There are a few things I wanted to say about developments affecting Targeted Individuals, from my
perspective.  Everything I refer to is in the public domain, and no doubt much more will be flooding
out over the coming weeks and months.


We all know about US mind control experiments and the bad things that went on in the 1950s after the second world war, the cold war, Vietnam and more recent developments. After Vietnam, which used conscripted US troops, the Targeted Individuals began to appear, but it was not obvious to everyone where that was going.

Picture opposite: Peasants suspected of being Vietcong under detention of U.S. army, 1966,

‘Thousands of American citizens have been publicly claiming for years that they are under attack from directed energy weapons that attack their physical bodies, and their central nervous systems. Hundreds of websites have sprung up on the internet and these distraught and tormented people have banded together in numerous groups seeking redress and relief from their elected representatives. They have brought legal cases to trial in both the United States and in international forums on human rights. Human rights activists have been besieged by them for help, but all such petitions, and court cases have run up against the problem of a lack of physical evidence. The entire judicial system is built upon the concept of physical evidence and people who are being attacked with invisible bullets are left with none’. Source: Marshall Thomas – Monarch II  -Victims.pdf

At first it seemed to be some sort of internal problem for one nation state. But with so many international groupings, special friends clubs etc, it was not appreciated at the time that there could be an international dimension that did not represent any nation state and transcended national boundaries.


No nation state, whatever their political structure, wants to give their power away to an invisible enemy. That’s what defence and military intelligence are meant to deal with. But most human beings tend to assume that there are standards, ethics, boundaries that they and others would not cross, and that even within defence organisations they would be able to spot anyone who didn’t share those standards.

But what if there was a technology that could capture people invisibly, not just brain-wash them, but impose subtle re-wiring on their brains and in some cases squirt somebody else’s mindset onto them. Those programmed individuals would then be released back into their environment to engage in every-day life under remote control.

Whether or not perpetrators interacted with TIs thereafter, they would use them in any way that served their purposes, as:

  • unwitting spies on others, recruiting more Tis,
  • unwitting sleeping activists
  • non consensual research subjects for all kinds of weapons research, including research on methods of torture.
There is a theory that if a group of 2000 strategically significant people in a country are taken
over, supported by a number of tactical people also targeted, the country is vanquished by default.
This stealth method relies on invisible electronic weapons. But the plans failed. In the new
scenario, perpetraitors’ bosses may begin to focus on TIs as hostages, in the hopes that
negotiation might be a possibility.
Perpetraitors were not told that at first, but now they know, and they are treading water, waiting for
new instructions that may never come, while those that managed to leave the sinking ship
negotiate their exit visas.
Picture opposite, courtesy of  Project Gutenberg – free ebooks
How could all this happen without governments
finding out? Well the mafia has always been in
town, and governments were always aware of
that, but no matter how senior an elected
representative may be, they are still individuals,
with loved ones.At first, the implications of invisibility technology for ‘virtual’ abduction of targeted
individuals may not have dawned on everybody immediately. But by now, you can be sure the
implications of what has been going on definitely have dawned on everyone.


If you worked for a nation state in an international grouping of national representatives, perhaps in the area of intelligence and security, the last thing you would want is for your country, your town, your family to be taken over by some ghastly group of nasties. Even allowing for diplomatic niceties, you would soon be networking with others who didn’t like what they saw either. The threat would be identified, assessed, and other arrangements would be put in hand to ensure the defence of the nation and protection of loved ones. And increasingly, that is what is happening.


The plan relied on major covert initiatives in a large number of other countries. But in practice it was never going to work on residents of other countries, because the system required gang-stalking – physical threats and brutality to support invisible weaponry. And that is too hard to arrange across the world on the scale necessary to ensure success, particularly when people realised that collaboration did not buy protection.


No one now thinks that war is the answer to problems that have blighted human life throughout history. Particularly when traditional weapons of last resort are no longer operational for wartime purposes. The diplomatic approach is containment and isolation, disentanglement from old out-of-date treaties, reduction in shared information, building of new bridges elsewhere, and development of feasible new technologies to keep the nasties out.

This in my view is what has been quietly going on, and already many people have turned their face
towards new objectives that offer real prospects of a better life for everyone while providing an
effective defence system. I say defence, rather than attack, because the old belief that attack is the
best method of defence no longer applies, if it ever did. If you have a system that will stop invisible
weapons:- electronic, radio, light, sound, atomic, particle or other systems, from reaching your
country or its people, that is a good start. And this is now happening.
How can we tell it is happening? Well for one thing, the flood of technical and scientific information
that is appearing in the mainstream press indicates that there is now greater freedom of
information. See my previous posts for details of what is now being openly reported. Gone are the
days when you had to scour the alternative media for hints of what might be going on. And this is
reflecting recent well-publicised changes in control over the media at international levels.
What is being reported now  includes incredible advances in science, particularly weapons
technologies.  Less is being discussed about measures to counter such weapons, but measures
do exist, and information about them is available in the technical media, for those who know where
to find it.

If certain insane plans had gone ahead unobstructed, one day, everyone would be a Targeted Individual. There is a beautiful part of Utah called ‘Zion National Park’, but the beauty of that part of the world, and some others, was smeared with a terrible stain – torture, cruelty, insensitivity to life and crimes against humanity. Some people made a link between what was going on there and the 2012 Olympics… but the 2012 Olympics were planned long ago, and many things changed, in ways that perpetraitor bosses had not predicted.

Some people thought that the 2012 Olympic Games would signal a special event that finally announced to the world what supposedly many people would already know – that key players and elected representatives across the world had been vanquished by an invisible enemy, and that a fait-accompli had been achieved, not through war but through stealth and invisible weapons. BUT IT DIDN’T HAPPEN. Why? Because most countries wised up to what was going on long ago, and took sensible preventative action.

‘The Games present an attractive target for our enemies and they will be at the centre of the world’s attention in a month or so. No doubt some terrorist networks have thought about whether they could pull off an attack. But the Games are not an easy target and the fact that we have disrupted multiple terrorist plots here and abroad in recent years demonstrates that the UK as a whole is not an easy target for terrorism. The national threat level at present is assessed to be SUBSTANTIAL – meaning that an attack is a strong possibility – one notch lower than has been the case for much of the last ten years. We are far from complacent. A lot of hard work still lies ahead and there is no such thing as guaranteed security. But I think that we shall see a successful and memorable Games this summer in London’…
‘The security preparations for the Games have been long and thorough. Members of my Service have been involved in advising on the physical design and security of the sites, but also in the accreditation of those working at the venues and in ensuring that intelligence collection and analysis for the security operation can meet the increased demand. This is not a solo activity. We are working as part of a mature and well developed counter-terrorist community in the UK and with the close support and co-operation of friendly Services overseas, who have been extremely generous in their assistance. We are also anticipating an Olympic security legacy after the Games – better intelligence coverage of potential threats, better integration at the local and national level of security and intelligence effort, and new, closer and better developed intelligence co-operation at the international level. I hope and expect that this legacy will live on well after the Games themselves have closed.’  
Source: THE OLYMPICS AND BEYOND, Address at the Lord Mayor’s Annual Defence and Security Lecture by the Director General of the Security Service, Jonathan Evans. Mansion House, City of London, 25 June 2012
‘More than 1,000 troops who had been on standby to bolster security at the Olympic Games have been deployed. Culture Secretary Jeremy Hunt said the 1,200 troops were to be used because ministers were clear that “we don’t want to leave anything to chance”…The move means 18,200 troops have now been deployed to the Games.’

‘The shadow of terrorism has hung over the Games for a reason. The day after London won its Olympic bid on 6 July 2005, suicide bombers struck the city. After that, everyone knew these Olympics would be the first to be held in a “high threat” environment’…

‘The number of players involved in delivering what has been called the largest peacetime security operation in British history is certainly bewildering.’..Critics have asked whether the security is all too much, pointing for instance to the missiles on rooftops in east London. Would they really be used?’ … 
‘There is a secret chart locked in a drawer somewhere in Whitehall, another of those involved in security tells me when I ask that question, which plots with clinical detail how many people would die if an airliner crashed into the Olympic Stadium’…
First of all, potentially everyone is a targeted individual.
There are particular problems for people living in the United States, though much has been going
on behind the scenes, with help from the international community, to stop further erosion of
internal and external national security. Some living in the US may smile wryly at the apparent
naivety of such a statement, and I understand why. But believe it or not, the nasties are actually on
the run. No you may not notice any change yet, but you may be one of the lucky ones who do.
If you live in a country in Europe, or some other places which have certain foreign bases permitted
within your national boundaries, you will have been allocated to an overseas perpetrator
‘supervisor’ for potential targeting. The way that works is that every country is divided up into
rectangles, and a perpetraitor unit using hand-held devices that can be carried in a small suitcase
is given charge of that area. They can’t target everyone, but they planned to focus on individuals
who might play a tactical or strategic role in their unfolding strategy.

That is bad enough, but what if a dividing line between one rectangle and another happens to fall between houses. And what if perpetraitors are not too fussy about who gets caught up in the beams they direct at Tis. There may be an overlap. That could mean that people get targeted twice by different units on a daily basis, and that others living in those houses may be affected.

Not all perpetrators can be bothered to do precision targeting of energy beams. This can mean that birds, bees, animals and fish may be affected. Where I live, birds can be seen dodging the microwaves to get to the food table. Only one song-thrush has fallen to the ground dead so far. But perpetrators don’t like our birds singing in the morning, because it isn’t morning for some of them, and a few of the louder birds have received personal attention from the perpetrators.

Recently I was rescued from a microwave
attack that began to affect not only people
where I live, but anyone in my vicinity. Hard-
working rescuers had jammed the perpetraitors’ signal, reducing their synthetic telepathy to a
murmur. In an attempt to counteract the jamming and recover their investment, the dim-witted
criminal perpetraitors exposed me and anyone near me to a 36-hour dose of microwaves with
enough power to support a large town, or fight a small war.
People walking towards me would suddenly lurch sideways as the illegally imposed
electromagnetic field surrounding me attempted to pull them into its ‘orbit’.  That type of microwave
beam does many things, including wiping short-term memory. So the memories of some
individuals in my vicinity may have been temporarily affected, not to mention credit card machines
in shops, bar-code readers in supermarkets and electrical circuits.
I tried to buy something in a shop using a debit card, and they had a power cut. Then it turned out
that a whole area of shops had a power cut. So we just had to go home. Luckily it was lunchtime…
But it was more disturbing when I went to a supermarket check-out one night, and the poor
gentleman at the till was so phased by the microwaves, that he couldn’t remember what he was
doing and asked me the same questions twice. He tried to input some bar codes but they didn’t
work, and a supervisor had to be called. At that moment, my perpetraitors realised their slip was
showing, and reduced the power for a little while.


From what I have observed so far, the plan for targeted individuals was intended to be that:

1. Strategic and tactical targets were identified.

2. TIs were prioritised in terms of threat or usefulness to the enemy.

3. Those with sufficient priority were assessed for viability, and if considered suitable, were given
tracking implants, and some mapping of brain and body neurology etc.4. There may be a long
backlog of such cases, but at some point, a TI gets to be called into the operating theatre, where
retinal camera, internal viewing screen, and communication wiring are implanted, using laser eye
surgery techniques, along with other things. How this is done I leave you to figure
out…Technologies for fast skin repair, using artificial tissue and skin as well, ensure that implants to
body parts fade quickly, and go unnoticed. But I had one double implant which took 8 days to fade.
I’m sorry if the picture below is harsh and crude, but it was taken shortly after I began to be
targeted. I woke up one day and found this mark on my leg.

Apparently, under terms recently negotiated, the new perpetraitors’ guidance manual says that TIs
should be asked – presumably telepathically – whether they are willing to work cooperatively with
the perpetraitors. This may be have a bearing on future international arrangements affecting how
TIs are identified and rescued.
Previously, this never happened, as far as I can tell, and perpetraitors were under the impression
that they should conceal the purpose of their torture activities from individuals. But now they are
supposed to explain to TIs that they are potential recruits to the invisible cause. So if you hear
them ask if you want to do something, that is your opportunity to make it clear to any independent
reviewers, or as a record on any perpetraitor recording systems or other recording systems, that
you declined to work with them.
Of course perpetrators don’t take no for an answer, and they prefer to make offers you cannot
refuse, linked to well being of loved ones. But they target those anyway, so don’t be fooled. In
practice, TI negotiation cannot happen with perpetraitors as they are all chipped, mind controlled,
and on incentives to target so many more TIs per week/month. The torture targeting is partly to
make TIs do what they want, but also because they want to research how best to torture people.
And Tis will get that whether they say yes or no.
If, despite electronic torture, TIs don’t cooperate, they may not be aware that the re-wiring has
happened. They may not be aware that others can see through their eyes, take pictures of what is
seen, and create visual and auditory hallucinations in their brains. They may at times be ill, lose
their jobs or relationships, or retain both if they hold strategically important posts. They may not
realise that the same thing is happening to their loved ones.
If Targeted Individuals do realise what is going on and resist, until recently, they were destined to
follow a familiar route –  torture, research and termination, depending on how much research
money they could bring in for their criminal perpetrators.  However, TIs are not noticeably dying in
large numbers these days, whereas the prognosis for perpetraitors is increasingly sombre.


To be effective, declining the perpetraitors’ invitation to collaborate must be loud, clear, capable of being picked up by a third party, and of sufficient duration that if a record is wiped it shows up on some other system. I have found that telepathic repetition / thinking of ‘Out demons out’ for a few minutes works quite well. Perpetraitors know there is a risk they may be monitored by international law enforcement groups and they take a coffee break.

There is a song from the 1970s by Edgar Broughton Band which includes chants of ‘Out demons out’- not for everyone as it is raucous, but its at:

It appears that perpetraitors are currently using me as one of their cases for training recruits on
how best to to make Tis do what they want, amongst other things. That really is adding insult to
injury.  Based on what I have observed, selection criteria for perpetraitor recruits must be very
esoteric, as intelligence, perception, knowledge of current affairs and awareness of what goes on
outside the USA are not essential requirements.

UPDATE – 15 November 2012

The table below shows details of people who I believe or know to be targeted individuals, most of whom live or work close to where I live, or with whom I have had regular dealings.  The reported ailments are not surprising, given the ages of those concerned, and would not arouse suspicion, apart from the sudden onset of the symptoms in people who were generally in reasonable health and did not have a medical history of such health complaints.  Details that might lead to recognition of the individuals have been altered to protect their identities.

I would have been on the list except that I use various shielding methods that prevent perpetrators from achieving results that would enable them to claim financial rewards under illegal research contracts.  Rather than waste the investment in mapping and tracking my frequency indicators, perpetrators locked onto me every night and then went fishing in the surrounding area for potential research cases.  After an initial period during which mapping and tracking presumably took place, the ill-health problems began to surface, although I was not always aware of this.  The cases listed below may be the tip of the iceberg.

The two perpetrators concerned, David – based in the US and Philip – based in the UK, cooperated in targeting the individuals concerned. Each are known to favour particular methods.  David uses infrasound cavitation techniques, typically to achieve fast-acting bowel complaints.  Philip targets hip joints with harsh pain consistent with electronic weapons, possibly maser delivery.  Philip operates using hand-held devices that fit into a special suitcase.  There is a time delay between initiating an attack and its impact.  David’s electronic delivery system from the US achieves real-time impacts.  It would not be impossible to establish, retrospectively, whether perpetrators had targeted these individuals, if access was obtained to records of their electronic weapons usage.

Targeted Individual
Nature of Apparent Criminal Assault
Elderly gentleman over 90 years, former military background, electronics specialism, US contacts. 3 months ago, following one afternoon in my vicinity, sudden onset of confusion as in a stroke or Alzheimer’s, followed by weakness, and then sleep state almost 24/7.
Lady over 70 years May 2012 reported pain in one hip, hip replacement operation performed 5 months later, now reporting pain in other hip.
Lady over 95 years Found wandering in bewildered state January  2012, followed by onset of chronic bowel complaint that has not responded to treatment.
Lady over 60 years After 5 days in my vicinity reported bowel complaint –consistent with infrasound cavitation weapon attack,diagnosed as bowel cancer, successfully treated with chemotherapy. 8 months later, after further day in my vicinity reported complications.
Lady over 50 years January 2012, acute bowel pains for several weeks –consistent with cavitation weapon attack – followed by quadruple bypass.
Lady over 80 years Sudden unexpected onset of psychosis, followed by removal to mental care unit.  Tests could not identify cause.  Psychosis disappeared on visit from her children.
Gentleman over 70 years, military background. Reported pacemaker problems.  Following investigations, put under observation.
The day following publication of this post, in which I reported the impact of high-intensity
microwaves on birds and insects, I went shopping and on returning to the house, found the front
door open.  We were unsure how this happened.  Next morning, on going into an upstairs room I

discovered what appeared to be a dead bird stuck to a piece of fly-paper suspended from the window.  See photograph opposite.  

When I first moved to my present address, in February 2012, the house was infested with large black flies.  I removed them by opening windows, fly-swats and fly-paper, which is safer than chemical sprays.  When my elderly relative living nearby began to be targeted, she also experienced a swarm of such flies. She happened to know an elderly gentleman who reported a similar experience, and who had the flies identified. Apparently they are a rare species not normally found in the UK.

While drafting this post on Blogspot, perpetrators were altering it as quickly as I wrote it.  Because of this, there may be alterations and omissions.  The WordPress version has also been illegally tampered with, changing formats.  Who would be so dumb as to leave their fingerprints all over the shop, after breaking in?  … That’s right, you’ve guessed it – xxx.

Websites that provide TI advice include the following:




This post is about:

Hidden aspects of psychotronic technology

– The science of physical regeneration using sound

– Decoding the invisible electromagnetic spectrum

– Secret bandwidths for targeting individuals

– Controversial views about the Schumann Resonance

This is a follow-up to my previous post -’Targeted Individuals: Psychotronics Anonymous’.

Not everything could be discussed in one post, because what psychotronics covers is really the Matrix.  At the time of publishing there were obvious flaws in the appearance of this post on Blogspot, input illegally by perpetrators with unauthorised access.


My perpetrators only got Electron Spin Polarity Resonance – ESR , an advanced visual imaging device, a couple of weeks ago. When matched together, ESR and fMRI can pick up not only unspoken audio-visual brain activity, but also, a brain movement that precedes subvocal thought. See ‘Predicting Intentions’ below.

Before, when they worked with their main contractor, they probably watched ESR technology in action. Now they have got their own model. But this kit is not cheap. They had to persuade a few corporations to invest in the prospect of future research, in order to buy the machine.

Why did my perpetrators beg, borrow or —– to get funding to buy the ESR? Because like all criminals, they were doing something underhand. They saw an opportunity to get twice as much money by secretly using TIs from their main subcontract again under a different research contract involving other funders and commissioning organizations.

To get enough subjects for statistically valid research samples, they planned to use their TI’s as unwitting spies, using retinal implant cameras embedded in the TIs’ eyes to photograph prospective subjects for facial recognition. All candidates fitting the research profiles, including families, friends and contacts could be used. Perpetrators were giving these photographs to a group of air-born ‘technicians- sans-frontiers’ who were in on the deal and who could enable ‘virtual’ capture of innocent citizens in other countries.

I found out recently that I am on the perpetrators’ new private project. The reason is that if anyone from the UK should make enquiries about whether I was a Targeted Individual, their main contractor could say that I was not on their books. I guess a lot of other TIs are in the same situation.



‘Using high powered steered phased arrays and focused directed energy from two sources next to each other, one can create a nearly undetectable “scalar” wave, or destructive interference at the point of interest. With just a minor energy interaction, the interfering beams bounce back with strong signal to noise ratio to be resolved at the sources again. This allows for any imaging technique to be done from extremely large distances. In effect, it makes distance irrelevant to the detection feature, be it RADAR, MRI, or ESR imaging.’

Free PDF: The Matrix Deciphered – Freedom From Covert Harassment and …


All that is required to intercept land-based communication networks is a building situated along the microwave route or a hidden cable running underground from the legitimate network. For this reason the worldwide network of facilities to intercept these communications is still mostly undocumented.

