Monthly Archives: July 2012

Targeted Individual: Perpetraitor Event Record

TARGETED INDIVIDUAL: PERPETRAITOR EVENT RECORD

The table below is a record of perpetraitor interaction with the targeted individual – author of this blog.  It was started in view of the increasing difficulties facing the targeted individual in writing and publishing posts. At the time of writing, one laptop has been broken, and Broadband filters have had to be replaced.

I do not live in the United States.

This post was first published on 31 July 2012.

DATE / EVENT

23-07-2012

  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power

24-07-2012

  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power

25-07-2012

  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system

26-07-2012

  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Multiple unauthorised intervention in my Apple MacBook Pro operations
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • While cleaning teeth, ‘frequency cleaning’ toothbrush got targeted and started to sound like an electric toothbrush for about 12 hours.

27-07-2012

  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power

28-07-2012

  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Multiple unauthorised interventions in my Apple MacBook Pro operations
  • Targeting of lower intestinal cavity on low power

29-07-2012

  • Psychotronics standard interface
  • Non-standard unauthorised targeting of lower intestinal cavity on full power 
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • Multiple unauthorised intervention in my Apple MacBook Pro operations

30-07-2012

  • My iPhoto application containing about 5,000 original photographs wiped twice, but I had a back-up
  • Psychotronics standard interface
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • Multiple unauthorised interventions in my Apple MacBook Pro operations.

31-07-2012

  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • Unauthorised interventions in my Apple MacBook Pro operations, including alteration of this record, both off-line before it was published, and systematically freezing some WordPress functions on-line while it  was being published.
  • Alteration of the colour settings on the photographs in my iPhoto library.

01-08-2012

  • Psychotronics standard interface.
  • Unauthorised interventions in my Apple MacBook Pro operations including attempted block on access to Blogspot and WordPress, which were reported to Apple Computers.

02-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices
  • Unauthorised interventions in my Apple MacBook Pro operations affecting the colour settings of my photographs in iPhoto.

03-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto and other applications.
  • Block on  internet access for two hours necessitating assistance from internet service provider.
  • Unauthorised intervention in Blogspot while drafting my blog.

04-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto and other applications.
  • Block on internet access to Blogspot, reported to Apple Computers.
  • Unauthorised intervention in Blogspot while drafting my blog.

05-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices, including, during shift 24.00 – 08.00 BST 4-5/7/12/, microwave heating 15 minutes – the relevant US research time allowance.
  • Block on  internet access to Blogspot, reported to Apple Computers.
  • Unauthorised intervention in Blogspot while drafting my blog.
  • Sleep deprivation.

06-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • During shift 24.00 – 08.00 BST 5-6/7/12, non standard exposure to frequency and other devices including targeting of heart and attempts at ‘waterboard’ asphyxiation  experience, by contracting throat area and expanding internal nasal tissue to reduce breathing space.
  • My perception was that the targeting perpetraitor had been taking alcohol or a mood-changing substance.
  • During shift 24.00 – 08.00 BST 5-6/7/12, non standard targeting by exposure to waves, starting at 04.05 BST.  Time did not exceed the fifteen minutes research allowance as targeting unit lost power, because the headset was vacated and left on. Both perptraitors were absent from the unit during that time.  The vacated headset appeared to trigger the attention of others, who logged on to a virtual environment, not physically located at the same installation, to establish why the headset was left on.
  • Sleep deprivation.

07-08-2012

  • Sleep deprivation.
  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised intervention in Blogspot while drafting my blog, reported to Apple Computers.
  • Sense of smell targeted.

08-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Block on internet access to mail, reported to Apple Computers.
  • Sense of smell targeted.
  • Sleep deprivation.

09-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.
  • Digestive system ph targeted.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.

10-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.
  • Digestive system ph targeted.
  • Sleep deprivation.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.
  • Blocking internet access to Blogspot, reported to Apple Computers.

