Gang Stalking World

United we stand. Divided they fall.

Happy New Year

I have been keeping busy, but happy New Year.

2013 is going to be a good year. I can tell by the vibe and the energy that surrounds it.

The craziness with the Gangstalking stuff is there in the background at times, but I would not have it be any other way.

For New Years I was going over the Jane Clift case. When I first came across the article, I had interestingly enough dismissed the articles as related, but different. I mean she was there, she had a notice in the mail advising her that she was on a Threat Assessment list, as medium risk only to be seen in pairs, and the length of time she would be on the list.

It was a few weeks later when I came back to the article, to this unrelated case is how I had phrased it, I recall being a bit annoyed, if it didn’t have anything to do with Gangstalking, and what was happening to us in the community, then I didn’t want anything to do with it.

In my usually scientific way of making discoveries, trying to think outside of the box, and so forth, I went back to her case, and looked at it from all angles, and it still didn’t make sense, but the moment I took away the letter she received, and factored in all that she was experiencing and going through, it was us in the community, it was a match. The sample once you excluded that one factor was a near perfect match. The more I read, I was sure that this was what I had been looking at and seeing.

Upon further research across the board, the scenario fit, and in most cases, there is no letter sent, the how people get onto such lists then fit in, and could be factored in. The individuals involved, and so forth, why family and friends went along with some aspects of this, the secrecy involved, and so forth.

The community has come a long way since those days, I have no question that this was what we were seeing, the illegal aspects that however go on behind the scenes can be mild to moderate, to involving external factors such as what was seen in the John St Clair Akawi case, but at least for the local stalking, monitoring a source could be listed, and targets could start to review or looking into these lists, see how they function, what’s behind some aspects of this, and then start to review the illegal aspects, such as described in the DT STockton report. All in all it’s come together over the years, and it’s been one of the most interesting times in human history because of it.

January 8, 2013 Posted by | Gang Stalking | , , , , , , , , , | 1 Comment

The DT STockton Document Reexamined.

The DT STockton Document Reexamined.

Several years ago someone under the name of DT STockton posted a document about his investigation into the informant system. Quite a bit of it agreed with information that I had already come to agree with, but how much could be verified?

Do the informants really have communication via a special frequency? Are most people in major cities on the informant system?

Are some of the businesses being taken over by government agents?

Informants

http://gangstalkingterrorism.wordpress.com/

The answer to the above questions, in my opinion, estimation, and investigation is confirmed, and then some. The world is scarier than we realize. To investigate any of this information, without being familiar with the informant system or government agencies is almost impossible. For a normal, fairly sane person to try to investigate the information can be cumbersome, but in this community of Targeted Individuals, to stay alive and survive, many have had to become minor investigators in their own capacities.

Threat Assessment Teams, the topic has been covered several times, that’s what the community was up against, for case history, I give you the Jane Clift case.

Her case is exactly what most people on a minor scale are up against. In Jane’s case she was advised she was getting listed as medium risk, only to be seen in pairs, and that a warning would come up every time she was in any situation.

https://gangstalking.wordpress.com/?s=jane+clift+

The case is what we end up seeing in the Gang Stalking community, on a minor level.

Eg. Threat Assessment Team, evaluated her as a danger to the community, in her case it was the local council, in other cases HR get’s the person listed, however it happens. Once the person is listed, they are monitored by the local monitoring units, or individuals in the community, in her case she was monitored for trying to be a good citizen. Others have complained about monitoring for arguments with those in the community, or workplace, who have the know how to get individuals listed.

Once the local monitoring unit is called in, you have positions in some countries, such as community advisors, unit commanders, shift commanders, who are responsible for the monitoring, of the individuals. The unit and shift commanders or in some cases “case workers” as one liked to fancy himself as, are responsible. In too many cases some are criminals themselves, and organize a deliberate campaign of harassment, against the individuals.

Thus people on the street are literally being given directions, the ones that are on the informant system, or in some simple cases co-workers are being given a warning about the person. Mostly however it’s the informant class, and the government agent class that create the problems for innocent individuals.

Deliberately trying to destroy their lives, and removing them all too often from their existences.