Microwave communications are intercepted in two ways: by ground stations, located near to and tapping into the microwave routes, and by satellites. Because of the curvature of the earth, a signals intelligence satellite out in space can even be directly in the line of a microwave transmission. America’s Secret Global Surveillance Network, http://, by Patrick S. Poole


The man whose invention made possible the targeting of individuals
‘In 1974, Robert Malech , an employee of Dorn & Margolin Inc., a major defense subcontractor in radar design now owned by EDO Corporation an even larger all defense contractor in electronic warfare, invented a fairly simple radar device that could read whole brain electrical activity at a large distance . It has the major advantages of no wires and full brain electrical activity analysis, not just points on the skull surface. He discovered and perfected a way to use some simple electromagnetic oscillations anywhere from 100Mhz to 40 Hz* to read brainwaves by “illuminating” the brain and its electrical conductance then reading the return signal…’ – See footnote at end of section. * This broadly refers to the wireless microwave band.

Within two years global communications were taken over

‘But more profoundly, he discovered that he could influence brain waves if precisely timed with a return training signal. He had no idea that at this moment in history, he had accidentally destroyed democracy as we envision it to be. The military and surveillance community immediately picked up on the patent and within two years had reprogrammed their communications and surveillance satellites and terrestrial phased arrays with the new concepts.

Thought Amplifier and Mind Interface – TAMI

The rapid deployment of this technology occurred because it only required software changes in already existing radar, imaging, and communications’ terrestrial dishes and satellites. Many additional spy satellites have been launched since to bolster the system. So in 1976, on the bicentennial of this great nation, a system called TAMI was born. TAMI is an acronym for “Thought Amplifier and Mind Interface”. A more invasive “Big Brother” technology came about before George Orwell’s prediction of 1984.’

Anyone near a TI can be influenced by TAMI

‘TAMI, can hone in on a compatible mind and instantly be able to manipulate it to some varying degree dependent upon many factors. The offense practices their trade by influencing people near a targeted individual to convey information only pertinent to them, for spy games. These people are everyday citizens unfamiliar with this high technology. The effects are so subtle without lots of training to detect, nobody would be the wiser. They would at most just question why they did that or felt the need to say that.’

The power of invisible voices

The third category of stalkers is the most disturbing. True zombies are created through the “voice of god” microwave hearing effects. Some people become complete believers that God is talking to them and telling them what to do, be it follow someone or kill on command. John Lennon’s killer claimed voices kept saying “do it, do it” over and over again. TAMI came on line in 1976, and John Lennon was killed in 1980.’

What they did to prevent the truth coming out

At that time the military demonstrated the capability of reading automobile license plates from satellite images…In order to cover up and not draw attention to mind reading radar, the whole field of psychic phenomena and paranormal psychology was invented to deceive the civilian populations of what was occurring.


‘EEG cloning means to copy someone else’s brainwaves onto another person. The discovery made by Robert Malech allows this to be done wirelessly anywhere in the world’…Unfortunately, due to the nature of this new weapon, many human minds are needed to create the database of specific brain data necessary to increase the effectiveness on a larger and larger population. These are referred to as the “Cataloguing and Cloning operations”. In this context, cloning does not refer to human cloning, but EEG cloning. Many have misunderstood this fact and then it was popularized by the T.V. series “X-Files”. These cloning operations are what plague the human race today…This weapon that requires torturing and killing many people.’


fMRI – for memory control
‘fMRI can be used to identify recognition in the brain. what we call Memory is actually distributed associations throughout the brain – for example, using the screwdriver, seeing the screwdriver.’

fMRI – shows the difference between schizophrenia and synthetic telepathy but MRI does not

One of the reasons TIs get diagnosed as schizophrenic if they report synthetic telepathy is that ordinary MRI brain scans cannot detect subcortical auditory activation in’…auditory ‘hallucination’. But fMRI scans can do so. Monarch II -Victims.pdf http://

Subvocalised thought

In synthetic telepathy, only the signals associated with subvocalised thought are of interest. The areas of the brain associated with speech are the Broca, Wernicke and supplementary motor areas.’ ciencia_psychotronicweapons08.htm. See picture below.

fMRI & ESR for real-time brain feedback

A functional MRI is an active scanning technique used to…measure brain activity in real time as well as its structure. MRI stands for magnetic resonance imaging… Another sister technology, is called ESR, electron spin resonance.’

Reading a TI’s ‘intentions’

This is about putting into words something you already know but haven’t yet verbalised. ‘Using fMRI, some researchers in 2008 were able to predict, with 60% accuracy, whether a subject was going to push a button with their left or right hand. This is notable, not just because the accuracy is better than chance, but also because the scientists were able to make these predictions up to 10 seconds before the subject acted – well before the subject felt they had decided’.

The way this is expressed in Wikipedia it might be interpreted as being an automatic process – ‘the results of unconscious processing.’ I am skeptical about that, as I often know what I want to say before the words come, and I think that is what they are looking at. But if that is what they are looking at, it is very significant, because it means they have learned to read ‘intention’, which is something they could not all do before. Without being able to read intention, motivation often remains unclear. So they might know what a TI said, but they did not always know why or what it referred to.

How have they learned to read intention? By using fMRI in combination with Electron Spin Polarity Resonance, the thing my perpetrators were so desperate to get their hands on. Perpetrators get an almost simultaneous screen print of what the TI meant, in words, and images. See next paragraph.

Electron Spin Resonance – ESR

– Oxygen for cancer therapy

‘Although groundbreaking, ESR isn’t a brand new discovery. Dutch scientists discovered its basic principles some 80 years ago, and ESR instrumentation has been around for more than 60 years…Now they’re developing ways to use ESR to determine oxygen concentrations in the body… Oxygen concentrations are especially important in cancer radiation therapy, where high-energy rays are used to kill cancer cells. “Radiation treatment is only effective when the rays are directed into tissue regions that contain high concentrations of oxygen.” inside


ESR / fMRI convert brain blood-flow into language in real-time

The ESR ‘enables ‘very high signal to noise EEG patterns’ to be extracted. ‘The sensitivity is truly “science fiction” like. Even a single nerve or neuron firing can be picked up individually. This gives new meaning to Signal Intelligence.’…‘ESR/EPR (electron spin resonance/electron spin polarity resonance) technique is one of the major methods of monitoring citizen’s brain activity.’

It uses continuous wave imaging which allows changes of blood perfusion and oxygenation in’ the body and brain ‘to be observed in nearly real-time. opportunities/opportunity.php?oppid=2221. This enables fMRI to convert blood flow changes into language more quickly and reliably.

Is translation into different languages needed after this?

Working together with an ESR, an fMRI can display words on screen that have not been verbalized internally by a TI. So I suspect that perpetrators don’t need to be able to speak different languages any more to spy on people through synthetic technology. They can get a translation in any language directly from the root electrical impulse.page11image10888

Brain facial-recognition software

‘In 2010 IBM applied for a patent on how to extract mental images of human faces from the human brain. It uses a feedback loop based on brain measurements of the fusiform gyrus area in the brain which activates proportionate with degree of facial recognition. – my emphasis. In 2011, a team led by Shinji Nishimoto used only brain recordings to partially reconstruct what volunteers were seeing.’ wiki/ Thought_identification


In his book Monarch : The New Phoenix Program II, Marshall Thomas writes that in 1979-81, he worked as an engineer fabricating designs for, oven controlled quartz crystal oscillators for Frequency Electronics Inc. a defense contractor /manufacturer of high-tech precision time and frequency products used to synchronize voice, data and video transmissions in wireless communications systems .Their systems are found in both ground- based stations and on-board commercial satellites.‘ Monarch II – Victims.pdf

That sounds like all the wireless transmissions for synthetic telepathy, brain wave data and video imaging, video images of TIs and everything else needed to torture them can all be brought together in one wireless transmission,either via satellite or ground-based stations. AND THIS HAS BEEN POSSIBLE SINCE THE 1980s.


All sound waves work with synthetic telepathy: infrasound, microwaves & ultrasound
According to, synthetic telepathy works with Extremely Low Frequency – ELF, a range description which generally includes infrasound.

In earlier posts I quoted experts such as John J. McMurtry, who referred to synthetic telepathy patents for microwave hearing and ultrasound. That means that all sound waves can be used to decode or transmit synthetic telepathy, including sonar, which has implications for submarine communications and communications in space.

Picture below: Analogue RF signal generator. Signal generators… are electronic devices that generate repeating or non-repeating electronic signals (in either the analog or digital domains)… Analog signal generators based on a sinewave oscillator were common before the inception of digital electronics, and are still used. There was a sharp distinction in purpose and design of radio-frequency and audio-frequency signal generators. http:// Signal_generator.

The dots join up
‘Deployment of new technology incorporating low-frequency microwaves and RF is at least a decade old. Security personnel can use it to scan through bodies and walls like X-rays, and see and track a target victim at home. But once they can see inside that person’s head, they can conduct computer-controlled targeting by firing pulsed-frequency masers at specific brain centers. (“Maser” is the acronym for “microwave amplification by the stimulated emission of radiation”.)’ ciencia_psychotronicweapons08.htm

Masers work with all radio waves

Perpetraitors deleted this section, but I reinstated it on 12-11-2012. That means microwaves are stimulated by electromagnetic radiation to produce ‘souped up’ microwaves, and nowadays , according to, it can mean that ELF, ultrasound, X-ray, gamma rays etc can also be transmitted by maser as well as microwaves. That means microwaves are stimulated by electromagnetic radiation to produce ‘souped up’

The brain gives off ELF emissions as subvocalised thought & EEG picks them up
‘Synthetic telepathy requires techniques for scanning the specific brain emissions given off when the targeted victim subvocalises. The techniques must be able to detect the 15-Hz, 5-milliwatt auditory cortex brain emissions that are linked with sound that bypasses the ear; the ELF frequencies that are linked with the excitation potentials in the brain that are associated with subvocalised thought; and EEG signals, such as the P300 signals mentioned previously.’

Perpetrators use ELF to transmit synthetic telepathy to TIs’ brains through windows

Perpetraitors did not want me to include the heading above this section. ‘Dr. Ross Adey, at Loma Linda Veterans Administrative Hospital in California, discovered that the best method for getting an ELF signal into a human brain is with ” pulse modulation of a high- frequency field. By firing ELF pulse-modulated masers, which can scan up and down the window of frequency emissions given off by subvocalised thought, interference effects can be measured in the maser beam…

Stages of computer-controlled targeting of individuals using ELF

Maser is generally used, but laser works as well

But laser transmission is also possible: ‘A simplistic version of this would be to direct a laser beam at a window in the targeted person’s home. The vibrations in the window cause modulations in the laser that can be converted into electrical signals and hence into sound.’ ciencia_psychotronicweapons08.htm

TIs hear perpetrators because of pulsed masers delivering ELF

‘Since the converging ELF-modulated masers are affected by low- level emissions in the target’s brain, shifts in the ELF-pulsed signal going into the brain can be detected.’… ‘Using ELF audiograms carried by a single pulse-modulated maser, subvocalised thoughts can be placed in the victim’s brain.’ http:// ciencia_psychotronicweapons08.htm


– Physical Regeneration is More Natural Than We Might Think

We all know that amphibians can re-grow a leg or a tail. But recent research shows that even mice can regenerate damaged tissue, and that ‘electrical stimulation has shown promising results for rats and mammals in general.’ http:// Regeneration_(biology).

Apparently the mechanism for regeneration is linked to deactivation of one gene: ‘The mechanism for regeneration in Murphy Roths Large (MRL) mice has been found, and is related to the deactivation of the p21 gene.’ ‘In May 1932, L.H. McKim published a report in The Canadian Medical Association Journal, that described the regeneration of an adult digit-tip following amputation.’ …

‘A woman named Deepa Kulkarni lost the tip of her little finger and was initially told by doctors that nothing could be done. Her personal research and consultation with several specialists including Badylak eventually resulted in her undergoing regenerative therapy and regaining her fingertip.’…

– ‘There have appeared claims that human ribs could regenerate if the periosteum, the membrane surrounding the rib, were left intact. In one study rib material was used for skull reconstruction and all 12 patients had complete regeneration of the resected rib’.*

– ‘Several animals can regenerate heart damage, but in mammals cardiomyocytes (heart muscle cells) cannot proliferate (multiply) and heart damage causes scarring and fibrosis. The long held view was that mammalian cardiomyocytes are terminally differentiated and cannot divide. However inhibition of p38 MAP kinase was found to induce mitosis in adult mammalian cardiomyocytes. Treatment with FGF1 and p38 MAP kinase inhibitors regenerates the heart, reduces scarring, and improves cardiac function in rats with cardiac injury.’

*Munro IR, Guyuron B (November 1981). “Split-Rib Cranioplasty”. Annals of Plastic Surgery 7 (5): 341–346. doi: 10.1097/00000637-198111000-00001. PMID 7332200.


In my first post on psychotronics, I identified a link between healing / regeneration of physical limbs and organs and ultrasound. I now think that infrasound works the same way. But it is less a question of frequency, and more to do with how loud the sound is at a specific frequency. For example, ultrasound is used widely in clinical applications, and yet occupational exposure to ultrasound in excess of 120 decibels – dB may lead to hearing loss.

But ultrasound and infrasound are outside normal human hearing range. However loud it is, we can’t hear it. So measurement is critical. Earlier I mentioned this article which says that pulsed ultrasound regenerates bones and teeth.  The point is they used low intensity pulsed ultrasound to regenerate bones and teeth. So the word to look for is ‘intensity’. High intensity = bad. Low intensity = healing and regeneration. And we are probably talking about ultrasound and infrasound. See paragraphs further below.

Picture opposite: Pedals of a steinway grand piano. The word piano is a shortened form of pianoforte (PF), the Italian word for the instrument. The musical terms piano and forte mean “quiet” and “loud,” and in this context refers to variations in loudness the instrument produces in response to a pianist’s touch on the keys: the greater the velocity of a key press, the greater the force of the hammer hitting the string(s), and the louder the note produced.


Marshall Thomas, monarch_ii_victims_thomas, page 25.

Dr. Allan Frey, a biophysicist at G.E.’s Advanced Electronics Center, Cornell Univ. (and a contractor for the office of Naval Research) discovered in 1958 that the auditory system responds to EM energy in a portion of the RF spectrum at low power densities…well below that necessary for biological damage.” Marshall Thomas, monarch_ii_victims_thomas, page 25.



Gravoboi numbers: The stories about regeneration of organs come mainly from Russia and the Philippines. In Russia they are associated with a former Russian government scientific expert called Grigory Petrovich Grabovoi. He produced a set of frequencies known as ‘Gravoboi numbers’ that he claimed could heal all diseases, and his name became associated with apparently miraculous regeneration of organs and even resurrection of people who had recently died.

The Russian Arcady Petrov group in Moscow that are reported to have achieved physical regeneration results, and a Russian living in Germany since 1995, working with the SVET centre in Hamburg all use Gravoboi numbers. Grigori Gravoboi was sentenced to 11 years in prison for fraud and exploitation of bereaved people. A group of Russian advocates brought an action to institute criminal proceedings against the Russian authorities before the Hague Tribunal, the International Criminal Court, for having effected Grigori Gravoboi’s criminal prosecution. Gravoboi’s early release in May 2010 was appealed by the regional prosecutor office. I heard that Gravoboi was released about that time, and he may have resumed his normal duties within Russia. He has also worked as an overseas consultant, advising other countries on how to protect nuclear power plants against risk of earthquakes etc.page19image11832 Retrieved on 2011-11-13.

Toothsome research may hold key to repairing dental disasters – ExpressNews – University of Alberta: Low intensity pulsed ultrasound is used for therapeutic tooth and bone regeneration. Researchers havesuccessfully used ultrasound to regenerate dental material.

The Gravoboi numbers are basically numbers from 1 to 9. For example, the number allocated to general healing of the head is 1819999. Does this indicate that the number is broadly around 2, and if so 2 what? The number for acute respiratory failure is 1257814, and the number for coma is 1111012. If they were derived via radionics, perhaps they relate to the infrasound series – 1-9 Hz, which is close to the resonance of the earth itself – see section on Schumann resonance below.

That would make sense, since humans are born on earth and live on earth. The point to remember is that to assist the healing process, exposure to infrasound must be at low intensity levels – very quiet, Pianissimo in musical terms. Using ultrasound at the same frequencies and low intensity levels would probably work as well. Could it be that this is how these groups are achieving physical regeneration of the human body?

Where can the Gravoboi numbers be found on the internet?

The Gravoboi numbers can be found at category_s/62.htm.

Sources for this section also include: Grigory_Grabovoy; See also Unified System of Knowledge, created by Gravaboy Grigori in June 1996, published by AV Kalashnikov 2001, http://www.Unified-1.pdf Experience_Being/…/Unified.pdf.

Picture above: Approximate frequency ranges corresponding to ultrasound, with rough guide of some applications. http://


Like the Arcady Petrov group, Grigory Gravoboi gave no indication that anything other than meditation was needed to achieve healing of diseases and regeneration of organs. But he said he got the numbers by using radionics. Now according to Wikipedia:

‘Radionics is not based on any scientific evidence, and contradicts the principles of physics and biology and as a result it has been classed as pseudoscience and quackery by most physicians’. http://

But radionics uses electrical equipment, so it must be doing something. Information about what is in the ‘black box’ seems to be shrouded in mystery, but there are other applications which use the term radionics which have less mysterious frequency equipment.


Some firms selling radionics boxes appear to be selling straightforward electronics equipment, and as you would expect, it is not cheap to buy. If something is expensive and doesn’t work, would people go on buying it? I doubt it.

Radionics: Cosman Medical, Inc use infrasound and ELF

In the US there is a firm called Radionics. Bernard J. Cosman, who founded Radionics (originally called Cosman and Company) in 1938, built ‘the first commercial RF lesion generator in 1952. His son, Professor Eric R. Cosman of the M.I.T. Physics Department, directed Radionics from 1970 to 2000. Professor Cosman designed dozens of RF generator models,… And an accompanying vast array of RF electrode systems which are used by thousands of clinicians around the world. Radionics, the family business, was sold in 2000. Cosman Medical, Inc. was founded in 2004 by Professor Cosman to continue the innovation and progress in RF medical technology that he and his father pioneered and lead from the very beginning of the field.’

The RFG-1B Radio Frequency Generator for advanced pain management’ has a range of stimulation, pulsed RF, and continuous RF parameters that are specifically matched to the needs and efficient use of pain management specialists. According to the brochure, in the ‘Stimulator Section’:

‘The RATE pushbutton selects either 2 or 50 Hz pulse rates. Voltage output is shown on the large digital display’.

This equipment can cover either 2 Hz or 50 Hz. Now 2-50 Hz = Infrasound / Extremely Low Frequency ELF radio waves, while 50 Hz is within the Super Low Frequency – 30-300 Hz so there are overlap areas.  Just to be clear, according to Wikpedia:

Electromagnetic radiation



Super Low frequency

30 – 300Hz

10 mm

Extremely Low Frequency – ELF

3-30 Hz

100 mm

Infrasound – Lower than 20 Hz

0.001 – 20 Hz


Schumann resonance – within the infrasound band width

7.8 Hz



The important point is that lower than 20 Hz = Infrasound, and this equipment provides infrasound.

Here are details of another radionics firm: Higher Power Technologies

Higher Power Technologies offers equipment that transmits the frequency of the Schumann resonance, the frequency of the earth’s electromagnetic field, which is broadly the same as the frequencies of human brain waves: ‘Higher Power Technologies was the first to combine life force orgone energy technologies with power electronic amplifier module transmitting antenna systems, the result ultimate radionics.’ 

‘Low Pulse Electronic Frequency module generator: Absolutely no experience is needed to operate this powerful instrument,
the Frequency generator pulsar box has a factory default setting of 7.83 Hz (the earth frequency, the choice of psychics and Shamans) so there is no guess work on your part, just flip a switch, or you can experiment and use the frequency dial tuner to tune in you own frequencies from 5.00HZ to 500HZ, the LED light will pulse to the different frequencies as you turn the dial. Comes complete with 12 Volt AC Adaptor (only within the U.S. and Canada) and instructions.’

Why is pain management radionics equipment shrouded in secrecy?

Could it be that equipment that works for pain management has relevance to pain infliction applications as well?

It is not so much the frequency level as the intensity that makes the difference. If low intensity heals and regenerates could high intensity cause diseases and even death? And could perpetrators be using this approach for torture of TIs, via the radio frequency range – infrasound, microwaves and ultrasound?

In my previous post I referred to how masers could deliver a payload of any type of electromagnetic frequency. If so, could a pulsed microwave maser direct these frequencies to relevant parts of the body?

