Author Archives: martinacable99

About martinacable99

I am a senior citizen, living in a country village.

Targeted Individuals: The Myth of ‘Non-Lethal’ Research

Targeted Individuals: The Myth of ‘Non-Lethal’ Research

This post is about:
1.  Why the number of targeted individuals may be increasing.
2.  Why targeted individuals may be used in nonconsensual research.
3.  Why such research can never be regarded as valid.
Targeted Individuals consistently report that they are being used in research experiments. These innocent people are being tortured by criminals, and such torture is a crime against humanity. It is hard to think of a more distasteful subject than cruel nonconsensual experimentation on human beings, motivated by profiteering and greed.
WHY ARE NUMBERS OF TARGETED INDIVIDUALS INCREASING?
In an earlier post on PerpeTraitor Profiles I mentioned a petition started in 2007, calling for a ban on electronic warfare on civilians.  To date the petition has received over 1500 over signatures, mainly from those describing themselves as TIs. An analysis of those signing the petition by year up to 13 June 2012 is produced in the graph below.
The graph shows a significant increase in those signing in 2011 and a likely similar results for 2012.  Why did the numbers signing increase significantly from 2011?  There could be several reasons including:
–  More TIs finding out about the petition.
–  Increasing internet interest in the plight of targeted individuals – last time I typed in “Targeted Individuals” into a search engine, it produced over 82 million references.
–  A significant increase in the number of TIs.
TI NUMBERS ARE INCREASING: NO ONE GETS OUT ALIVE, BUT THEY STILL SURVIVE
Some TIs wrote in their survey responses that they had been targeted for over ten or even twenty years.  From this it appears unlikely that TIs are ever released from remote electronic torture.  According to Marshall Thomas, TIs continue to live on, despite what perpetraitors do to them. He states that TI mortality rates are ‘surprisingly low’. In a compilation of evidence for the Presidents Advisory Committee on Human Radiation Experiments March 1995, Marshall Thomas stated:
‘One thing is very clear about the program these people are under…once it starts it never stops until they are dead.  Having said this, it should be noted that the mortality factor for TI’s is surprisingly low considering the ferocity of the torture program that they are under. Though it is difficult to be exact, only about one out of 20 or one out of 40 TI’s appear to die each year.*’
*Extracts from ‘Monarch-the-New-Phoenix-Program-II’, Page 34 onwards.  www.scribd.com/doc/15360318/Monarch-the-New-Phoenix-Program-II
Also, nonconsensual research on TIs is a profitable criminal business, so it is in the interest of the perpetraitors to keep them alive.
HAVE PERPETRAITORS RECENTLY HAD A MAJOR CAPACITY INCREASE ? 
Why could there be a sudden increase in the number of TIs?  If the criminals running the TI “business” operate the kind of technology used by large corporations that interact with the public – such as call centres, and back up of records in a data centre – there must be a limit to the capacity of the business to take on new TIs.  So if suddenly more individuals  are being targeted, it could be that perpetraitors recently had a major expansion of capacity. The increase in TI numbers from 2011 would suggest a capacity increase of at least 100%.
What is the implication of a capacity increase for Targeted Individuals?  From what I have seen in my interaction with perpetraitors, they now have a lot of upgraded spare capacity.  It looks as if far more Targeted Individuals than ever before are planned to be targeted.
ARE TARGETED INDIVIDUALS BEING ‘FARMED’ AS A NONCONSENSUAL CASH CROP?
I suspect that for the perpetraitors, expansion of capacity means larger profits. The more Targeted Individuals they have in their net, the more money they can get. The possible implications of this are that:
–  TIs are becoming a kind of ‘cash crop’ that can be farmed, with increasing reliance on automation and modern facilities.  The primary source of income is through offering TIs as subjects for nonconsensual research.
–  But there are other lucrative markets as well. According to Marshall Thomas, the illicit surveillance of TIs provides for a kind of reality TV which is sold to viewers within the criminal fraternity. See inset below:
‘The TI is both a very  expensive lab rat for the health effects of microwave  weapons, a training tool for a stalking army, a psychology experiment to perfect mind control, fodder for publishing scientific papers, and a commodity to be sold for entertainment purposes a la reality TV.
The incredible expense of gang stalking several thousand people on an enemies list is offset by selling the TI as a human guinea pig for weapons development programs, medical experiments, psychology experiments  (GSA contracts), and a “reality TV show” that might be sold on the internet, satellite TV, or satellite radio.
The audience is made up of several tiers of viewers and participants. The perspective of the drama that unfolds before the satellite TV and internet audience is the action as seen through the eyes of the TI with the targets “inner voice” typed out on the screen below.’  Extract from Page 33 of:
www.shatteringdenial.com/books/monarch_ii_victims_marshall_thomas.pdf
SOME TARGETED INDIVIDUALS REPORT BEING USED FOR WEAPONS RESEARCH
