Worldwide Campaign to stop the Abuse and Torture of Mind Control/DEWs
We should urge government start investigating the abuse and torture of remote electromagnetic mind control technologies from cases which have strong evidences. If government start investigating few cases which have strong evidences, all victims will see the hope that their cases would be investigated soon.
My case have strong fact and evidence, we encourage all victims to collect strong facts and evidences. If you have strong facts and evidences, please leave an comments to this discussion.
The Fact and evidence of abuses and tortures of mind control technologies:
I was controlled by remote Voice to Skull technologies and Mind Control technologies, and I was brought inside US Embassy in Hong Kong
What constitutes evidence of electronic harassment?
Posted by Jeremy on 6th January 2011
In this article:
•An invisible crime, committed at the speed of light
•How helpful are statements from the alleged developers or possessors of electronic harassment technology?
•When measurements are helpful, and when they’re not
•Can you prove that mind-invasive technology is being used against you, and how does that help you?
•On the utility of witnesses
To help targeted individuals complaining about electronic harassment with gathering evidence of what’s happening to them, and to demonstrate to skeptics what a difficult hurdle TI’s face, I’d like to go over what TI’s need to do to make their case in the court of public opinion, or the court of law.
An invisible crime, committed at the speed of light
When a person is shot with a gun, there are mountains of evidence left behind:
•the bullet, enabling investigators to narrow down the search for the weapon considerably;
•the entry/exit wounds;
•evidence placing the victim at a specific location when he was shot – blood droplets, footprints, and clothing fibers;
•ballistic evidence, allowing the bullet to be traced back to its source with some reliability;
•evidence left on the bullet itself – barrel markings, DNA of the suspect, and the suspect’s fingerprints (even if they’ve been wiped off1);
•a loud noise, alerting bystanders that a crime has been committed, in real time;
•and more, depending on the circumstances.
However, let’s suppose a person is attacked electromagnetically. What evidence is left behind?
•The target’s uncorroborated account of the sensations he felt.
The attack itself is completely silent and invisible. The attacker could be miles away.2 The equipment used is unknown, and effectively untraceable. There might be no visible or identifiable marks on the victim, as emerging nonlethal weapon (NLW) technologies are intended to inflict intolerable pain on a target, rather than damage him.3
How helpful are statements from the alleged developers or possessors of electronic harassment technology?
Do patents prove anything?
A patent only proves that someone is interested in developing the capabilities described in the patent. Without a working model, it doesn’t prove that the device described actually does what is claimed.
In fact, we would expect exactly the opposite; that any U.S. patents pertaining to clandestine technologies targets are complaining about would be dead ends. If they actually described working devices, they would be suppressed under the Invention Secrecy Act of 1951, because of national security concerns.4
Does a stated intent to develop capabilities prove anything?
Military agencies regard deception as a tool of warfare, and may arrange the publication of disinformation about future capabilities. It’s best not to read too much into statements regarding hypothesized technological developments. Occasionally, agencies like DARPA or MITRE corporation will publish requests for proposals or speculative strategies for the uses of futuristic technology. These statements may be useful for investigators who are trying to divine the shape of things to come, but aren’t useful for proving capabilities exist.
Does a statement or demonstration of capabilities prove anything?
Statements from established, credible sources about their capabilities are generally considered strong evidence. If those sources are caught lying, their credibility is undermined.
So a statement of capabilities is very useful in terms of making your case to the general public that a particular device exists and is or will soon be used. A demonstration is proof that it exists and is being used. However:
•A demonstration or credible statement of capabilities doesn’t prove that the device in question is being used against you;
•over-using references to these public statements or demonstrations may be portrayed as evidence of “obsession” on the part of a “deluded” writer.
When making your case, image is everything.
When measurements are helpful, and when they’re not
Can you measure it?
Measuring equipment that you can afford will, realistically, measure emissions in limited frequency ranges: 1 Hz to 21 Ghz is the maximum range of ‘affordable’ spectrum analyzer equipment as of 2010; RF detectors are much cheaper, but have a more limited range. This is troublesome, because at least one directed-energy weapon on the market (the Active Denial System) operates at a much higher frequency range.
For a measuring device to capture an RF signal, not only does the signal have to be in the frequency range that the device will pick up; the signal also has to be long enough in duration for the device to pick up. A military-grade implant might be picking up frequency-hopping signals of very short duration – microseconds or even nanoseconds between hops. A commercial spectrum analyzer wouldn’t be able to capture these signals.
