Please! help us continue the fight by donating they prey on all of our families by keeping it below the awareness threshold ON THIS LEVEL IT DOES MAKE A HUGE DIFFERENCE
LINKED TO CREDIT CARD SERVICE SECURE SERVER
Feel Free to Email Me
We need to communicate without being blocked, edited, and filtered.
Standing up for human rights
Insider Speaks Out: Electromagnetic Effects on Brain
Ret. British military intelligence scientist interview: covering
reality and effects of Directed Energy Weapons
Capt. Paul E. Tyler
This is a great declassified explanation of electromagnetic weaponry and
human experimentation without subject’s consent.
The links below take you directly to the pages containing the applicable laws at Michigan State Legislature’s website.
Brief of Michigan's Electromagnetic Weapon Law
Michigan Law 4513
Paragraph k addresses electronic and electromagnetic weapons Act 256 2003, effective 2004.
Penalties Part 4514
INTEL: Developing 'Brain Chip'
Intel states "by 2020, brain chips should be available for the consumer."
Missouri Law Against Involuntary Microchipping
Videos of microchipping, Fox News and Australian 60 minutes,
pictures of many removed covert human microchip implants,
and pictures of cancer allegedly cause by implanted human microchips.
Newsweek Cover Story
Gleaning thoughts from the electrical activity of the brain, brain mapping, and injecting thoughts through electromagnetic waves.
They restrict or retard you the reader from information in anyway they can. In this article they would only present, the first few sentences to distract and derail you from the information, which is stating something humorous, conveying the future is here today.
Extremely important article, it is very short and an easy read.
Some points on the time line of human experimentation
Time Line Electromagnetic Weapons
Statements from Presidential Commission
Children, experimentation, and mind control.
Cointelpro and the Church Hearings
Great Overview. Unsavory and vicious tactics have been employed. The Constitutional system of checks and balances has not adequately controlled intelligence activities. In the final report of the Senate select committee, Cointelpro was castigated in no uncertain terms.
Silent Sound and V2K( Voice to Skull):
Confirmed and In Production
Sound bypasses the ear drum.
Inventions that effect thoughts, emotions, memory, and thinking from external sources.
Patent that Dates Back to the 70's
US Congressman Kucinich Introduced Legislation in 2001
SSec7 Definitions.(III) & (IV) (II)
The use of land-based, sea-based, or space-based systems using radiation, electromagnetic, psychotronic, sonic, laser, or other energies directed at individual persons or targeted populations for the purpose of information war, mood management, or mind control of such persons or populations...
Decades of CIA
Includes information on veterans law suit against the CIA.
EXTREMELY POSITVE PROCEEDINGS AND COMMENTS from U.S. Magistrate Judge
FIND Declassified Documentation MKULTRA
and Human Experimentation
Site with Conference Calls
Includes enclosures, paints, bedding, and absorbers.
Washington Post's statement;
is not just science fiction – or the imaginings of the mentally
Many times it is harder for them to minimize, and engage their discrediting machine. Such as when confronting this example.
Seems to have validity, and be in line with what is part of a larger whole.
U.S. Code Electromagnetic Weapons
Illegal CIA Activities Human Experiments Spanned Decades
A person who uses, attempts or conspires to use, or possesses
and threatens to use. This has a 2 million dollar penalty and a minimum
25 years sentence
French Government Bans
WiFi in Schools; Requires that No Child Under the Age of 8 Should Be Exposed
to WiFi Electromagnetic Radiation.
It should be noted that some European countries use the age of 16 rather
than 8. This helps convey the dangers of EMR even in these amounts, especially
to young people.
Russian Law draft describes psychotronic
weapons in detail
Helps convey that it is not a victim as an individual, and not exclusive
to the U.S. Aiding us when attempting to address technology that is developed
to the point that it can adversely effect human-beings brains, minds,
Russia Wants Ban on HAARP Testing
Piece from Provda, a Russian Newspaper
Great Technical Information Link
These Are the People Who Research and Develop What Adversely Affects the General Public
Neuroscience-EGE Report: Implants in the Human Body
This report a good report on the subject; it describes
a spectrum of human implantable microchip technology.
Boston Globe's Article on Brain Computer Interface and Funding
Decades of Published Evidence of Microchip Technology and Symptoms
note: I am under mind-bending effects from what they employ.
I do suffer on an ongoing basis.
I have included the following statement, due to those inflicting the
harm and hardship continually attempting to preempt, and mirror me, while
suppressing me and 'information'. This is in their continually attempt to keep the information below the awareness threshold of those who would scrutinize, or recognize their behavior. They also steal and sloth my work (much of my work as I stated elsewhere on this site is for other
purposes, such as legal action) this is in part
not only to minimize the impact, but also to bolster their fraudulent
Very importantly they will admit to something employed, or a minimized
version to accomplish what they present.