On the plus side, perhaps the Gravoboi numbers represent specific infrasound/ ultrasound wireless frequencies for various parts of the body, and possibly octaves of those frequencies in other electromagnetic frequency ranges as well. If so, physical regeneration results even quicker than those achieved by meditation might be possible, using infrasound/ultrasound and microwave wireless frequencies. Marshall Thomas, monarch_ii_victims_thomas, page 25.

Dr. Allan Frey, a biophysicist at G.E.’s Advanced Electronics Center, Cornell Univ. (and a contractor for the office of Naval Research) discovered in 1958 that the auditory system responds to EM energy in a portion of the RF spectrum at low power densities…well below that necessary for biological damage.” Marshall Thomas, monarch_ii_victims_thomas, page 25.


Information about an area within the electromagnetic spectrum lacks clarity

There appears to be some lack of clarity about between specifics of the microwave range within the electromagnetic spectrum. The diagram above indicates a gap in the spectrum, by the satellite dish, with wavelengths numbered 10 cm – 10 m, and it shows a label ‘Radio waves observable from Earth’.

According to Wikipedia, the area where radio astronomy is indicated is in the 30-300 GHz EHF microwave range. But the wavelengths quoted in the diagram are insufficient to locate the bands, because each band has a lower and upper range, for example, 3 – 30 MHz, where 3 = lower range limit and 30 = upper range limit. Source: http:// Extremely_high_frequency.

The diagram above does not give information in that format, and within the scientific community there appear to be different versions of the electromagnetic spectrum, saying different things about what is going on in that area.

If the gap in the diagram relates to the EHF 30-300 GHz band, then, according to Wikipedia, it is the bandwith indicated for: Radio Astronomy, Remote sensing, Active Denial System radiation beam, and TSA scanner. This is also one of the bandwidths used to target individuals for synthetic telepathy and pain infliction by maser.

Wireless also falls partly within the bandwidth. For more on the EHF Microwave band, the Terahertz ‘invisible area’ and the Wireless frequency range, see the Radio Spectrum table below:

Band Name    

Radio Spectrum Table

Mid-infrared, from 30 to 120 THz (10 to 2.5 μm).    

Hot objects (black-body radiators) can radiate strongly in this range. This range is sometimes called the fingerprint region, since the mid-infrared absorption spectrum of a compound is very specific for that compound. Electromagnetic_spectrum

Terahertz ‘Invisible Area’
This range falls within the Terribly High Frequency, Microwave, Far infrared or Terahertz frequencies. See table at end of this post.

According to Wikipedia ‘Terahertz radiation is a region of the spectrum between far infrared and microwaves. Until recently, the range was rarely studied and few sources existed for microwave energy at the high end of the band (sub-millimeter waves or so-called terahertz waves), but applications such as imaging and communications are now appearing. Scientists are also looking to apply terahertz technology in the armed forces, where high-frequency waves might be directed at enemy troops to incapacitate their electronic equipment.* http:// Electromagnetic_spectrum

* “Reference Solar Spectral Irradiance: Air Mass 1.5”. Retrieved 2009-11-12.
The wavelength range from approximately 200 μm up to a few mm is often referred to as “sub- millimeter” in astronomy, reserving far infrared for wavelengths below 200 μm.

EHF  Microwave

In the case of the 92–95 GHz band, a small 100 MHz range has been reserved for space-borne radios, making this reserved range limited to a transmission rate of under a few gigabits per second. The band is essentially undeveloped and available for use in a broad range of new products and services, including high-speed, point-to-point wireless local area networks and broadband Internet access. Highly directional, “pencil-beam” signal characteristics permit systems in these bands to be engineered in close proximity to one another without causing interference. Potential applications include radar systems with very high resolution. Source. Extremely_high_frequency.

Radio astronomy, high-frequency microwave radio relay, microwave remote sensing, amateur radio, directed-energy weapon, millimeter wave scanner.


SHF Microwave

Radio astronomy, microwave devices/ communications, wireless LAN, most modern radars, communications satellites, satellite television broadcasting, DBS, amateur radio.

UHF Microwave

Television broadcasts, microwave ovens, microwave devices/ communications, radio astronomy, mobile phones, wireless LAN, Bluetooth, ZigBee, GPS and two-way radios such as Land Mobile, FRS and GMRS radios, amateur radio.


FM, television broadcasts and line-of-sight ground- to-aircraft and aircraft-to-aircraft communications. Land Mobile and Maritime Mobile communications, amateur radio, weather radio.


Shortwave broadcasts, citizens’ band radio, amateur radio and over-the-horizon aviation communications, RFID, Over-the- horizon radar, Automatic link establishment (ALE) / Near Vertical Incidence Skywave (NVIS) radio communications, Marine and mobile radio telephony.


AM (medium-wave) broadcasts, amateur radio, avalanche beacons.
Medium wave is by far the most used for commercial radio broadcasting; this is the “AM radio” that most people are familiar with. For the long and medium wave bands, the wavelength is long enough that the wave diffracts around the curve of the Earth by ground wave propagation, giving AM radio, in particular long wave and medium wave at night, a long range. Frequency_Spectrum


Navigation, time signals, AM longwave broadcasting (Europe and parts of Asia), RFID, amateur radio. Radio signals below 50 kHz are capable of penetrating ocean depths to approximately 200 meters. The United States, Russian, British, Swedish, and Indian navies communicate with submarines on these frequencies.

Longwave transmitting antennas take up large amounts of space, and have been the cause of controversy in the United States and Europe due to fears over proximity to high-power radio waves. Frequency_Spectrum

Band Name


(VLF) Very Low Frequency: 3-30 kHz

Navigation, time signals, submarine communication, wireless heart rate monitors, geophysics.
Very Low Frequency or VLF refers to Radio Frequencies (RF) in the range of 3 – 30 kHz. Since there is not much space in this band of the spectrum, only the very simplest signals are used, such as for radionavigation.
Many natural radio emissions, such as whistlers, can be heard in this band. Because VLF can penetrate water to a depth of 20 meters, they are used to communicate with submarines. Lightning generates low frequency radio waves called whistlers. Whistlers have been recieved from Jupiter showing the presence of lightning there.
The dawn chorus is an unexplained electromagnetic phenomenon that occurs most often at sunrise or shortly after, that (with the proper radio equipment) resembles the sound of a massive flock of birds. It is thought to be caused by high-energy electrons that get caught in the Van Allen radiation belts of the Earth’s magnetosphere and fall to the Earth’s surface in the form of audible radio waves. Dawn choruses occur more frequently during magnetic storms.
This phenomenon also occurs during aurorae, when it is termed an auroral chorus.


Submarine communication, Communication within mines


Natural and man-made electromagnetic noise.

Wireless Frequency Range

The current US Frequency Allocation for Radio Spectrum runs from 3 kHz to 300 GHz.  In the case of the 92–95 GHz band, a small 100 MHz range has been reserved for space-borne radios, making this reserved range limited to a transmission rate of under a few gigabits per second.

For some reason perpetrators deleted the statement above from my post. 

The upcoming Wi-Fi standard IEEE 802.11ad will run on the 60 GHz (V band) spectrum with data transfer rates of up to 7 Gb/s. Uses of the millimeter wave bands include point- to-point communications, intersatellite links, and point-to-multipoint communications.

Because of shorter wavelengths, the band permits the use of smaller antennas than would be required for similar circumstances in the lower bands, to achieve the same high directivity and high gain…Furthermore, because one can place more voice channels or broadband information using a higher frequency to transmit the information, this spectrum could potentially be used as a replacement for or supplement to fiber optics.

Wireless high power transmission using microwaves is well proven. Experiments in the tens of kilowatts have been performed at Goldstone in California in 1975 and more recently (1997) at Grand Bassin on Reunion Island.These methods achieve distances on the order of a kilometer. Wireless_energy_transfer

Applications of Wireless Technology

Aplications of wireless technology include:Mobile phones, WIFI, Bluetooth, WLAN, Wireless data communications, Wirless energy transfer, Wireless sensor networks, Computer interface devices, Satellite technology. Other applications of wireless technology include weapons systems used to target individuals.


Mixed Frequency Infrasound / ELF weapons target people and animals

‘ELF Transmitters can be used as remote weapons against people and animals… The effects of Extremely Low Frequencies are said to include the alterations of brain function resulting from exposure to mixed frequencies of ELF radiation. One physiological effect which has been demonstrated is heart seizure on humans, dogs, and cats.

Another possibility is the alteration of the blood- brain barrier. This could allow neurotoxins in the blood to cross. As a result, an individual could develop severe neuropathological symptoms and either die or become seriously impaired neurologically.’ http://

Cancer-causing radio frequencies target human cells

‘Imposed weak low frequency fields (and radio frequency fields) that are many orders of magnitude weaker in the pericellular fluid (fluid between adjacent cells) than the membrane potential gradient (voltage across the membrane) can modulate the action of hormones, antibody ne.urotransmitters and cancer-promoting molecules at their cell surface receptor sites.’

ELF & memory loss

‘Exposure to ELF can cause loss of short/long term memory..

Harmful biological effects of Infrasound mixed with ELF

Effects ‘after 30-60 second “lock-on” include:-

ELF at 17 Hz & 70 Hz (mixed) are said to have ‘Psychoactive”, harmful biological effects’. – 10.80 Hz at high intensity may cause riotous ‘behavior in people’.
– 8.6-9.8 Hz may cause ‘tingling sensations and may be sleep inducing in people’.

– 6-7 Hz Ringing in ears, increased blood pulse, fatigue, tightening in the chest.
– Depression in some people. 20010214.html

But it appears that health of humans and animals is only at risk if ELFs are transmitted at high intensity.


The earth has its own magnetic resonance frequency pattern. The first documented observations of global electromagnetic resonance were made by Nikola Tesla at his Colorado Springs laboratory in 1899. Tesla discovered that the resonant frequency of the Earth was approximately 8 hertz (Hz)… In the 1950s, researchers confirmed that the resonant frequency of the Earth’s ionospheric cavity was in this range (later named the Schumann resonance)…Physicist Winfried Otto Schumann predicted the Schumann resonance mathematically in 1952. Schumann_resonances.

Picture opposite: This is a frequency-time spectrogram showing the Schumann resonances over a five-day period. Notice the difference in the nighttime intensities from night to night.

Accepted view on Schumann Resonance

The accepted view is that the Schumann resonance is due to the space between the surface of the Earth and the ionosphere. It acts as a resonant cavity fueled by energy from lightning strikes. Schumann resonances are the principal background in the electromagnetic spectrum, beginning at 3 Hz and extending to 60 Hz.’ See http:// Electromagnetic_spectrum. They appear as distinct peaks in infrasound around 7.83 (fundamental), 14.3, 20.8,‘ and in ELF 27.3 and 33.8 Hz.

Picture opposite: The Schumann resonances occurring over an eight-hour period can be clearly seen at approximately 7.8, 14, 20, 26, 33, 39, and 45 Hz. http:// system/earth-rhythms.html

Fluctuations in the Schumann resonance may be due to factors such as:

Lightning. There is an average rate of 50 lightning events per second globally. ‘However, occasionally there occur extremely large lightning flashes which produce distinctive signatures that stand out from the background signals. Called “Q-bursts”, they are produced by intense lightning strikes that transfer large amounts of charge from clouds to the ground, and often carry high peak current. Q- bursts can exceed the amplitude of the background signal level by a factor of 10 or more, and appear with intervals of ~10 s, which allows to consider them as isolated events and determine the source lightning location.’ http://

Full moon and new moon and tidal interaction.

– Earth rhythms identical to moon rhythms:

The most important slow rhythm is the daily rhythm sensed directly as change of light. Rhythms connected with the daily rhythm are called circadian (an example is pineal gland melatonin secretion). Some experiments in the absence of natural light have shown that the basic human “clock” is actually slightly longer than one day, and closer to one lunar day (24h 50min). The lunar day has a similar period (24h 50min).

– Strong influences on Earth’s geomagnetic field.

On a slower scale, a strong influence on the Earth is its geomagnetic field, which is influenced by the following periods: the Moon’s rotation (29.5 days); the Earth’s rotation (365.25 days); Sun spots (11 and 22 years); the nutation* cycle (18.6 years); the rotation of the planets (88 days to 247.7 years); and all the way out to the galaxy’s rotation cycle (250 million years). Very important rhythms are in the order of 1-2 hours, like hormone secretion, and dominant nostril exchange. In the range of human EEG, we have the Sun’s electromagnetic oscillation of 10Hz, while the Earth-ionosphere Schumann Resonance system is resonant at frequencies in the theta, alpha, beta1 and beta2 bands. Schumann%20-%20haarp.pdf

Human health linked to Schumann Infrasound / ELF via brain wave rhythms
Lewis B. Hainsworth of Western Australia first recognized the relationship of brain wave frequencies to naturally circulating rhythmic signals, known as Schumann’s Resonances…’ He ‘was among the first to suggest that human health is linked with geophysical parameters by way of the naturally occurring Schumann ELF (extremely low frequencies). His hypothesis identified naturally occurring features which determine the frequency spectrum of human brain-wave rhythms. He concluded that the frequencies of human brain-waves evolved in response to these signals. If the hypothesis is correct, conditions for evolutionary changes in human brainwave patterns have now been established.’ http:// %20haarp.pdf.

Picture above: *Earth’s ‘nutation cycle’ – precession of the equinoxes.

Infrasound & Schumann Resonance
According to Wikipedia ‘Infrasound is sound that is lower in frequency than 20 Hz (Hertz) or cycles per second, the “normal” limit of human hearing. Hearing becomes gradually less sensitive as frequency decreases, so for humans to perceive infrasound, the sound pressure must be sufficiently high. The ear is the primary organ for sensing infrasound, but at higher levels it is possible to feel infrasound vibrations in various parts of the body.’

Many contemporary texts refer to Schumann Resonances being Extremely Low Frequencies – ELF rather than a progression through infrasound and ELFs. But the brain’s frequencies almost all appear to arise below 20 Hz, which puts them outside the range of human hearing and within the infrasound range.

Controversial View of Source of Schumann Resonance & relationship to Gravity

Perpetraitors attempted to ‘reconstruct’ my copies of the source documents for this section, and their unfinished work was in their hidden ‘Shared’ file, when I discovered it.

The following is an extract from a much longer article at: http://, with my sub-headings and emphasis.page40image12176 page40image12336 page40image12976

What is the role of the earth’s polar regions in electromagnetic terms?

‘The traditional scientific community postulates that the Schumann Resonance is created in the area or “cavity” between the surface of the Earth and the Ionosphere. But how can a constant and steady rhythm or an electromagnetic wave of approximately 7.5 beats per second be logically created and maintained in a cavity that is under constant stress by lightning, tornadoes and hurricanes? A logical source for a constant and steady rhythm is a black hole on one side of this dimension and a white hole on the opposite side of that same dimension.

Black hole / white hole galaxy models

Multiple fundamental and harmonic tones or electromagnetic pulses in or near the black/white hole of a galaxy probably scatter molecules and matter in spiral patterns. The color black is a combination of all colors and no individual color can be visually observed. Likewise, a black/white hole at the center of a galaxy is a combination of fundamental and harmonic frequencies and no individual frequency can be detected.

Could galaxies have not only a central black/ white hole, but others orbiting it in resonance?

But what if a black/white hole were to have only single fundamental dominant frequency with related harmonic frequencies? Would the black/white hole with one dominant frequency and the proper phases and amplitudes attract and hold matter together in the space/time vacuum of the cosmos? Might a galaxy actually be composed of one multi-toned center black/white hole with countless single-tone black/white holes orbiting around the multi-toned center black/white hole in spiral patterns?

Could the earth be a kind of black/white hole orbiting at the Schumann Resonance?


Might our planet actually be a fundamental single-tone black/white hole? Does our planet’s black/white hole vibrate at approximately 7.5 Hertz with 144 phases and amplitudes? When toilets flush in Moscow and Sydney, are the clockwise and counterclockwise water spirals due to the different sequences of the phases and amplitudes (grids) of the fundamental 7.5 frequency and harmonically related frequencies in the northern and southern hemispheres of Earth?

Does Earth’s Resonant Frequency with specific phases and amplitudes attract, organize and embed molecules of the chemical elements that vibrate between 2,000 and 5,000 Hertz? Is the relationship of the Schumann Resonance at approximately 7.5 Hertz to the resonant frequencies of the chemical elements that vibrate between 2,000 and 5,000 Hertz the force of or related to the force of gravity on our planet?’ schuman.html

Almost all human brain function frequencies fall within the Infrasound Frequency range:

Brain Area

Bioelectric Resonance Frequency

Information Induced Through Modulation

Motor Control Cortex

10 HZ

Motor Impulse Co- ordination

Auditory Cortex

15 HZ

Sound which bypasses the ears

Visual Cortex

25 HZ

Images in the brain, bypassing the eyes

Somatosensory Cortex

09 HZ

Phantom Touch Sense

Thought Center

20 HZ

Imposed Subconscious Thoughts



Frequency range

Wavelength range







Gamma Ray*

3 EHz

300 EHz


100 nm

X Ray

30 PHz

3 EHz

100 nm

10 nm


750 THz

30 PHz

10 nm

400 nm


430 THz

750 THz

400 nm

700 nm


3 THz

430 THz

700 nm

100 um

Far Infrared or Terahertz radiaiton

Imaging, Communications, Incapacitating enemy equipment 3-30 THz


Wi-Fi standard IEEE 802.11ad will run on the 60 GHz V band spectrum.

– Treatment of diseases

Treatment of many diseases, mainly in Russia. 40-70 GHz, 7.5 – 4.3 mm.


Radio waves below this point

Terribly high frequency, Microwave, Far infrared or Terahertz

Communications, Incapacitating enemy equipment Terahertz imaging – a potential replacement for X- rays in some medical applications, ultrafast molecular dynamics, condensed-matter physics, terahertz time- domain spectroscopy, terahertz computing/ communications, sub-mm remote sensing, amateur radio Submillimeter waves travel by line-of-site.

300 GHz – 3 THz

Extremely High Frequency, Microwave

Millimeter waves travel by line of sight. 30 – 300 GHz Directed Energy Weapons – Active Denial System radiation beam. millimeter wave scanner – TSA scanner.

Radio Astronomy. High-frequency microwave radio relay, microwave remote sensing, amateur radio,

Submilimete r/ THF Microwave / Far Infrared

300 GHz

3 THz

100 um

1 mm

EHF Microwave

30 GHz

300 GHz

1 mm

1 cm

SHF Microwave

3 GHz

30 GHz

1 cm

10 cm

UHF Microwave**

300 MHz

3 GHz

10 cm



30 MHz

300 MHz


10 Mm


3 MHz

30 MHz

10 m

100 m


300 kHz

3 MHz

100 m

1 km


30 kHz

300 kHz

1 km

10 km

Ultrasound / sonar

20 kHz





3 kHz

30 kHz

10 km

100 km


300 Hz

3 kHz

100 km

1 Mm


30 Hz

300 Hz


10 Mm


3 Hz

30 Hz

10 Mm

100 Mm



20 Hz

100 Mm


Infrasound is sound that is lower in frequency than 20 Hz (Hertz) or cycles per second, the “normal” limit of human hearing. The study of such sound waves is sometimes referred to as infrasonics, covering sounds beneath 20 Hz down to 0.001 Hz.

This frequency range is utilized for monitoring earthquakes, charting rock and petroleum formations below the earth, and also in ballistocardiography and seismocardiography to study the mechanics of the heart.

Beta frequencies are about 12 Hertz.

12 Hz


Beta frequencies coincide with our most “awake” analytical thinking.

– Alpha frequencies are from 8-12 Hertz and are commonly associated with relaxed, meditative states.

8-12 Hz


Most people are in an alpha state during the short time immediately before they fall asleep and when the conscious nervous system switches over to the subconscious.

– Frequencies below 8 Hertz are considered theta waves.

Lower than 8 Hz


Said to be associated with creative and insightful thought

Schumann resonance – Earth’s pulse rate

7.8 Hz on average


Makes a person feel “good”

Can cause cancer, and can treat some cancers. Sterilizing foodstuffs, killing bacteria.