Furthermore, an investigator has to be there with measuring equipment when the signal is being transmitted. The harassment might be turned off when the target has arranged for instruments to be present.
With obstacles like these, it’s not surprising that many TI’s don’t even try to capture measurements.
Are your measurements inaccurate or misleading?
Incorrect alignment of the measuring device, or proximity to large metal objects, can give misleading readings to unsophisticated investigators.5 Also, your detector may be deliberately set off.
What have you measured?
If you’ve recorded a signal that coincides with pain or distress, have you determined that a specific person is attempting to harm you?
Harm: ANSI has set standards for maximum acceptable levels of short-term microwave exposure; ionizing radiation has well-known lethal dosages; and at least one study shows a very strong correlation between long-term proximity to cell towers and certain kinds of ailments.6 If you can capture signals corresponding to the strength, duration, and radio-frequency of these harmful EM emissions, you know you’re being harmed by those emissions, and you’ll eventually be able to make a good case to the public and to a court.
If mind-invasive technology is being used, you need much more personalized evidence of harm. See my remarks in the next section.
Specific person: you have to trace the signal back to the source. You can do this with very inexpensive equipment – such as an RF detector – assuming the source isn’t adjusting his attacks in real time. Signal strength will increase with proximity to the source.
What have you gained by obtaining evidence that a specific person is attempting to harm you?
You’ve gained focus for a more thorough (and expensive) investigation by expert witnesses whose testimony will support your claim in court.
If you can prove harm, you’ll eventually have a criminal case. (Assault is illegal, whether it was performed with a microwave weapon or a baseball bat; there doesn’t have a law specifically prohibiting the use of a particular implement against you.)
Can you prove that mind control technology is being used against you, and how does that help you?
U.S. researchers recently demonstrated silk-based implants, with miniscule electrodes imprinted on a silk substrate that melts away, allowing for precise placement of the electrodes.7 This isn't necessarily happening to TI's, but it pays to think outside the box when considering implant architectures.
Many targets repeatedly get ‘hit’ in the same areas; some have discernible bulges under their skin suggesting the presence of foreign objects. It’s possible they have implants in those areas; it’s even possible that mind control technology requires the presence of implants.
Possible methods of detection include:
•Metal detectors or stud finders;
•An MRI reading;
•A CT scan, CAT scan, or X-ray reading.
However, just because the suspected implant or implants aren’t detected by commercial equipment, doesn’t mean they don’t exist. I’ve previously suggested that targets might be carrying covert taggants which enable tracking and targeting8, or the implants themselves might be microscopic.
Detection of covert taggants or implants will have to be through more indirect means. I’ll get to that in a minute.
So you’ve found an implant. What have you proved?
Unfortunately, not much. You have a foreign object in your body; it is in your possession; you have the right to disable it or remove it.
You don’t know who put it there, or how it’s affecting your body or nervous system. (However, a link between certain kinds of implants and cancer has been previously demonstrated.6.)
How likely are you to capture signals?
If hypothesized mind control signals are directed at implants in your body, they might (as discussed above in the Measurements section) be undetectable on commercial spectrum analyzers. Furthermore, the target’s harassers are unlikely to cooperate.
In my opinion, the best shot involves going after targets who are getting some form of highly frequent harassment (typically 24/7 voice-to-skull or subliminals).
It’s possible that targets getting highly frequent harassment are getting it from programmable implants – a telling sign would be that the harassment doesn’t go away when the target is inside a shielded environment, but it gets “dumber”. Programmable implants might be getting signals from the outside world only occasionally.
Will capturing signals help you?
For the sake of argument, let’s say the signals can be captured, and you manage to capture them. What’ve you got?
You’ve got a recording of an unusual signal that means nothing to the layman, or even to most civilian scientists and engineers. You have to demonstrate that this signal has an effect on you – and ideally, on others.
Having captured a mind control signal, if you can replay it and reproduce its effects on your nervous system or mind under controlled conditions, you now know that mind control technology is being used against you, and what its nature is.
You’re ready for a more focused – and expensive – investigation.
On the utility of witnesses
In the event that you find evidence linking attacks on you to a specific location, you’re almost ready to take legal action. However, you shouldn’t expect your adversary to lie down and accept a beating from the legal system; he might challenge you in court, and even counter-sue. You need credible expert witnesses who can verify or testify that attacks against you are coming from the location in question, and that they are harming you or causing you distress.
