲出来!为什么这么多人被控制竟然一个能讲出来的都会没有?这与精神侵害的 技术性内容 有关,这个技术已经达到的水平使出了这样的事!绝大多数人会觉得难以想象,精神侵害技术能达到如此高超的水平,但是,事实的确如此!通过向人脑的 中枢区域 以强能级发放电磁波,人就将会把这些信息信以为真,根本摆脱不了!比如对我们单位就是这样实现的,向我们的脑的中枢以强能级发放了这样的脑波“别人会说这些精神侵害的事情是假的,会说被侵害者是精神病”,由于这一技术能使人们摆脱不出来这样的强能级发放,于是,就使一个人陷入过分的顾虑,就没有人能讲出来了。我们单位就是一个实例,每个人都看出来别人也被脑波控制侵害,明明是完全可以互相交流脑波控制了,但是还是会顾虑——“那个人会不会说我是精神病”!这就是那些犯罪分子以强能级调控发放后所能达到的效果。就我个人体会,是完全挣脱不出来的。(因为我周围几个朋友还是相信脑波控制的,所以我才能有挣脱出来的一点可能)我们单位跟我挨着坐的一个女孩,我看出来被控制得非常严重,于是想去帮助她。下班的时候,她走在前面,我在后面厚着脸皮使劲的撵,吃饭的时候故意到她的宿舍去往那一坐,想跟她逐渐的谈开这些。可是,后来那帮犯罪分子是怎么用的脑波技术你们知道吗?她被控制后,当着很多同事的面,很刺的说,“你不要跟我说话了,我不喜欢你!”后来,我又试着看能不能接近,她继续说,“我不想和你打任何的交道!”虽然我知道她是被控制下才讲出那样的话,但是,周围人会以为是她的确不想和我交往,而我也无法直接了当的告诉所有人说,她是被控制讲了那样的话的,一个是她看上去神情自若,完全不像是被控制后讲出的话,一个是由于脑波控制这样一个事物还没有被单位承认,会被人菲议这是精神病!在脑波控制没有被公认的环境下,如果什么人执意要说脑波控制这回事,那个犯罪团伙甚至于能够控制周围所有的人集体诽谤,“一个人对人讲脑波控制这些事物是精神病”,然后进一步控制周围所有人就能把此人送进精神病院!虽然那些人是处于他人控制下将一个正常的人送进精神病院的,但是每个人都会讲不出来自己是被控制后做的这件事情!我没有任何途径可以和她接近得了。而那些犯罪分子为了使我再也不敢对她讲脑波控制这回事情,甚至于有一次,控制着她,拽着另一个同事,要挟我说,“你是不是有了精神病,为什么老想对我讲脑波控制这些稀奇古怪的事情?”那些犯罪分子采用这种方式堵住我们这些听说过脑波控制的人的嘴 —— “如果你再讲脑波控制这些事,我们就会控制你周围别的人诽谤你是有了精神病”。于是我就再也不敢对她提脑波控制这回事了。而尤其是,她也是被控制的,她自己并不想说这些(实现了对我的要挟),而居然出现了这样的状况:一方面我和她明明都是受害者,却互相怎么都捅不破这一点,而甚至于成为了诽谤彼此的傀儡人(所谓傀儡人就是以脑波技术完全控制后的受害者)!脑波犯罪分子用这种方式利用傀儡人来充当其犯罪的帮凶!而如果脑波技术被社会公认就不会成为这样的状况,这就是脑波技术犯罪分子竭力否认脑波技术的存在,竭力诽谤许多脑波受害者不是被侵害而是精神病的原因!【因为受害者会互相 捅不破 彼此是被控制的——这一点应该引起我们所有人的注意】而她大概被控制了几个月以后,我有一次无意中听说,她一个人在外面住,而没有一个人知道究竟住在哪儿。于是我就想了解一下这件事,就去问她现在住在哪儿。结果我发现她被控制得非常严重,一点点都讲不出来了,每当我问话时,她的语言表达就会被完全控制住。后来我觉得很不对劲,就去问别的同事,她们没有一个人说得上来,她们说“谁都问不出来”。她一个人在外面住了半年多,每天朝夕相处得很要好的姐妹都没能问出来过,说觉得是因为“她不想让别人知道自己的私事”。而原本性格那么开朗的一个人,现在突然变得有点孤僻,脾气变得很大!那肯定是被控制后根本讲不出来自己任何的私事,而根本不是真的不想讲。但是,周围别的人居然完全没有察觉,不认为她现在正非常需要帮助!还有我们单位的一件事简直让人哭笑不得。我办工会的展板,准备把工会小组的组织机构写一下,于是我去问单位的助理员,结果我们单位的助理员说,“工会没有组织机构!”,说我们单位并没有成立工会的组织机构。我大吃一惊,说,“怎么可能?”那个助理员又继续说,“工会是没有组织机构!”(我们工会主席是一个年纪比较大的男同志——但是助理员居然理直气壮的说工会并没有组织机构)。我后来又试着问了好几遍,都是同样的回答,“工会没有组织机构”,而且神情自若。后来,我没有了一点办法,就想绕着问看会不会好一些,我说,“我工会的展板上必须得写一下工会的组织机构”。结果当时助理员是这么说的——“你瞎编一个不就完了”!让我自己瞎编,想写谁就可以写谁!而且全过程我们单位的助理员神情自若,回答得很自然。【那一次,那个挨着我坐的女孩拽着我们同事去要挟我的时候也是的,她已经被控制得很严重,经常会表现得有点孤僻,但当时居然又恢复了开朗,变得神情自若起来】现在我终于和脑波控制受害者的维权机构联系上了,那些施害者知道了以后,马上又调整了应对。当我去跟同事打交道时,看上去他们的症状居然消失了,我以为是不再侵害他们了——后来,我路过他们的办公室往里面不经意的一瞥,受侵害的症状仍然和过去一样严重!是不想让我知道!我和他们打交道时就调整为正常,想让我以为他们的状况不严重!附:薇薇鼠的受害简况我被控制以后,头痛不已,晚上睡眠非常不好,而这影响了我的工作。你们可以看一下上面的例证(澳洲女留学生soleilmavis),有相当多的受害者都是这样的。侵害者为了给我们生活的方方面面制造麻烦,于是让我们晚上睡不了,白天就会无法正常上班。我晚上头经常会很痛,很晚才能休息一小会儿,因为头痛,睡觉睡得很难受,早上也根本起不来。幸好领导非常照顾我,非常谢谢他们!我估计我们单位里面有很多同事都是这样的,他们因为不知道脑波控制这一事物终于已经被社会所承认了,所以不敢对同事讲,不敢对领导讲,甚至于连自己的家人都不敢讲,只有经常缺勤,而有的甚至于会因此丢掉工作。而你们看到上文中受害者mary的状况了吗(“……就跟狼嚎似的撕心裂肺的嚎叫,叫声凄烈刺耳,我的脑子的中枢区域就像有橡皮筋扯着扯着,当这个信息变得很强时,我就甚至于会不能自控的嚎叫起来。然后我的腿、胳膊都不能自控的动弹,严重时成了拳打脚踢……”)?是这样的,这个技术是这样的,侵害者为了污蔑别人是精神病,就会这样来运用。那些犯罪分子为了试图污蔑我,于是就让我在宿舍乱动 —— 头里面简直就像要炸开一样,难以形容!这个在脑波控制技术中称为骨传导。我估计还有很多别的受害者也会出现这样的状况,而且侵害者会竭力诽谤说这是脑波技术实现不了的,好污蔑像这样的状况是得了精神疾病!这个在脑波控制技术中是实现得了的。我现在因为受到脑波控制技术的侵害,工作的确存在着困难,头经常很痛,谢谢领导能够体谅我们这些受害人群 —— 侵害我们的那些犯罪分子为了妨碍我们能够正常的生活,根据我们的作息制度来干扰我们,白天规定上班,就会让白天睡觉,即使规定下午上班,他们也会让下午睡觉。幸好领导非常的好,很照顾我们这样的!使我们一方面能够承担一定的工作,一方面健康不会受到太大的损伤。来源:http://www.jskz.net/oblog4/u/vivivvvo/archives/2007/13.html#