The microwave spectrum is defined as electromagnetic energy ranging from approximately 300 MHz to 1000 GHz in frequency. Most common applications are within the 1 to 40 GHz range. Microwaves can be used to transmit power over long distances, create a solar array to beam power to earth.The microwave spectrum is defined as electromagnetic energy ranging from approximately 300 MHz to 1000 GHz in frequency. Most common applications are within the 1 to 40 GHz range. Frequency_Spectrum.

As usual it has been difficult for me to bring this post into publication owing to strong resistance by the perpetraitor David, aided and abetted to varying degrees by members of his family and by members of his associate, Eliza-Beth’s family. Perpetraitors have been deleting or altering files from my computer, stealing files for this post and hiding them in a ‘recovered file’. Numerical and statistical images were being altered and substituted for accurate ones, blocking basic computer functions such as ‘search’, and deleting sections from my post. Every file I open automatically goes to a folder named “Shared’ which I did not create, and which appears to be empty if I open it. By accident I found it, and it contained every file I used. This may be happening to other TI’s as well.


This post is about:

  • Part I: Psychotronics – what it is and how it works.
  • Part II: Psychotronics used for torture.
  • Part III: Advanced technologies associated with psychotronics.

PART I: Psychotronics is a complicated subject, and not everyone agrees what it is about.  I would describe it as ‘manipulating brain activity to achieve physiological outcomes’. Picture above:  How perpetrators may see Targeted Individuals via psychotronics.  Source:

The main point about psychotronics is that it can be used remotely, and anonymously on innocent civilians for torture, mind control and sinister political purposes.  Criminal perpetrators can commit crimes against humanity without detection, as if they were invisible. They can in fact be detected, but only through use of similar technologies.

Just because these criminals are using invisible directed energy weapons and not  guns, and because they redefined information warfare as propaganda, we are supposed to think it is less than war and murder of the citizens. These are invisible weapons being used far more destructively than a simple bullet to the’

However psychotronics is widely used in health treatments, enabling people suffering from paralysis to speak and move, and enhancing sight for people with partial blindness or hearing problems.  When it comes to new technologies, psychotronics is just the tip of the iceberg.  This post looks at some of the implications of psychotronics, and what is now in the public domain about a range of formerly secret technologies.  Picture opposite: Cochlear implant.


Some people interpret psychotronics as meaning ‘synthetic telepathy’, or referring exclusively to weapons purposes. Here are three different interpretations of ‘psychotronics’:

–  Psychotronics as synthetic telepathy

‘Synthetic telepathy also known as techlepathy or psychotronics – is a term used to describe the process in brain-computer interfaces by which human thought (as electromagnetic radiation) is intercepted, processed by computer and a return signal generated that is perceptible by the human brain. (ref 1,2,3,4)’

1. – Army developing ‘synthetic telepathy’
2. articleshow/3596708.cms – US army developing synthetic telepathy
3. url= – Army Sinks Millions Into “Synthetic Telepathy” Research
4. – Tips and Tricks for Mind Control from the US Military

Source: at

–  Psychotronics as weapons development programmes

‘Development programs for microwave and radio frequency radiation weapons designed to influence the central nervous system’. Source: Marshall Thomas – Monarch II  -Victims.pdf

  • Psychotronics as a method of inflicting torture and mind control

There are two options for inflicting torture, gang-stalking or remote Directed Energy Weapons  – DEW.  Unless the TI lives nearby, gang-stalking isn’t an option, which is why Remote Neural Monitoring used to be a requirement – If you aim a precision electronic weapon at someone from a distance, you want to know where you hit them, and what effect that had on them.

If perpetrators wanted to carry out assassination, they would use lethal equipment.  The purpose of targeting individuals seems to be to force them into virtual slavery using electronic weapons and to brainwash them into obedience using mind control.  This would never be achieved over night, which is why an episode of psychosis followed by temporary incarceration in a mental institution were regular tools that perpetrators used in an attempt to create new mind controlled slaves or hostages.

But TIs have proved much more resilient than expected by perpetrators.  The only way to bludgeon human beings into permanent submission is by mafia tactics of gang-stalking – hit them on the head with a blunt instrument.  The close proximity of MKULTRA perpetraitors to their victims was what ensured the relative success of that era of abduction and torture of innocent citizens. The total condemnation of that era by the elected representatives of the USA should leave no one in any doubt of the illegality of such activities.

In his first book ‘The Matrix Deciphered’ – now freely available on his website at, this is what Robert Duncan has to say about his work experience and psychotronics:

My research interests have been neural networks, virtual reality, and EEG controlled robotics. Before graduate school I worked for the Department of Defense, Navy, NATO, and various intelligence agencies computer science projects… and worked on the highest level of military projects for the U.S., NATO, and U.K…
I apologize to the human race for any contribution to these 4th generation weapons that I may have worked on that are more horrific than the nuclear bomb and whose cover-up is more pervasive than the Manhattan Project. And because of the horrific acts of violence being committed on as many as two thousand Americans as far as my research has uncovered and many others in other countries, I understand the extreme risk to my own welfare that publishing this material will have.

In this post I quote a fair bit from ‘The Matrix Deciphered’, because it covers psychotronics in a lot of detail, and few authors do that.  Here’s what Robert Duncan says about psychotronics:

Coal miners used as slaves were hobbled by breaking of their ankles to keep them from running away and demonstrated in the movie,”Misery”. Brain hobbling through psychotronics is done today in an analogous fashion.

By using psychotronic generators to inject minute random currents into the targeted brain, a threat will exhibit schizophrenic thinking and can be thrown into a mental hospital where further silencing can occur without their consent. Neural scientists are closely watched and any who get to close to rediscovering the government’s mind control technology can be mentally hobbled to prevent further discovery.

Without visible political prisons and torture scars, the public will remain discredulous that it is being done.’

‘The tools of psychophysicists are called psychotronics…Mind control weapons are the holy grail of the ultimate weapon and has given birth to the world’s most notorious, sociopathic scientists which in turn have spawned a generation of the most intense human suffering for weapons testing efficacy the people of this planet have ever endured.’

Picture above: Saturn Devouring His Son, painting by Spanish artist Francisco Goya.

‘The Matrix Deciphered. This is a book written by Robert Duncan (The Saint). It is non-fiction and original research. Also see his vital new book PROJECT:SOUL CATCHER Vol 2 at’


My view is that RNM was once a discrete system, but as secret technologies advanced, parts of the system became obsolete, and by now the original system has been virtually superceded.

Originally RNM was the way perpetrators dealt with distance from TIs.  It was a technology that would work with satellite delivery.  Now perpetraitors can achieve the same results without RNM or satellites. But with the global take-up of wireless for TV, cell-phones and lap-tops, satellite is no longer normally required

So RNM is really a legacy concept.  But not all perpetrators have the latest technology, and someTIs may still be linked to older criminal track-and-target systems.  Upgraded versions of the technologies that underpinned RNM are still key to tracking and targeting TIs, but they rely  on wireless instead.

RNM was once a proprietary product, but by now, criminals all over the matrix appear to have access to variations on, or upgrades of the basic system.  See section on Brain-Computer Interface below for more recent developments.

Picture above:

Remote Neural Monitoring – RNM – uses a set of brain-wave reading technologies to find out what is going on in an indiividual’s mind and body.  RNM can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor…Operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves…Operatives can use this surreptitiously to put images into a surveillance subject’s brain while they are in REM sleep for Every thought, reaction, motor command, auditory event and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials.” The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain.


  • fMRI – Functional Magnetic Resonance Imaging:  

fMRI is the method used to map the brain. It can ‘identify regions linked to critical functions such as speaking, moving, sensing, or planning…It is common to combine fMRI signal acquisition with tracking of participants’ responses and reaction times. Physiological measures such heart rate, breathing, skin conductance (rate of sweating), and eye movements are sometimes captured simultaneously with fMRI. The method can also be combined with other brain-imaging techniques such as transcranial stimulation, direct cortical stimulation and, especially, EEG. Functional_magnetic_resonance_imaging.

Translating thought into language is linked to changes in blood flow in the brain. fMRI ‘uses the blood-oxygen-level-dependent (BOLD) contrast… This is a type of specialized brain and body scan used to map neural activity in the brain or spinal cord…by imaging the change in blood flow…related to energy use by brain cells…BOLD contrast depends on blood flow.  The point of monitoring blood flow is that it is used to decode thought word-patterns.

– MRI – Magnetic resonance imaging: also known as nuclear magnetic resonance imaging (NMRI), or magnetic resonance tomography (MRT), is a medical imaging technique used in radiology to visualize internal structures of the body in detail. MRI makes use of the property of nuclear magnetic resonance (NMR) to image nuclei of atoms inside the body,

– EEG – Electroencephalograph: records electrical activity along the scalp, and measures voltage fluctuations within the neurons of the brain.   It records different states of awareness – sleep, dreaming, dozing, awake, and alert. EEG techniques include monitoring evoked potentials , which show ‘spikes’ in response to a stimulus – visual, sound or touch. So perpetrators can tell if a TI is afraid, happy attracted to or repelled by something.

Picture below: Magnetic resonance spectrum.

– MEG – Magnetoencephalography: is another technique for mapping brain activity by recording magnetic fields produced by electrical currents occurring naturally in the brain, using very sensitive magnetometers.

Brain wave monitors have graduated from EEGs to magnetoencephalographs (MEGs) that correlate brain wave patterns via a remote crystalline computer whose software reads and translates spoken words and silent thought. “EEG cloning” can monitor the target’s electromagnetic field, decode it through computer software, then feed emotional patterns back to the target’s brain or to another brain. A 5- micromillimeter microchip placed in the optical nerve can draw neuroimpulses from the brain so as to “eavesdrop” on the implanted person and transfer his or her thoughts to a computer where they will be stored until they’re projected back into the brain to be re-experienced as hallucinations, voices from past conversations, etc. Perpetraitors can monitor brain waves via satellite, decode evoked 5-milliwatt potentials of the brain at 3.50Hz, and transmits them to a VHSIC (very high speed integrated circuit) computer monitor to set up forced “conversations.” modification-technology/

– ESR – Electron Spin Resonance: This facilitates detailed biochemical analysis of a subject, such as is required in research, using imaging techniques which can show corresponding frequencies via a spectrometer.  It also facilitates analysis of DNA and changes in DNA following external interventions. Apparently it can get a wireless analysis from the body’s brain waves.  This analysis would identify cancers, altered blood sugar levels, leaching of calcium etc.  A scientific explanation is at

‘This is the secret sauce that the conspiracy kills to keep secret. Notice that there are no ESR machines in hospitals. Why? Because it would become immediately obvious how easy it is to read body electricity from RADAR, i.e. brain waves at a distance. The basic concept is simple and very analogous to the way Magnetic Resonance Imaging works. It works on manipulating spin and gyro frequency of electrons.’

Picture above: ESR spectrometer.

– ECoG – Electrocorticography: measures the electrical activity of the brain taken from beneath the skull in a similar way to non-invasive electroencephalography,… but the electrodes are embedded in a thin plastic pad that is placed above the cortex.

  ECoG is a very promising intermediate BCI modality because it has higher spatial  resolution, better signal-to-noise ratio, wider frequency range, and less training requirements than scalp-recorded EEG…It is possible to use ECoG signals to discriminate the vowels and consonants embedded in spoken and in imagined words. The results shed light on the distinct mechanisms associated with production of vowels and consonants, and could provide the basis for brain-based communication using imagined speech.–computer_interface

Picture above: MRI equipment.

‘Based on EEG/MEG responses, words are readily distinguished from non-words, pictures, and as to length.’ 

MRI v fMRI? 

MRI (Magnetic Resonance Imaging) for brain imaging, in general, is used for view the structure of the brain.  It is especially useful for detecting small anatomical changes as a result of disease processes or trauma that cannot be resolved in a CT scanner.  It has  great research utility for correlating strucutural changes/differences with behavior.

 fMRI (functional MRI) is a recent development in MR technology that allows you to obtain a ‘functional’ image of the brain by measuring blood flow (blood oxygenation actually in certain cases).  This is a hot area because the hope is that you would eventually be able to take advantage of the high spatial resolution of MRI and the far superior temporal  resolution of fMRI…So the major difference is the MRI images structure and fMRI images function.

Brain Wave Monitoring: Why one size doesn’t fit all

Picture opposite fMRI – functional magnetic resonance imaging.

When an individual is identified as suitable for targeting it takes quite a long time for preparatory work to be done mapping the individual’s brain and body. Robert Duncan notes that there is a unique body resonance signature, heart beat signature, and brain wave print for every individual:

‘The key to influencing a neuron and the entire informational structure of the mind is in the timing of the pulses of electromagnetic signals. Using just EEG probes is generally not enough to determine the timing…It is only the informational coherence of the signal specific to each individual that matters.’


MRI mind reading scans ‘reveal secrets of human vision’

’In 2011 psychologists and computer scientists at Stanford, Ohio State University and the University of Illinois at Urbana–Champaign demonstrated that pictures shown to volunteers in MRI scanners – were sufficiently reflected via the scanners, to enable the researchers to tell what they were looking at, if they were using sophisticated software that interprets the signals coming from the scan.’

Source: Stanford Report, May 18, 2011 ‘Mind reading’ brain scans reveal secrets of human vision’ ...“Mind reading” scans show that, to our brains, a sparse line drawing of a street scene is almost as recognizable as a detailed color photograph.  Images courtesy of Fei-Fei Li.

In October 2011 the Economist reported on three recently published papers, the first on the process of dreaming, the second on reconstruction of a moving image of what an observer is looking at, and the third on how to tell what someone is thinking about.  All three papers are based on determining, by scanning the brain, what someone is actually thinking about.

Synthetic telepathy uses wireless         Picture below spectrogram of I-owe-you.

For a detailed review of synthetic telepathy see my previous post ‘Targeted Individuals: thinking Allowed’. Synthetic telepathy is about sound waves. The term sonar is a generic term for equipment used to generate and receive sound. The acoustic frequencies used in sonar systems vary from very low (infrasonic) to extremely high (ultrasonic).  This means that potentially the whole range of sound waves, infrasound, microwave and ultrasound, are capable of being used for silent sound and synthetic telepathy, although ultrasound may be the preferred method.  As all sound waves work on wireless, synthetic telepathy can work by connecting with your terrestrial  TV transmitter, cell-phone or computer, so satellite is not needed unless there is no wireless outlet at the TI’s home.

ECoGs discriminate vowels and consonants embedded in imagined words

‘In a $6.3 million Army initiative to invent devices for telepathic communication, Gerwin Schalk, underwritten in a $2.2 million grant, found that it is possible to use ECoG signals to discriminate the vowels and consonants embedded in spoken and in imagined words. The results shed light on the distinct mechanisms associated with production of vowels and consonants, and could provide the basis for brain-based communication using imagined speech.’*–computer_interface

‘Research is ongoing into military use of Brain-Computer interfaces and since the 1970s DARPA has been funding research on this topic. The current focus of research is user-to-user communication through analysis of neural signals. The project “Silent Talk” aims to detect and analyze the word-specific neural signals, using EEG, which occur before speech is vocalized, and to see if the patterns are generalizable.

In 2009, the world’s first personal EEG-based spelling system came to the market: intendiX. The system can work with passive, active, or new dry EEG electrodes. The first version used P300 activity to type on a keyboard-like matrix. Besides writing text, the patient can also use the system to trigger an alarm, let the computer speak the written text, print out or copy the text into an e-mail or to send commands

to external devices.’–computer_interface

One thing to be aware of: If you do not verbalise your thoughts they cannot hear what you are thinking.


‘A brain–computer interface (BCI), often called a mind-machine interface (MMI), or…a brain–machine interface (BMI), is a direct communication pathway between the brain and an external device.’–computer_interface.

Mind-machine communication no longer needs a wired connection between the TI’s brain and the perpetrators’ computers, because wireless can use a TI’s terrestrial TV, cell-phone or computer to link up to TIs, wherever they are.  This is referred to as ‘direct wireless neural interfaciing’. So images of people with electric probes stuck to their skulls via EEG caps are out of date.

‘Wireless Ionosphere Signal Bouncing: The Earth’s Ionosphere is spherical. This allows a phased array beam to be bounced off the ionosphere and focused on a point on the Earth. The total internal reflection only occurs at a certain angle from the source…’So these over the horizon Radar systems, which are mostly used for viewing and tracking people, have their radar signals bounced off of the Earth’s atmosphere in a donut like circle for the strongest energy areas due to the phenomena known as total internal reflection.’

According to Robert Duncan, writing in 2010: 

Not only are they conducting internal voice recognition using the neural feature set of premotor muscle movements and word meaning recall brain waves, they are…working on computer vision image recognition techniques from the decoded visual cortex…

This has incredible potential for mind/machine interfacing. By just visualizing characters being typed, a computer could recognize the characters, send them to a virtual keyboard to an internet browser and then project the resultant information page in their minds eye.’


If it were not for use of psychotronics for torture, there would be few Targeted Individuals.  Criminal perpetrators exploit ‘less-lethal ‘Directed Energy Weapons and psychotronic techniques to inflict pain and unpleasant sensations on victims however far away they may be, and they can do it anonymously.

TIs generally report receiving painful attacks from perpetraitors. See examples below: source:

TARGETED INDIVIDUALS REPORT EXPERIENCES OF…/Over-300-Satellite-and-Brain-Weapons-Assault-
 Iran/Neitherlands. Torture began 2001: I went to USA for 3 months, because my family lives there, I could not stay and had to go back to the Netherlands and that’s when I began to hear the harassers, they began talking and I could here them, making different parts of my body or even my internal organs ache, sometimes the pain was excruciating, and they would make me feel dizzy and make me here noises as if they were coming from the neighbors and as if the neighbors were complaining about me.After a few awful years of excruciation and torture in the Netherlands where I was completely alone, left with no friends at all and no job and no money, in 2005 I went back to my country of birth Iran, but the effect of the mind control devices seem to have no limitation and it does not matter where in the world you are, they continue to torture me…The main symptoms are:-
Pain in different parts of my body and sometimes internal organs, headache, tooth ache, not being able to communicate with people and want to be alone for ever, sleeplessness, electric shocks (specially when sleeping), hearing things that are not there, making people get angry at me for no reason at all.  Page 24-25
Spain. Torture began 1995: Although I have been living these agonies for fifteen years, only five years ago did I discover what all this was about. I am a victim of extreme torture and abuse using directed energy and neurological weapons. I am only thirty-five years old but my whole life has gone to rack and ruin since the fated day I took part  in a demonstration for women’s rights. After leaving the demo premises I was electronically attacked on the very evening I went back home, but at the time I did not have a clue of what it could be. To hear my story would be terrifying and bewildering to a public unaware of this type of weapons and crimes but these are all true facts.
More often than not, my physical pains are so intense that I cannot even walk. On a couple of occasions I had to crawl to move from one room to another in my own flat.
To alleviate my pains I often have to adopt a foetal position for hours and hours, even at night, which means I am regularly deprived of a normal sleep. Page 26
Germany. Torture began 2005: One day I noticed I felt unusual. I was sweating, I was boiling hot, nauseous, dizzy, my heart racing. It only lasted a short time, then I felt normal again. Yet soon the symptoms grew worse, new ones appeared, and the rest periods’ became rapidly shorter. I had stinging pains on my body and headaches pressured my skull…An engineer whom I ask for advice tells me of electronic weapons and of instruments, that were developed for psychiatry, which are used to “treat” (cure) people to free them from their addiction. He shows me letters of “targeted people”. The heading says: “torture and murder with energy weapons in the Federal German Republic”. The brutally tortured writer speaks about the worst violation of human rights in Europe since the Holocaust…
Someone is aiming at me, why ? I find red and also reddish-purple circles on my body, they are the targeted red burned points. To avoid directed radiation I move my bed, sleep on the floor in every conceivable corner of the house, on the balcony, in the woodshed, in the farmyard, on the haystack, even in the chicken coop…The radiation’s hit all around the walls of the house, gently at first increasing in force to the sound of a fire cracker. What are those devices ? They cause different body reactions : I become hot and almost instantly completely sweaty, I feel terribly sick, dizzy almost to fainting, I have the worst headaches ever, my intestines begin to rumble violently, I immediately get diarrhoea, the heated current attacks my body, giving me very bad muscle cramps and stabbing pains in my intestines, heart, head, arms, legs, genitals. A bestial torture ! And no one wants to believe it ? Pages 31-32

What TIs are talking about are Directed Energy Weapons – DEWs.