14-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Blocking internet access to Blogspot, reported to Apple Computers.
  • Sleep deprivation.

15-08-2012

  •  Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Blocking internet access to Blogspot and WordPress, reported to Apple Computers.
  • Sleep deprivation.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.

16-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions on WordPress blog.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.

17-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.

18-08-2012

  • Psychotronics standard interface.
  • Exposed to infrared frequency for over 40 minutes.
  • RMN stimultion of cerebral cortex to induce symptoms of dehydration, toxification and breathing difficulties.
  • Interference with eye focus, laser targeting of eye
  • Sleep deprivation
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.

19-08-2012

  • Psychotronics standard interface.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.
  • Blocking internet access to Blogspot, reported to Apple Computers.
  • Sleep deprivation.

20-08-2012

  • Psychotronics standard interface.
  • Unauthorised intervention blocking internet access.

21-08-2012

  • Psychotronics standard interface.
  • Unauthorised intervention blocking internet access.
  • RMN stimulation of cerebral cortex to induce symptoms of breathing difficulties.
  • Short-term memory manipulation.

22-08-2012

  • Psychotronics intermittent signal.
  • Breathing difficulties from synthetic noxious chemical frequency applied to living space.
  • Short-term memory manipulation.

23-08-2012

  • Psychotronics intermittent signal.
  • Force field created in attempt to break perceived jamming of signal. Side effects.
  • Unauthorised blocking of several Apple computer applications.
  • Breathing difficulties from synthetic noxious chemical frequency applied to living space.

24-08-2012

  • Psychotronics intermittent signal. Tests to establish cause and extent of signal disfunction including visual imaging, audio reception, subject intervention, subject response.

25-08-2012

  • Psychotronics intermittent signal.
  • Reduced exposure to frequency devices.
  • Unauthorised blocking of several Apple computer applications.
  • Breathing difficulties from synthetic noxious chemical frequencies.
  • RNM used to produce synthetic acid within thyroid and digestive tract, to alter ph level and linked to fast acting cancers.

26-08-2012

  • Psychotronics intermittent signal.
  • Reduced exposure to frequency devices.
  • Interference with natural eye focus function.
  • Unauthorised blocking of access to WordPress blog, reported to Apple computers.

27-08-2012

  • Psychotronics intermittent signal
  • RNM used to produce breathing difficulties for over 30 minutes from 21.34-22.10 BST.
  • RNM used to produce synthetic heart beat anomalies
  • RNM used to produce synthetic acid within thyroid and digestive tract, to alter ph level, linked to fast acting cancers.

28-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • RNM used to produce synthetic heart beat anomalies
  • Unauthorised blocking of several Apple computer applications.
  • Malicious damage to files in iPhoto library.
  • Breathing difficulties from synthetic noxious chemical frequencies.
  • RNM used to produce synthetic acid within digestive tract, to alter ph level, linked to fast acting cancers.

29-08-2012

  • Psychotronics reduced interface.
  • Reduced exposure to frequency devices.

Targeted individual was out of doors or travelling for over 12 hours.

30-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised blocking of access to Blogspot and WordPress, reported to Apple computers.
  • Malicious damage to files in iPhoto library.

31-08-201

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Malicious alteration of family photographs in Apple computer IPhoto Library.
  • Creation of illict shared areas on Apple computer Finder in names of Bert, bthub3 and kat-pc.  Reported to Apple computers.
  • Attempt to wipe short-term memory to prevent reporting.
  • RNM targeting of lymph glands and thorax, linked to  fast acting cancers.

01-09-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised blocking of access to Blogspot and WordPress, reported to Apple computers and Google.  Access enabled.
  • Targeting eyes.  Note: This used to be included in ‘Standard Exposure’, but in future will be specified.
  • Several events of exposure to heat either by microwaves or infrared radiation.