Read more…
各位难友,就在几天前,在QQ上,一个叫“桃花仙子”的找到了我。开始他说他是高级警察,后来他说他是秘密警察,是上面的人派他和我接触的。我记得就在我在高三复读、家里没有钱供我读大学我感觉穷途末路之时,那些科学家就将我引入了试验,后来,当我在家受尽了长达6年的精神摧残和煎熬之后,我猜想,是否我又在同样的穷途末路的情形之下,那些科学家才对我开始新的行动。果然,就在我在家里实在呆不下去,同时我家面临山穷水尽、穷途末路的时候,那些科学家开始派人和我接触了。他就是“桃花仙子”。从中,我们可以发现一个关键词---“极限”。仔细想一下,那些科学家精神摧残我们也都达到了极限的尽头。我能肯定这个“桃花仙子”的确是科学家派来的,或者,根本就是那些科学家本人。我们进行了语音对话。大家听说过这个词没有:“模糊策略”。这是政治术语。同样,“桃花仙子”对我也采取了这种高超的“模糊策略”。我向他提出了很多尖锐又清晰的问题,他的回答,既模糊又清晰、既吐露了重要信息又有极大的保留,最后,使我虽然相信了他但是,大脑仍不得清醒。我对他说,为什么科学家对我总是这么模糊,他说:“会越来越清晰的”。他承诺过我,半个月后,会给我寄点钱花,元旦过后,会派人来我家解决我父亲退休养老金的问题的。我当时很高兴,晚上睡觉时,也不为家里的未来担忧焦虑得睡不着觉了。他对我说:全国几乎每一个县有一个监测的对象;主席很关心我们;上面的人知道我们所有的情况;全世界到处都有试验品,只有极少数人知道这事;我是他们的重点关注对象,因为,只有我的博客最接近真相;科学家分南北两方;上面有两种意见,一种是将我们敷衍塞责掉,另一种就是,为我们负责。各位难友,赶快加他的QQ吧,他的QQ是:840312739。其实,还有一个很重要的证据能证明,他就是科学家本人,那就,QQ上------他居然知道我的心理和大脑思维。这当然是最高机密,通过卫星无知觉破译控制脑电波根据我的个人经历,我发现那些科学家至少掌握了这么几种高科技:1,能破译大脑任何部位、任何皮层的所有信息。2,能毫无知觉的、毫无创伤的控制大脑。3,能淡化甚至洗掉大脑记忆甚至是潜记忆。4,能制造真实的幻觉。5,能给大脑安插不存在的记忆片段。6,能利用大脑磁场看到你所有的未来和过去。7,能利用你大脑和地球的空间磁场将你进行空间、时间转换----你能在一秒种之内从北京走到悉尼,时空在你身上可被扭曲(这是我在北京和小时侯的经历)。当然,还有更多更惊人的,只有他们自己才知道。这么惊世骇俗、震惊世界的高科技革命不是高度机密才怪。从20世纪60年代开始,人类就进入了“读脑时代”,在“冷战”的时代背景下被严密保守的秘密。人类脑计划的基本概念起源于80年代早期。1997年人类脑计划在美国正式启动。目前人类脑计划正在向着全球发展,欧洲和日本相继启动了脑研究计划,我国已加入全球脑计划,成为第二十一个成员国。这儿有个昭然若揭的全球性秘密:那就是人类在20世纪60年代就已经开始掌握“阅读大脑”的技术,可以把人类大脑的思维活动、记忆、反应显示在电脑显示器屏幕上。由于时代的局限性,没有政府、组织、个人正式出面承认该技术的存在与发展现状,难得的蛛丝马迹也是一闪而过、遮遮掩掩。21世纪初,此技术已发展到无线远程、大量同步监测重点对象“所闻、所见、所思、所感”的水平;及自动化处理、数据库管理监测到的内容的水平。各位难友,其实发生在我们身上事情真相是:中国科学家正在通过卫星进行远距离捕获、破译大脑电波研究人脑的试验。各位难友,在中国官方网站上很容易找到“人类脑计划”-------中国已成为“全球人类脑计划”第20个成员国。而且“全球人类脑计划、神经信息学工作组中国代表”是唐一源教授,另外,中国科学院的唐孝威院士也是中国脑计划总负责人。2002年,国际经济合作发展组织(OECD)的科学论坛批准建立以美国为牵头国家的神经信息学工作组,起规定:成员国之间可以利用电子网络寻求协作伙伴,进行数据交换和科研协作,并共同承担科研任务、共享科研成果。目前,国际性神经信息工作群已经成立,国际间科研大合作已经开始,全球性神经信息电子网络已开通。我们可以细想:“全球人类脑计划”已成立,那么,那就意味着各国科学家已有了研究大脑的高科技,并且,各国科学家正在进行大脑研究的工作,那他们正在研究哪些人的大脑呢?是志愿者?还是囚犯?但,如果是这些人的话,那科研范围也太小了,脑研究收获会不大,那,又会是谁呢?--------啊,难友们,不是我们又会是谁呢?脑科技革命正在悄悄地、然而又轰轰烈烈的来到。全世界各大小国都在你追我赶地运作人类脑计划。现在谁做得最多,谁将来就会拥有最多的知识产权。另外,从外国媒体的《美秘密试验欲控制人脑》的新闻报道中我们可以知道,各国拼命的运作人类脑计划不仅仅为了在激烈的竟争中立于不败之地,而且也为了-------不让在脑科学领域遥遥领先的美国在未来战争中和政治大阴谋中占据绝对优势。因此,我猜想,各国政府也是迫于这种压力做出了“强迫大量公民做高残酷的脑试验”的选择。当然,也还有别的原因吧。如,各国科学家面对几十亿公民如此丰富的脑研究资源,能不情不自禁的选中几千人畅通无阻、酣畅淋漓的尽情研究吗?既然,他们能强迫我们做如此残酷的试验而不会招来国际文明是势力坚决的抗议和抵制,那么这些科学家一定用什么理由说服了他们,是什么呢?严峻的形势还有给我们这些试验品诱人的补偿吗?不管怎样,人权始终应该是至高无上的,而且,人是有精神的,补偿不能收买一切。目前,这还是很多人知道但还不能统一在媒体面前、在全世界面前公开的秘密,因此,试验具有高度的隐蔽性,也因为脑科技革命和极致残酷的脑试验对世界的轰动性太大,争议也太大吧。为什么试验如此残酷简直就是极致的残酷呢?对我们进行至少长达五年连续不断、反复的、野蛮卑鄙的精神摧残,直至摧残致疯、在摧残到想要自杀来解脱难以忍受的痛苦的程度的时候,才开始有所收敛。为什么要如此残酷?如此阴暗?如此令人发指?如此灭绝人性?而我只是个渴望得到文明关爱的娇弱女孩。我个人猜想,这么做无非还是为了研究人脑,为了大大加强大脑尤其是大脑深层的神经信号,直至我们疯掉甚至再也活不下去为止,所以,那些科学家就采用了纳粹式、流氓式、畜生式的手法了。我认为,通过卫星远距离捕获破译人脑电波、精神摧残研究大脑的试验,目前还是个秘密,天大的秘密。因此,为了掩饰这个秘密,稳定局面,几乎所有的试验品都被深深的误导,看不到真相,而且,控制我们的大脑,让我们反抗意志懈怠,甚至淡忘这件事。并且,国际社会暗中达成共识------目前,不允许公开承认这个事实。所有人,所有高高在上的人,都必须遵守。这就是,这么巨大的事,这么极为严重的、各国国家本应知道的一清二楚的事,国家却不向我们做出任何解释和交代。另外,想想看,这种高科技带来得种种政治和军事效应。说不定,各国在前段日子用这种高科技进行过轰轰烈烈、你死我活的让整个银河系都震惊的明争暗斗。