NOw try coming into any of the above positions without being on the informant system, or agency and those in charge have no idea what to do with you. It would be almost impossible to get into a community advisor role, unit commander role, or shift commander role without being in one of these situation, but if you could get into one of these roles, slip in unnoticed, or accidentally come into the role, then those who interface with these units, have no idea how to interact with the individual, because the systems are now creepishly designed to work with the informant system. Period.

Government Agents

Energy

https://gangstalking.wordpress.com/2010/12/12/energy/

Whenever I read the case of John St Clair Akwei, and what governments are capable of doing, or allegedly capable of doing as per the lawsuit that the signal intelligence agent filed against the government, pertaining to aspects of his work, it always sounds so futuristic, so Matrix like in some ways, but it’s a lawsuit that’s been there for over 15 years now?

The stuff that could be done back then, would scare most people now, but image what they are capable of now, if brain mapping, remote neural monitoring and other situations were common place when he worked for NASA.

http://www.whale.to/b/akwei.pdf

John St Clair Akwei VS Nasa

john-st-clair-akwei-vs-nasa/

[quote]
Detecting EMF fields in humans for surveillance A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment, NSA cryptologists can
remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance.

NSA personnel can dial up any individual in the country on the Signals Intelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S.

NSA’s Signals Intelligence use of EMF brain stimulation NSA Signals Intelligence uses EMF brain stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MK Ultra program of the early 1950′s, which included neurological research into “radiation” (non-ionizing EMF) and bioelectric research and development.
[/quote]

Tracking a person via their emf fields. Brain mapping technology that allows you to map a persons mind, but at a distance. [quote]

The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can monitor all the electrical activity in the brain continuously. The NSA records aid decodes individual brain maps (of hundreds of thousands of persons) for
national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link (in military fighter aircraft, for example).

For electronic surveillance purposes, electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use
this to covertly debilitate subjects by simulating auditory hallucinations, characteristic of paranoid schizophrenia.

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can
send images direct to the visual cortex, bypassing the eyes and optic nerves.

NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain-programming purposes.
[/quote]

Remember it’s been claimed that this stuff has been available for decades. The lawsuit that brought this technology to light was almost 20 years ago, and this is a person who worked for the agency, and I think with this technology.

If this is being used remotely and at a distance on people, how many people in society might not even be aware that such programing has been used on them until it’s too late?[quote]

Capabilities of NSA operatives using RNM There has been a Signals Intelligence network in the U.S. since the 1940′s.

The NSA, Ft. Meade, has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brain. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech, 3D sound, and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears), and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods, and motor control. [/quote]

Frequency

The informants are contacted on the street with a special frequency, and they do get instructions, if you could hear the stuff they are advised, literally walk really close to this person, we just want to see if he reacts, we just want to see if she has a reaction to it, mostly the average person would just do what they are told, because most do not see the bigger picture. They are innocent in a way, but some are pretty specific, eg. Driving close enough to cause an accident, deliberately, some are all too knowing, and cognizant, meaning fully aware. It’s a scary balance, and I can now personally attest to the fact that they do have in most cases, directions that are being conveyed to them. A frequency is being utilized, and that’s pretty scary.

Could a variety of individuals be on the informant system? I mean to be an informant don’t most people have to be criminals? It’s pretty scary, because in most people’s mind’s informants are criminals, at least in my mind they were, but in today’s society, they get all sorts onto the informant system. I do feel that some groups are targeted more than others, just based on attitudes and mentalities of those that are deliberately assigned with ensuring school children get placed on the informant system. High School and the informant system, jr high and the informant system. Yes that’s the fate of some of our school children, isn’t that nice.