02-09-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Targeting eyes.
  • Several events of exposure to heat either by microwaves or infrared radiation.
  • Incapacitating breathing difficulties from synthetic noxious chemical frequencies.
  • Unauthorised removal of copies of documents on my Apple computer, including this one.
  • Re-creating password-protected shared area ‘bthub3’ on my Apple computer.

03-09-2012

  • Psychotronics standard interface.
  • Exposure to heat either by microwaves or infrared radiation.
  • Unauthorised changes to photographs of people.
  • Intermittent attempts to block internet access throughout a 6-hour period from 06.10 a.m.- 12.10 p.m BST.

04-09-2012

  • Recreation of illicit shared area on Apple computer Finder in name of bthub3.
  • Exposure to heat either by microwaves or infrared radiation for over one hour.
  • Exposure to other microwave technology with greater tissue-depth of impact.
  • Targeting eyes.
  • Re-creating unauthorised password-protected shared area ‘bthub3’ on my Apple computer.

05-09-2012

  • Psychotronics standard interface.
  • Reduced exposure to standard frequency devices.
  • Exposure to microwave technology with greater tissue-depth of impact.
  • Breathing difficulties.
  • Illicit manipulation of computer data.

06-09-2012

  • Psychotronics standard interface.
  • Exposure to heat either by microwaves or infrared radiation.
  • Illicit manipulation of computer data.

07-09-2012

  • Psychotronics standard interface
  • Reduced exposure to standard frequency devices.

08-09-2012

  • Psychotronics standard interface.
  • Reduced exposure to standard frequency devices.
  • Subject of training for perpetraitors on synthetic telepathy – possibly exam conditions.
  • Illicit manipulation of computer data.

09-09-2012

  • Psychotronics standard interface.
  • Exposure to electromagnetic force field.
  • Focused microwave targeting of head.
  • ELF targeting of intestine using non-standard equipment at 18.20 BST.
  • Exposure of face to heat either by microwaves or infrared radiation.
  • Microwave targeting of body.
  • Illicit manipulation of computer data and reconstruction of illicit shared area.

10-09-2012

  • Psychotronics standard interface.
  • Standard Exposure to frequency devices.
  • ELF targeting of intestine using non-standard equipment at 03.30 a.m. BST – halted by Targeted Individual activity.
  • Interference with Apple computer operations and Pages computer files.

 

While updating this blog on 11 August 2012, I observed that unauthorised alterations were made after I saved the update, requiring further amendment.  I check the accuracy of this record, but cannot guarantee that what is recorded at a specific point in time is what I intended the record to state.  My gratitude goes to WordPress, for maintaining the best security they can under difficult circumstances.

Targeted Individuals: Perpetraitor Parasites

PERPETRAITOR PARASITES

The development of psychotronics represents an amazing technological advance, with beneficial therapeutic applications, such as  enhancements for those with impaired hearing and eyesight.  Tragically  the technology is being pursued for the potential harm it can cause. Those who seek to use the technology for criminal activities have deselected themselves from the human race. Since my post on Perpetraitor Profiles I have had further opportunities to note and record more about those who carry out electronic harassment and psychotronic torture of targeted individuals.

THEIR MINDS HAVE NO FIREWALL

Bearing in mind that psychotronic interaction with Targeted Individuals is a two-way communication process, that means that when they are studying me, I might get insights into what’s going on with them as well.  And they know that, because they tried to install a human firewall after my last post, but that arrangement hasn’t been working too well.

What does that mean?  Well when I first got targeted, the criminal bosses allowed less experienced staff to interact directly with my mind.  But later they realised that this could enable me to look over their shoulders.  Then they tried having one suitably-equipped person to interact with me and tell less experienced staff what I was thinking and doing.  That meant that the less experienced staff got it second hand. I noticed that this arrangement might not be too effective, because only the ‘equipped’ person could say anything, and it might not be accurate and no one would know. Possibly for this reason, the criminal bosses gave the supervisor separate simultaneous access.