When these thing are scrutinized
they will attempt to play another side of the fence garnering a response,
or decision that is devoid of what they were stating, or presenting a
moment earlier. Hold them accountable for what they presented earlier
That they have anything employed
is what is instrumental. Who has these things employed is as concerning
as what they employ.
Their addressing it at all is in response to what I am working on.
They are involved in being on top of me like glue, and at times
there will be a direct association with me through the years. How much
of my other work is in the same place in a minimize hidden way.
Lastly, this site will include voice files in the near future to save visitor time.
Senator Glenn "You just think about your family, your own son, your own daughter, or grandchildren
who might be, the next time they got to a doctor, the subject of some medical experiment that they
are not even told about."
Statement floor U.S. Senate
Koo-ou and eu wire in On and Around Us
This is the technology behind the targeting of unwitting victims
The more we become aware the more we have the realization that the technologies, methods, and techniques employed are no longer in the hands of those who originally developed or participated in the programs.
The point that needs to be mentioned at this juncture is that those on the side of the fence who are acting legally, morally, and ethically have a hard time grasping that someone would act that immorally, unethically, and illegally. And this is why at times the statements and apologies from the highest levels are needed. This ensures it is remembered that it is in society, and there are those who are acting in such ways. Who is engaged in these acts is as concerning as what they are engaged in.
Their organization is described by using the analogy of an onion. The layers hide, or shield, the core. As you move in from the "peripheral layers" of the onion, which will be addressed later, towards the epicenter, the primary function of the layers is geared towards targeting unwitting victims, and generating cash. It is designed, as it becomes more and more engrossed in targeting the unwitting victim, to make and keep the victim vulnerable for the use of the human organism, unwitting victim. What makes most of us in society susceptible, especially their victims, is the lack of awareness that they are, and have the ability to, act as surreptitiously as they do while engaging in such egregious and unconscionable behavior. They are surreptitiously on top of the victim, regardless of whether the victim is aware or not. Clandestinely Acting Organization
Electromagnetic (EM) weapons, or directed-energy
weapons (DEW), we do not see, hear, taste, or smell, although we are
grossly affected by them as citizens. They utilize the various frequencies
of the electromagnetic spectrum to disable or kill the target. Among
electromagnetic weapons are psychotronic weapons. These EM weapons
interact with the nervous system of the target. Silence Sound Weapons
are weapons affecting our subconscious, but can be raised above our
awareness threshold. Having the below graphic as a mental picture
helps convey what it is that an exposed person encounters.
US Army War College Quarterly "The Mind Has No Firewall"
Great Awareness Foundation Building Piece.
The "data" the body receives from external sources--such
as electromagnetic, vortex, or acoustic energy waves--or creates through
its own electrical or chemical stimuli can be manipulated or changed
just as the data (information) in any hardware system can be altered.
Jefferson City Mo.
King City Mo.
To Whom It May Concern,
This letter is to ask
for your help for the many constituents in our country who
are being affected unjustly
by electronic weapons torture and covert harassment groups.
Serious privacy rights violation and physical
injuries have been caused by the activities of these groups
and their use of so-called non-lethal weapons on
men, women, and even children.
I am asking you to play a role in helping these victims and
also stopping the massive movement in the use
of Veri-chip and RFID technologies in tracking Americans.
Long before Veri-chip was known we were testing these devices
on Americans, many without their
knowledge or consent.
There are new revelations of the cancer risk besides the privacy
and human rights problems with the use of
Veri-chip and RF signals.
I am asking for your help in stopping these abuses and aiding
those already affected.
Rep. Jim Guest
To demonstrate how far technologies have advanced since the 1960's and 1970's and 'newoo' an 'eeoo' wire. Implantable microchips are just one of the technologies, methods, and
techniques they employ.
The sizes of these devices have become too small for the human eye to
|Nanotechnology (Actual Chips)
Microchips on a Penny
These technologies represent some of the many ways they
have to monitor us unwitting victims and monitor how our brains and
bodies are reacting to what they employ. They will cause what affects
us their victims, including
employing these chips and nanobots, and then use them to detect how
the subjects are affected. These graphics are intended to convey this
small part of what these organizations use, their ever-evolving sophisticated
capabilities and the exponentially ever-decreasing size of the technology,
now so small it cannot be detected by the naked eye. Both body and brain
implants are in existence. Those who are unethical are using technologies,
methods and techniques to experiment using human-beings, attempting
to affect and control their victims brains and bodies from afar. These
technologies, methods, and techniques are in part how we bleed at the
gills as a nation economically. Those who are unscrupulous in their
business enterprises have obtained this technical knowledge through
the years, and have benefited by keeping it under the awareness radar
of society as a whole. As we trace the time lines, we can see the evolution
of what they employ.
