The Tattoo, the ring, or the pill?
The tech companies are finally trying to catch up, and in my opinion failing badly. When Google suggested the ring to login, instead of user names and passwords, I thought it was a waste of time. I am not against jewelry, but some people just don’t wear, or carry jewelry and find it to be invasive.
Google Wants to Replace All Your Passwords with a Ring
The world’s largest search engine is now experimenting with jewelry that would eliminate the need to remember dozens of passwords.
By Tom Simonite on March 12, 2013
Why It Matters
Passwords remain the standard method of protecting personal accounts, but people struggle to remember them, and they are often stored insecurely.
The search and ad company first revealed its plans to put an end to passwords in an academic paper published online in January (see “Google’s Alternative to the Password”). The effort focused on having people plug a small USB key that provides their credentials into a computer. The possibility of using special jewelry in a similar manner was mentioned in that paper.
I really thought this idea wasn’t that great, that is until I read this in the paper this morning, now the ring doesn’t seem that bad.
Motorola has announced it is looking at alternatives to the traditional passwords in a bid to make logging into online sites, or accessing mobile phones, more secure. Among the ideas discussed at the D11 conference in California on Wednesday include electronic tattoos and authentication pills that owners swallow. The tattoos contain flexible electronic circuits that are attached to the wearer’s skin using a rubber stamp and the pills can emit a signal from the wearer’s stomach to a mobile phone.
But seriously for my own situations ever increasingly, I am using spiritual based products. The only item for me that makes sense is the unique identifier system. It’s what the internet and the world has been waiting for.
I will go with being uniquely identified, and that will make sense. Even if someone discovers your unique identifier information they can’t use it, because it’s unique to the individual. So better than a password, it’s with you at all time, because it uniquely identifies the individual. It’s a spiritual based product, so it’s their at all times in the background working, but fully none invasive, what the internet, and the world loves.
I also want to see a universal login, open id is pretty cool, because then I don’t have to log into a billion situations, I want to see a payment system like this as well, one payment system, one login, similar to open id. That works for me, as long as they are working with the unique identifier system, even better, cause then no one, can use your information. Your unique identifier is sensed out remotely, and that would be that.
I think if these worked with the unique identifier system, then the internet would have the security, and the convenience they need to survive.
Eg. Example of a unique identifer system
1. Creator of unqiue identifiers
2. Name of creator of unquie identifiers
3. The only person who can say they created the unqiue identifiers
That’s a bit of a lame example, but the unqiue identifiers, can only be used by the actual person, the remote sensors can not be tricked, and it’s unqiue to the individual. You are the only person with those credentials, so if someone found your details, and tried to use them, the remote sensors would simply advise, you are not this person, you are not eg. Administrator of Gangstalking World or something.
The Gangstalking community have likely had access to this information for over a year and a half and been using it, also some others on the internet. The unique identifier also comes with a personal spiritual firewall, so it can be used in conjunction with what you already have, it’s an extra added layer of protection.
Activating the unqiue identifier is easy, you just request to remotely activate your unique identifier, or remotely activate your Royal Queen Security Clearances, and those get activated at the same time. That’s what I personally use, and I have been a little bit safer, but I am waiting for full integration with some of the situations that are out there, once the integration occurs, it will make sense.
Freedom of Information Act Requests
These are suggestions that might be useful when making F.O.I.A. requests.
I think it would be a good idea to request freedom of information act information. Not only trying to obtain personal records, but also systeimic records.
Eg. 1. How many cases do Threat Assessment Teams have open and actively being monitored?
2. How many females vs males are currently and activily being monitored?
3. What is the cultural and or ethnic make up of those currently being monitored on these lists?
4. How many cases over the years ended up in institutionalizations? How many in arrests? How many in suicide? How many in homelessness? (They must have these figures if they are actively monitoring the cases, even if someone becomes homeless, the files would stay open.)