The problem with giving the supervisor separate simultaneous access is that, in this particular business model, the supervisor is the one operating the torture equipment.  Having separate access means that no one knows exactly what he is doing. There are volumetric reports for the equipment, but I doubt if that that is enough to ensure an accurate record. Also, certain events led me to conclude that those with access to torture equipment had other equipment as well, which did not have an automatic activity record, and which could be exploited to abuse others.

EQUIPMENT DOESN’T ALWAYS HIT THE TARGET

According to the author and technical specialist, Robert Duncan*, perpetraitors have screen monitors that show them where to point when directing harmful/painful energy towards victims. For about two weeks I noticed that perpetraitors seemed fixated on one point on my leg.Eventually I realised that it was probably not my leg they were aiming for. Could it be that their shiny new equipment needs calibration?

Perpetraitors are sitting in their brand new ivory tower, having interaction with their screens, but if their equipment isn’t correctly calibrated they may not be getting reliable feedback about what TIs are experiencing. It could mean that when perpetrators thought they were administering a medium shock, they might be administering a higher level, in situations that could be life-threatening to the targeted individual.  This is unlikely to be what perpetraitors want,  because without a continuing population of TIs, they would be out of a job. If there is any business rationale for what they are doing, a possible flaw in technical performance might have implications for things like research contracts and continued viability.

*Project: Soul Catcher, Volume Two, Secrets of Cyber and Cybernetic Warfare Revealed, Page 237 – Torture Database Screen’, Robert Duncan and   the Mind Hacking Strategy Group 2010, http://www.freedomfchs.com/thematrixdeciph.pdf.

THEIR MINDS HAVE NO FIREWALL – NOR HAS THE TARGETED INDIVIDUAL

The perps were chatting on to each other as usual, and what they were saying was echoing through my mind, because I was obliged to listen to them.  If I had been wearing the right headset or had electronic receptors stuck to my brain, the frequencies I was hearing could have been recorded.   Even if  perpetraitors have paid for the best security at their hideout, other parties that have the technology could be eavesdropping through me.  The perpetraitors seem to disagree with my view on this, but that doesn’t mean it isn’t happening.

According to Dr John Hall*, criminal perpetraitors are hacking into satellites. If that is happening, it could mean that other parties could also listen in and record what I was hearing, using advanced satellite frequency detection devices.  They could then translate the frequencies into speech for their own purposes.

To use an analogy, if the perpetraitors were a bank, they might have reasonable in-house security, but that wouldn’t stop other criminals from abusing their ‘ATMs’, because the weak link in the chain is the person who has a bank account and who may not be aware that their PIN number could be detected. And none of this sounds like good news for the targeted individual. I hope the perpetraitors take care not to think about their credit card details and passwords when interacting with their equipment.

*A New Breed. Satellite Terrorism in America, Dr John Hall, 2009.

SATELLITE TECHNOLOGY GIVES THEM THE EDGE BUT THEY CAN GET CUT

I do not claim to have any knowledge of technical things, so this is just how it comes across to me: TIs often report that the perps can see what TIs are seeing, as if looking through their victims’ eyes.  This involves satellite technology* and Remote Neural Monitoring**.

On 30 April 2012, in an article about enhancements to US Navy uniforms, the UK Newspaper the Daily Mail also revealed one of a range of new ‘cyborg’ technologies under test by the Pentagon. The article  stated:

‘Another groundbreaking high-tech military system will allow any soldier in a unit to ‘see’ through the eyes of any of his comrades’.*** 

On October 11 1999 the BBC News Online Science Editor Dr David Whitehouse reported that ‘a team of US scientists have wired a computer to a cat’s brain and created videos of what the animal was seeing’.****  

The article anticipated that ‘It is also conceivable that, given time, it will be possible to record what one person sees and “play it back” to someone else either as it is happening or at a later date’. 