From 28 February to 1 March 2011, the Presidential Commission on Bioethics discussed non-consensual experiments on human beings. During this discussion, Targeted Individuals talked about their experience, and what their life was like because of the experimentation done on them. A few of the Targeted Individuals’ observations on human experimentation are included below:
Observations by Targeted Individuals
1. ‘Gang stalking and harassment was used to implement this nonconsensual biotechnology application that is being used on me… I now experience involuntary limb movements. I receive stingings. I get pains to my head, to my abdomen… I get burning on my lower legs and my ankles. I get ringing in my ears that’s pitch is like they pitch it.’
2. ‘Since 2008 and before, I have endured the following physical and psychological symptoms: extreme debilitating and chronic fatigue, weakness and dizziness for days and weeks at a time… I have an unusual dental filling of unknown origin on the side of one of my back upper right teeth and no memory of having this procedure done… And I have X-ray printouts and a signed affidavit from my dentist stating this.’
3. ‘I wanted to speak about bio-technology applications being utilized on my person. I have medical reports showing eye damage being done to my eyes, my eyes does not have a mirror image, I also have nano wiring inside my eyes, I have pictures of the actual implants from the eye doctor, once enlarging the nano implants, you will see a copy of the actual particles in my eyes. I have CAT scans in my eyes and PETs showing wiring, nano wiring in my head.’
4. ‘I am requesting that the Presidential Commission conduct an investigative hearing on non-consensual human experimentation and I do have credible evidence I’m submitting, 1158 videos and pictures that’s been occurring for the last two years. I’m also presenting 10 attachments which includes my 14-page public comment…’
5.‘For decades I have suffered the following due to these remote weapons and research…To date I have: Non age related cataracts, nodule on thyroid, nodule on adrenal gland and sudden hearing loss syndrome. These are all resulting from being subject to electromagnetic weapons.  Endless MRI’s, X-rays, test after test, specialist after specialist. Thousands of dollars in debt and the doctors cannot find a reason.  I have witnesses.’ www.targetedindividuals.blogspot.co.uk/2011/09/
WHO STANDS TO GAIN FROM RESEARCH ON TARGETED INDIVIDUALS?
If one of the main reasons for targeting individuals is to conduct research testing of electromagnetic microwave, laser and psychotronic weapons on various populations, presumably there are groups of people who have commissioned such research, and people who have provided funding – sometimes referred to as donors.
The groups with most interest in the outcome of this research would include the manufacturers and suppliers of these weapons. Is it likely that such groups are going to be concerned about testing weapons on human subjects?  They will, presumably, need evidence of exactly how their weapons affect human populations if they are to sell their products. But they can hardly be seen to commission nonconsensual research. So perpetraitors can profit by exploiting their slave population of targeted individuals as research guinea pigs.
WHY SUCH RESEARCH IS NEVER VALID
One thing that perpetraitors and electronic weapons salesmen seem to have overlooked – you can’t pull the wool over the eyes of the international community when it comes to proper registration and conduct of weapons research, even if it is not ‘non-lethal’ i.e. not for battlefield use.  There are rigorous standards for all types of research, and evidence of compliance with them will be expected.
NON CONSENSUAL HUMAN RESEARCH V INFORMED CONSENT
Non-consensual human experimentation is outlawed in all humane societies. The targeted individuals who had the courage to give their testimonies to the Presidential Commission on Bioethics had clearly not given their consent to being used as research subjects.  The US Office for Human Research Protections has set out guidance about the basics of obtaining informed consent:- Office for Human Research Protections (OHRP) §46.116 – Informed Consent Checklist – Basic and Additional Elements.  These require that human subjects are clearly informed, amongst other things, about:
– the purpose of the research
– what the research will cover
– how long the research will last
– what tests they will be involved in
– who do contact with questions
– personal confidentiality of records
– what the risks to health are, and
– what will happen if the subject wishes to withdraw before the end of the research project.
WHAT PERPETRAITORS WOULD HAVE TO DO TO MEET BASIC HUMAN RESEARCH REQUIREMENTS
Any research testing on humans must comply with fairly stringent standards if the results are to be recognised as valid within the international community.  Human research subjects should not have been experimented on for the same thing before, otherwise their health and mental outlook might have been affected by previous research, and conclusions about current research results could be based on invalid data, and therefore flawed. This would mean that Targeted Individuals must not automatically be transferred from one research project to a subsequent one, although criminals might well do so for financial considerations.
Here are a few of requirements that perpetrators would need to have checked before selecting individuals for targeting:
– Complete health history of research subject and close family and known health risks.
– All medical drugs, vitamins and other remedies taken by the human subject.