You would think that people have to commit some major crime, but even with just the items I’ve researched online, eg. Rachel Hoffman.

https://gangstalking.wordpress.com/2009/03/01/rachel-hoffman-deadly-dealings/

https://gangstalking.wordpress.com/2010/10/14/throwdown/

Or even the girl who got stopped for parking tickets, had no drug use or drug selling history, from a small town, and was placed on the informant system as a confidential informant. In that specific case, her dad went back with her to the station, and removed her from the informant system, in that case she had a lawyer in the family. The point is innocent people who have no idea how this working, are being destroyed, converted, etc. So when a document appears online explaining that many in major cities are already on the informant system, don’t be surprised, because the above example, was from a small town, and if the small towns are this far gone, then that becomes problematic.

http://www.november.org/stayinfo/breaking09/Attica_Informants.html

http://www.snitching.org/2009/11/recruiting_new_informants.html

{November 10, 2009
Posted by Alexandra Natapoff at 06:27 AM
Recruiting new informants

Here’s a revealing article in the Buffalo News: Walking thin line in Village of Attica: Would-be informant says police coerced her into cooperation. It’s about Bianca Hervey, a 20-year-old college student who got pulled over by police for failing to pay her traffic tickets. The police threatened to put her in jail for the night, unless she agreed to become a drug informant. Although Hervey did not use drugs or have any connections to the drug world, police told her it didn’t matter–she could still work as a snitch and try to set people up. Frightened of going to jail, Hervey signed the informant agreement. When she told her father, attorney Richard Furlong, what had happened, however, he “went ballistic.”

Furlong went to the police and to the City of Attica and complained about the recruitment of young people into the world of drugs, but the police and the Village Board refused to change the policy.

This story illustrates how snitching has quietly become such an immense part of the criminal justice system. Many cities have policies like Attica’s, in which police can recruit any potential offender as a drug informant–even a 20-year-old guilty of nothing more than a traffic violation. It was this same
type of policy that led to the death of 23-year-old Rachel Hoffman in Tallahassee, Florida, and triggered Florida’s ground breaking legislation on the subject of informant-creation. See post: Florida’s “Rachel’s Law” offers some protections for informants.}

Alexandra Natapoff, has done some wonderful research into the informant system, she is a lawyer, and the above summary is from her. Her statistics more importantly, back up much of what has been said about the numbers, and figures of those on the informant system in most major cities, and some communities.

In summary, it’s not paranoia when they are out to get you, as the saying goes, and it’s not paranoia to believe that too many people are on informant systems, and in or a part of government agencies. The things Targeted individuals blog about, satellite tracking, etc, that’s common knowledge, because their are articles which cover, how local police and others have access to these minor technologies, and have had access for years. The items less well known, but that have also been pretty common are things like the John St clair Akwei case, and the technologies used there. The figures on the informant system are understated, to say that have or above that in cities are on the informant system, is understated.
To say that school children are being stopped, interrogated for minor things, and then placed on the informant system, similar to how Bianca Harvey was, is not an exaggeration. “Weed” children is not a good look, and it’s also, one of the ways these kids in today’s society are getting themselves into these situations, but also at times they are foolishly, and unwisely being set up by their little friends, who are already on the informant systems.

October 22, 2012 Posted by | Awareness, CIA, Citizen Informants, Civilian Spies, Community harassment, Conformity, conspiracies, Cults, Echelon, Gang Stalking, Gangstalking | , , , , , , | 7 Comments

John St. Clair Akwei vs NASA

Mr. Akwei use to work for NASA. He sued them. He says that they are capable of using remote neural monitoring to do a lot of really nasty things to innocent citizens. His case was from 90/91, so if they had this technology then as he has claimed, imagine what they can do now? Makes you wonder what the rush was to switch to the digital signal with the remote set top boxes, maybe it was not for watching targets in their home. If they have the technology that Akwei claims, then they could watch people in their homes through their brains with the right frequency. Hear what they hear, see what they see, and use the technology to program them. Read the case file, and the accusations, they are quite interesting, when you think about the fact that he says that some of this tech was in used since the 1940’s.

http://www.buergerwelle.de/pdf/akwei.pdf

Evidence for the Lawsuit filed at the US courthouse in Washington, D.C.

(Civil Action 92-0449)

John St.Clair Akwei vs. NSA Ft George G. Meade, MD

My knowledge of the National Security Agency’s structure, national security activities, proprietary technology, and covert operations to monitor individual citizens.