Electromagnetic (radiation) weapons are a type of directed energy weapons which use electromagnetic radiation to deliver heat, mechanical, or electrical energy to a target to cause various, sometimes very subtle, effects. They can be used against humans, electronic equipment, and military targets generally, depending on the technology.

Electromagnetic radiation weapons are a type of directed energy weapons which use electromagnetic radiation to deliver heat, mechanical, or electrical energy to a target to cause various, sometimes very subtle, effects. They can be used against humans, electronic equipment, and military targets generally, depending on the technology. ‘Now, there are electron “amnesia” beams and magnetophosphene guns that make you “see stars”; hand-held VLF (20-35KHz) infrasound generators that trigger nausea, diarrhea, and abdominal pain. Brilliant Eyes surveillance satellites are equipped with multispectral scanners, interferometers, visible infrared spin scan radiometers, cryocoolers, hydride sorption beds, brain maps, and neurophones to alter behavior subliminally. An electronic imaging satellite beam can lock onto a human target in real time and assault him or her with a laser.’ From an article by Elana Freeland, modification-technology/

‘The energy can come in various forms:

High-energy radio frequency weapons (HERF) or high-power radio frequency weapons (HPRF) use high intensity radio waves to disrupt electronics.

High and low power, Pulsed Microwave devices use low-frequency microwave radiation which can be made to closely mimic and interact with normal human brain waves having similar amplitudes and frequencies. The heart, lungs, and other vital organs are controlled by very low voltage electric signals from the human brain. It should be possible to disrupt, catastrophically, such signals— from a distance— using this technology. Taser-like motor effects are also possible. The purpose of the PEP (Pulsed Energy Projectile), the LIP (Laser Induced Plasma) weapon and the Active Denial System (ADS) is to induce pain, although the PEP has lethal capabilities.

Some bio-effects of electromagnetic (radiation) weapons include effects to the human central nervous system resulting in drowsiness, localized physical pain (e.g. headaches or joint pain), difficulty breathing, vertigo, incontinence, nausea, disorientation, or other systemic discomfort. Electromagnetic radiation weapons may cause cumulative damage to the human body. Electromagnetic weapons can affect the human nervous system and might lead to diseases of the nervous system such as Primary Lateral Sclerosis.

Millimeter-wave pulses can affect the epidermis (skin) and dermis, the thick sensitive layer of skin and connective tissue beneath the epidermis that contains blood, lymph vessels, sweat glands, and nerve endings, generating a burning sensation or actual burn from as far as 700 meters

Interference with breathing poses the most significant, potentially lethal results.

Light and repetitive visual signals can induce epileptic seizures. Vection and motion sickness can also occur…

Lasers: Lasers are often used for sighting, ranging and targeting for guns; but the laser beam is not the source of the weapon’s firepower. Laser weapons usually generate brief high-energy pulses. A one megajoule laser pulse delivers roughly the same energy as 200 grams of high explosive, and has the same basic effect on a target.

Masers: – Meaning focused microwaves: Microwave guns powerful enough to injure humans are possible:

Active Denial System is a millimeter wave source that heats the water in the target’s skin and thus causes incapacitating pain. It is being used by the U.S. Air Force Research Laboratory and Raytheon for riot-control duty. Though intended to cause severe pain while leaving no lasting damage, some concern has been voiced as to whether the system could cause irreversible damage to the eyes. There has yet to be testing for long-term side effects of exposure to the microwave beam. It can also destroy unshielded electronics:

Pulsed Energy Projectile

Pulsed Energy Projectile or PEP systems emit an infrared laser pulse which creates rapidly expanding plasma at the target. The resulting sound, shock and electromagnetic waves stun the target and cause pain and temporary paralysis. The weapon is under development and is intended as a non-lethal weapon in crowd control.

Sound in Sonic Weapons

Cavitation, which affects gas nuclei in human tissue, and heating can result from exposure to ultrasound and can damage tissue and organs. Studies have found that exposure to high intensity ultrasound at frequencies from 700 kHz to 3.6 MHz can cause lung and intestinal damage in mice. Heart rate patterns following vibroacoustic stimulation have resulted in serious arterial flutter and bradycardia. Researchers have concluded that generating pain through the auditory system using high intensity sound risked permanent hearing damage.’

A multi-organization research program ++ involved high intensity audible sound experiments on human subjects. Extra-aural (unrelated to hearing) bioeffects on various internal organs and the central nervous system included auditory shifts, vibrotactile sensitivity change, muscle contraction, cardiovascular function change, central nervous system effects, vestibular (inner ear) effects, and chest wall/lung tissue effects. Researchers found that low frequency sonar exposure could result in significant cavitations, hypothermia, and tissue shearing. Follow-on experiments were not recommended.

++ Naval Submarine Medical Research Laboratory (Groton, Connecticut), Navy Experimental Diving Unit (Panama City, Florida), SCC San Diego, Navy Medical Research and Development Command (Bethesda, Maryland), Underwater Sound Reference Detachment of Naval Undersea Warfare Center (Orlando, Florida), Applied Research Laboratories: University of Texas at Austin, Applied Physics Laboratory: University of Washington, Institute for Sensory Research: Syracuse University, Georgia Institute of Technology, Emory University, Boston University, The University of Vermont, Applied Physics Laboratory, Johns Hopkins University, Jet Propulsion Laboratory, University of Rochester, University of Minnesota, University of Illinois system, Loyola University, State University of New York at Buffalo, New York

‘The TECOM Technology Symposium in 1997 concluded on non-lethal weapons, “Determining the target effects on personnel is the greatest challenge to the testing community,” primarily because “the potential of injury and death severely limits human tests.”

Also, “directed energy weapons that target the central nervous system and cause neurophysiological disorders may violate the Certain Conventional Weapons Convention of 1980. Weapons that go beyond non-lethal intentions and cause “superfluous injury or unnecessary suffering” may also violate the Protocol I to the Geneva Conventions of 1977.”

See Annex to this post for recognition of psychotronics in national and international forums


 According to Wikipedia, the human brain contains a map of the body within the Motor cortex, ‘with different body parts, represented by partially overlapping areas, lined up along a fold called the central sulcus’.  ‘The motor cortex is a term that describes regions of the cerebral cortex involved in the planning, control, and execution of voluntary movements’.

If someone electronically stimulates a tiny part of the brain that relates to the foot, something happens to the foot.  It may create an involuntary movement, or it may register a feeling like touch, or it may translate into pain.

Picture above: developed along the lines of similar screens that can be found at and Robert Duncan’s book Project Soulcatcher’, Higher Orders Thinkers Publishing, 2010.

In his book ‘Project Soulcatcher’, Robert Duncan describes how operatives could point to different parts of the body on a screen monitor showing a stylized human being and inflict pain.  Pain is not targeted directly at parts of the body.  Instead pain sequences are played into a part of the brain – the cerebrum, and then the TI experiences this as an electronic torture attack in specified areas of the body, carried out by an IT technician. This is how the Remote Neural Monitoring method works.

Where RNM is not used, accuracy of body mapping rather than brain mapping becomes the focus.

‘By modeling a human body and head, one could calculate the resonant pattern in the human body, i.e. the standing wave formations and where the high and low energy absorption nodes would be. So a directed energy weapon could be made more effective by precision targeting of energy to specific organs for example.

If you wanted to give a target diabetes, you could destroy some of the pancreas or alter the sugar metabolism in the cells. If you wanted to increase the chance of lung or brain cancer, the weapon merely needs to add energy to those locations and overtime the probability will increase dramatically.’


How do perpetrators locate the TI without RNM?  They still have to do the full brain and body mapping exercise when they first ‘kidnap’ a TI, after which they can then locate TIs anywhere in world by wireless EEG or body resonances signatures – see


If perpetrators want to target body functions rather than body parts, they may still use RNM, but it is not necessary.  Using RNM, breathing systems can be targeted through lung function, blood oxygen take-up, congestion of airways or brain-oxygen take up.

But most of this can be achieved by either microwaves or sonic weaponry techniques such as cavitation. A TI can be made to feel a heart rate change by projecting a rhythmic microwave pulse that mimics heart beat onto the back of the chest, around the heart. If perpetrators wish to alter the actual heart rate, sonic weaponry may be required.

If a TI has a pacemaker or insulin disburser, perpetrators might choose to manipulate its effectiveness.  But recent developments indicate that shielding is being developed to protect clinical prostheses from manipulation.  See BBC report: ‘Antimagnet’ joins list of invisibility approaches’.  26 September 2011.


For a long time, psychotronics was like the tip of the iceberg, hinting at a range of secret technologies. There have been delays in releasing classified technologies to the public, but that is beginning to happen now. This section looks at advances in one or two of those technologies, one where ultrasound is being used to heal and regenerate bodies, the other an illegal application of laser eye surgery combined with eye implants, now being applied by perpetrators to some TIs without their consent, and in breach of state and national laws. An issue requiring clarification is how they are introduced into a TI’s body without TIs being aware if it.


Introduction. Ultrasound plays a key role in synthetic telepathy and some torture methods. But the other side of the coin on ultrasound is almost unbelievable, and much more sensitive. I have quoted a number of media reports about the benefits of ultrasound healing, which show that both military and health clinicians are already exploiting the incredible opportunities offered by low-level pulsed ultrasound.

Targeted Individuals with nonconsensual implants or surgery may have wondered why incisions leaves no wounds or scars. Check out the website below on incisionless surgery using ultrasound.

Ultrasound for incision-less surgeryYoav Medan: Ultrasound surgery — healing without cuts – FILMED OCT 2011 • POSTED DEC 2011 •

Imagine having a surgery with no knives involved. At TEDMED, Yoav Medan shares a technique that uses MRI to find trouble spots and focused ultrasound to treat such issues as brain lesions, uterine fibroids and several kinds of cancerous growths.


First the downside: High levels of ultrasound can be harmful to health

It is often the case that the same technologies can be used for help and harm, and this is so with RNM stimulation of nano-sized brain particles. Ultrasound is used widely in clinical applications, and yet occupational exposure to ultrasound in excess of 120 dB may lead to hearing loss.

Ultrasound treatments and/or exposure can create cavitation that can potentially “result in a syndrome involving manifestations of nausea, headache, tinnitus, pain, dizziness, and fatigue.”

Exposure in excess of 155 dB may produce heating effects that are harmful to the human body, and it has been calculated that exposures above 180 dB may lead to death. Part II, industrial and commercial applications (1991). Guidelines for the Safe Use of Ultrasound Part II – Industrial & Commercial Applications – Safety Code 24. Health Canada. ISBN 0-660-13741-0.,


Some evidence in the public domain:-

Ultrasound to treat war wounds, By Paul Rancor, Science reporter, BBC:

The US military plans a portable device that uses focused sound waves to treat troops bleeding internally from wounds sustained on the battlefield. Ultrasound can seal ruptured blood vessels deep within the body without the need for risky surgery.The lightweight device has to be designed so that soldiers can operate it with minimal training.The technology could potentially save lives on the battlefield.The US military plans a portable device that uses focused sound waves to

Ultrasound for trauma & first aid

Ultrasound is also increasingly being used in trauma and first aid cases, with emergency ultrasound becoming a staple of most EMT response teams. Furthermore, ultrasound is used in remote diagnosis cases where teleconsultation is required, such as scientific experiments in space or mobile sports team diagnosis:- DistanceDoc and MedRecorder: New Approach to Remote Ultrasound Imaging | Solutions | Epiphan Systems. Retrieved on 2011-11-13.

Ultrasound for bone and tooth regeneration

Ultrasound is sometimes used to increase bone formation, for instance post-surgical applications.

Low intensity pulsed ultrasound is used for therapeutic tooth and bone regeneration. Researchers have successfully used ultrasound to regenerate dental material:-

Toothsome research may hold key to repairing dental disasters – ExpressNews – University of Alberta. Retrieved on 2011-11-13.–study-deadly-puffer-fish.html#ixzz2Agn4kUwm

Shockwaves that can heal broken bones: New treatment avoids need for surgery on fractures that won’t join up.By ANNIE BOYDE.UPDATED: 10:05, 28 June 2011

New ultrasound treatment avoids need for surgery on fractures that won’t join up.

Ultrasound speeds up healing of broken bones, study shows

By DAILY MAIL REPORTER UPDATED: 09:47, 8 October 2010

Picture above: Glasgow surgeon using ultrasound to treat fractures

Please heal me quicker! Wilshere hooked up to machine in race to be fit for Euros

UPDATED: 13:01, 7 February 2012

The machine is an ultrasound bone healing system and is the only bone healing device proved to accelerate the healing of fractures.

New hope for millions tormented by tinnitus: Sound-wave machine relieves ringing in ears that drives victims to despair By ISLA WHITCROFT, 24 April 2012

The new treatment is a hand-held ultrasound device that is placed behind the ear for one minute. It’s designed to give temporary relief, and is currently being used in trials on 500 people. The gadget is held against the skull behind the ear, and then emits a high frequency signal.

HIFU ultrasound hope for prostate cancer

Sound wave treatment that zaps prostate tumours could double men’s chance of avoiding debilitating side effects. Daily Mail, April 16 2012

Soundwaves could help 95% of prostate cancer patients… without affecting sex life. Daily Mirror, April 16 2012

Ultrasound scanner could spell the end of the arm-squeezing cuff to take your blood pressure By DAILY MAIL REPORTER UPDATED: 11:13, 16 June 2011

The male Pill? Ultrasound hailed as new contraceptive for men


Breakthrough: Scientists claim sperm production could be halted by a blast of ultrasound waves. Ultrasound is being hailed as a cheap, reversible contraceptive for men, offering a potential new birth control option for couples throughout the world.

The fat zapper: Ultrasound waves to be used to help dieters shift that flab

By SOPHIE BORLAND UPDATED: 07:49, 7 March 2011

Ultrasound waves that destroy fat cells could be used to help dieters shift those final stubborn pounds.  British scientists have developed a new technique that uses the powerful blasts of energy to get rid of flab without harming the healthy tissue nearby.



This section is based on reports that can be accessed at:

In Russia ‘there is evidence for a whole new type of medicine in which DNA can be influenced and reprogrammed by words and frequencies — WITHOUT cutting out and replacing single genes…

According to their findings, our DNA is not only responsible for the construction of our body, but also serves as a means of data storage and communication…Russian linguists found that the genetic code — especially in the apparent “useless” 90% — follows the same rules as our human languages.They compared the rules of syntax (the way in which words are put together to form phrases and sentences), semantics (the study of meaning in language forms) and the basic rules of grammar.

Russian linguists ‘found that the alkalines of our DNA follow a regular ‘grammar’, and do have set rules just like our languages. Therefore, human languages did not appear by coincidence, but appear to be a reflection of the inherent patterns in our DNA…

The Russian biophysicist and molecular biologist Pjotr Garjajev and his colleagues also explored the vibrational behavior of DNA. In brief, the bottom line was: “Living chromosomes function just like a holographic computer, using endogenous DNA laser radiation.”  This means that they managed, for example, to modulate certain frequency patterns (sound) onto a laser-like ray, which then influenced the DNA frequency — and thus altered the genetic information itself.

Since the basic structures of DNA-alkaline pairs and language (as explained earlier) are similar, no DNA decoding is necessary. One can simply use words and sentences of the human language!

This, too, was experimentally proven. Living DNA substance (in living tissue, not in vitro) will always react to laser beams that have been modulated by language, and even to radio waves, if the proper frequencies (sound) are being used.This scientifically explains why affirmations, hypnosis and the like can have such strong effects on humans and their bodies. It is entirely normal and natural for our DNA to react to language…

Esoteric and spiritual teachers have known for ages that our body is programmable by language, words and thought. This has now been scientifically proven and explained.

Of course, the frequency has to be correct. And this is why not everyone is equally successful, or can perform feats of consciousness with the same degree of strength.

The Russian researchers work on a method that is not dependent on these factors but will ALWAYS work, provided one uses the correct frequency.’

So the big question is:-  What frequencies are we talking about?  The Russians are not saying, but the answer may very well be ULTRASOUND. 

See also


A break-away Russian group claims to have discovered a method of healing many diseases through the application of number sequences, using concentration alone.  Some patients in Moscow receiving treatment for diseases not only recovered but found that organs removed by surgery and missing teeth were regenerated.  Arcady Petrov “Light of eternity” part 1 (Vid 8’.34”) Regeneration, rejuvenation, immortality. and

Picture below: A starfish regrowing two of its legs.

The group’s exact method for replicating these results is not clear, and western proponents of the concentration method do not seem to achieve such dramatic results.  Could it be that there was a missing step in the method, that was not shared with western researchers – application of Low intensity pulsed ultrasound for example?


Based on my observation, some Tis targeted in tranches from about autumn 2011 onwards may have been given embedded eye cameras etc before they were aware they were being targeted.  And they may still not be aware they are being targeted.

My previous post on ‘TIs: Seeing through the perpetrators’ covered military use of implanted cameras either on an embedded lens or behind the retina.   Recently, I had my eyes checked, because perpetrators had been carrying out unauthorized interventions in my eyes. Fundus photographs clearly showed a dark line attached to the retina of one eye.  In the last month, further nonconsensual surgery appears to have been carried out in both my eyes.

I now think  perpetraitors supplemented a retinal camera with computer functions and an internal monitor which could display mental images.  This meant that perpetrators were able to see my internal mind pictures in clear definition in full colour, possibly in 3D. See

Perpetrators  commented on the ‘improvement’, which enabled them to get a better view of what I was thinking in mind pictures.  But the eye implants require maintenance. As detailed in my post on ‘Targeted Individuals: Seeing throught perpetraitors’, I woke up when perpetraitors were apparently trying to change a battery in what they referred to as the flaps in one of my eyes.  They dropped the battery, and I heard something fall with a ‘clink’ sound.

I looked up eye surgery on the internet, and was astonished to find that there is a type of laser eye surgery – LASIK – that involves putting flaps in a person’s eye:

‘LASIK or Laser-Assisted in Situ Keratomileusis, commonly referred to simply as laser eye surgery, is a type of refractive surgery for the correction of myopia, hyperopia, and astigmatism. LASIK is performed by an ophthalmologist using a laser.The laser is used to reshape the cornea in order to improve the clearness and sharpness of the image that is seen’.

Laser remodeling 

I suspect that perpetrators are implanting nano-cameras and other equipment into the eyes of TIs, and then making adjustments to the cornea, in order to correct any vision problems arising.

Picture above: LASIK surgery using the Star S4 IR™ excimer at US National Naval Medical Center Bethesda.

Picture opposite: The procedure involves creating a thin flap on the eye, folding it to enable remodeling of the tissue beneath with a laser and repositioning the flap.

One possible reason for TI eye surgery 

There may be many reasons, relating to military applications, but to focus on one for now, espionage seem likely.  Perpetrators could be taking photos of people that TIs meet, through the camera implanted in a TI’s eye, and then run face recognition checks to the TI’s memory database, using internal imaging screens, before checking their own databases.  See Robert Duncan’s comments on uses for military display glasses:

Robert Duncan, writing in 2010 said: ‘In business school I borrowed a pair of heads-up display glasses from DARPA for a wearable computer entrepreneurship project. The idea was to overlay a computer screen in each eye that would enhance reality with information that only you could see. For example, with a small camera embedded in the glasses face recognition could be done. A bio of the recognized face comes up. Or if you are giving a presentation, you could read off a teleprompter only you could see…At the time, I did not think that direct wireless neural interfacing techniques were so developed.’


Now in my country all this nonconsensual surgery would be classed as a criminal assault – or perhaps assault and battery.   But how could it happen in the first place without my knowing.   How could anyone carry out a surgical procedure on my eyes involving insertion of a prosthesis without my knowing, and without disrupting my normal life.  

In my last post I mentioned how an elderly relative over 95 years old recently became aware that she was being targeted, with distressing synthetic telepathy and induced visual images.  I told her what had happened to me, and she reminded me of a strange experience she had in December 2011.  

She had gone out shopping, with her shopping trolley, and suddenly found herself wandering in a strange part of town that she did not recognize.  She was lost, and could not find her way home.  A gentleman saw her and came to her aid.  He asked where she lived, and took her to her house.  But she was bewildered for some time afterwards, and she later fell ill with a chronic condition that has remained ever since. 

In the light of my experience, my elderly relative now thinks that perpetrators may have been responsible in some way for what happened to her.  But how could it happen?  Perhaps readers could hazard a guess as to what has been going on.  