– Any substance abuse including alcohol and nicotine.
– Any previous mental health issues.
– Any actions taken subsequently by human subjects to counteract torture and victimisation,
  including shielding against microwaves, diet to counter cancer, maintaining a healthy ph level,
  exercise etc.
– Any medical prostheses such as pacemakers and automatic insulin dispensers, that might be at
  risk of failure because of electronic interventions.
– Previous work in a nuclear power station, which might have exposed a subject to nuclear
  radiation.
– Previous work in an industry involving nuclear radiation products.
– Previous work involving toxic chemicals.
– Previous work in a cell phone factory.
– Previous involvement as a human research subject in similar research projects.
In commercial research for medical drugs, the clinical records and the full testing records for each human subject must be available for scrutiny by the relevant independent standards checking authorities.  The perpetraitors would have to maintain similar research records and make them available to independent scrutiny, if their ‘research projects’ were to be recognised by the international community.
DOES THIS SOUND LIKE RESEARCH TO YOU?
We have heard what some targeted Individuals reported to the Presidential Commission on Bioethics about their experiences.  Does this sound like research to you?  Is it likely that a bunch of criminals went about drawing on TIs’ official health records and establishing their suitability before selecting them for targeting?  And are the so-called ‘research case papers’ going to be examined by an independent research body to ensure records can be relied on?  If not, then whatever research results the criminal perpetraitors eventually come up with must be open to question, making the whole research project unviable.
Anyone having doubts about this? Read the provisions of the Belmont Report – ‘Ethical Principles and Guidelines for the Protection of Human Subjects of Research’, summarised at the end of this post.
CONCLUSION
If you look at what Targeted Individuals have to say about their experiences, the only conclusion that can be drawn is that whatever is happening to them cannot be classified as research. It is also clearly nonconsensual, and therefore against the law.
Based on what appears to be the significant increase in the numbers of Targeted Individuals, major investment is being made in this criminal activity, perhaps for decades to come.  If that is being done in the mistaken view that results from targeting individuals can be used to prove that some kind of research has been conducted, then billions of dollars have already been wasted for no justifiable reason, and thousands of innocent human beings have been subject to appalling misery and torture.
SHIP OF FOOLS
~
THE BELMONT REPORT
In 1979, the Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research, was published in the United States to provide a succinct description of the mandate for review of research involving human research participants.  Regulation and guidelines concerning the use of human research participants in the U.S., and increasingly so in other countries, are based on the following fundamental elements excerpted from the Belmont Report:
Respect for Persons – In research, respect for persons demands that participants enter into a research program voluntarily and with good information about the research goals.
Beneficence – to do no harm and to “maximize possible benefits and minimize possible harms” to the individual research participant.  Investigators – or in this case perpetraitors – and their institutions have to plan to maximize benefits and minimize risks.
Informed consent – the informed consent process must allow human participants, as much as they are able, to be given opportunity to choose what will or will not happen to them.  The consent process must include information to the participant about the research; the participant must understand the information and volunteer rather then be coerced into participation.
Assessment of Risks and Benefits – Assessing risks and benefits means the researcher needs to assemble all data that explains why the research will obtain the benefits that are sought by the research project. The review committee of the researcher’s sponsoring institution, upon review of the collected data, can decide whether the risks to the subjects are justified.  Prospective participant can determine whether or not to participate.
Selection of Participants – The principle of justice—that benefits and risks of research be distributed fairly.  Researchers are not just if they only select disadvantages persons for risky research or only provide beneficial research to groups they favor.  Special classes of injustice arise when participants are drawn from vulnerable populations, like those institutionalized or incarcerated in prisons, racial minorities, economically disadvantaged or the very sick. www.hhs.gov/ohrp/humansubjects/guidance/belmont.html
Sources of images for this post:
Slavery Frieze – Detail from ‘Slavery’ frieze www.bbc.co.uk/london/content/articles/2007/03/16/passage_of_time_feature.shtml
While drafting this post, unauthorised alterations were made to it, prior to publication.  There are those who do not want information to be made available publicly even though it is already in the public domain. They know that they have committed crimes against humanity, and they fear that the consequences of their actions will confront them.