Perpetraitors also have the option of looking not only at what you see, but also directly at you from satellites, using laser particle beam technology that allows them to see through walls, roofs, cars etc.  This option is more likely  to be available to the supervisor. If perpetraitors only have ‘see-through-eyes’ vision, they may be left in the dark if the TI closes both eyes or is in an unlit room. Having both views  usually clarifies what is going on, but can create two interpretations of what is happening. Sometimes it can be like two people blindfolded trying to put the tail on the donkey.

*See ‘A New Breed. Satellite Terrorism in America, Dr John Hall, 2009.

** Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. http://www.bibliotecapleyades.net/scalar_tech/esp_scalartech12.htm.

***Http://www.dailymail.co.uk/sciencetech/article-2137347/Cyborg-New-American-military-uniforms-test-soldiers-urine-warn-nuclear-biological-attack.html.

**** BBC News Online Oct 11, 1999, Looking Through Cats’ Eyes Fuzzy, But Recognizable, Dr. David Whitehouse, A BBC News article reported on the first pictures from an experiment to see through the eyes of a cat. http://news.bbc.co.uk/hi/english/sci/tech/newsid 471000/471786.stm.  Source: Cold War Nonconsensual Experiments: The Threat of Neuroweapons and the Danger it will happen again, Cheryl Welsh, J.D., www.mindjustice.com.


TIPS FOR TARGETED INDIVIDUALS

  • if perpetraitors are invading your thoughts and you can think in another language, try doing that for a bit. It puts the perpetraitors off, because their criminal bosses want them to understand what you are saying.  If you carry on they will have to bring in someone who can speak the same language, and that is not always easy, even when no expense is spared.
  • I tried this, using a few phrases of a foreign language that I had picked up, and some songs from a CD in that language. I regularly repeated the words in my mind.  This resulted in two language experts being brought in.  They both left almost immediately on ethical grounds, and one of them was traumatised by what he  found out about targeting of individuals.
  • If you are fed up with intruders trying to take you over, and want to meet up with your friends, pick a venue that has built-in protection against a range of frequency devices.  Many airport hotels now have this, and some can be reasonably priced.  Just make sure you are within the shielding – avoid the foyer and bars open to non-guests.
  • Most people are aware of the next point, but I wasn’t, so I will mention it.  Before you go to sleep, it is advisable to switch off all wireless/internet routers and unplug internet cable connections to phone filters before you go to sleep.  Take strategic electric plugs out of sockets. Ensure that cell phones, tablets etc are not only switched off but encased in metal or wrapped in aluminium, as they can be used as tracking devices even when switched off.

 

 In the course of preparing this post my laptop was crashed externally so many times that it no longer worked, and I had to buy another one.  I also had to get a new filter for my Broadband internet.  The day after publishing this post the photo library in my iPhoto application, containing nearly 5,000 photographs was wiped out.  I do have a back up, so I reloaded the photos, and half an hour later they were wiped again.

Targeted Individuals: Why People Get Targeted

EVER WONDERED WHY PEOPLE GET TARGETED?

An independent researcher Marshall Thomas developed an assessment of why some people got targeted and not others.   In his book ‘Monarch-the New Phoenix-Program’* he states that:

‘After meeting with 220 individuals and subjecting their case studies to an epidemiological analysis it was possible to assign the group with a collective set of risk factors. It is helpful if the reader will imagine a huge database with millions and millions of names… perhaps everyone in the United States. The targets are chosen with a computer program that gives a cumulative weighted score to each name when they engage in a certain proscribed activity. Picture this computer program acting as an elaborate three strikes and you’re out program. Every targeted activity or behavior carries a weighted score and every entry to the TI’s name increases their cumulative score. When the score reaches a certain quantity then that person is automatically enrolled in the program as a target’.

www.scribd.com/doc/15360318/Monarch-the-New-Phoenix-Program-II,

TARGETING CRITERIA

Marshall Thomas shows how the scoring works. Taking the case of a lady in her seventies who was targeted, he examines the reasons:

  • Strike One: Civil rights activity.
  • Strike Two: An FBI file.
  • Strike Three: Working for a major oil company as well as any personal or family association with the intelligence community.
  • Strike Four: Foreign travel to certain countries as well as learning a foreign language and integrating with a foreign culture.
  • Strike Five: Being permanently injured and on disability – a “drain on the system”*.