Annex: Recognition of psychotronics in national and international forums
The term “psychotronic”, short for psycho-electronic ( ref 38) was used in the proposed Bill H.R. 2977 Space Preservation Act of 2001, which listed “psychotronic” as a list of possible spaceborne weapons which would be banned by the Act (ref 39)In 2001, President Vladimir V. Putin signed into law a bill making it illegal to employ “electromagnetic, infrasound … radiators” and other weapons of “psychotronic influence” with intent to cause harm…The European Parliament adopted a resolution on January 28, 1999[38], 28.1.99 Environment, security and foreign affairs A4-0005/99:23. Calls on the European Union to seek to have the new ‘non-lethal’ weapons technology and the development of new arms strategies also covered and regulated by international conventions …27. Calls for an international convention introducing a global ban on all developments and deployments of weapons which might enable any form of manipulation of human beings38. , of Psycho-Social Studies – Vol 2 (2) 2003 – On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology by Dr. Carole Smith

  1. – Space Preservation Act of 2001 at

While uploading this post, the perpetrator known as Philip, who is based in the UK, hacked into wordpress and prevented wordpress functions such as formatting, upload and save, from operating.


 This post is about:

–  Implications of synthetic telepathy.

 – What is meant by ‘synthetic telepathy’.

–  What Targeted Individuals say they    experience. 

–  Technical basis of synthetic telepathy.

‘Without freedom of thought there can be no such thing as wisdom & no such thing as publick liberty without freedom of speech, Benjamin Franklin, 1722.’



How would you feel if someone far away could listen not only to what you were saying, but also to what you were THINKING!!  And what if that person commented on what you were thinking, in a way that no one else could hear.

That is what synthetic telepathy is about.  It is an invasion of privacy, and a breach of human rights. It offers the opportunity for espionage, impersonation and theft of intellectual property. Most people, including those inside military and state organisations, may not know or really believe it is happening, but corporate criminals within security industries are involved in weaponising thought.  Many Targeted Individuals know all too well what weaponisation of thought is about, because it is with them every waking and sleeping moment of their lives.

‘Freedom of thought (also called the freedom of conscience or ideas) is the freedom of an individual to hold or consider a fact, viewpoint, or thought, independent of others’ viewpoints. It is different from and not to be confused with the concept of freedom of speech or expression.’

In the Universal Declaration of Human Rights (UDHR), which is legally binding on member states of the International Covenant on Civil and Political Rights, freedom of thought is listed under Article 18:

Everyone has the right to freedom of thought, conscience and religion; this right includes freedom to change his religion or belief, and freedom, either alone or in community with others and in public or private, to manifest his religion or belief in teaching, practice, worship and


Synthetic telepathy refers to a technology that can make you hear real people’s voices broadcast in your head, as if you were hearing a cell-phone conversation.  Perpetraitors can listen to your thoughts too, and you may not be aware they are doing so.  The implications of that are huge, and though the technology has been understood for some time, there is silence about it.  But now synthetic telepathy is becoming openly acknowledged as part of new weapons strategies in the US. Credibility gap?? Check these links:

  • Youtube video demonstrates synthetic telepathy 

All you need to do is point the energy device accurately at the electromagnetic field of the targeted individual, and they will hear the speech transmitted from the microphone.  The Youtube video at the link below demonstrates synthetic telepathy in action.!

  • Pentagon report investigated lasers that put voices in your head:

‘A recently unclassified report from the Pentagon from 1998 has revealed an investigation into using laser beams for a few intriguing potential methods of non-lethal torture. Some of the applications the report investigated include putting voices in people’s heads, using lasers to trigger uncontrolled neuron firing, and slowly heating the human body to a point of feverish confusion – all from hundreds of meters away’., 2008.

  • The Army’s Bold Plan to Turn Soldiers Into Telepaths:

‘The U.S. Army wants to allow soldiers to communicate just by thinking.

The new science of synthetic telepathy could soon make that happen’.,2011 and–field-years, 2012.

  • Army developing ‘synthetic telepathy’:

‘Similar technology marketed as a way to control video games by thought’…

Read This Thought: The U.S. Army is developing a technology known as synthetic telepathy that would allow someone to create email or voice mail and send it by thought alone. The concept is based on reading electrical activity in the brain using an electroencephalograph, or EEG.’, 2008.

  • Army budgeted $4 million to give soldiers telepathy

The United States Army Research Office budgeted $4 million in 2009 to researchers at the University of California, Irvine to develop EEG processing techniques to identify correlates of imagined speech and intended direction to enable soldiers on the battlefield to communicate via computer-mediated telepathy. Source:


From what I have read, it is possible to direct waves at a person’s electromagnetic field and, using a microphone, to speak directly to their inner hearing function, bypassing the ears.  It may be that several types of radio waves could be used for this including infrasound – considered by some to have higher health risks – microwaves, and ultrasound, which has its origins in sonar.  The sound waves may resonate via the bones in the skull, or it could be that the waves are converted to audible speech by the earth, acting as a transducer.  The picture below was removed by perpetrators and had to be replaced. Perhaps this was because it reflects their synthetic telepathy systems too closely.


[A transducer is a device that converts one form of energy to another. Energy types include (but are not limited to) electrical, mechanical, electromagnetic (including light), chemical, acoustic or thermal energy.]

Theoretically, synthetic telepathy could be transmitted via satellite in the same way that satellite TV, long distance cellphones and Global Positioning Satellite data are communicated.  I live in the UK and regularly receive invasive transmissions from different parts of the US, often via a virtual chat room.


Many TIs report hearing voices of perpetrators abusing them, impersonating others and trying to manipulate them:

Ti Experience & Source

I had very violent depreciating vile voices or thoughts that came from people in hollywood. Leonardo De Caprio was one of them. Ben Kingsly was another. I have also had Arnold Shwarzenneger.’ Germany, 09/08/2012.
On January 13, 2009 I started to hear a voice that was nearly as loud as normal spoken words. I think that it was about 3 PM. This continued for exactly 10 weeks. As soon as I woke up, within 1 second I heared a message spoken by an angry male voice with aggressive intonation. This was repeated every few seconds the whole day long, until I fell asleep…In the summer of 2011 I heard a voice say regularly “I have cancer.” Then the voice disappeared.
I hear now voices in my head, which threaten me personally: We will kill you, you are already a zombie! We will erase your memory; We will kill your relatives!; On the 22nd of September you do not go to the demonstration ! Think about your relatives ! We will remove your legs and hands and all other body organs! We will turn you into a zombie! These voices torment me at night and inhibit any sleep. They ask me questions and demand that these are answered.. They affect my free will and control me. Without any doubt my human dignity is permanently violated and as the Human Rights are guaranteed by the German Constitution not only national but international rules of law are violated. 128.

‘Attempted murder by arrhythmia brutal forced effort at maximum power.

Inductions to suicide through “Synthetic telepathy” Sound + + Stimulation (to nudge Stimoceiver) + generation of mental state (5 or 6 days of torture started 24 hr ON apparatus open (10-15 January 2005) + Possible psychoactive (17/70 hz)’





When I got targeted, I could hear people talking, quietly, in a different medium from normal hearing, more like what you would hear if you wore headphones.  If friends or family were talking to me, I didn’t notice the voices, but when I was alone, or on waking, I could hear them.  Generally they were talking to each other about me, consciously for me to hear, but sometimes they forgot and started talking to each other.  Very rarely did they address me directly.  That was nearly a year ago, and it continues. 

If you go out to a show, do sport, sing in a choir or watch something interesting on television, it is less likely that you will notice the voices. That may be why TIs report losing their job and becoming more isolated.  Perpetrators want your undivided attention, but they cannot get it unless you are alone or asleep. So if you want to avoid them, go outside, take part in things, and if possible, be around family and friends.

It may seem easy for perpetrators to talk via synthetic telepathy, but I found out they have to learn and practise before they reach a recognised standard, and they have to take an examination. I remember the first time that the perpetrator referred to by his peers as Phillip – the son of the perpetrator referred to as David, was learning how to use the psychotronic head set.  He wanted to talk to his colleagues, but he couldn’t.  They were shouting ‘Take the head-set off!”.  He was talking to me, not them, but didn’t realise it.


Communicating sounds from one person to another is possible over distances in the same way as with a cell phone, using microwave and lasers/masers.  Just as each person has a cell phone number, each person has their own unique electromagnetic field frequency, which can be identified by sound wave devices of many types, in a similar way to television, you have a transmitter and a receiver, and for long distances, satellite may be necessary.

Electrical activity can best be demonstrated by looking at the way an EEG machine works.  It shows brain wave activity and responses to sounds and other interventions.

But how are microwaves turned into words?  Apparently it is based on measuring blood flow to the brain for different sounds, reflected in electrical activity. A technique called functional magnetic resonance imaging to track blood flow in the brain has shown promise for identifying which words or ideas someone may be thinking about.

So first you dial a person’s frequency number, using a satellite tracking device like GPS.  Then you speak into a headset that translates your brain blood flow patterns into electronic impulses.

There is now a variety of brainwave-reading headsets on the market, mostly used for video gaming’.  Headset picture and quote from: and

The electrical impulses are pointed by a focused laser/maser beam towards someone’s electromagnetic field and they pick up the resonance via the bones in their skull and ear. The impulses are translated into words by the brain in the same way as for normal speech.  Satellite is used except where both people are located nearby. Satellite tracking implies that the person receiving the call has an implant that transmits a frequency signal, but this is not always required. 

HOW SYNTHETIC TELEPATHY WORKSMeasuring Blood flow to the brain  

A new brain scanner has been developed to help people who are completely paralysed speak by enabling them to spell words using their thoughts.

fMRI is usually used to track brain activity by measuring blood flow.’ 

In June 2012 the BBC reported that  ’A new brain scanner has been developed to help people who are completely paralysed speak by enabling them to spell words using their thoughts.

It uses functional magnetic resonance imaging (fMRI) to help patients choose between 27 characters – the alphabet and a blank space… fMRI is normally used to track brain activity by measuring blood flow… Each character produces a different pattern of blood flow in the brain, and the device interprets these patterns…The study appears in Current Biology journal of Cell Press.  Bettina Sorger of Maastricht University in The Netherlands, one of the researchers working on the current study, told the BBC:

“The work of Adrian Owen and colleagues led me to wonder whether it might even become possible to use fMRI, mental tasks, and appropriate experimental designs to freely encode thoughts, letter-by-letter, and therewith enable back-and-forth communication in the absence of motor behavior.”

The team writes in the paper that because the noninvasive device requires “only little effort and pre-training, it is immediately operational and possesses high potential for clinical applications.


On 1 February 2012 the BBC reported that ‘By studying patterns of blood flow related to particular images, Jack Gallant’s group at the University of California Berkeley showed in September that patterns can be used to guess images being thought of – recreating “movies in the mind”.

The team focused on an area of the brain called the superior temporal gyrus, or STG. This broad region is not just part of the hearing apparatus but one of the “higher-order” brain regions that help us make linguistic sense of the sounds we hear.  According to the BBC, researchers at University of California Berkeley: ‘have demonstrated a striking method to reconstruct words, based on the brain waves of patients thinking of those words. 


The technique reported in PLoS Biology relies on gathering electrical signals directly from patients’ brains. Based on signals from listening patients, a computer model was used to reconstruct the sounds of words that patients were thinking of. The method may in future help comatose and locked-in patients communicate.

Several approaches have in recent years suggested that scientists are closing in on methods to tap into our very thoughts; the current study achieved its result by implanting electrodes directly into a part of participants’ brains: The discovery of language – electrical brain wave patterns:  The technique hinges on plotting brain activity across a number of frequencies


Science decodes ‘internal voices’, BBC News


In a 2011 study, participants with electrodes in direct brain contact were able to move a cursor on a screen by simply thinking of vowel sounds..The team employed a computer model that helped map out which parts of the brain were firing at what rate, when different frequencies of of sound were played.

With the help of that model, when patients were presented with words to think about, the team was able to guess which word the participants had chosen. They were even able to reconstruct some of the words, turning the brain waves they saw back into sound on the basis of what the computer model suggested those waves,meant.


On 10 October 2011 the BBC reported on a headset, developed by Australian company Emotiv for the games industry, which used software connected to various electronic devices. The headset has been around for some time, but it is only now that companies such as IBM are beginning to harness the wealth of data that it can provide.  Using software developed in-house, researchers have linked the Emotiv to devices such as a model car, a light switch and a television.

Control signals come from two main sources; electroencephalography (EEG) measurements of brain activity, and readings of nerve impulses as they travel outwards to the muscles…At Brown Institute for Brain Science in the US, scientists are busy inserting chips right into the human brain. The technology, dubbed BrainGate, sends mental commands directly to a PC.

Subjects still have to be physically “plugged” into a computer via cables coming out of their heads, in a setup reminiscent of the film The Matrix. However, the team is now working on miniaturising the chips and making them wireless.


There are various modes of operation for synthetic telepathy including:


  • One person listening to another’s thoughts or speech;
  • Listening in a group to another’s thoughts and speech;
  • Talking and listening to one person;
  • Talking to one person and being listened to by many people;
  • A virtual chat room in which anyone could talk or listen, if they followed set procedures.


‘Synthetic telepathy requires techniques for scanning the specific brain emissions given off when the targeted victim subvocalises. The techniques must be able to detect the 15-Hz, 5-milliwatt auditory cortex brain emissions that are linked with sound that bypasses the ear; the ELF frequencies that are linked with the excitation potentials in the brain that are associated with subvocalised thought; and EEG signals, such as the P300 signals mentioned previously’*


Picture opposite: –


* at

‘Contrary to popular belief, synthetic telepathy does not provide the ability to read a person’s mind or memories. What it does provide is the ability to read the internal monologue (or anything that causes electrical change/radiation) and the trick is to get the subject to “voice” their memories and cross-reference that with their emotional state. In other words, basic psychological manipulation is a key factor and makes the technology not much more reliable than a standard lie-detector test. In practice, passive monitoring of the internal monologue over a long time period (months-years) is probably the most effective method of intelligence gathering. at


The device that makes the leap from  electronic brain impulses into words is said to be an electroencephalograph or EEG. In clinical contexts, EEG refers to the recording of the brain’s spontaneous electrical activity over a short period of time, usually 20–40 minutes, as recorded from multiple electrodes placed on the scalp. EEG used to be a first-line method for the diagnosis of tumours, stroke and other focal brain disorders, but this use has decreased with the advent of anatomical imaging techniques with high spatial resolution such as MRI and CT.


Picture below: The first human EEG recording obtained by Hans Berger in 1924. The upper tracing is EEG, and the lower is a 10 Hz timing signal.



According to Wikipedia:  ‘Derivatives of the EEG technique include ‘evoked potentials’, which involves averaging the EEG activity time-locked to the presentation of a stimulus of some sort (visual, somatosensory, or auditory)’‘Event-related potentials (ERPs) refer to averaged EEG responses that are time-locked to more complex processing of stimuli; this technique is used in cognitive science, cognitive psychology, and psychophysiological research‘.

What that means is that when perpetraitors inflict something on a TI,  they can see that event reflected in TI brain waves recorded on a machine. ‘Event-related potentials’ refers to the machine read-out of the TI’s reaction to being tortured, abused or harassed by perpetraitors.


In her acclaimed book ‘1996’*, author Gloria Naylor describes in her fictionalized memoir how she was exposed to synthetic telepathy. Perpetraitor technology at that time involved a small satellite dish with a lap-top computer connected to it.  Perpetrators typed in the words they wanted Gloria to hear, and that translated into ‘heard thought’ in her perception.  The method described is similar to a Text-to-Speech system. Perpetraitors removed the picture above several times in an attempt to prevent it being published.  

*Third World Press, Chicago, 2005.

Technology has advanced since 1996, and from what I have observed, there is now no need for typing text onto a computer in order to create synthetic telepathy. Perpetraitors speak directly into microphones, and speech recognition equipment is used with computer-brain interface instead.–computer_interface.


According to John J. McMurtry, in his article ‘*Remote Behavioral Influence Technology Evidence’:

‘A Defense Intelligence Agency review of Communist literature affirmed microwave sound and indicated voice transmission. The report states, “Sounds and possibly even words which appear to be originating intracranially (within the head) can be induced by signal modulation at very low average power densities.” Among microwave weapon implications are “great potential for development into a system for disorientating or disrupting the behavior patterns of military or diplomatic personnel.”+


‘An Army Mobility Equipment Research and Development Command report affirms microwave speech transmission… “One decoy and deception concept presently being considered is to remotely create noise in the heads of personnel by exposing them to low power, pulsed microwaves . . . By proper choice of pulse characteristics, intelligible speech may be created” quotes the report.’…


“Communicating Via the Microwave Auditory Effect.” is the title of a small business contract for the Department of Defense. Communication initial results are: “The feasibility of the concept has been established” using both low and high power systems…

Such a contract’s purpose is elaborated by the Air Force’s “New World Vistas” report: “It would also appear possible to create high fidelity speech in the human body, raising the possibility of covert suggestion and psychological direction . . . . If a pulse stream is used, it should be possible to create an internal acoustic field in the 5-15 kilohertz range, which is audible.

Thus it may be possible to ‘talk’ to selected adversaries in a fashion that would be most disturbing to them.” Robert Becker, whose eminence was enough to have been twice nominated for the Nobel Prize in biological electromagnetic fields research, is more explicit: “Such a device has obvious applications in covert operations designed to drive a target crazy with “voices” or deliver undetectable instructions to a programmed assassin.”++

Not all commentators are impressed with synthetic telepathy’s application on a battle field: 

Synthetic telepathy has limited uses as a communication system unless direct-contact headset systems are used and supported by encrypted channels. As such, standard radios are more effective in combat situations. Synthetic telepathy also requires the thought stream to be processed,+ which results in a minor lapse of attention, rather like a daydream, that could have deadly consequences on the battlefield.’ + My emphasis. at

1975 – A.W. Guy describes pulsed microwave effect

According to Richard Alan Miller, a researcher called A. W. Guy observed the effects of pulsed microwaves on humans. He noted that low levels of microwave energy could penetrate the skull and heat up the brain cells, causing expansion of brain tissue at cellular level. This caused a sound wave to pass from the skull to the ear, creating the microwave auditory effect.+++

*John J. McMurtrey, M. S.Copyright 2003, 23 Dec. 2003. Address: 903 N. Calvert St., Baltimore MD 21202. Email- Phone- 410-539-5140.

+ “Surveillance Technology, 1976: policy and implications, an analysis and compendium of materials: a staff report of the Subcommittee on Constitutional Rights of the Committee of the Judiciary. United States Senate, Ninety-fourth Congress, second session, p 1280, US GOV DOC Y 4.J 882:SU 7/6/976.

++ Becker RO and Selden G. The Body Electric: Electromagnetism and the Foundation of Life Quill William Morrow, New York, p 319 & 320, 1985.

+++SYNTHETIC TELEPATHY AND THE EARLY MIND WARS By Richard Alan Miller, copyright 2001, [Presented at the Consciousness Technologies Conference-July 19-21, 2001,on Saturday, July 20th, 2001, in Sisters, OR], updated 03/04/2003,


John J. McMurtrey also cites patents for ultrasound as the basis for synthetic telepathy:

‘Internal voice capability, without discernment by others nearby. is also evident in ultrasound-based technology. Lowrey Patent # 6052336 “Apparatus and method of broadcasting audible sound using ultrasonic sound as a carrier” clearly focuses on non- lethal weapon application against crowds or directed at an individual…’

‘Norris Patent # 5889870 “Acoustic heterodyne device and method”, directionally produces sound on interference (or heterodyning) of two ultrasound beams. The cancellation leaves the carried audible sound perceivable. The effect becomes apparent particularly within cavities such as the ear canal. An individual readily understands communication across a noisy crowed room without nearby discernment. Sound can also be produced from mid-air or as reflecting from any surface’.

Source: ‘*Remote Behavioral Influence Technology Evidence’:John J. McMurtrey, M. S.Copyright 2003, 23 Dec. 2003. Address: 903 N. Calvert St., Baltimore MD 21202. Email- Phone- 410-539-5140.


At the moment, Targeted Individuals do not have a lot of choice, because of the costs of shielding. There is no point in covering just our ears or head, because our whole body is enclosed in an electromagnetic field that operates like a TV satellite dish.  We need to be in a shielded environment.  Solutions do exist, and clearly where  government and state operations are involved, specialist security equipment must provide appropriate shielding.      