5. How much funding do these threat assessment teams get?
6. What is the guidelines for the remote monitoring and information gathering?
7. Where are the local monitors collected from? Are they local community members or others?
8. Who oversees the local monitoring? What guidelines are in place to ensure abuses do not happen?
9. What measures are in place to ensure that the privacy of the individual is not being trampled upon?
These are some of the Freedom Of Information Act Requests, that I would like to see directed to these threat assessment teams and any other agencies that they interact or liason with.
Human Rights Organizations
Some basic suggestions that might work.
For the human rights appeals, I think those should be redirected at local and other levels, but in addition to your other efforts, you might also wish to ensure that you point to these Threat Assessment Teams and their active and open case file monitoring.
Eg. I am what is known as a Targeted Individual. I am writing in regards to some ongoing surveillance and monitoring that I am currently experiencing. I believe that it is a possibility that I have been placed on a monitoring program at some point in the past by what is known as a Threat Assessment Team or similar entity, as per their case file monitoring guidelines.
Under this program I have experienced human rights abuses that i woudl like to bring to your attention.
I have experienced community monitoring, stalking and harsssment.
I have been terrorised and stalked within the communities where I reside, and my belief is that it’s in direct corrolation to the monitoring associated with this program.
I have experienced what our Targeted Individual community has coined Electronic Harassment.
The individuals who are taking part in the monitoring are using a variety of items which are remotly causing great physical pain, and discomfort. Though I have not visually seen the items being used, it has been suggested, and it is my belief that items such as:
Police radar guns are being used. -I have been advised that these might be getting used as part of the monitoring to remotely identify the targets location in their apartment. This casue a great deal of pain and discomfort.
Laser guns -I have been advised that laser guns such as the ones sold via the wickedlaser company might also be employed as part of the stalking. -According to the companies website these might be able to burn holes in items. It is my belief that these may be getting employed and used on Targeted Individuals.
Accoustic Weapons -I have been advised accoustic weapons that are capable of remotely manipulation of the nervous system might also be employed and used upon targets to assist with the monitoring. According to the current research this is capable of causing emotional disruptions of a nervous systems as well as placing individuals into unwilling states, such as relaxation, and drowsiness, and others.
Bass -I have been directed to the fact that times the sound compnent such as speakers with the sound component removed might be getting used. The vibrations are felt, and experienced, but no sound is heard. This also causing ringing in the ears, disrupts sleep, and has other ill health effects.
Transducers -I have been told and lead to believe that transducers might be also employed below the drywalls of apartments to cause heat and vibrations. Which create a great deal of pain and suffering as they disrupt sleeping patterns for days, weeks, months at a time.
RFID -It is my belief that RFID items in my possession are being illegally used to monitor my location while out in public. It’s a well proven fact that warrentless surveillance of some targets has been allowed in the past by some governments. RFID surviellance can include cellphones, door passes, passports, any communication device or other item that uses RFID to monitor and track a targets location.
(At this stage targets can add their own research to what they believe is being used upon them. Other forms of assault, such as sexual. I have left off things like satalight in this example, but if you have a compelling case, or good information, feel free to include it. A lot of what I have listed might not be things known to these agencies, things that are 100% proven, but the things that I have listed, should hopefully be within their realms of possibilities, and hopefully might prompt someone to open an investigation, or at least take the claims seriously.)
You may also wish to include a link to sites such as this
http://www.amazing1.com/ultra.htm which have things that might be designed to cause pain and discomfort. Tangable items that a human rights agency could be directed to.
Will this make a shred of difference? With enough letters, and the finger being pointed at these threat assessment teams, maybe it will lead to a review of some of these practices. Some of the things they are doing in my opinion seem to be just at the border at what some of these laws allow, and I am sure many other things are quite outside of the border of what the laws allow, and would disgust some if the dirty dealings came to light, but my recommendation is stick to the tangable.
Sure other things are going on like the V2k, or audio spotlight, but they are harder to prove. If you really need to include this element include information about the audio spotlight and how it can send sound to one person at a distance.
Ok I have been trying to make this post for the last three months or so. At first it was just going to be a simple light little post, but after three months of trying to write it, and post it, then always forgetting to, it’s not so much fun anymore.