*Extracts from ‘Monarch-the-New-Phoenix-Program-II’, Part VIII, Page 34 onwards. 

Marshall Thomas notes an additional criteria – whistleblowers, which he considers ‘may comprise as many as 5-10% of all cases of targeted individuals’.

He states that ‘There is a great deal of variability across the range of TI’s in both the reasons for their targeting as well as in the manner that they are targeted. Academics, scientists and inventors who possess intellectual property of value are often targeted to relieve them of their ability to retain their patentable intellectual property. Microbiologists are particularly well represented in the target population.

Multiple targets share the risk factor of belonging to religions such as Jehovah’s Witnesses, Mormons, Buddhists, Christian sects, and other groups that are not mainstream religions, a category that will be referred to as religious dissidents. Twins are very common targets, usually one twin is overtly targeted with electronic harassment and microwave weapons while the other twin functions as the control group’.

PEOPLE ALSO GET TARGETED RANDOMLY FOR USE IN SECRET RESEARCH PROGRAMMES

The author and whistleblower Robert Duncan, in his free e-book ‘The Matrix Deciphered’*- puts human experimentation as the main reason why individuals are targeted. He says that:

‘Two high level FBI agents and a couple CIA agents have come forward to validate the existence of a MKULTRA like project that continues to grab random people for mind control experimentation.’

‘Two of these have since become part of the program and endure daily psychotronic tortures. All the torture can be done using directed energy psychotronic weapons with the so called continental ballistic missile surveillance defense grids’.

Robert Duncan says his reason for writing the book was ‘to help consolidate the technical information about the most advanced, secret military weapons being tested on civilians throughout the world, and to give new test victims a literary reference that they can give to police officers, psychiatrists, and family members so that they can be quickly educated on what is happening them’.

Robert Duncan, himself a TI, is a professor in computer science and business. He states that he has  ‘interviewed over two hundred people and worked on the highest level of military projects for the U.S., NATO, and U.K. and have given videotaped testimony to senators and representatives’

* www.freedomfchs.com/thematrixdeciph.pdf

WHY MORE WOMEN AND MINORITIES GET TARGETED

Several researchers have commented on the significantly higher numbers of women in the population targeted individuals.  One of the reasons for this could be compliance with the US Public Law 103-43 which requires that:

1.  ‘Women and minorities be included in all clinical research studies, as appropriate for the scientific goals of the work proposed.

2.  Additionally, NIH policy requires that women and members of minority groups and their subpopulations be included in Phase III clinical trials in numbers adequate to allow for valid analyses of sex/gender, racial, and/or ethnic differences in intervention effects.

3.  NIH policy also states that children (defined as persons under the age of 21) be included in human subjects research supported by NIH unless an acceptable justification for their exclusion is provided.

4.  The NIH Peer Review regulations (42 C.F.R. 52h) specify that reviewers will take into account, in determining overall impact that the project in the application could have on the research field involved, the adequacy of plans to include both genders, minorities, children and special populations as appropriate for the scientific goals of the research.

5.  Therefore, reviewers must evaluate the proposed plans for inclusion of women, minorities, and children as one of the review criteria that factor into the evaluation of scientific and technical merit’.

This underlines the point that targeting is about nonconsensual human experimentation, and the need to get a suitable research population.

Source: ‘Human Subjects Protection and Inclusion of Women, Minorities, and Children, Guidelines for Review of NIH Grant Applications’, www.grants.nih.gov/grants/peer/guidelines_general/Human_Subjects_Protection_and_Inclusion.pdf

THE COMBINED TARGETING STRATEGY

Marshall Thomas sees the three main reasons for targeting of individuals as merging into an overall strategy:

–  perfecting (EMW) electromagnetic weapons on unwilling people – human guinea pig experiments.