Picture opposite: Electromagnetic shielding cages inside a disassembled mobile phone.

Here are some examples of shielding materials:

  • Acoustic or silent glass, available as double glazing
  • Leaded glass
  • Silicon / plastic-based materials in walls, roofs and windows
  • Metal sheeting and wire such as used in microwave ovens.

These may not be easily affordable or practical for every-day life, but it is worth knowing they exist.  Jamming devices are another option, and they are more affordable, but they may have health risks, just as microwaves may do. Tall office blocks encased in green glass are likely to be sound-proof against synthetic eavesdropping, as are airports and modern deluxe airport hotels.

But what happens when the state representatives go home after their meetings?  What about all those intelligence, security and military personnel around the world who don’t discuss classified material, but know about it?  What if someone tries to listen to what they are thinking by pointing a microwave auditory device at them?  My theory is that they must have some kind of implanted devices, that operate radio wave jamming frequencies.  If so, that may work in the short-term, but it is not doing the health of such people any good.

This post was altered by perpetrators while I was preparing to publish it, and after it had been published. Only IT technicians have access permissions to do that, but family influence can be brought to bear. The main perpetrator involved was referred to by others as Philip, a trainee IT technician, the son of the perpetrator referred to by others as David. Based in England, on an overseas military base near where I live, Philip has been part of a group of new entrant perpetraitors participating in training in the US, with his father acting as mentor. As a trainee, he is still on probation, wherever his current location may be.

Posted 6 days ago by Martina Cable

Labels: Psychotronics Infrasound Targeted Individuals Electronic Harassment Mind Control Synthetic Telepathy Ultrasound Implants.



Like 0



Add a comment





I never expected to be writing this, but here goes:

As a result of recent posts, the perpetrator ‘David’ decided to take revenge by attacking me with a non standard electronic device which is illegal for use against civilians in some countries, including the US.  It uses Extremely Low Frequency which when directed at the vital organs can lead to death in various ways.

David usually targets the lower intestine, which results in immediate shaking, expansion and contraction of the bowel, creating liquefaction. Longer-term results are cancers of the intestine, but fast-acting intestinal cancers can be created in a short time as well.

What I did not realise was that he had just targeted a close member of my family for the third time, using the ELF device on this occasion.  He targeted that same family member three times altogether, creating other cancers each time.

Why? Because it appears he had come into contact with both of us, separately, at different times, through his former employment, before he left the country under a cloud, to work in the US. And I understand that other women he met through his work have also been targeted.

His reputation for attacking women in this way was so well known that those with whom he associated gave him some strong warnings in no uncertain terms. This left a permanent mark on his health. He has intestinal problems.

Why was he not removed from his present post?  He trusted in the protection of a group of people who, often unsung heroes and heroines, have done much to help poor people of the type he prefers to target – widows and orphans.  Ironically, it never occurred to him that my family also had connections to that same organisation.  Though no longer living, there are three men who if they could, would be taking a keen interest in the proceedings.

I was horrified to discover that he did not exclude women in his own family from targeting, even his children.  He also forced members of his family, who had access to electronic equipment, to target people on his behalf. Because of his disability, men with nobler motives and higher principles stopped short of removing him from his post.  But you have to realise, he will carry on indefinitely until he is stopped.  How many lives of women and children has he scarred or terminated?  Even he cannot remember.  The illegal electronic weapons that are his personal possessions must be destroyed, and he must be prevented from causing further harm to others.


Under normal perpetraitor arrangements, all activation of electronic equipment is carried out by IT technicians, who do not participate in synthetic telepathic communication with Targeted Individuals. It appears that David used to be an IT technician, but was removed from that work because of his known tendency to torture women and to depart from authorised activities.  However he can and does go into the IT technician section, presumably when no other IT technicians are there,  in order to carry on his unauthorised activities.

It appears that for routine targeting of individuals, the person engaging in synthetic telepathic communication with the individual sends a request for targeting to the IT technician, who activates it.  The person talking should not normally be the person who uses a pointer on the screen to target different parts of the TI’s body.  What is not clear is the extent to which separation of the two roles is complied with.  If David could get away with it, how may others could be doing the same thing?


Hi everyone, I heard on the grapevine that one or two people expressed concern when my daily log fell into disrepair. My heart goes out to all of you, and I know what you all go through. It is not so bad for me today, but recently I have been attacked a lot because of my blog. I have started naming and shaming some perpetraitors, because of what they are doing to so many other Targeted Individuals. 

When it is possible, I will do a summary of my log, but access to the Internet is difficult, owing to unauthorised interventions by perpetraitors.

As always, interaction with perpetraitors brings new understanding, and I have discovered a couple of points I want to share right now:


1.  Perpetraitors could always be detected in my environment because of the smell of cigarettes that hung around my living space. But why? I found out that when a TI goes to sleep or loses contact it is like a screen-saver. You can’t get in without a password. Perpetraitors have to go through a full boot-up, first inputting exact co-ordinates, then waiting while every screen and every piece of equipment connect to satellite. They use the frequency of synthetic cigarette smoke to tell them if they have logged on successfully, as the frequency is easy for their lasers or masers to detect. 

Yes I did say masers, by which I mean an intensely focused microwave beam that behaves like a laser. Using laser as a delivery mechanism involves a light-based system delivering sound-based targeted weapons – Extremely Low Frequency, microwave, infrasound and ultrasound – sound. If maser is used instead of laser, there are only sound-based frequencies so there is less frequency resistance in the process. 


2.  Now there is a new upgrade going on which may make some existing retinal lens-camera processes obsolete. I only got my upgrade on 27 September 2012, and have not found out everything about it. I am joining up the dots on this, but there are gaps. The upgrade is an implant inside the other eye – the one that doesn’t have a camera lens. If you have a camera lens prosthesis on one eye, the platform for the upgrade in the other eye will already be in place. Perpetraitors can now send the implant as a payload down the laser / maser via satellite from the safety of their own hideout. They can deliver to anywhere in the world. 

3.  What is the new upgrade for? It is for sending nano-scale video information that TIs will see via their camera-lens eye. This information may be pictures, virtual environments, word documents, graphics and numeric data. It can be stored and accessed like a download in the TI’s neural networks. In the same way, data obtained via the other eye with the camera lens in can be uploaded to perpetraitor computers. There are digital enhancements that go way beyond photoshop and desk top publishing in sophistication and they can combine audio visual media – the full works. 

But I should point out this does not give anyone the ability to create and amend documents in situ.  It means that all types of information, documentary, pictures, video and audio can be processed and transmitted using nano-biotech and electromagnetic technologies. The TI’s virtual environment can be altered using similar approaches. 

What is happening is not necessarily all bad for TIs, and there are simple things that can be done to mitigate risks to Targeted Individuals.

I am going to leave it there for now, and go into more detail in upcoming blogs. 

As always, this post was altered deliberately by perpetraitors while I was drafting it.  I have re-created the text, but it may be subject to further unauthorised amendment.  Perpetraitors involved refer to each other as David, Philip and Robert.



This post provides a brief update on what happened when a friend’s windscreen was hit by a stone-coloured object.  The windscreen was hit in the place where my eyes were focused. A couple of stories from the BBC and Fox News throw light on how this might have occurred.

Picture opposite: An LED attached to a prototype bullet shows its flightpath during a night-time field test –

Recap of the point from my post Seeing Through Perpetraitors

In my post ‘Seeing through perpetraitors I reported how after reading articles in the UK newspaper the Daily Mail, and adding to them information from my own experience, it occurred to me that a Targeted Individual with a camera embedded in one eye could be part of a weapons system, providing additional close up vision that could be transmitted to a drone/satellite and also to a third party, possibly but not necessarily a human with weapons capability.

Shortly afterwards I was sitting next to a friend who was driving, when something the colour of a stone seemed to come from slightly above eye level opposite us and hit the windscreen, leaving a mark in the glass.  The mark in the glass was where my eyes were focused when the windscreen got hit.



–   On 31 January 2012 the Royal United Services Institute think tank told the BBC ‘A self-guiding bullet that can steer itself towards its target is being developed for use by the US military’

–  On 28 June 2012 the BBC reported that ‘US Army scientists are developing a weapon which can fire a laser-guided lightning bolt at a target.

The Laser-Induced Plasma Channel (LIPC) is designed to hit targets that conduct electricity better than the air or ground that surrounds them. The weapon went through extensive testing in January…”This plasma is located along the path of the laser beam, so we can direct it wherever we want by moving a mirror.”

Fox News also stated that ‘a U.S. Army lab is testing how lasers can create an energized plasma channel in the air — an invisible pathway for electricity to follow. The laser-guided lightning weapon could precisely hit targets such as enemy tanks or unexploded roadside bombs, because such targets represent better conductors for electricity than the ground’.  Original military report at

Reading these news stories it seemed there was a possible explanation as to how the windscreen of my friend’s car might have been targeted.  Looking at the picture of the laser travelling horizontally and then going straight down to the target, the trajectory was exactly how it appeared when the ‘stone’ was delivered, except that the laser would have to be pointing at our windscreen.  Was the laser guided to a point on the windscreen where my eyes were focused?


As stated in the BBC article on 31 January, Light-emitting diodes are used to guide lasers in military scenarios.   LEDs already have numerous peaceful applications such as aviation lighting, automotive lighting,  advertising, general lighting, and traffic signals. LEDs have enabled new text, video displays, and sensors to be developed, while their high switching rates are also useful in advanced communications technology.

Infrared LEDs are also used in  remote control units of many commercial products including televisions, DVD players, and other domestic appliances.


If LEDS can be used to guide a lightning bullet, could there be some kind of LED in the eyes of some TIs?  Recently I was taking photographs of some ancient buildings.  When I stared through the camera lens I noticed a tiny green light reflecting back at me.  This only happened if I used the eye with an embedded camera lens.  Could the light be an LED?  And if so, what could I do about it?


Since then I have been wearing dark ‘pinhole’ glasses when travelling with friends, to avoid the risk of a recurrence of such incidents.  There have been no further problems so far.

If TIs are aware that they have a nano-camera and lens implanted in one eye, then temporarily obscuring vision in that eye may be a simple way to reduce the risks that criminals could be using their eyes for some harmful

In the course of preparing this post, criminal perpetrators living in the USA, but not in any way connected with its authorised elected representatives,  intervened in the functionality of WordPress, attempting to prevent its publication.  I live in Europe, and such activity is a breach of international law.

Targeted Individuals: The Myth of ‘Non-Lethal’ Research

Targeted Individuals: The Myth of ‘Non-Lethal’ Research

This post is about:
1.  Why the number of targeted individuals may be increasing.
2.  Why targeted individuals may be used in nonconsensual research.
3.  Why such research can never be regarded as valid.
Targeted Individuals consistently report that they are being used in research experiments. These innocent people are being tortured by criminals, and such torture is a crime against humanity. It is hard to think of a more distasteful subject than cruel nonconsensual experimentation on human beings, motivated by profiteering and greed.
In an earlier post on PerpeTraitor Profiles I mentioned a petition started in 2007, calling for a ban on electronic warfare on civilians.  To date the petition has received over 1500 over signatures, mainly from those describing themselves as TIs. An analysis of those signing the petition by year up to 13 June 2012 is produced in the graph below.
The graph shows a significant increase in those signing in 2011 and a likely similar results for 2012.  Why did the numbers signing increase significantly from 2011?  There could be several reasons including:
–  More TIs finding out about the petition.
–  Increasing internet interest in the plight of targeted individuals – last time I typed in “Targeted Individuals” into a search engine, it produced over 82 million references.
–  A significant increase in the number of TIs.
Some TIs wrote in their survey responses that they had been targeted for over ten or even twenty years.  From this it appears unlikely that TIs are ever released from remote electronic torture.  According to Marshall Thomas, TIs continue to live on, despite what perpetraitors do to them. He states that TI mortality rates are ‘surprisingly low’. In a compilation of evidence for the Presidents Advisory Committee on Human Radiation Experiments March 1995, Marshall Thomas stated:
‘One thing is very clear about the program these people are under…once it starts it never stops until they are dead.  Having said this, it should be noted that the mortality factor for TI’s is surprisingly low considering the ferocity of the torture program that they are under. Though it is difficult to be exact, only about one out of 20 or one out of 40 TI’s appear to die each year.*’
*Extracts from ‘Monarch-the-New-Phoenix-Program-II’, Page 34 onwards.
Also, nonconsensual research on TIs is a profitable criminal business, so it is in the interest of the perpetraitors to keep them alive.
Why could there be a sudden increase in the number of TIs?  If the criminals running the TI “business” operate the kind of technology used by large corporations that interact with the public – such as call centres, and back up of records in a data centre – there must be a limit to the capacity of the business to take on new TIs.  So if suddenly more individuals  are being targeted, it could be that perpetraitors recently had a major expansion of capacity. The increase in TI numbers from 2011 would suggest a capacity increase of at least 100%.
What is the implication of a capacity increase for Targeted Individuals?  From what I have seen in my interaction with perpetraitors, they now have a lot of upgraded spare capacity.  It looks as if far more Targeted Individuals than ever before are planned to be targeted.
I suspect that for the perpetraitors, expansion of capacity means larger profits. The more Targeted Individuals they have in their net, the more money they can get. The possible implications of this are that:
–  TIs are becoming a kind of ‘cash crop’ that can be farmed, with increasing reliance on automation and modern facilities.  The primary source of income is through offering TIs as subjects for nonconsensual research.
–  But there are other lucrative markets as well. According to Marshall Thomas, the illicit surveillance of TIs provides for a kind of reality TV which is sold to viewers within the criminal fraternity. See inset below:
‘The TI is both a very  expensive lab rat for the health effects of microwave  weapons, a training tool for a stalking army, a psychology experiment to perfect mind control, fodder for publishing scientific papers, and a commodity to be sold for entertainment purposes a la reality TV.
The incredible expense of gang stalking several thousand people on an enemies list is offset by selling the TI as a human guinea pig for weapons development programs, medical experiments, psychology experiments  (GSA contracts), and a “reality TV show” that might be sold on the internet, satellite TV, or satellite radio.
The audience is made up of several tiers of viewers and participants. The perspective of the drama that unfolds before the satellite TV and internet audience is the action as seen through the eyes of the TI with the targets “inner voice” typed out on the screen below.’  Extract from Page 33 of:
From 28 February to 1 March 2011, the Presidential Commission on Bioethics discussed non-consensual experiments on human beings. During this discussion, Targeted Individuals talked about their experience, and what their life was like because of the experimentation done on them. A few of the Targeted Individuals’ observations on human experimentation are included below:
Observations by Targeted Individuals
1. ‘Gang stalking and harassment was used to implement this nonconsensual biotechnology application that is being used on me… I now experience involuntary limb movements. I receive stingings. I get pains to my head, to my abdomen… I get burning on my lower legs and my ankles. I get ringing in my ears that’s pitch is like they pitch it.’
2. ‘Since 2008 and before, I have endured the following physical and psychological symptoms: extreme debilitating and chronic fatigue, weakness and dizziness for days and weeks at a time… I have an unusual dental filling of unknown origin on the side of one of my back upper right teeth and no memory of having this procedure done… And I have X-ray printouts and a signed affidavit from my dentist stating this.’
3. ‘I wanted to speak about bio-technology applications being utilized on my person. I have medical reports showing eye damage being done to my eyes, my eyes does not have a mirror image, I also have nano wiring inside my eyes, I have pictures of the actual implants from the eye doctor, once enlarging the nano implants, you will see a copy of the actual particles in my eyes. I have CAT scans in my eyes and PETs showing wiring, nano wiring in my head.’
4. ‘I am requesting that the Presidential Commission conduct an investigative hearing on non-consensual human experimentation and I do have credible evidence I’m submitting, 1158 videos and pictures that’s been occurring for the last two years. I’m also presenting 10 attachments which includes my 14-page public comment…’
5.‘For decades I have suffered the following due to these remote weapons and research…To date I have: Non age related cataracts, nodule on thyroid, nodule on adrenal gland and sudden hearing loss syndrome. These are all resulting from being subject to electromagnetic weapons.  Endless MRI’s, X-rays, test after test, specialist after specialist. Thousands of dollars in debt and the doctors cannot find a reason.  I have witnesses.’
If one of the main reasons for targeting individuals is to conduct research testing of electromagnetic microwave, laser and psychotronic weapons on various populations, presumably there are groups of people who have commissioned such research, and people who have provided funding – sometimes referred to as donors.
The groups with most interest in the outcome of this research would include the manufacturers and suppliers of these weapons. Is it likely that such groups are going to be concerned about testing weapons on human subjects?  They will, presumably, need evidence of exactly how their weapons affect human populations if they are to sell their products. But they can hardly be seen to commission nonconsensual research. So perpetraitors can profit by exploiting their slave population of targeted individuals as research guinea pigs.
One thing that perpetraitors and electronic weapons salesmen seem to have overlooked – you can’t pull the wool over the eyes of the international community when it comes to proper registration and conduct of weapons research, even if it is not ‘non-lethal’ i.e. not for battlefield use.  There are rigorous standards for all types of research, and evidence of compliance with them will be expected.
Non-consensual human experimentation is outlawed in all humane societies. The targeted individuals who had the courage to give their testimonies to the Presidential Commission on Bioethics had clearly not given their consent to being used as research subjects.  The US Office for Human Research Protections has set out guidance about the basics of obtaining informed consent:- Office for Human Research Protections (OHRP) §46.116 – Informed Consent Checklist – Basic and Additional Elements.  These require that human subjects are clearly informed, amongst other things, about:
– the purpose of the research
– what the research will cover
– how long the research will last
– what tests they will be involved in
– who do contact with questions
– personal confidentiality of records
– what the risks to health are, and
– what will happen if the subject wishes to withdraw before the end of the research project.
Any research testing on humans must comply with fairly stringent standards if the results are to be recognised as valid within the international community.  Human research subjects should not have been experimented on for the same thing before, otherwise their health and mental outlook might have been affected by previous research, and conclusions about current research results could be based on invalid data, and therefore flawed. This would mean that Targeted Individuals must not automatically be transferred from one research project to a subsequent one, although criminals might well do so for financial considerations.
Here are a few of requirements that perpetrators would need to have checked before selecting individuals for targeting:
– Complete health history of research subject and close family and known health risks.
– All medical drugs, vitamins and other remedies taken by the human subject.
– Any substance abuse including alcohol and nicotine.
– Any previous mental health issues.
– Any actions taken subsequently by human subjects to counteract torture and victimisation,
  including shielding against microwaves, diet to counter cancer, maintaining a healthy ph level,
  exercise etc.
– Any medical prostheses such as pacemakers and automatic insulin dispensers, that might be at
  risk of failure because of electronic interventions.
– Previous work in a nuclear power station, which might have exposed a subject to nuclear
– Previous work in an industry involving nuclear radiation products.
– Previous work involving toxic chemicals.
– Previous work in a cell phone factory.
– Previous involvement as a human research subject in similar research projects.
In commercial research for medical drugs, the clinical records and the full testing records for each human subject must be available for scrutiny by the relevant independent standards checking authorities.  The perpetraitors would have to maintain similar research records and make them available to independent scrutiny, if their ‘research projects’ were to be recognised by the international community.
We have heard what some targeted Individuals reported to the Presidential Commission on Bioethics about their experiences.  Does this sound like research to you?  Is it likely that a bunch of criminals went about drawing on TIs’ official health records and establishing their suitability before selecting them for targeting?  And are the so-called ‘research case papers’ going to be examined by an independent research body to ensure records can be relied on?  If not, then whatever research results the criminal perpetraitors eventually come up with must be open to question, making the whole research project unviable.
Anyone having doubts about this? Read the provisions of the Belmont Report – ‘Ethical Principles and Guidelines for the Protection of Human Subjects of Research’, summarised at the end of this post.
If you look at what Targeted Individuals have to say about their experiences, the only conclusion that can be drawn is that whatever is happening to them cannot be classified as research. It is also clearly nonconsensual, and therefore against the law.
Based on what appears to be the significant increase in the numbers of Targeted Individuals, major investment is being made in this criminal activity, perhaps for decades to come.  If that is being done in the mistaken view that results from targeting individuals can be used to prove that some kind of research has been conducted, then billions of dollars have already been wasted for no justifiable reason, and thousands of innocent human beings have been subject to appalling misery and torture.
In 1979, the Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research, was published in the United States to provide a succinct description of the mandate for review of research involving human research participants.  Regulation and guidelines concerning the use of human research participants in the U.S., and increasingly so in other countries, are based on the following fundamental elements excerpted from the Belmont Report:
Respect for Persons – In research, respect for persons demands that participants enter into a research program voluntarily and with good information about the research goals.
Beneficence – to do no harm and to “maximize possible benefits and minimize possible harms” to the individual research participant.  Investigators – or in this case perpetraitors – and their institutions have to plan to maximize benefits and minimize risks.
Informed consent – the informed consent process must allow human participants, as much as they are able, to be given opportunity to choose what will or will not happen to them.  The consent process must include information to the participant about the research; the participant must understand the information and volunteer rather then be coerced into participation.
Assessment of Risks and Benefits – Assessing risks and benefits means the researcher needs to assemble all data that explains why the research will obtain the benefits that are sought by the research project. The review committee of the researcher’s sponsoring institution, upon review of the collected data, can decide whether the risks to the subjects are justified.  Prospective participant can determine whether or not to participate.
Selection of Participants – The principle of justice—that benefits and risks of research be distributed fairly.  Researchers are not just if they only select disadvantages persons for risky research or only provide beneficial research to groups they favor.  Special classes of injustice arise when participants are drawn from vulnerable populations, like those institutionalized or incarcerated in prisons, racial minorities, economically disadvantaged or the very sick.
Sources of images for this post:
Slavery Frieze – Detail from ‘Slavery’ frieze
While drafting this post, unauthorised alterations were made to it, prior to publication.  There are those who do not want information to be made available publicly even though it is already in the public domain. They know that they have committed crimes against humanity, and they fear that the consequences of their actions will confront them.