集中体现在美日台对台湾人大脑的控制,还有,美国在很早的时候,就根据各个种族有相同的大脑电波,就对别的种族的大脑施加影响,如:让中国人更自卑、灵性更贫乏、心气更弱、更堕落,尤其是那些官员;让日本人更不能容忍中国的崛起;让俄罗斯人更颓废,等等。但是现在,根据我每天对新闻节目的观察,我认为,现在,国际已经为此达成和解,并且使之规范。2001年10月4—5日,我国科学家赴瑞典参加了人类脑计划的第四次工作会议,成为参加此计划的第20个成员国。许多科学家认为,我国的神经信息学的总体研究水平落后于发达国家,今后10年是神经信息学快速发展的阶段,也是竞争性最强的阶段。今后十年这个词是关键。今后10年是神经信息学快速发展的阶段,也是竞争性最强的阶段。而我们被引入试验大多是从2001年或2002年,2002年加十,就是2012年,可以推测,2012年,残酷的研究人脑的试验将会结束。我又失业了我都找过5、6份工作了,要么嫌我手脚不利落,太文雅,要么就是听别人说我是精神病患者。昨天,我在梅尼超市面包房工作了一天,又被退掉了。因为,超市里几乎所有的员工都跑过来对老板说我是精神病患者(甚至说我母亲也是)。因为,我总是对着天空自言自语。天啊,我的难友们,你们知道的,那是我正在用大脑思维对那些科学家说话。总之,我在自己的家乡是无法找到工作了。甚至,现在,我更本不能工作。因为,为昨天的事,我相当激动,倍受打击,大脑的病情更严重了,好痛,像要炸了一样。快要完全精神失常的感觉,夜晚也睡不着,我想需要吃安眠药。现在,我的大脑也很痛。我母亲昨天为我的悲惨哭了。我该怎么办呢?上帝啊,人权在哪儿?昨天,我在床上时,那些科学家对我说了很多话,他们的声音依然很小,不过比以往大。他们说:“你的大脑损伤严重”。各位难友,你们可不可以把那些科学家对你们的过程详细的写下来,开头的、还有现在的,无头无脑,不知情的人是看不懂我们的博客的。好吗?
Read more…
那些科学家曾通过卫星对我说过以下的话:1.我们是民族英雄,我们会载入史册,我们会流芳百世。2.到时候他们会狂欢,我们会周游世界。3.试验结束时,国家会派直升飞机来接我,某个大人物也会来。4.要把我的大脑变成一张白纸,再把我卷走。5.国家会负责到底,我们会有上亿的赔偿金。6.价值好大呀。7.到时会召开新闻发布会,会向全世界公开。8.某人会向我们下跪道歉。9.我们的大脑已被复制在电脑中,我们可以永生。10.到时候,我们大脑要被安装芯片。11,会让我梦想成真。我只是如实的转述科学家对我说过的话,我认为,别的试验品都被深深的误导,但是除了我。各位难友,我真的是又好气又好笑,怎么除了我一个,没有一个难友看到,这是中国科学家正在做残酷的研究大脑的试验呢?像中国这样讲究绝对统治的国家是不可能让民间拥有如此尖端、超前、极具危险性的高科技的。如此多的人、如此大的规模、如此惊人一致的手法、如此惊人尖端、超前的高科技且都是通过卫星进行的、上面如此一致的保持缄默,因此,无论你怎么想,怎么推论,这,都不是什么犯罪集团干的。为了保密和稳定局面,那些科学家深深误导大家,让大家意见无法统一,他们有时还冒充别的试验品,让我们互相猜疑,更加无法统一。更何况,被选中的试验品大多来自社会最底层,贫穷、单纯、无知。没有大脑、没有金钱也没有能力去反抗,这样,更是有助于那些科学家牢牢的控制局面。我敢预言:我们越是意见统一,且越是接近真相,反抗行动的越积极有力,那些科学家给我们知情权的那一天离我们就越近。我是个崇尚真理的人,捍卫真理、推动世界进步,是我坚定的信念。我希望我美丽、灵动、卓越、强大,这样,我就有足够的能力美化世界、改造世界。我希望我未来的丈夫高大、优秀、睿智、强大、崇高,就像一只温和又威严的狮子。他最好又是科学家又是商界精英,像李开复一样。我希望我和他都能通过高科技得到进化,成为超人类。我希望我能是他的至爱,他对我充满了仁爱,他是那么的崇高,以至于他一生都像狮子一样温柔、慈爱的守侯着他那可怜的小母狮子。但是,未来的他能知道现在的我正在遭受苦难吗?那些科学家对我说过,他们会让我成为世界上最幸福的人,这是真的吗?他们又让我有了等他们的理由。我等着、等着,等着那些科学家,等着未来的丈夫。那些科学家在很早以前说,要把我的大脑变成一张白纸,要让我的大脑变空。果然,现在我的大脑被整空了,一片空白、木僵呆滞、灰暗混沌,就像在噩梦中。因此,我的大脑没有能力去思索我的出路了,我的大脑仅是------一片空白。我发现别的试验品也都有这种症状。根据我的症状和医院诊断书,我的大脑已患上了严重的精神分裂症,离完全精神失常仅一步之遥。我估计别的试验品在最后都会这样。在试验开始时,那些科学家就让我等他们来接我,来为我负责。都6年了,我都等他们6年了,多么难熬的6年啊。我从20等到了26岁,我的青春就是那样度过的吗?现在,我有一种千万孤苦、万千悲苦“白头宫女老”的感觉。现在,整个县城我都无法找到工作,因为,他们都认为我有精神病,其实,我也无法工作,因为,我的大脑时刻处在崩溃的边缘。现在,我只能呆在家里,多么难熬啊,我实在是熬不下去了呀。我真的希望,那些科学家坚硬的心突然变柔软了,对我们会人道些了。科学家呀,科学家呀,请求你们呀,熬不下去了呀,熬不下去了呀,能帮助我吗?好吗?好吗?好吗?各位难友,我们行动越积极,我们就能越早得到知情权那些科学家曾通过卫星对我说过以下的话:1.我们是民族英雄,我们会载入史册,我们会流芳百世。2.到时候他们会狂欢,我们会周游世界。3.试验结束时,国家会派直升飞机来接我,某个大人物也会来。4.要把我的大脑变成一张白纸,再把我卷走。5.国家会负责到底,我们会有上亿的赔偿金。6.价值好大呀。7.到时会召开新闻发布会,会向全世界公开。8.某人会向我们下跪道歉。9.我们的大脑已被复制在电脑中,我们可以永生。10.到时候,我们大脑要被安装芯片。11,会让我梦想成真。我只是如实的转述科学家对我说过的话,我认为,别的试验品都被深深的误导,但是除了我。各位难友,我真的是又好气又好笑,怎么除了我一个,没有一个难友看到,这是中国科学家正在做残酷的研究大脑的试验呢?像中国这样讲究绝对统治的国家是不可能让民间拥有如此尖端、超前、极具危险性的高科技的。如此多的人、如此大的规模、如此惊人一致的手法、如此惊人尖端、超前的高科技且都是通过卫星进行的、上面如此一致的保持缄默,因此,无论你怎么想,怎么推论,这,都不是什么犯罪集团干的。为了保密和稳定局面,那些科学家深深误导大家,让大家意见无法统一,他们有时还冒充别的试验品,让我们互相猜疑,更加无法统一。更何况,被选中的试验品大多来自社会最底层,贫穷、单纯、无知。没有大脑、没有金钱也没有能力去反抗,这样,更是有助于那些科学家牢牢的控制局面。我敢预言:我们越是意见统一,且越是接近真相,反抗行动的越积极有力,那些科学家给我们知情权的那一天离我们就越近。
Read more…