So here goes, short and sweet. A few months back I was on lunch. I had started the new job, it was after 2 months of getting microwaved. Anyways I was tired one day, so I went to sit in the lower level of this hotel near where I work. It’s a quite area, so I figured I could get a bit of shut eye, not real sleep, but some quite. For the first few minutes a couple of snitches just hovered off in the distance, but they did not approach.
Then after about 10 minutes this guy did approach near where I was. He had to go to the guys washroom, that’s fine, however he left this bag outside near where I was sitting.
Ok I was sitting down at these empty tables, near the washrooms. He walks past me, he leaves his bag, which looks like the brown one in the above picture. It had that kind of rectangle shape, maybe bigger than this one. There was no reason for him to leave it there.
I mean I am a complete stranger, and suddenly there is no one else around. That was the big clue, the only other time that I can remember being snitch free, was the time they tried to set me up with the sleazy old dude. I have blogged about that before. So anyways, I sit there tired, thinking are they going to try to set me up? ‘What is this? Why is he leaving the bag there? Also where are the snitches?
I wanted to get out of there, but I was tried, and thought, ok, let’s see what happens. Eventually he came back out of the guys bathroom, after about 5-10 minutes, took up the bag and left. I also left, cause by then I was like, what are they up to?
So I was still trying to figure out what they heck later on that day, when I was at home. Well the weird thing was out of nowhere, my mind conjured up this memory of this story that I had read on one of these websites. I could not find the link.
It’s about this person who says that after 2 times where someone leaves this laundry sized bag, she/he had their mind read by the government. Now my mind would not normally jump to this conclusion. Even though I know that this can be done, it’s not a something that would normally come to mind. Even with all that I am going through, I try to leave things like that as a last ditch explanation. I really don’t like to talk about the “weird stuff”.
Anyways, I can’t find the link to the story, but it was something like the person was left alone with the laundry looking bag, then they were getting direct feedback via V2K about what was being read from their mind.
Now I have never had any of the V2K stuff, and I don’t necessarily have any reason to believe that the government is reading my mind, but two weird things did happen right after that.
One was I started to feel like this probe, or like these mini tendrils were moving over mind/brain. Hard to explain, and I hate talking about the weird stuff, maybe that’s why it took three months to write this post.
The second thing was I felt like something like maybe a contact, or something was being pressed into the corner of my eye(s), that went away eventually, but happened on a few occasions. (Remember there are people that have reported that people are seeing what they see, via their own eyes.)
Now normally I would just think, ok, so a weird feeling in the eye, some brain probe feeling so what? However it’s partially the fact that my mind so clearly went to that memory of that story when I tried to figure out what had happened.
Also I was recently on Mark’s site, I guess I read this before, but only reread it recently.
This brain tapping technology is obviously intended to maximize the trauma, & presumably portray me as mentally ill if I were to explain it. Like fingerprints, each person has their own unique brain print. Presumably, each of these individuals has visited a clinic where they their specific brain pattern was cataloged & attuned to a type of a remote biofeedback computer. In all likelihood, this is being done by the CIA, FBI, other federal agencies, or a private security firm with national security privileges.
See this is the part that worries me, if this technology exists, then what would stop someone from being able to get a wireless device that could do this remotely. All you would have to do is leave it by the person when they are by themselves, so it picks up their specific wave, and no one elses, leave it around them for a lenght of time, and then it would pick up the individual, much like tuning into a radio station. Then it could listen to your specific channel whenever they wanted to. What’s the target doing right now, we have lost contact, what are they thinking?
Also like a radio, we can train our brains to be silent. The stronger our thoughts are, the easier they are to pick up. Where some activities render our thoughts harder to read. If you are trying to figure out ways to be less violated.
[quote]Other electronic harassment includes a type of attack known as Phantom Touch, where it feels as though someone is running their fingers on top of my head. There are also burning attacks & sharp, pulsed pains, frequently aimed at my ears.[/quote]
What I feel is more internal than external. Eg. The phantom touch is more like brain/mind touch than the top of my head. Again, I don’t have any proof, and no specific reason to think this, but I feel it was important to relay this.