Targeted Individuals: Seeing Through The Perpetraitors

This post is about information in the public domain, recently highlighted in the UK and   US media, about miniature lenses that can sit on an eyeball and communicate with other devices used for military purposes.  Based on reports of targeted individuals, similar  technology may already be in use to enable perpetrators to see through our eyes.

In my post on ‘Perpetraitor Profiles’ I mentioned that several Targeted Individuals recorded that perpetraitors were looking through one or both of their eyes, and that a technology called Remote Neural Monitoring could be used to do that.  But it wasn’t clear how that worked in practice.  

Since then I have done some more research and, based on the information and evidence quoted below, I have come up with a theory about how perpetrators could look through the eyes of Targeted Individuals.  So here is my argument for what technology is being used, and how it works.


In 1999 scientists proved that they could look through the eyes of a cat. BBC News Online Science Editor Dr David Whitehouse reported: ‘ A team of US scientists have wired a computer to a cat’s brain and created videos of what the animal was seeing… To their amazement they say they saw natural scenes with recognisable objects such as people’s faces. They had literally seen the world through cat’s eyes.’


In March 2008 Fox News reported that ‘U.S. military engineers are trying to design flying robots disguised as insects that could one day spy on enemies and conduct dangerous missions without risking lives… In essence, the research seeks to miniaturize the Unmanned Aerial Vehicle drones used in Iraq and Afghanistan for surveillance and reconnaissance.’,2933,456384,00.

In November 2008 Fox News also reported that ‘The next generation of drones, called Micro Aerial Vehicles, or MAVs, could be as tiny as bumblebees and capable of flying undetected into buildings, where they could photograph, record, and even attack insurgents and terrorists.’,2933,456384,00.html#ixzz22s2VQHy3

 In July 2009 the journalist Chares Q. Choi reported that: ‘Scientists can already control the flight of real moths using implanted devices.  The military and spy world no doubt would love tiny, live camera-wielding versions of Predator drones that could fly undetected into places where no human could ever go to snoop on the enemy.’


On 3 February 2012 the UK newspaper the Daily Mail reported:

‘DARPA – the Defense Advanced Research Projects Agency, thought of as the American military’s ‘mad scientist’ wing – has been funding research on ‘soldier mounted displays’ for some time, but previous versions have been bulky.

The lenses, made with nano-scale engineering processes,work as a hi-tech focusing device, which allows Innovega’s glasses to be considerably less bulky than previous devices.   The lenses themselves require no power, and thus can sit safely on the eyeball.’*  *My emphasis 

DARPA Says, ‘Innovega’s  iOptiks are contact lenses that enhance normal vision by allowing a wearer to view virtual and augmented reality images without the need for bulky apparatus. ‘

‘Instead of oversized virtual reality helmets, digital images are projected onto tiny full-color displays that are very near the eye.’

These novel contact lenses allow users to focus simultaneously on objects that are close up and far away.

On 14 April 2012, the Daily Mail ran an article under the headlines:


  • Lenses can let troops see through ‘eyes’ of drones flying above.
  • Can ‘layer’ target information over view of world.
  • Contact lenses don’t impede fighter’s vision.
  • Equivalent to a 240-inch 3D television from 10 feet’.

The Daily Mail reporter, Rob Waugh, stated that:

‘The Pentagon has placed an order with Innovega for lenses which focus 3D battlefield information from drones and satellites directly into people’s eyeballs*. The tiny ‘screens’ sit directly on users’ eyeballs and work with a pair of lightweight glasses with a built-in translucent screen. *My emphasis

On Sunday 29 July 2012, the Daily Mail also reported that:

‘The system is designed to improve the awareness of a military team as a whole, allowing soldiers to see through the eyes of their team mates in real-time’.* *My emphasis


According to John St Clair Akwei, a former surveillance specialist, Remote Neural Monitoring plays a key role in the targeting of individuals:

‘Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves.’ 

From an article in Nexus Magazine April/May 96 from MindControlForums Website

John St Clair Akwei does not say how Remote Neural Monitoring is achieved.  Dr John Hall, medical anesthesiologist, author of ‘A New Breed: Satellite Terrorism in America’ and a targeted individual, states that satellite technology was used at an early stage to connect electronically with computers. Drawing on his experience in the medical profession he notes that Electroencephalograms – EEGs – are routinely used in hospitals to monitor brain wave frequency activity, and that when connected with satellite technology, a similar type of equipment will enable a perpetraitor to hear what you hear and see what you are seeing in real-time.


For Remote Neural Monitoring to work, satellite technology must have some way to connect with the targeted individual. Perpetraitors can see Targeted Individuals all the time using lasers and satellite technology. But they can also look through the eyes of a Targeted Individual. So far I have not been able to find anything that describes how this is achieved, but I think that nano-scale cameras must play a part in enabling perpetraitors to see through the eyes of targeted individuals.

The reason I think this is that:

  • The Daily Mail reported how US military battlefield methods are being upgraded with drones or satellites connected to cameras that can ‘safely sit on the eyeball’ of soldiers, allowing them to ‘see through the eyes of their team mates’.
  • If  the US military weapons described in the Daily Mail articles could connect with drones and satellites without using nano-scale eye cameras they would have done so, as it can hardly be convenient  for soldiers to be fitted with a type of contact lense attached to a camera, however small.  If the US Military didn’t need nano-scale cameras I doubt if the US army would be doing what they are doing.
  • The US military weapons system has some similarities with the Remote Neural Monitoring, and it is quite possible that RMN would need nano-scale cameras in the same way.
  • TIs report that perpetraitors only look through one of their eyes.  This is consistent with having a camera installed in one eye.

My theory is that perpetraitors can see through both our eyes, using satellite technology to track into our brains and connect with a nano-scale camera attached to or implanted on the outside of the eye.


My impression was that perpetraitors could look through one of my eyes, although I now think they can see through both eyes, even if our eyes are closed.  Something else I noticed was that in the dark I could see the nano-scale camera implant equipment shining white inside both my eyes, although it appears that only one eye has a camera.

And in daylight I saw something in one of my eyes that looked like a black comma.  At first I thought it was a floater. Then I saw a clothing advert on a bill board, and noticed that the model had a comma drawn above her cheekbone. It looked like the one in my eye.   I searched the words ‘comma symbol’  on the Internet and found that there is a computer game called Naruto which has a huge following, and that the comma symbol is known as a Sharingan.

I also found out that you can buy contact lenses that give you a whole range of Sharingans. Could it be that some perpetraitor technician is into Naruto games and is making nano-scale eye camera implants that have a Sharingan on them?

Picture opposite: Sharingans.


After reading the articles referred to above in the Daily Mail, and adding to them the information I had from my own experience, I began to realise that a TI with a camera embedded in one eye could be part of a weapons system, providing additional close up vision that could be transmitted to a drone/satellite and also to a third party, possibly but not necessarily a human with weapons capability.

But the set up could work just as well if the Targeted Individual was the third party with weapons capability, if the camera in the TI’s eye could be used as a weapon to be fired at someone or somthing. Could some Targeted Individuals be used as human handgrenades? And could the system work just as well if the Targeted Individual had a separate camera in each eye? Or could the second camera be embedded centrally somewhere else in the TIs head?

I put a patch over my eye – the one with the Sharingan in it. I could see as well with the other eye as if I had two eyes. But for the first time, I noticed a blurred patch in the middle of the other eye. Could that blurred patch be an invisible camera sight? I had already seen the placement socket shining in the dark as if reflecting ultraviolet light. Did it make any difference whether my eyes were open or closed?

At this stage, I hope I am wrong in my conclusions. Last week, I was sitting next to a friend who was driving, when something the colour of a stone seemed to come from slightly above eye level opposite us and hit the windscreen, leaving a mark in the glass. The mark in the glass was where my eyes were focused when the windscreen got hit.


Are nearby people and living things at risk when individuals are targeted electronically?

When perpetraitors target me with microwaves, birds and squirrels do not visit the food table outside. When perpetraitors stop targeting me with microwaves, birds crowd the table, as if making up for lost time.

This made me wonder how wide a space is covered when perpetraitors target individuals.  Could it affect people nearby, for example sleeping in the next room.  Could it affect neighbours sleeping in a semi-detached house.  And what effect could it have on partners of targeted individuals.


Anti-histamine cream and tablets appear to be helpful, based on my experience.  Maintaining an alkaline ph balance may also assist – for example, drinking lemon juice or cider vinegar.  Perpetraitors  get agitated by this, so it may nullify the results of some laser or microwave research testing.  Microwaves leach calcium out of bones, with results similar to osteoporosis. Taking a sufficiently strong dose of calcium citrate with vitamin D3 on a regular basis can counter the effects of this. 1000 mg of calcium with D3 a day would be the lowest suggested level.  Seeking the advice of a pharmacist is advisable.

After using aluminium protective eye shades at night for a while I could see that I had a ‘sunglass mark’.  My face was more red – except where the eye shades covered my face. One side of my face was less red than the other, probably because I sleep  on that side. I am not sure if this was caused by directed laser or microwave energy.  Sleeping in sunglasses or eye shades covered with aluminium foil may be beneficial. Attaching a cloth container such as a sunglass case to eye shades, and filling it with aluminium is another option.

NOTE: This post may not read as I would wish, owing to multiple interventions made on my Blogspot post by perpetraitors while I was trying to draft it. In recent weeks I have been subject to an onslaught of interventions and attacks by perpetrators while drafting, and I sometimes find that publishing the post as work in progress is best. Criminal encroachment in the internet operations of another country is a breach of international law.

Targeted Individual: Perpetraitor Event Record


The table below is a record of perpetraitor interaction with the targeted individual – author of this blog.  It was started in view of the increasing difficulties facing the targeted individual in writing and publishing posts. At the time of writing, one laptop has been broken, and Broadband filters have had to be replaced.

I do not live in the United States.

This post was first published on 31 July 2012.



  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Multiple unauthorised intervention in my Apple MacBook Pro operations
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • While cleaning teeth, ‘frequency cleaning’ toothbrush got targeted and started to sound like an electric toothbrush for about 12 hours.


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Multiple unauthorised interventions in my Apple MacBook Pro operations
  • Targeting of lower intestinal cavity on low power


  • Psychotronics standard interface
  • Non-standard unauthorised targeting of lower intestinal cavity on full power 
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • Multiple unauthorised intervention in my Apple MacBook Pro operations


  • My iPhoto application containing about 5,000 original photographs wiped twice, but I had a back-up
  • Psychotronics standard interface
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • Multiple unauthorised interventions in my Apple MacBook Pro operations.


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • Unauthorised interventions in my Apple MacBook Pro operations, including alteration of this record, both off-line before it was published, and systematically freezing some WordPress functions on-line while it  was being published.
  • Alteration of the colour settings on the photographs in my iPhoto library.


  • Psychotronics standard interface.
  • Unauthorised interventions in my Apple MacBook Pro operations including attempted block on access to Blogspot and WordPress, which were reported to Apple Computers.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices
  • Unauthorised interventions in my Apple MacBook Pro operations affecting the colour settings of my photographs in iPhoto.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto and other applications.
  • Block on  internet access for two hours necessitating assistance from internet service provider.
  • Unauthorised intervention in Blogspot while drafting my blog.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto and other applications.
  • Block on internet access to Blogspot, reported to Apple Computers.
  • Unauthorised intervention in Blogspot while drafting my blog.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices, including, during shift 24.00 – 08.00 BST 4-5/7/12/, microwave heating 15 minutes – the relevant US research time allowance.
  • Block on  internet access to Blogspot, reported to Apple Computers.
  • Unauthorised intervention in Blogspot while drafting my blog.
  • Sleep deprivation.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • During shift 24.00 – 08.00 BST 5-6/7/12, non standard exposure to frequency and other devices including targeting of heart and attempts at ‘waterboard’ asphyxiation  experience, by contracting throat area and expanding internal nasal tissue to reduce breathing space.
  • My perception was that the targeting perpetraitor had been taking alcohol or a mood-changing substance.
  • During shift 24.00 – 08.00 BST 5-6/7/12, non standard targeting by exposure to waves, starting at 04.05 BST.  Time did not exceed the fifteen minutes research allowance as targeting unit lost power, because the headset was vacated and left on. Both perptraitors were absent from the unit during that time.  The vacated headset appeared to trigger the attention of others, who logged on to a virtual environment, not physically located at the same installation, to establish why the headset was left on.
  • Sleep deprivation.


  • Sleep deprivation.
  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised intervention in Blogspot while drafting my blog, reported to Apple Computers.
  • Sense of smell targeted.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Block on internet access to mail, reported to Apple Computers.
  • Sense of smell targeted.
  • Sleep deprivation.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.
  • Digestive system ph targeted.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.
  • Digestive system ph targeted.
  • Sleep deprivation.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.
  • Blocking internet access to Blogspot, reported to Apple Computers.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Blocking internet access to Blogspot, reported to Apple Computers.
  • Sleep deprivation.


  •  Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Blocking internet access to Blogspot and WordPress, reported to Apple Computers.
  • Sleep deprivation.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions on WordPress blog.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.


  • Psychotronics standard interface.
  • Exposed to infrared frequency for over 40 minutes.
  • RMN stimultion of cerebral cortex to induce symptoms of dehydration, toxification and breathing difficulties.
  • Interference with eye focus, laser targeting of eye
  • Sleep deprivation
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.


  • Psychotronics standard interface.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.
  • Blocking internet access to Blogspot, reported to Apple Computers.
  • Sleep deprivation.


  • Psychotronics standard interface.
  • Unauthorised intervention blocking internet access.


  • Psychotronics standard interface.
  • Unauthorised intervention blocking internet access.
  • RMN stimulation of cerebral cortex to induce symptoms of breathing difficulties.
  • Short-term memory manipulation.


  • Psychotronics intermittent signal.
  • Breathing difficulties from synthetic noxious chemical frequency applied to living space.
  • Short-term memory manipulation.


  • Psychotronics intermittent signal.
  • Force field created in attempt to break perceived jamming of signal. Side effects.
  • Unauthorised blocking of several Apple computer applications.
  • Breathing difficulties from synthetic noxious chemical frequency applied to living space.


  • Psychotronics intermittent signal. Tests to establish cause and extent of signal disfunction including visual imaging, audio reception, subject intervention, subject response.


  • Psychotronics intermittent signal.
  • Reduced exposure to frequency devices.
  • Unauthorised blocking of several Apple computer applications.
  • Breathing difficulties from synthetic noxious chemical frequencies.
  • RNM used to produce synthetic acid within thyroid and digestive tract, to alter ph level and linked to fast acting cancers.


  • Psychotronics intermittent signal.
  • Reduced exposure to frequency devices.
  • Interference with natural eye focus function.
  • Unauthorised blocking of access to WordPress blog, reported to Apple computers.


  • Psychotronics intermittent signal
  • RNM used to produce breathing difficulties for over 30 minutes from 21.34-22.10 BST.
  • RNM used to produce synthetic heart beat anomalies
  • RNM used to produce synthetic acid within thyroid and digestive tract, to alter ph level, linked to fast acting cancers.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • RNM used to produce synthetic heart beat anomalies
  • Unauthorised blocking of several Apple computer applications.
  • Malicious damage to files in iPhoto library.
  • Breathing difficulties from synthetic noxious chemical frequencies.
  • RNM used to produce synthetic acid within digestive tract, to alter ph level, linked to fast acting cancers.


  • Psychotronics reduced interface.
  • Reduced exposure to frequency devices.

Targeted individual was out of doors or travelling for over 12 hours.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised blocking of access to Blogspot and WordPress, reported to Apple computers.
  • Malicious damage to files in iPhoto library.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Malicious alteration of family photographs in Apple computer IPhoto Library.
  • Creation of illict shared areas on Apple computer Finder in names of Bert, bthub3 and kat-pc.  Reported to Apple computers.
  • Attempt to wipe short-term memory to prevent reporting.
  • RNM targeting of lymph glands and thorax, linked to  fast acting cancers.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised blocking of access to Blogspot and WordPress, reported to Apple computers and Google.  Access enabled.
  • Targeting eyes.  Note: This used to be included in ‘Standard Exposure’, but in future will be specified.
  • Several events of exposure to heat either by microwaves or infrared radiation.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Targeting eyes.
  • Several events of exposure to heat either by microwaves or infrared radiation.
  • Incapacitating breathing difficulties from synthetic noxious chemical frequencies.
  • Unauthorised removal of copies of documents on my Apple computer, including this one.
  • Re-creating password-protected shared area ‘bthub3’ on my Apple computer.


  • Psychotronics standard interface.
  • Exposure to heat either by microwaves or infrared radiation.
  • Unauthorised changes to photographs of people.
  • Intermittent attempts to block internet access throughout a 6-hour period from 06.10 a.m.- 12.10 p.m BST.


  • Recreation of illicit shared area on Apple computer Finder in name of bthub3.
  • Exposure to heat either by microwaves or infrared radiation for over one hour.
  • Exposure to other microwave technology with greater tissue-depth of impact.
  • Targeting eyes.
  • Re-creating unauthorised password-protected shared area ‘bthub3’ on my Apple computer.


  • Psychotronics standard interface.
  • Reduced exposure to standard frequency devices.
  • Exposure to microwave technology with greater tissue-depth of impact.
  • Breathing difficulties.
  • Illicit manipulation of computer data.


  • Psychotronics standard interface.
  • Exposure to heat either by microwaves or infrared radiation.
  • Illicit manipulation of computer data.


  • Psychotronics standard interface
  • Reduced exposure to standard frequency devices.


  • Psychotronics standard interface.
  • Reduced exposure to standard frequency devices.
  • Subject of training for perpetraitors on synthetic telepathy – possibly exam conditions.
  • Illicit manipulation of computer data.


  • Psychotronics standard interface.
  • Exposure to electromagnetic force field.
  • Focused microwave targeting of head.
  • ELF targeting of intestine using non-standard equipment at 18.20 BST.
  • Exposure of face to heat either by microwaves or infrared radiation.
  • Microwave targeting of body.
  • Illicit manipulation of computer data and reconstruction of illicit shared area.


  • Psychotronics standard interface.
  • Standard Exposure to frequency devices.
  • ELF targeting of intestine using non-standard equipment at 03.30 a.m. BST – halted by Targeted Individual activity.
  • Interference with Apple computer operations and Pages computer files.


While updating this blog on 11 August 2012, I observed that unauthorised alterations were made after I saved the update, requiring further amendment.  I check the accuracy of this record, but cannot guarantee that what is recorded at a specific point in time is what I intended the record to state.  My gratitude goes to WordPress, for maintaining the best security they can under difficult circumstances.