————————————————————————–

The NSA’s mission and the NSA’s domestic intelligence operations

Communications Intelligence (COMINT)

Blanket coverage of all electronic communication in the U.S. and the world to ensure national security. The NSA at Ft. Meade, Maryland has had the most advanced computers in the world since the early 1960′s. NSA technology is developed and implemented in secret from private corporations, academia, and the general public.

Signals Intelligence (SIGINT)

The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies. Signals Intelligence is based on the fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves. The NSA/DoD has developed proprietary advanced digital equipment which can remotely analyze all objects whether man-made or organic that have electrical activity.

Domestic Intelligence (DOMINT)

The NSA has records on all U.S. citizens. The NSA gathers information on U.S. citizens who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent National Security “anti-terrorist” surveillance network in place. This surveillance network is completely disguised and hidden from the public.

Tracking individuals in the U.S. is easily and cost-effectively implemented with the NSA’s electronic surveillance network. This network (DOMINT) covers the entire U.S., involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously. Cost effective implementation of operations is assured by NSA computer technology designed to minimize operations costs.

NSA personnel serve in quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track. N.S.A. personnel in the community usually have cover identities such as social workers, lawyers and business owners.

Individual citizens occasionally targeted for surveillance by independently operating NSA personnel

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA’s domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.

NSA’s domestic electronic surveillance network

As of the early 1960′s the most advanced computers in the world were at the NSA, Ft. Meade. Research breakthroughs with these computers were kept for the NSA. At the present time the NSA has nanotechnology computers that are 15 years ahead of present computer technology.

The NSA obtains blanket coverage of information in the U.S. by using advanced computers that use artificial intelligence to screen all communications, irregardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists. These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the U.S. is a result of the NSA’s Signals Intelligence (SIGINT) mission.

The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF spectrum. This equipment was developed, implemented, and kept secret in the same manner as other electronic warfare programs.

With this technology NSA personnel can non-obtrusively tap into any communication device in existence. This includes computers, telephones, radio and video-based devices, printers, car electronics, and even the minute electrical fields in humans (for tracking individuals).

Signals Intelligence remote computer tampering

The NSA keeps track of all PCs and other computers sold in the U.S. This is an integral part of the Domestic Intelligence network.

The NSA’s EMF equipment can tune in RF emissions from personal computer circuit boards (while filtering out emissions from monitors and power supplies). The RF emission from PC circuit boards contains digital information in the PC. Coded RF waves from the NSA’s equipment can resonate PC circuits and change data in the PC’s. Thus the NSA can gain wireless modem-style entry into any computer in the country for surveillance or “anti-terrorist” electronic warfare.

Radio and television signals can be substituted at the receiving end with special EMF equipment. Replacing signals in radios and televisions is another outgrowth of the NSA’s Signals Intelligence (SIGINT) mission.

Detecting EMF fields in humans for surveillance

A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment, NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance.

NSA personnel can dial up any individual in the country on the Signals lntelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S.

NSA’s Signals Intelligence use of EMF brain stimulation

NSA Signals Intelligence uses EMF brain stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MK Ultra program of the early 1950′s, which included neurological research into “radiation” (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as “Radiation Intelligence,” defined as “information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation.”

Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can monitor all the electrical activity in the brain continuously. The NSA records aid decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link (in military fighter aircraft, for example).

For electronic surveillance purposes, electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations, characteristic of paranoid schizophrenia.

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain-programming purposes.

Capabilities of NSA operatives using RNM

There has been a Signals Intelligence network in the U.S. since the 1940′s. The NSA, Ft. Meade, has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brain. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech, 3D sound, and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears), and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods, and motor control.

Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.

National Security Agency Signals Intelligence Electronic Brain Link technology

NSA SigInt can remotely detect, identify and monitor a person’s bioelectric fields. The NSA’s Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz, .5 milliwatt electro-magnetic emissions from the brain.

Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called “evoked potentials.”

Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials.” The EMF emission from the brain can be decoded into the current thoughts, images, and sounds in the subject’s brain.

NSA SigInt uses EMF-transmitted brain stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level).

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. As previously noted, EMF Brain Stimulation can also change a person’s brain-states and affect motor control.

Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2D screens in the brain).

Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. intelligence community.

RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in that specific brain area. The frequency to which the various brain areas respond varies from 3 hz to 50 hz. Only NSA Signals Intelligence modulates signals in this frequency band.

An example of EMF Brain Stimulation:

[Brain area-bioelectric resonance/ frequency/ information induced through modulation]

• Motor control cortex/ 10 hz/ motor impulse co-ordination

• Auditory cortex/ 15 hz/ sound which bypasses the ears

• Visual cortex/ 25 hz/ images in the brain, bypassing the eyes

• Somatosensory cortex/ 9 hz/ phantom touch sense

• Thought center/ 20 hz/ imposed subconscious thoughts

This modulated information can be put into the brain at varying intensities, from subliminal to perceptible.

Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived.

The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to 5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to authorities about their activities against the Plaintiff in the last twelve years.

The Kinnecome group has about 100 persons working 24-hours-a-day at Ft Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.

NSA Techniques and Resources

Remote monitoring/tracking of individuals in any location, inside any building, continuously, anywhere in the country. A system for inexpensive implementation of these operations allows for thousands of persons in every community to be spied on constantly by the NSA.

Remote RNM devices

• NSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals, and can send messages through the nervous system to affect their performance.

• [Information missing from original]

• RNM can electronically identify individuals and track them anywhere in the U.S. This equipment is based on a network and is used for domestic intelligence operations, government security, military base security, and in case of bioelectric warfare.

Spotters and walk-bys in metropolitan areas

Tens of thousands of persons in each area working as spotters and neighborhood/business place spies (sometimes unwittingly), following and checking on subjects who have been identified for covert control by NSA personnel.

• Agents working out of offices can be in constant communication with spotters who are keeping track of the NSA’s thousands of surveillance subjects in public.

• NSA Agents in remote offices can instantly identify (using RNM) any individual spotter in public whom is in contact with a surveillance subject.

Chemicals and drugs into residential buildings with hidden NSA-installed and maintained plastic plumbing lines

• The NSA has kits for running lines into residential tap water and air ducts of subjects for the delivery of drugs (such as sleeping gas or brainwashing aiding drugs). This is an outgrowth of CIA pharmapsychology.

Brief overview of proprietary U.S. intelligence/”anti-terrorist” equipment mentioned

• Fixed network of special EMF equipment that can read EEGs in human brains and identify/track individuals by using digital computers.

• ESB (Electrical Stimulation to the Brain) via EMF signal from the NSA Signals Intelligence is used to control subjects.

• EMF equipment that gathers information from PC circuit boards by deciphering RF emissions, thereby gaining wireless modem-style entry into any personal computer in the country.

All equipment hidden, all technology secret, all scientific research unreported (as in electronic warfare research). Not known to the public at all, yet complete and thorough implementation of this method of domestic intelligence has been in place since the early 1980′s.

————————————————————————–

Resources

These publications have only been discovered since December 1991, after the Plaintiff had already notified authorities (Dept. of Justice and others) of Public Corruption by named NSA employees. When no action was taken against the NSA employees, the Plaintiff researched the intelligence community electronic surveillance technology involved and discovered the following publications:

• The Body Electric-Electromagnetism and the Foundation of Life, by Robert Becker

P. 265/313/318, monitoring neuroelectric information in the brain; EM waves/ESB.

• Cross Currents, by Robert Becker, M.D.

P. 70/78/105/210/216/220/242/299/303, EM ESB; simulating auditory hallucinations; p. 274, remote computer tampering using the RF emissions from the logic board.

• Currents of Death, by Paul Brodeur

P. 27/93, driving brain electrical activity with external EM; magnetophosphenes; Dr. Delgado.

• The Zapping of America, by Paul Brodeur

DoD EM ESB research; simulating auditory hallucinations.

• Of Mice, Men and Molecules, by John H. Heller (1963)

P. 110, bioelectricity; probing the brain with EM waves.

• The 3-Pound Universe, by Judith Hooper

P. 29/132/137, CIA’s EEG research; EEG for surveillance.

• In the Palaces of Memory, by George Johnson

EM emissions from the brain; the brain as an open electromagnetic circuit.