S

Advertisements

Targeted Individuals: Seeing Through The Perpetraitors

This post is about information in the public domain, recently highlighted in the UK and   US media, about miniature lenses that can sit on an eyeball and communicate with other devices used for military purposes.  Based on reports of targeted individuals, similar  technology may already be in use to enable perpetrators to see through our eyes.

In my post on ‘Perpetraitor Profiles’ I mentioned that several Targeted Individuals recorded that perpetraitors were looking through one or both of their eyes, and that a technology called Remote Neural Monitoring could be used to do that.  But it wasn’t clear how that worked in practice.  

Since then I have done some more research and, based on the information and evidence quoted below, I have come up with a theory about how perpetrators could look through the eyes of Targeted Individuals.  So here is my argument for what technology is being used, and how it works.

SCIENTISTS COULD SEE THROUGH CATS EYES IN 1999

In 1999 scientists proved that they could look through the eyes of a cat. BBC News Online Science Editor Dr David Whitehouse reported: ‘ A team of US scientists have wired a computer to a cat’s brain and created videos of what the animal was seeing… To their amazement they say they saw natural scenes with recognisable objects such as people’s faces. They had literally seen the world through cat’s eyes.’

www.news.bbc.co.uk/1/hi/sci/tech/468857.stm

US MILITARY PLANS TO USE INSECTS AS MINIATURE SURVEILLANCE DRONES 

In March 2008 Fox News reported that ‘U.S. military engineers are trying to design flying robots disguised as insects that could one day spy on enemies and conduct dangerous missions without risking lives… In essence, the research seeks to miniaturize the Unmanned Aerial Vehicle drones used in Iraq and Afghanistan for surveillance and reconnaissance.’ www.foxnews.com/story/0,2933,456384,00.

In November 2008 Fox News also reported that ‘The next generation of drones, called Micro Aerial Vehicles, or MAVs, could be as tiny as bumblebees and capable of flying undetected into buildings, where they could photograph, record, and even attack insurgents and terrorists.’www.foxnews.com/story/0,2933,456384,00.html#ixzz22s2VQHy3

 In July 2009 the journalist Chares Q. Choi reported that: ‘Scientists can already control the flight of real moths using implanted devices.  The military and spy world no doubt would love tiny, live camera-wielding versions of Predator drones that could fly undetected into places where no human could ever go to snoop on the enemy.’www.dailymail.co.uk/sciencetech/article-527328/Insects-fly-wall-spies-tiny-cameras-radio-controls-microphones.html#ixzz22s0vDPMK

www.msnbc.msn.com/id/31906641/ns/technology_and_science-science/#.UCEmU3gTtD0

US BATTLEFIELD TECHNOLOGY ENABLES SOLDIERS TO SEE THROUGH THE EYES OF THEIR TEAM MATES 

On 3 February 2012 the UK newspaper the Daily Mail reported:

‘DARPA – the Defense Advanced Research Projects Agency, thought of as the American military’s ‘mad scientist’ wing – has been funding research on ‘soldier mounted displays’ for some time, but previous versions have been bulky.

The lenses, made with nano-scale engineering processes,work as a hi-tech focusing device, which allows Innovega’s glasses to be considerably less bulky than previous devices.   The lenses themselves require no power, and thus can sit safely on the eyeball.’*  *My emphasis 

DARPA Says, ‘Innovega’s  iOptiks are contact lenses that enhance normal vision by allowing a wearer to view virtual and augmented reality images without the need for bulky apparatus. ‘

‘Instead of oversized virtual reality helmets, digital images are projected onto tiny full-color displays that are very near the eye.’