sunny(781169776) 16:16:20我被害的跳了桥破译脑电波(258027165) 16:16:47真的跳了桥吗?sunny(781169776) 16:17:04腿都端了荒野游魂(823693135) 16:17:11匿名(2007-09-16)这个东西学名为“声像同步”也叫脑指纹仪,有多种方法实现:核磁共振技术,红外线技术,毫米波技术。不过毫米波有益于免疫力的提高。不光中国全世界都有这项技术,不光你怕,国家领导人出访还得妨范一下呢。这东西可信度多高sunny(781169776) 16:17:27谁腿骨折荒野游魂(823693135) 16:17:28国家领导人咋防范?破译脑电波(258027165) 16:18:30那你落水了吗?sunny(781169776) 16:18:32双腿骨折荒野游魂(823693135) 16:18:33毫米波是300G-30GHZ,是高频荒野游魂(823693135) 16:18:50sunny(781169776) 16:18:32双腿骨折为你悲哀sunny(781169776) 16:18:55立交桥sunny(781169776) 16:19:15是中国人干的汉语亚荒野游魂(823693135) 16:19:16你应该高兴,我们先知道有这种东西sunny(781169776) 16:19:41差点死了还高兴呢(732792706) 16:19:52没跳荒野游魂(823693135) 16:20:05呵呵,大难不死,必有后福sunny(781169776) 16:20:15跳了抢救过来的sunny(781169776) 16:20:27我都残废了荒野游魂(823693135) 16:20:33晕死破译脑电波(258027165) 16:20:35真的骨折了吗?怎么不在医院里?sunny(781169776) 16:20:48出院了sunny(781169776) 16:20:56快一年了sunny(781169776) 16:21:52中国人也用这个证人了sunny(781169776) 16:22:45我操把我往死里整sunny(781169776) 16:23:16竟然命令我自惭,Ryu(15963228) 16:23:24你控制不了你自己吗sunny(781169776) 16:23:53竟然命令我自残sunny(781169776) 16:24:30我那是被搞得不知自己是谁了破译脑电波(258027165) 16:25:26http://blog.sina.com.cn/guoruquan16 大家能把你们的经历写在我博客的评论里吗?荒野游魂(823693135) 16:25:27神仙,MSN能上吗sunny(781169776) 16:25:31真狠,真不是人Ryu(15963228) 16:25:32你为什么控制不了sunny(781169776) 16:26:23我不知道哪个是自我了,三天没睡觉了Ryu(15963228) 16:27:03我都一个月了破译脑电波(258027165) 16:27:44sunny,是因为那些科学家精神摧残你,你才跳了桥吗?好了吗?KK`ツ(43985094) 16:28:10是不是会有人跟你们说话啊,我倒是没有,我就是经常梦游才加这个群看看,sunny(781169776) 16:28:24是啊KK`ツ(43985094) 16:29:00那个芯片是怎么回事啊,怎么会植入到体内呢,就算植到体内你们怎么会不知道啊sunny(781169776) 16:29:32很细微的破译脑电波(258027165) 16:30:26很细微的声音?sunny(781169776) 16:31:50声音很大破译脑电波(258027165) 16:32:05sunny,是那些科学家的声音吗?sunny(781169776) 16:32:07芯片一定很细微KK`ツ(43985094) 16:32:33对这东西挺好奇的,但是了解不深sunny(781169776) 16:32:47已经不是科学家了破译脑电波(258027165) 16:33:00sunny,有博客吗sunny(781169776) 16:33:04施害人者sunny(781169776) 16:33:23没有破译脑电波(258027165) 16:33:46ttp://blog.sina.com.cn/guoruquan16 您能把你们的经历写在我博客的评论里吗?破译脑电波(258027165) 16:33:54很重要的。KK`ツ(43985094) 16:34:25你们这种情况没有向有关部门反应吗破译脑电波(258027165) 16:34:35这么多人的经历就是强的证据。但是,首先,得有你们的经历。sunny(781169776) 16:34:48你说话时会有脑电波,被机器破译了,然后用机器模仿你的脑电波破译脑电波(258027165) 16:34:48sunny,好吗破译脑电波(258027165) 16:34:58是的KK`ツ(43985094) 16:35:12那会不会来控制我啊sunny(781169776) 16:35:15也许这正是政府的机密sunny(781169776) 16:35:38谁会管这个事情破译脑电波(258027165) 16:35:39sunny,好吗?http://blog.sina.com.cn/guoruquan16 你能把你们的经历写在我博客的评论里吗?这么多人的经历就是强的证据。但是,首先,得有你们的经历。破译脑电波(258027165) 16:35:57外国记者和学者。破译脑电波(258027165) 16:36:14sunnysunny,好吗?http://blog.sina.com.cn/guoruquan16 你能把你们的经历写在我博客的评论里吗?这么多人的经历就是强的证据。但是,首先,得有你们的经历。KK`ツ(43985094) 16:36:28医院检查不出来吗sunny(781169776) 16:37:14就像声波一样,要及时捕捉荒野游魂(823693135) 16:38:16黑骑在中华网的帖子咋不让顶了?破译脑电波(258027165) 16:38:27unnysunny,好吗?http://blog.sina.com.cn/guoruquan16 你能把你们的经历写在我博客的评论里吗?这么多人的经历就是强的证据。但是,首先,得有你们的经历。sunny(781169776) 16:38:30医院也没有这种设备荒野游魂(823693135) 16:38:38晕死,我弄错了破译脑电波(258027165) 16:39:40unnysunny,好吗?http://blog.sina.com.cn/guoruquan16 你能把你们的经历写在我博客的评论里吗?这么多人的经历就是强的证据。但是,首先,得有你们的经历。KK`ツ(43985094) 16:39:53那我天天梦游我也郁闷得一B,每天都睡不好荒野游魂(823693135) 16:41:00哦,你郁闷谁了?KK`ツ(43985094) 16:41:15?没听懂什么意思破译脑电波(258027165) 16:41:31unnysunny,好吗?http://blog.sina.com.cn/guoruquan16 你能把你们的经历写在我博客的评论里吗?