–  neutralizing potential enemies on a hit list, political activists and whistleblowers, by using them as the unwilling subjects of the human experimentation.

–  using extreme trauma, sleep deprivation, and other torture techniques delivered by EMW to the targets to further refine the science of behavior modification.

www.marshallgthomas.blogspot.co.uk

A WORLDWIDE PROGRAM TARGETING THE CIVILIAN POPULATION

In his book The Hidden Evil’, author and researcher, Mark M Rich states:

‘Although whistleblowers, activists and others have been targeted, the scope of this worldwide program is too big for it to be limited to a parallel justice system… According to both McKinney* and Moret*, it has moved beyond experimentation and is being widely used on the civilian population’…  ‘Dr Kilde* adds, “Today ANYONE CAN BECOME A TARGET, even those who invented the system”.  www.freedomfchs.com/thehiddenevil.pdf

Mark M Rich is another targeted individual. His website is www.gangstalking.wordpress.com/category/mark-m-rich/

*Sources quoted by Mark M Rich:

The Investigative Journal, Julianne McKinney; 

www.sm4csi.home.xs4all.nl/nwo/MindControl/Microwave.Harassment.And.Mind-Control.Experimentation.htm

www.arcticbeacon.com/audio/2006/2006-RBN/04-2006-RBN

Co-op Radio, Leuren Moret; 

www.youtube.com/watch?v=YDFoX1Hzo3w

Microwave Mind Control, Dr Kilde;

http://lordlangerz.wordpress.com/2012/03/18/the-illuminatis-secret-mind-control-operations-dr-rauni-leena-luukanen-kilde/

Targeted Individuals: Perpetraitors Secret Weapon

This post covers:

  • The secret weapon that gives perpetraitors control
  • How the criminal perpetraitors do it
  • What methods we can use to protect ourselves
  • My personal experience of trying out one of the methods

Many Targeted Individuals (TIs) have had the courage to write about their experiences, either on the internet, or in books.  Some experiences appear to be common to most TIs, including remote pain transmission, exposure to dangerous levels of microwaves and altered states of awareness. Some also describe ‘gang-stalking’ and others report impressions of synthetic telepathy, paranoia and psychosis.

THE SECRET WEAPON THAT GIVES PERPETRAITORS CONTROL

There is one type of energy weapons approach that gives perpetrators control over their victims. In her article ‘On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology’, Journal of Psycho-Social Studies 2003, the psychoanalyst Dr Carole Smith.PHD, states:

‘In 1969 Dr Jose Delgado, a Yale psychologist, published a book: “Physical Control of the Mind: Towards a Psychocivilized Society”. In essence, he displayed in practical demonstrations how, by means of electrical stimulation of the brain which had been mapped out in its relations between different points and activities, functions and sensations, – by means of electrical stimulation, how the rhythm of breathing and heartbeat could be changed, as well as the function of most of the viscera, and gall bladder secretion. Frowning, opening and closing of eyes and mouth, chewing, yawning, sleep, dizziness, epileptic seizures in healthy persons were induced. The intensity of feelings could be controlled by turning the knob, which controlled the intensity of the electric current.’

http://www.globalresearch.ca/index.php?context=va&aid=7123

What we are talking about in everyday terms – I do not pretend to know much about the technical side – is that by directing an electronic weapon at a very specific part of the  brain, perpetrators can alter the victim’s state of awareness, including:

  • Sudden onset of sleep/sleep deprivation
  • Going unconscious
  • Forgetting what happened to them
  • Experiencing externally induced emotions
  • Synthetically induced paranoia and psychosis
  • Heart malfunction
  • Breathing difficulties – asphyxia can be induced by altering frequencies in the brain that control breathing
  • Synthetically induced frequencies that replicate inhalation of noxious gases/chemicals.