(Courtesy of Shinji Nishimoto)
What The Mind Sees Vs. What The Eye
Short list of symptoms
chilling of Skin/ Instant Coldness
-daytime discernible "microwave hot spots" on skull
- nighttime, severe night sweats
sensation of electric current running through the body
deterioration of cognitive abilities
jaw or tooth pain
severe disorientation while driving
lesions on internal organs
Short list of their tactics /organized stalking
helicopter/airplane home fly overs
home monitoring workplace harassment activity
targeting of pets
unexplained sounds in home
Control of another human-being's
normal brain and body function, by electromagnetic energy and radiation,
dates back to the 60's. By means of electrical stimulation
of the brain, the rhythm of breathing and heart beat [this was even
stopped for several pulses] was affected, as well as the function of
most of the viscera -- like the secretion of the gall bladder. Also
resulting were frowning, opening and closing of eyes and mouth, chewing,
yawning, sleep, and dizziness, and epileptic seizures were induced in
They have been on us like
flies in a horse barn through the years for different reasons. Their
primary reason is to monitor how we acted and reacted to what they employed,
without our knowledge, long before we become aware. Unlike many of us
who have become aware there are those who are unaware and may never
become aware. How horrifying it is to find out that someone is adversely
affecting our lives, but it is twice as horrifying to find out
they have been acting in this way for decades. They have burned bridges
of support many times before we knew we needed to cross those bridges
of support. With their less than one
sided view the only view heard, they are continually attempting to predispose
those who would be support for us their victims, or would scrutinize
their behavior. Once we become aware or obtain too much information
for their liking, they use their monitoring abilities to keep us from
obtaining independent support, ensuring that the information we have
and what we prepare is intercepted and watered down. This minimizes
the impact of my work and ensures that the answers I have found do not
get to someone independent, or a group of independent people before
they have their covers and smoke screens in place.
Organized Criminal Involuntary Servitude, Stalking, and Intimidation (OCISSI)
It is commonly known that the violent criminal element (their organization) has gotten a hold of these technologies, methods, and techniques. People have infiltrated their groups and they have confirmed they are a violent organization that inflicts harm and hardship on us, their victims, which is the definition of violent. They employ these things for their personal gain; this does not have to be monetary gain, it can be things such as information for research and development, including R&D of new, even more sophisticated technologies, or it can be simple curiosity.
You begin to recognize who is involved when you can recognize how they function and operate. This includes things such as who has, and has had, their fingers on the information 'block,' 'edit,' and 'filter' buttons controlling the information flow that is being presented. Who has their hands on the slander and misinformation machine, which is a well known part of their program. And, who is demonstrating and employing these technologies, methods, and techniques
With their ability to present whatever view they want to, they supply bad information and data or only the information that ensures they get the decision or response they want. When there is information that reveals, proves, they presented bad information and bad data, they will stop at nothing to create a smoke screen that they can hide behind. This ensures they will need to have their well greased block, edit, and filter mechanism control all new information, or it would reveal this fact.
As I prepare material, they will confiscate and present it in a watered down way that minimizes their behavior and minimizes the technology, methods, and techniques they dare to use. They should present it as they presented their less than one-sided view through the years, not when I find a way to counter their less than one sided view. They literally have stolen and altered both my paper and electronic files at times as soon as I was done preparing them.
They are on top on me. It is obvious that the material comes from me. If it is presented by those who are privy to the information from being on top of me, then they are preempting me and the information. The source, being me, cannot be questioned. Those who take credit for my work, minimizing the impact, will attempt to leave the room, or hide behind a smoke screen, when light is being put on their involvement. This light leads to scrutiny that begins to unravel their deceit and fraudulent behavior. This is the type of behavior that identifies them and their gross involvement in inflicting the harm and hardship on us, their victims.
SEE THROGH THE WALL TECHNOLOGY
N.Y. City Police Commissioner to deploy see through clothes terahertz technology THIS YEAR
These links are simply used to convey technology that is available and evolving, and has been around for decades.
Those who are engaged in the use of human being against their will, knowledge, or want, as well as being surreptitiously involved in an unwitting victims life, recklessly use this and much more crude technologies. They do not have the well being of the victim in mind.
TROUGH THE WALL TECHNOLOGY
This is a newer look and contains information from another owned site.