这么多人的经历就是强的证据。但是,首先,得有你们的经历。荒野游魂(823693135) 16:41:33那我天天梦游我也郁闷得一B,每天都睡不好?????KK`ツ(43985094) 16:41:51我意思是我天天都梦游,很郁闷荒野游魂(823693135) 16:41:56哦sunny(781169776) 16:42:15我大概只知道这些,你说话时会有脑电波,被机器破译了,然后用机器模仿你的脑电波,通过机器用脑电波和你说话sunny(781169776) 16:42:41我大概只知道这些,你说话时会有脑电波,被机器破译了,然后用机器模仿你的脑电波,通过机器用脑电波和你说话破译脑电波(258027165) 16:43:42写下他们折磨你的详细经过好吗?sunny(781169776) 16:44:27我不想写,没有意义破译脑电波(258027165) 16:44:42荒野游魂(823693135) 16:44:48那就写感受破译脑电波(258027165) 16:44:55这么多人的经历就是强的证据。但是,首先,得有你们的经历。sunny(781169776) 16:45:17恐吓,欺骗破译脑电波(258027165) 16:45:22那样的话,没人会关注我们。破译脑电波(258027165) 16:45:32sunny(781169776) 16:45:59甚至幻像sunny(781169776) 16:47:12这个世界总有人统治,爱谁水,科技发展成这样,由他去吧KK`ツ(43985094) 16:47:34有去医院看过吧荒野游魂(823693135) 16:48:01sunny(781169776) 16:47:12这个世界总有人统治,爱谁水,科技发展成这样,由他去吧那倒是,可是他们折磨我们啊sunny(781169776) 16:48:07议员说你精神病KK`ツ(43985094) 16:48:33也是,如果确实有这种情况,但是被说是精神病是不好受sunny(781169776) 16:48:45认倒霉sunny(781169776) 16:49:05但要有个地方说出来KK`ツ(43985094) 16:49:24我在网上看了下,什么深圳福田区706这是啥东东啊sunny(781169776) 16:49:37就是这里,把我了解地说出来荒野游魂(823693135) 16:49:54那是有个受害者查出谁干的了
Read more…
V-(630527934) 2007-09-25 12:22:00各位难友你们要反抗啊!不在沉默中暴发,就在沉默中灭亡。全国每年有20多万受不了迫害而自杀,广东东莞几个月就有552人自杀,你们可用google.com搜索,这些自杀的受害者可能还不知道有电子折磨武器,施恶者选择迫害我们,最终目的就是要害死我们,施恶者害我已经有8年了,南京红铃受害30年,虽然你们现在受害才几个月,很快的8年30年混混也就过去了,你们过这样的生活不冤吗?最好的反抗就是宣传,写博客发贴子发邮件留地址电话,死也要让人民知道我们是被害死的。几个人的宣传力量不大,要靠大家一起努力。V-(630527934)说得对。我们要争取我们的父母在我们眼前衰老死去之前,安心的看到他们自己的儿女被国家负责,得到公正的对待。精神摧残折磨我们的时间久,试验也很残酷,但是那些科学家不仅淡化我们的记忆,用拖时间消磨我们的反抗意志,从不给我们知情权,而且,还长年累月的跟踪研究我们。也不管我们的大脑因试验被废掉而生存艰难。想想吧,我们高贵的人权就这样被践踏,他们视我们如贱草,我们有多悲惨,有多艰难。试验时间会很久很久,我们没有这个时间等下去,除非,我们都是一群麻木的废物,无能的贱民。2008年,会有很多人权组织来中国,我们不要再找公 an 局的了,那是个黑暗充满压制的地方,他们也不会管的,光明在西方人那里。2008,谁会和我一起去北京?我们要反抗,致死不虞。以上转自难友QQ受害群聊天记录。
Read more…
谁是真正的凶手?谁是真正的凶手?最近十几年,在中国不断发生各种怪现象,人莫名其妙的突然猝死,凶杀案如马嘉爵,邱兴华的暴力事件较典型(无线思维扫描与人脑意识控制),还有一些学生总是想不开,想“旆ㄒ自杀,大学毕业找不到工作跳楼自杀(清华研究生跳楼自杀),一些人自杀,周围人莫名其妙的起哄,难道说周围的人都变态?走进科学中所有怪现象是实实在在的,但为何所谓专家的解释那么荒唐和滑稽?究竟是何原因?难道说那些专家都是粪草?还是故意隐瞒什么?幻听,癌症都是自然发生的?上述这些一切现象都可以用一句话解释即新概念武器的泛滥。中国重庆大学国家重点实验室,生物学院,光电学院,都在做什么泯灭人性的反人类新概念生化武器试验直接针对学生及学生家庭成员。而且能拿到国家自然科学基金,比如张宗益副校长2005申请到250万自然科学基金与重庆第三军医医科大学,解放军通信工程学院合作,这究竟是什么课题?当然这是国家秘密与我无关,问题是我及我家人朋友成为他们的新概念生化武器试验的对象,所有十几种新概念武器的杀伤性试验全部一一体验到,我家人及朋友受到折磨却不知,只有我知道是新概念武器的试验,耳边出现声音“比如阿隆,阿隆吃饭去。”(原来是田学隆脑神经修复平台)“给我买带方便面!” “袋装的还是盒装的?”“随便,来袋装的吧!”“声音小点!”(一面放着影碟)或者在光天化日之下,那么高温下,在大家都开着门睡午觉的状况下我竟然能听到女人大声叫春的声音,而我从不看国产影片,从未听到接触过此景,(在重庆大学诊断为幻听之前)“我把袜子给你寄过去吧!”经常听到打电话声音,甚至呼噜声,而且所用的竟是瑞星杀毒软件(凌晨3点多被呼噜声吵醒,原来瑞星卡卡困了!),让我不明白的是因贫困休学,愿意给我付,免费强制性拖进疯人院住院治疗凭靠一张试卷诊断为精神分裂百分之60者却要逼我休学(理由因经济原因休学)那么重庆大学为何有那么多研究生选择退学,几乎都是因经济原因退学,真是这样的吗?让人有些怀疑。2005年C区一女生自杀方式叫特殊,用塑料袋罩住头跑到顶楼“自杀”躲在某一角落中,发现时尸体已腐烂,什么勇气让此女生选择如此残忍的方式?2003年6月从重庆大学经济管理学院大楼有一男硕士在拿到学位状况下跳楼自杀,为何选择经济管理学院?经济管理学院据说有可以算命的,张宗益副校长在2005年研究生创新基地第一次博硕论坛上说“经济管理学院有几千万的试验设备,闲了几年就是请不来人。”是人不敢来还是,另有原因。重庆大学研究生创新基地博硕论坛,“受损神经细胞组织与修复”骨神经之类的,还有重庆大学国家重点实验室生物学院,都在做什么,发了那些文章,幻听之类的文章都有,癌症等等。新概念武器种类实在太多,什么声学软杀伤性武器,纳米武器,粒子武器,高功率微波武器(耗电大,在二十多天就可以耗电650多度),找到你们这些泯灭人性的专对健康者进行破坏新概念武器杀伤性试验者,实在太容易了,最原始的方式是通过检索你们所发的论文,令一种方式是你们的大脑。所有的详细记录包括你们从小到大的经历,甚至你哪一天何时吃了几个米粒都会准确无误,相信吗?