Now keep in mind that I have other weird things happening in my life, that could explain this as well. Stuff that has been verified. However this other weird stuff, was happening a few months before this specific experience or incident.
Before this all sounds too weird, and puts people off, I am going to point to a few links about some of the mind reading stuff being made public.
Now whither my own personal experience has any relevance at this stage is anyone’s guess, and not something that I spend time worrying about.
The bottom line for me is reading people’s minds is wrong, and without their permission you get what you pay for. Eg. What people think does not always mirror their true intentions for bad or for good. Thoughts might be intentions, but intentions do not always translate to thoughts.
Also in traditional fashion if I think someone is reading my mind, just as if I think they are listening to my phone conversations, you are going to get some stuff that you don’t want to hear on purpose. Really harsh stuff, much harsher than if I thought my thoughts were private. Eg. When I first realised that my home was being bugged, and that people at work could hear stuff back. I took the opportunity to say just about every mean thing I could think of, stuff I probably would not have said otherwise, but if you are listening to people’s private moments when you should not be, or without their permission, then you get what you pay for. Same with tapping into the mind.
I mean if I could listen to someones thoughts would I? Maybe, but I think somethings should be private, and if I could listen in, I would probably keep it to myself. I think it’s wrong to listen into someones thoughts, and then share it with whomever and whatever wants to know. It’s a form of violation, some would call it a form of mind rape. Whatever you think on this subject, it’s going to become more relevant in future years, as these forms of technologies become more precise and we maybe even absorb it into our current culture at airports and other areas. Imagine not being able to go to work in the mornings without being able to pass a brain scan? Now that would be something.
- Above top secret
- Abu Ghraib
- Active denial
- Active Denial Weapons
- as the world turns
- Asain Male
- Asian Female
- Astral Plane
- Background records checks
- bad luck
- Black female
- Black Females
- Black Male
- black women
- Brain reading device
- Britney Spears
- brown coats
- Buffy The Vampire Slayer
- changing vibrations
- Citizen Informants
- Civilian Spies
- Community harassment
- community mobbing
- community policing
- concentration camps
- constitutional change
- Controlled society
- Covert investigations
- Cultural diversity and multiculturalism
- david icke
- devinci code
- domestic spying
- East Germany
- electromagnetic frequency
- Electronic harassment
- Emotional Vampires
- False Prophets
- files updated
- Gang Stalking
- government corruption
- GPS tracking
- Guantanamo Bay
- Health and Safety
- Heath Ledger
- High technology
- Honey Trap
- Indigo Ribbon
- Informant System
- Intimate Infiltarations
- Jeremy Blake
- Joan of Ark
- John Lennon
- Kilmeer Gill
- Lord Of The Rings
- Marian Fisher
- Mark M Rich
- Markus Wolf
- Martin Luther King Jr
- Meat production
- mental concentration camps
- metropolitan police
- militarized police force
- Mind Control
- Mind Reading
- Minority women
- Naomi Ebersole
- National Security Letters
- Neurolinguistic programing
- New World Order
- one handed signals
- Online Stalking
- Passive Aggressive Manipulative
- Personal Identifiers
- Police Abuse
- Police Corruption
- Police State
- Production Company
- psychological harassment
- Quantum Physics
- Record keeping
- records updated
- Red Squads
- Robot Sentient Project
- Rosa Parks
- School Shooting
- sexual harassment
- sign language
- Skin Heads
- Social Control
- Spiritual Based Products
- Spy cameras
- spy satellites
- State target
- Stop snitching
- Targeted Individual
- The Matrix
- Theresa Duncan
- Third wave
- Thought Police
- Threat Assessment Teams
- time travel
- twilight zone
- violent persons registry
- Voice to skull
- walls of jericho
- whistle blower
- white female
- White Male
- workplace mobbing
- Young and the restless
- zero tollerance