In the event you manage to capture signals to implants in your body (or mind control signals), expert witnesses will be an essential element of your proof that clandestine technology has been used against you. You would need to reproduce the signals’ effect on you in a shielded environment, in a double-blind study9, with reliable expert witnesses who understand the experiment and what’s being claimed.
The obstacles to proving the use of electronic harassment against a target are enormous, and even understated in this article. Much of what I’ve written above will not apply if the target’s harassers do not cooperate – or worse, act to mislead the target.
From our perspective, exposing targeting operations en masse is more economical and more likely than being able to prove they’re happening to a particular person. Skeptical third parties might be able to work wonders by bringing detection equipment with them on surprise visits to targeted individuals, but for them, talk is much cheaper.
It’s been three years of overt electronic harassment for me, and much longer for others, but we’re still at an impasse.
Please go to LAST PAGE OF "Replies to this Discussion" to read NEWEST Information
"Where there is Unity there is always Victory."-- Publilius Syrus.
I would like to start campaign against the secret society activities including targeting innocent individual and mind control program. This program has also been sponsoring our government and spreading in our whole society. So that many general residence are involving and harassing targeted individual without knowing the secret society’s objective. It's destroying our social values, human morality and destroying our civilization. Most of the local community organization has been working in this program only for illegal financial benefit. We should sacrifice those who know this conspiracy to aware our local community for saving us and our society. We can start our work through distributing flyers in our local community. Please write your opinion, how we draft the flyers and Tis in Toronto may communicate with me for further discussion. Please see my blog: Gang Stalking Toronto.
There is only ship cost 50usd for free jammer.
https://zezustech.ecwid.com/#!/%E0%B8%AD%E0%B8%B8%E0%B8%9B%E0%B8%81...ZEZUSTECH ,INC SPECIALISTS IN ELECTRONIC COTERMEASURE SECURITY SERVING THE ENTRIE DOMESTIC AND ENTRIE WORLD Technical Surveillance Counter Measures (TSCM) Using The BEST Technology Available Professional licensed private investigator will bug sweep telephones, computer lines, and offices to eliminate electronic eavesdropping and wiretaps and surveillance devices. Detection of bugs, detection of wiretaps, detection of hidden cameras. Also Securing: Telephones Computer Data Lines Office Spaces Homes Vehicles Microwave Detection Technical Surveillance Counter Measures (TSCM) is our specialty. We eliminate telephone line bugs and wiretaps (using wiretap detection sweeps), computer data line taps and bugs (telecommunications security line sweeps), and bug sweep your conference rooms (using electronic room bug sweeping and electronic detection). Our superior equipment can detect electronic espionage and our unparalleled experience and knowledge can identify and locate those bugging devices. Get more information on bugs, wiretaps, and phone taps. Over 30 years Experience Non-linear Junction Detector locates hidden tape recorders, amplified microphones, voice-actuated, remote-controlled, and non-operating devices. Find out more... Don't let your valuable information leak because of electronic eavesdropping! Help to protect yourself and your company from invasions and thefts due to surveillance wiretaps and bugs. Many corporate trade secrets are compromised and executives have been kidnapped for ransom due to inside nformation gained by wiretaps and bugs. Recently, cases of computer theft and alteration of computer records have been perpetrated by criminals who gained access to telephone data lines using electronic bugs. Electronic Security Company TSCM Bug Sweeping Services have been used in over 2,500 locations! Large corporations as well as individuals are satisfied customers. The Typical TSCM Services To Corporations Maintaining secure telephone lines for executive offices by regular sweeps for bugs Securing Data Communications lines including T1 Telephone instrument debugging and sweeping Bug sweeping rooms for transmitters in executive areas Microwave Detection Securing conference rooms from surveillance devices Providing phone