伪造的白纸黑字成为过去式,脑袋里的记忆当然可以抹去,我相信也可恢复。次生波武器导致幻听,声音是通过受害者本人的体频传递的,不是靠声波,所以无论受害者如何解释周围人都无法理解,高功率微波武器可以使高楼瞬间塌方消失,更何况人呢,照射一秒钟立刻致死,甚至消失。我在上帝面前曾发过誓,一定要活着报。作者:marginheig 回复日期:2007-7-25 23:25:50     公开性的折磨分分秒秒长达二年之多,什么声学软杀伤性武器,高功率微波武器,粒子武器,纳米武器,超声波武器,基因武器,计算机病毒武器,气候武器,无线遥控思想意识控制武器,高超声武器等等全都用上。这就是发生在重庆大学校园里的真实场景,中国重庆大学张宗益副校长与第三军医医科大学,解放军通信工程学院联合申请到国家教委250万自然科学基金,2005年12月份,分三年下发,2005年80万到2007年结束。重庆大学有钱,重庆大学电影学院------思想意识控制武器的应用,重庆大学高功率微波武器的杀伤性应用可以研究所谓医学课题,直接针对健康者进行杀伤性破坏,癌变,组织器官变形等等。基因武器的应用可以改变一个人的外形,肤色,毛发,对身体器官也进行迫害致死,次声波武器导致幻听即通过人体频率使声音只让受害者本人听到,计算机病毒武器攻击他人电脑窃”鹑嗣孛埽纳米武器刺窜人的骨头等等。重庆大学光电实验室,生物学院都发了些什么文章,基本上是通过新概念武器杀伤性试验发的论文,这些武器的试验对象基本上是在校大学生或其亲人,而且这些新概念武器可以跨省跨国犯罪,马嘉爵,邱兴华的凶杀案,人莫名其妙的自杀是无线思维及思想意识控制武器的应用。什么鬼魂附身,灵魂出窍等等滋味被我尝尽,如今我要把对我及我家人朋友的泯灭人性的毁灭性的新概念生化武器的折磨与摧残全部还给你们。不要忘记在美国高功率微波武器已警用,日本开了生死课,况且这些武器在中国已存在几十年所有技术都非常成熟,是谁对杀人者开的绿灯?重庆大学研究生创新基地《脑神经修复平台》实质上是通过生化武器泯灭人性试验的结果,《受损神经细胞组织与修复工程》博硕论坛,实质上是通过高功率微波武器对正常健康者进行迫害的泯灭人性的反人类试验。瞧一下重庆大学生物学院国家重点试验室申请到的课题,实质上几乎都是新概念武器杀伤性试验,伪造的白纸黑字已成为过去,无线思维扫描仪可以测出一个人一生的经历,所有犯罪事实记录在你们大脑里,在科学-------上帝面前一切都是赤裸裸的,谎言苍白无力。况且无线送电早已成为现实,这些算什么,太空都有此种武器。重庆大学竟然利用淘汰几十年的武器来进行泯灭人性的毁灭性的新概念武器研发与杀伤性一体的活人试验,却无人问津,此时此刻都不间断。重庆大学自成立武装部,国际学术交流中心。次声波武器导致的受害者直接关进疯人院,假扮医生胸卡戴在右边,这样的白痴都可以利用此种武器进行泯灭人性的反人类试验,可见多荒唐,也可见此种武器的普及率有多高及当今教育界的黑暗与腐朽。记住你们的反人类行为一切都在监控之下。知道我为何在上述那种泯灭人性的反人类的新概念生化武器折磨下,即使生不如死,还坚持生命吗?因为我相信上帝-----科学人类永远无法超越的宇宙的束缚,相信耶稣-----掌握最尖端高科技谁也无法超越者,相信正义是不分国界的,而且知道此种技术的未来会怎样。况且2015年人造大脑问世意味着无线思维扫描与意识控制将普及,一个人一生的经历都写在你的大脑里。想想看,你们的日子还有多久,中国来抓我反革命罪吗?我是个人从没参加过任何组织团体,我此时此刻去找工作总是被你们迫害,无法吃饭,抓我至少有饭吃,我宁愿被你们折磨而死,,不去自杀就是为了增强永生毒咒与诅咒的力量,作为少数民族竟遭如此泯灭人性的反人类试验,剥夺我学习的权利,连最基本的生理反应,上厕所都被剥夺,谈什么人权,分明是被歧视,因此宁作外国鬼,不做中国人,我一定要活着走出中国,死之前一定要改国籍,死了尸体都要捐给外国文明者解剖,让他们揭露你们对我所有的十几种新概念武器试验的泯灭人性,相信现代科技完全达到,因为通过化石中DNA都可以还原出一个人,甚至克隆出一个人,倘若我家人被你们所害,我要把他们尸体或骨灰捐给国外文明者,揭露一切暴行。人死了一无所有,我不相信来世,不相信命运,无神论者,是个体从不参加任何组织,只相信上帝----科学,,耶稣-----掌握最尖端高科技谁也无法超越者的能力。所有的欺骗谎言在我面前显得苍白无力,不再被欺骗,只要我意识清醒状况下,即使法律上是中国公民,但心里仍不承认自己是中国人,我求助于国际,没奢望中国政府的救助,祖父祖母生在韩国,可以说是韩国种,我所表达的仅仅是我们民族无论移居哪里,无论过多少年,那隐藏在骨子里的民族气质是优秀的,是优秀民族,永不服输的民族。我既然被折磨得奄奄一息,随时都可以死,高功率微波武器可以把装甲车瞬间分解消失,更何况人呢,我还怕什么呢?我不愿死于由低级下流卑鄙无知无耻贪婪嫉妒愚昧不开化而导致的泯灭人性的邪恶,一定要活着走出邪恶。相信上帝,耶稣会帮助我死于文明的国度中。相信我的永生毒咒与诅咒吧!我死了都要变成武器不放过你们,中国特色的现实版现“娴摹吨湓4》必定会上映,一定要让你们亲自体会与领悟什么叫泯灭人性四个字,我要活着看到你们,当把对我及我家人朋友的泯灭人性的新概念武器试验的折磨与摧残全还给你们时,你们的表情,你们的反应会怎样,即使你们说受不了要自杀,也没有权利,让你们真正的体验生不如死,泯灭人性几个字。引自:http://main.tianya.cn/publicforum/content/stocks/1/358214.shtml
Read more…
郭佩茜 wrote:你好,soleilmavis,你住在哪里?在北京吗?如果在,能接待我吗?因为我想来北京工作,同时,为我们被强迫做残酷的研究人脑的试验的事努力暴光。能接待我吗?我们要团结互助。mavis mavis 写道:您好, 我人不住在北京, 住在一个靠近农村的地方. 您想找什么工作呢? 您在北京已经找到了工作了吗?目前北京的受害者还没有人有能力接待您, 所以您一定要慎重.大家肯定是很想帮助您. 所以我鼓励您先开一个淘宝店铺, 您可以卖任何您想卖的东西.我和RINOA都回帮助您的.http://shop34821367.taobao.com/郭佩茜 wrote:你有没有将我们的事反映给外国记者,如 da she 国际的。mavis mavis 写道:我们有给很多的国外媒体写信. 目前在争取媒体报道方面, 美国, 德国, 俄罗斯, 英国, 等国家的受害者工作进展比较大.在我的博客有很多的国外媒体的联系方式, 您也可以给他们发信.http://soleilmavis.spaces.live.com郭佩茜 wrote:我认为,你要去北京和那些外国记者面对面的交谈。否则,你的一切努力都将被悄悄阻拦。2008年,会有很多外国记者和外国人 quan 组织来中国,其中就有对人权特别敏感的 da she 国际报的记者。你要在2008年找到他们,面对面的说。我也会去的。我正在赚车费。记住,这样做才有效果,2008年很关键,我们要抓住这一机会,暴光这一震惊世界的事件。