If it wasn’t for this one perpetraitor capability, targeted individuals could probably get up and walk away from much of what was targeted at them, most of the time.

HOW DO THE CRIMINAL PERPETRAITORS DO IT?

In his book ‘A new breed: satellite terrorism in America’ – www.satweapons.com, Dr John Hall has drawn attention to the use of satellite technology by criminal perpetraitors for targeting individuals remotely.  Dr Carole Smith’s article supports this:

‘A more disturbing use is the system developed for manipulating and disturbing the human mental process using pulsed radio frequency radiation (RFR), and their use as a device for causing negative effects on human health and thinking. The victim, the innocent civilian target is locked on to, and unable to evade the menace by moving around. The beam is administered from space’…*

‘The technology that originated in the years of the arms race between the Soviet Union and the West, has resulted in using satellite technology* not only for surveillance and communication systems but also to lock on to human beings, manipulating brain frequencies* by directing laser beams, neural-particle beams, electro-magnetic radiation, sonar waves, radiofrequency radiation (RFR), soliton waves, torsion fields and by use of these or other energy fields which form the areas of study for astro-physics.’

*My emphasis

WHAT CAN WE DO TO PROTECT OURSELVES?

According to Mr Barry Trower, a well-known advocate of targeted individuals*, TIs can protect themselves  using several layers of aluminium foil as shielding.  In a talk recently uploaded to YouTube, he also provides a range of other advice  – www.youtube.com/watch?v=09mpvscHiKI&feature=youtu.be.

*www.thermoguy.com/pdfs/filings/[20]%20Amended%20Declaration%20of%20Barry%20Trower.pdf

I have read some things on the internet that suggest that anyone who uses aluminium foil – such as for tin hats – is deluding themselves.  But according to Wikipedia:

‘The notion that a tin foil hat can significantly reduce the intensity of incident radio frequency radiation on the wearer’s brain has some scientific validity, as the effect of strong radio waves has been documented for quite some time. A well-constructed tin foil enclosure would approximate a Faraday cage, reducing the amount of … radiofrequency electromagnetic radiation passing through to the interior of the structure…’

“The efficiency of such an enclosure in blocking such radiation depends on the thickness of the tin foil, as dictated by the skin depth, the distance the radiation can propagate in a particular non-ideal conductor. For half-millimetre-thick tin foil, radiation above about 20 kHz (i.e., including both AM and FM bands) would be partially blocked, although tin foil is not sold in this thickness, so numerous layers of tin foil would be required to achieve this effect’…

‘The effectiveness of the tin foil hat as electromagnetic shielding for stopping radio waves is greatly reduced by it not being a complete enclosure.’

www.en.wikipedia.org/wiki/Tin_foil_hat

I TRIED IT OUT

Recently, perpetraitors were directing brain targeting to make me struggle for breath, or lose concentration, particularly when I write this blog.  So I decided to give the aluminium hat a try – and I found that IT WORKS.  The lack of oxygen and loss of focus stopped.

There are things that aluminium foil doesn’t do, including blocking synthetic telepathy, but if you want to stop perpetrators taking over your brain, based on my experience, several layers of aluminium foil, covering the head completely, will do it.  You can buy the foil quite cheaply in places like supermarkets and general purpose stores.

The risk is mainly when you are indoors at home, and staying still, or asleep. If you are outside in fresh air and moving about, the risk is much lower.

References

Dr Carole Smith.PHD – ‘On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology’ – http://www.globalresearch.ca/index.php?context=va&aid=7123

Dr John Hall – ‘A new breed: satellite terrorism in America’ – www.satweapons.com

Mr Barry Trower – www.youtube.com/watch?v=09mpvscHiKI&feature=youtu.be

www.thermoguy.com/pdfs/filings/[20]%20Amended%20Declaration%20of%20Barry%20Trower.pdf