These novel contact lenses allow users to focus simultaneously on objects that are close up and far away. www.dailymail.co.uk/sciencetech/article-2095987/Virtual-reality-contact-lenses-beam-images-directly-eyes-sale-2014

On 14 April 2012, the Daily Mail ran an article under the headlines:

‘U.S. TROOPS TO HAVE ‘SUPER VISION’ AS PENTAGON ORDERS ELECTRIC CONTACT LENSES THAT LET THEM ‘SEE’ THROUGH DRONES FLYING OVERHEAD 

  • Lenses can let troops see through ‘eyes’ of drones flying above.
  • Can ‘layer’ target information over view of world.
  • Contact lenses don’t impede fighter’s vision.
  • Equivalent to a 240-inch 3D television from 10 feet’.

The Daily Mail reporter, Rob Waugh, stated that:

‘The Pentagon has placed an order with Innovega for lenses which focus 3D battlefield information from drones and satellites directly into people’s eyeballs*. The tiny ‘screens’ sit directly on users’ eyeballs and work with a pair of lightweight glasses with a built-in translucent screen. *My emphasis 

www.dailymail.co.uk/sciencetech/article-2129261/Pentagon-contact-lenses-US-troops-super-vision-electric-eye-lenses-pipe-target-information.html#ixzz22trGdEvY

On Sunday 29 July 2012, the Daily Mail also reported that:

‘The system is designed to improve the awareness of a military team as a whole, allowing soldiers to see through the eyes of their team mates in real-time’.* *My emphasis 

www.dailymail.co.uk/sciencetech/article-2137347/Cyborg-New-American-military-uniforms-test-soldiers-urine-warn-nuclear-biological-attack.html.

HOW DOES NEW TECHNOLOGY AFFECT TARGETED INDIVIDUALS?

According to John St Clair Akwei, a former surveillance specialist, Remote Neural Monitoring plays a key role in the targeting of individuals:

‘Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves.’ 

From an article in Nexus Magazine April/May 96 from MindControlForums Websitehttp://www.bibliotecapleyades.net/scalar_tech/esp_scalartech12.htm

John St Clair Akwei does not say how Remote Neural Monitoring is achieved.  Dr John Hall, medical anesthesiologist, author of ‘A New Breed: Satellite Terrorism in America’ and a targeted individual, states that satellite technology was used at an early stage to connect electronically with computers. Drawing on his experience in the medical profession he notes that Electroencephalograms – EEGs – are routinely used in hospitals to monitor brain wave frequency activity, and that when connected with satellite technology, a similar type of equipment will enable a perpetraitor to hear what you hear and see what you are seeing in real-time.

MY HYPOTHESIS

For Remote Neural Monitoring to work, satellite technology must have some way to connect with the targeted individual. Perpetraitors can see Targeted Individuals all the time using lasers and satellite technology. But they can also look through the eyes of a Targeted Individual. So far I have not been able to find anything that describes how this is achieved, but I think that nano-scale cameras must play a part in enabling perpetraitors to see through the eyes of targeted individuals.

The reason I think this is that:

  • The Daily Mail reported how US military battlefield methods are being upgraded with drones or satellites connected to cameras that can ‘safely sit on the eyeball’ of soldiers, allowing them to ‘see through the eyes of their team mates’.
  • If  the US military weapons described in the Daily Mail articles could connect with drones and satellites without using nano-scale eye cameras they would have done so, as it can hardly be convenient  for soldiers to be fitted with a type of contact lense attached to a camera, however small.  If the US Military didn’t need nano-scale cameras I doubt if the US army would be doing what they are doing.
  • The US military weapons system has some similarities with the Remote Neural Monitoring, and it is quite possible that RMN would need nano-scale cameras in the same way.
  • TIs report that perpetraitors only look through one of their eyes.  This is consistent with having a camera installed in one eye.

My theory is that perpetraitors can see through both our eyes, using satellite technology to track into our brains and connect with a nano-scale camera attached to or implanted on the outside of the eye.

MY PERSONAL EXPERIENCE

My impression was that perpetraitors could look through one of my eyes, although I now think they can see through both eyes, even if our eyes are closed.  Something else I noticed was that in the dark I could see the nano-scale camera implant equipment shining white inside both my eyes, although it appears that only one eye has a camera.

And in daylight I saw something in one of my eyes that looked like a black comma.  At first I thought it was a floater. Then I saw a clothing advert on a bill board, and noticed that the model had a comma drawn above her cheekbone. It looked like the one in my eye.   I searched the words ‘comma symbol’  on the Internet and found that there is a computer game called Naruto which has a huge following, and that the comma symbol is known as a Sharingan.