mavis mavis 写道:我们电子邮件团队的国外协调员,都在努力跟本国的记者们联系,那些到中国来采访奥运会的记者怕没有时间来关心其它事情。奥运会对他们来说是赚钱的大事情,他们不会因为我们这些事情耽误他们赚大钱的。我们目前已经联系了很多有正义感的记者,他们对我们的事情很关注,所以我们应该把工作重点放在先在,努力联系更多的人,寻找真正有正义感的记者,来报道我们的事情。目前就应该给很多的报纸,杂志,电视台等编辑,记者写信。争取找到关注我们的人,争取曝光。把工作重点放在2008在北京找到国外的记者曝光,只怕您倒时会很失望。但是您现在努力赚钱是应该的,希望能看到您的淘宝店铺早日开起来。郭佩茜 wrote:你都联系上了哪些记者?要面对面的和他们说呀。mavis mavis 写道:是的,每天我们都在联系记者, 有很多受害者也面见过很多记者. 国外已经有了很多报道出现, 在中国,虽然还没有报道, 但是我们不停地联系记者, 至少也让我们的故事被更多人了解.国内也有受害者跟记者见过面.但是, 中国的记者很多, 报纸也很多, 编辑也很多, 需要我们每个受害者大量写信. 不写信, 就没有记者会了解详情.郭佩茜 wrote:为什么不找 da she 国际的记者?mavis mavis 写道:da she 国际不是一个媒体, 而是一个并不太大的人 quan 组织. 在我们联系的人权组织中已经有很多对我们很关注. 并且在努力帮助我们.郭佩茜 wrote:真的吗?是哪些人权组织?他们在北京的哪儿?我要面对面的找他们,能告诉我吗?这很重要。还有,我怎样在我的网店上友情联接您。mavis mavis 写道:我的淘宝", "管理我的店铺" "友情链接"我们联系的人权组织不在北京.郭佩茜 wrote:您知道美国的受害者的暴光工作进行的怎样了?他们怎么不和反战组织连在一起暴光呢?美国的受害者,应该说,是很容易暴光此事的,为什么现在都没呢?mavis mavis 写道:美国的受害者已经做了大量的工作, 他们的故事已经被报纸报道了, 而且是第一个得到媒体关注的国家. 他们已经进行了很多的此的游行示威, 而且已经得到了专家医生组织的承认他们是受虐待而非精神问题.他们也跟很多的人权和反酷刑组织有密切联系, 得到了他们的支持.这些受害者的工作动态在我的网站新闻 http://soleilmavis.googlepages.com和我的博克 http://soleilmavis.spaces.live.com "受害者工作动态"中都有介绍. (网站的左边栏,有一项: 受害者工作动态" . 请您随时关注我的博克, 便可知道全世界的受害者的工作动态.欢迎使用粉红和平工具栏, 可以跟受害者保持即时联系. 您可以从以下网站下载http://peacepink.ourtoolbar.com/, 点击此网页右边有一个大大的灰黑色的"Download Toolbar",就可以出现下载框, 点击保存(save), 或运行(run), 就可以了. 绝对没有任何的病毒和木马, 也不搜集您的任何材料, 比如IP地址等. 此工具栏的搜索功能也经过了GOOGLE的安全过滤,过滤掉了所有的危险,有安全隐患, 色情等不健康的网站. 请放心使用.
Read more…
1. 法国受害者Rodin联系意大利律师Romano Nobile先生Rodin与意大利律师Romano Nobile先生进行了长时间的电话沟通.Romano Nobile先生已经退休不再是职业律师, 但是,他仍然愿意帮助我们. 他曾经代理过大脑受害者Paolo Dorigo的官司, 并且赢了官司. 所有的受害者可以给他写信. (因为他无法阅读中文, 请使用英文写信, 您可以采用电子邮件团队的信件样本). 他的电子邮件: romanobile@libero.itaresricerche@libero.itRomano Nobile先生写了一本书, , 而且他与意大利媒体有着密切的联系.Romano Nobile先生的联系方式:Via Cristoforo Colombo 33200100 RomaTel.+39.06.51.31.400 +39.06.400.41.972 (打电话请联系Angelo Quattrocchi先生, Romano Nobile先生的书的发布商)--------------------------------------------------------------------------------2. 比利时受害者Monika联系德国律师比利时受害者Monika已经联系到了一位愿意给我们提供帮助的德国律师. 受害者们写给"电子邮件团队"信箱的您的故事会转交给他. 如果您还没有给"电子邮件团队"写信, 您可以现在就写. 或者写给soleilmavis@yahoo.comlawyer lorek jensRAJensLorek@aol.comRob McConnell 来自"X"zone 无线电广播和电视, 他对受害者很关注, 受害者可以把您的故事写给他们.Rob McConnell主持人和制片主任"X"zone 无线电广播和电视加拿大REL-MAR McConnell 媒体公司的一个部门联系方式:办公室电话: (905) 575-5916制片室电话: 1-877-528-8255E-mail: xzone@xzone-radio.comWebsite: www.xzone-radio.comThe "X"Zone 在 MySpace.com 的网站 www.myspace.com/xzoneradiotvThe "X"Zone 在 YouTube 的视频 - https://www.youtube.com/xzonerad iotv--------------------------------------------------------------------------------受害者suzelectrowell从FBI获得了好消息我已经从Akron联邦调查局驻地办事处取得了一些结果,并已经寄了我的报告。我想他们正进入调查,如果您愿意,您可以把您的姓名,地址和您的经历寄给他们。我在俄亥俄州似乎是有"运气" ,您也可以把您的案件报告给当地的FBI办事处。他们正在协调,请您写信给我这里的FBI办事处: akron.cv@ic.fbi.govSuz at electrowell http://suz.leboeuf.googlepages.com--------------------------------------------------------------------------------另附她的最近大脑遭受那些科学家精神摧残的记录:早晨, 他们从3点开始将我弄醒. 然后先从疼痛开始进行虐待我. 这种疼痛不是皮疼,而是脖子以上的头部所有的肌肉和骨骼都在疼痛. 他们让我的鼻子呼吸时, 整个呼吸道也很疼痛, 并且无法呼吸顺畅. 在这样酷刑折磨我的同时,他们一边用声音直接传入大脑的方法用他们的各种声音来侮辱我, 他们最经常对我说的一句话就是:"你是他妈的狗X." 