• The Puzzle Palace, by James Bamford

Signals intelligence, most advanced computers in the early Sixties; the U.S. intelligence community – glossary of terms at National Security archives; Radiation Intelligence –information from unintentionally emanated electromagnetic energy, excluding radioactive sources.

• The Search for the “Manchurian Candidate,” by John Marks

P. 327, electrical or radio stimulation to the brain; CIA R&D in bioelectrics.

• Secret Agenda, by Jim Hougan

National Security cult groups.

• Crimes of the Intelligence Community, by Morton Halperin

Surreptitious entries; intelligence agents running operations against government workers.

• War in the Age of Intelligent Machines

NSA computer supremacy; complete control of information; alternate computers, by Time-Life Books.

• The Mind, by Richard Restak, M.D.

P. 258, EEG Systems Inc.; decoding brain EM emanations; tracking thoughts on a computer.

• MedTech, by Lawrence Gallon

Triggering events in the brain directly to auditory cortex signals.

• Cyborg, by D.S. Halacy, Jr. (1965)

Brain-to-computer link research contracts given out by the U.S. govemment.

• Psychiatry and the C.I.A.: Victims of Mind Control, by Harvey M. Weinstein, M.D.

Dr. Cameron; psychic driving; ultraconceptual communications.

• Journey Into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, by Gordon Thomas

P. 127/276/116/168-69, intelligence R&D; Dr. Delgado; psychic driving with radio telemetry.

• Mind Manipulators, by Alan Scheflin and Edward M. Opton

MK ULTRA brain research for information gathering.

• The Brain Changers, by Maya Pines

P. 19, listening to brain EM emissions.

Further Resources

• Modern Bielectricity

Inducing audio in the brain with EM waves; DoD cover-up; EM waves/ESB; remote EEGs.

• Magnetic Stimulation in Clinical Neurophysiology, by Sudhansu Chokroverty

Magneto-phosphenes; images direct to the visual cortex.

• The Mind of Man, by Nigel Calder

U.S. intelligence brain research; Neuroelectric Society conference – 1971; audio direct to the brain with EM waves; two way remote EEG.

• Brain Control, by Elliot S. Valenstein

ESB control of individuals.

• Towards 21st Century, by C.S. Wallia

P. 21, brain stimulation for direct brain-to-brain communication.

• Mind Wars, by Ron McRae (associate of Jack Anderson)

P 62/106/136, research into brain-to-brain electronic communications; remote neural EM detection.

• Mind Tools, by Rudy Rucker

Brain tapping; communication with varying biomagnetic fields. P. 82, U.S. News and world report (01/02/84); p. 88, EM wave brain stimulation; intelligence community high tech.

• Ear Magazine article on extremely low frequency radio emissions in the natural environment; radio emissions from the human body.

• City Paper article on FCC and NSA “complete radio spectrum” listening posts (01/17/92)

• Frontiers in Science, by Edward Hutchings, Jr. (1958)

P. 48

• Beyond Biofeedback, by Elmer and Alyce Green (1977)

P. 118

• The Body Quantum, by Fred Alan Wolf

• Cloning – A Biologist Report, by Robert Gilmore McKinnell

Ethical review of cloning humans.

• Hoover’s FBI, by former agent William Turner

P. 280, routines of electronic surveillance work.

• July 20, 2019, by Arthur C. Clarke

Lida; neurophonics; brain-to-computer link.

• Mega Brain, by Michael Hutchinson

P. 107/108/117/120/123, brain stimulation with EM waves; CIA research and information control.

• The Cult of Information, by Theodore Rosnak (1986)

NSA Directive #145; personal files in computers; computer automated telephone tapping.

• The Body Shop

1968 implantation of an electrode array on the visual cortex for video direct to the brain and other 1960s research into electronically triggering phosphenes in the brain, thus bypassing the eyes.

• Evoked Potentials, by David Regan

Decoding neuroelectric information in the brain.

November 7, 2010 Posted by | Conspiracy, control, Controlled society, Gang Stalking | , , , , , , , , , | 3 Comments