speech scramblers 24-hour phone bug monitors TSCM Services to Residences and Individuals Sweep for transmitters, phone bugs, and other surveillance bugging devicesSecure and modify the existing phone system to make it more tamper-proof and eavesdropping resistant Our staff is available for any questions you may have. Please feel free to call. ZEZUSTECH , INC As supplier store and RNM,V2k,Sythetic Telepathy labatory I produce variety staffs about Telepathy labatory devices that can solve all factors by professional network solution devices for you. Many people these days, especially Online, claim to sell mind control and electronic attack countermeasures and detection devices. Clearly none of whom can match the relevant highly-specialized knowledge, experience, equipment, parts, specialized materials, tools and facilities of Remote Neural Monitoring Shop. to actually be able to help mind control and electronic attack victims, and most of whom are clearly outright frauds. Further, we are the only ones we know of who now provide Advanced Transient Suppression Technology (ATST) in our mind control and electronic attack countermeasure devices. All electronic devices can be damaged or destroyed by common high-voltage transients from lightning and defective high-voltage equipment and power lines, electrical arcs and coronas, inductive kicks from high-voltage power interruptions, and static electric discharges. Also, based on what we know, mind control and electronic attack predators are increasingly resorting to directional high-pulse burst transmitters (pulse-type directed energy transmitters), possibly even EMP, to wipeout costly countermeasure devices deployed by mind control and electronic attack victims to protect themselves. Our unique countermeasure devices now come with 1,500 watts of ATST protection (at no extra cost) to foil even the most highly dedicated wipeout attack tactics, as well as to help protect you from the common forms of high-voltage transients. Remote Neural Monitoring Shop
How to get a free RNM jammer ? Would like to try
Zezustech , Inc said:
Zezustech, Inc open Boot campaign give the RNM and V2K Jammer 20units for free for victims who make request. You can request RNM & V2K Jammer at http://www.zezustech.com/store/home/en.html
The unit packaging: box #1 contains power unit and small parts. Box Size is 15 inches x 15 inches x 9 inches
Box # 2 contains structure PVC poles. Box Size 72 inches x 7 inches x 7 inches
Box #3 contain's structure. Box Size 49 inches x 7 inches x 7 inches.
Total Weight 25 Kg
This lab have way out of RNM and V2K President Zezustech , Inc http://zezustech.ecwid.com/
zezustech is a spoof scam site
Here is the way fill out the form at this pagehttps://zezustech.ecwid.com/#!/%E0%B8%AD%E0%B8%B8%E0%B8%9B%E0%B8%81%E0%B8%A3%E0%B8%93%E0%B9%8C%E0%B8%95%E0%B8%B1%E0%B8%94%E0%B8%AA%E0%B8%B1%E0%B8%8D%E0%B8%8D%E0%B8%B2%E0%B8%93%E0%B9%80%E0%B8%84%E0%B8%A3%E0%B8%B7%E0%B9%88%E0%B8%AD%E0%B8%87%E0%B8%AD%E0%B9%88%E0%B8%B2%E0%B8%99%E0%B9%83%E0%B8%88-RNM-V2k-Sythethic-Telepathy-%E0%B9%81%E0%B8%88%E0%B8%81%E0%B8%9F%E0%B8%A3%E0%B8%B5%E0%B8%AA%E0%B8%B3%E0%B8%AB%E0%B8%A3%E0%B8%B1%E0%B8%9A%E0%B8%9B%E0%B8%A3%E0%B8%B0%E0%B8%8A%E0%B8%B2%E0%B8%8A%E0%B8%99%E0%B8%8A%E0%B8%B2%E0%B8%A7%E0%B9%84%E0%B8%97%E0%B8%A2%E0%B9%80%E0%B8%97%E0%B9%88%E0%B8%B2%E0%B8%99%E0%B8%B1%E0%B9%89%E0%B8%99/p/52156528/category=13654174
All the delivery and item price is 50usd
New Evidence added in Photos including HK media are all switched ON/OFF sleepwalkers, 3 things 3 points on EM remote surgery and Remote Mind Control 2 Techs invented in 50-60s being controlled Not by Government.
Mediaworkers in every country had been turned into ON/OFF or always sleepwalkers. Instant sleepwalkers are also 100% ONLY murders themselves as the one single mind control 50yrs military tycoon family do not have any competitor. Eileen Rockefeller, Jay Rockefeller, Nelson Rockefeller, the whole family are public figures, as they want others know their power to make them feel good. They do not live for whole humankind. They live for power and sensational satisfactory. Eileen Rockefeller, and husbands of Rockefellers never allow good thing happen when they alive. They only allow everybody thousands of times better after their deaths, which would be beyond their controls. They are the ONLY blockage to making EVERYBODY GOVERNMENT employee, before EVERYBODY engineer.
A single mind control 50 yrs military tycoon family created Cancer, Aids and other fake diseases after 60s. Not many evidence, 6 photos added.