而他们所有说的话中, 每句话最后一定要有"....狗X" 及"...神经病" 等字眼. 当然在他们一边骂着的同时, 他们一定要用"图像或信息直接传入大脑"的办法, 强迫我去看他们制造出来的一些情景,图像,信息, 用他们的话来讲, 就是每天他们必须要做的主要工作, 就是用"直接传入大脑的方法" 对我"放电影".他们对我每天晚间的折磨时间并不固定, 有时半夜12点开始折磨,到3点会允许我在痛苦中重新睡上一会儿; 有时会一直虐待我到天亮. 有时2点开始折磨, 直到天亮, 有时3点, 有时4点. 而这些年来,他们没有早晨4:30以后让我睡觉的.所有的折磨都是从疼痛开始,有时头痛, 有时胃痛, 有时其他地方痛. 而痛的时候是身体内部的每一块肌肉和骨骼都在疼痛. 在疼痛的同时"放电影' 以及用各种声音对我侮辱"....狗X" "他妈的狗X"是使用频率最多的词. 而且在疼痛的同时他们一定是要让我呼吸不能顺畅, 而且呼吸时整个呼吸道内部很疼痛.每当他们开始虐待我的时候, 我就打开电脑, 发发信, 写写博客和日记. 或者回复一下我的电子邮件, 看看我的博客和网站是否有需要修改的地方. 这样做些事情, 可以分散一下我的注意力.--------------------------------------------------------------------------------英国独立电视制作公司寻找受害者的故事Paula Wittig paula@firecrackerfilms.comDate: 22 August 2007 13:20:37 BDTTo: info@slavery.org.uk, John.allman@thatfund.org主题:电视纪录片亲爱的约翰,我来自名为Firecracker制片的电视制作公司,就我们正在制作的受监视的社会的记录片写信给您。我们非常感兴趣联系那些强烈反对政府监视/跟踪的人。非常乐意与您们的组织交谈并得到您们的帮助。我们非常感兴趣进一步调查监视的技术和大脑控制技术,我们非常乐意更多探讨这个问题,我们将很荣幸地回答关于这个节目的任何问题。请您告诉我您的合适时间,我可以联系您,或者您可以联系我。非常感谢,并期待着您的回信。顺致良好祝愿,Paula Wittig 助理制片 Firecracker制片3rd Floor The Chambers Chelsea Harbour London SW10 0XF总机 +44 207 349 3400 传真 +44 207 349 3401直线电话: +44 207 349 4411email: paula@firecrackerfilms.comwebsite: www.firecrackerfilms.com
Read more…
以下是一个听证会的直播, 与我们大脑控制受害者有直接关系. 这次听证会是由国会委员会举办的关于国土安全部.他们通过在8月休会期间在华尔街日报的一片文章中发现, 美国国土安全部正计划于10月1日部署一个新间谍卫星, 那会大大增强现有的监视能力. 因此他们有些人怀疑这一计划及其目标: 监测飓风,森林火灾,水灾或其他自然灾害,再加上跟当地执法部门协调信息. 意识到委员会的怀疑(他们也应该怀疑) 是了不起的, 让我们知道委员会应该知道我们的问题--有些已经知道我们的问题了. 它也让我们知道人们开始警醒, 也意识到我们的自由在迅速消失. 如果有人能够录下这个听证会遗留给后人,那就太好了. 听证会大约3小时, 每一分钟都很有价值.(注: NGA --- 国家地理情报机构。也有利于明晰这个名词----Posse Comitatus,其中提到了很多http://hsc-democrats.house.gov/hearings/index.asp?ID=84)--------------------------------------------------------------------------------Monika 寄给欧洲议会主席HANS-GERT POTTERING博士的信。hans-gert.poettering@europarl.europa.eu我想请求您就大规模全世界大量的侵犯人权罪和危害人类罪给予帮助.这一问题相对还比较新,(自2000年以来,在全世界突然增多),该技术非常先进,并正在遥控作为武器对付平民.大多数受害者都是老百姓. 他们屡次试图描述正在发生什么事,但他们都被忽视或怀疑患上妄想症.他们得不到任何人的任何帮助,.国际和欧洲组织不断建议受害者呼吁本国立法机构.但他们的申诉被看作是一个孤立的小问题.还有,全世界受害者者的症状和他们对所使用的技术的描述很相似。再加上,全世界90%以上的受害者是在2000年以后受到攻击,这种“流行的模式”在各大洲存在。因此我们紧急要求就此问题进行国际调查.欧洲受害者,迫切要求帮助.请看以下受害者名单,及受害时的时间。受害者组织起来,在全球范围内采取行动反对人体操控武器滥用.全球范围的深入调查,包括统计数据和证词显示受害者并未精神错乱。他们唯一的目的是要揭露这一历史上的重大罪行。请不要忽视这个问题。请帮助我们。我本人于2005年成为受害者,我知道我没有精神病,也没有精神病史。我是一个稳定而理性的人。我知道我并不孤单,因为全世界范围内成千上万的人正在谈论同样的事。大多数受害例子开始于2000年以后。这就是为什么有这么多人在此时此刻报告此事,这真是一个震撼。我意识到目前没有人“相信“受害者,因此犯罪范围才会如此之广,如此之容易,所以难以想象的残忍。我希望,全世界如此多的申诉能够证明这种犯罪正在发生。请尽快调查此事,请不要忽视此事。Monika Stoces比利时(欧洲受害者名单,见上面英文信后名单)名单还在继续增加。世界性运动,反对电子武器操纵人体神经系统。1999年1月,欧洲议会通过一项决议,而它( 27段) ,称之为"一项国际公约关于全球禁止发展和部署可能以任何形式操纵人类的武器" .Soleilmavis寄给欧洲议会主席HANS-GERT POTTERING博士的信Europ?isches ParlamentRue WiertzPHS 11B011BE-1047, BR?SSELKingdom of Belgiumhans-gert.poettering@europarl.europa.eu尊敬的阁下:我是一位被大脑控制武器(精神电子武器)和定向能武器长期残忍虐待和骚扰的受害者,我是一位中国公民,我已经被大脑控制武器(精神电子武器)和定向能武器在几个国家酷刑虐待了很多年。目前有很多的中国及世界其他国家的合法,无辜,没有任何防御能力的平民声称自己正在被大脑控制武器长期虐待和骚扰。这种有组织的犯罪行为在全世界范围内非常严重。目前,全世界有很多受害者声称自己正在受虐待。因为受害者缺乏资金,没有任何设备,所以即使有中毒,芯片,或正在遭受其他电磁波类大脑控制武器的残酷虐待,也无法自己检测,又无法找到能够为我们做检测的部门的帮助。
Read more…