I also found out that you can buy contact lenses that give you a whole range of Sharingans. Could it be that some perpetraitor technician is into Naruto games and is making nano-scale eye camera implants that have a Sharingan on them?

Picture opposite: Sharingans. http://en.wikipedia.org/wiki/File:Sharingan.jpg

IF LOOKS COULD KILL

After reading the articles referred to above in the Daily Mail, and adding to them the information I had from my own experience, I began to realise that a TI with a camera embedded in one eye could be part of a weapons system, providing additional close up vision that could be transmitted to a drone/satellite and also to a third party, possibly but not necessarily a human with weapons capability.

But the set up could work just as well if the Targeted Individual was the third party with weapons capability, if the camera in the TI’s eye could be used as a weapon to be fired at someone or somthing. Could some Targeted Individuals be used as human handgrenades? And could the system work just as well if the Targeted Individual had a separate camera in each eye? Or could the second camera be embedded centrally somewhere else in the TIs head?

I put a patch over my eye – the one with the Sharingan in it. I could see as well with the other eye as if I had two eyes. But for the first time, I noticed a blurred patch in the middle of the other eye. Could that blurred patch be an invisible camera sight? I had already seen the placement socket shining in the dark as if reflecting ultraviolet light. Did it make any difference whether my eyes were open or closed?

At this stage, I hope I am wrong in my conclusions. Last week, I was sitting next to a friend who was driving, when something the colour of a stone seemed to come from slightly above eye level opposite us and hit the windscreen, leaving a mark in the glass. The mark in the glass was where my eyes were focused when the windscreen got hit.

LATER IN-SIGHTS 

Are nearby people and living things at risk when individuals are targeted electronically?

When perpetraitors target me with microwaves, birds and squirrels do not visit the food table outside. When perpetraitors stop targeting me with microwaves, birds crowd the table, as if making up for lost time.

This made me wonder how wide a space is covered when perpetraitors target individuals.  Could it affect people nearby, for example sleeping in the next room.  Could it affect neighbours sleeping in a semi-detached house.  And what effect could it have on partners of targeted individuals.

MITIGATING THE EFFECTS OF LASER/MICROWAVE HITS

Anti-histamine cream and tablets appear to be helpful, based on my experience.  Maintaining an alkaline ph balance may also assist – for example, drinking lemon juice or cider vinegar.  Perpetraitors  get agitated by this, so it may nullify the results of some laser or microwave research testing.  Microwaves leach calcium out of bones, with results similar to osteoporosis. Taking a sufficiently strong dose of calcium citrate with vitamin D3 on a regular basis can counter the effects of this. 1000 mg of calcium with D3 a day would be the lowest suggested level.  Seeking the advice of a pharmacist is advisable.

After using aluminium protective eye shades at night for a while I could see that I had a ‘sunglass mark’.  My face was more red – except where the eye shades covered my face. One side of my face was less red than the other, probably because I sleep  on that side. I am not sure if this was caused by directed laser or microwave energy.  Sleeping in sunglasses or eye shades covered with aluminium foil may be beneficial. Attaching a cloth container such as a sunglass case to eye shades, and filling it with aluminium is another option.

NOTE: This post may not read as I would wish, owing to multiple interventions made on my Blogspot post by perpetraitors while I was trying to draft it. In recent weeks I have been subject to an onslaught of interventions and attacks by perpetrators while drafting, and I sometimes find that publishing the post as work in progress is best. Criminal encroachment in the internet operations of another country is a breach of international law.

Targeted Individual: Perpetraitor Event Record

TARGETED INDIVIDUAL: PERPETRAITOR EVENT RECORD

The table below is a record of perpetraitor interaction with the targeted individual – author of this blog.  It was started in view of the increasing difficulties facing the targeted individual in writing and publishing posts. At the time of writing, one laptop has been broken, and Broadband filters have had to be replaced.

I do not live in the United States.

This post was first published on 31 July 2012.

DATE / EVENT

23-07-2012

  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power

24-07-2012

  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power

25-07-2012

  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system

26-07-2012

  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Multiple unauthorised intervention in my Apple MacBook Pro operations
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • While cleaning teeth, ‘frequency cleaning’ toothbrush got targeted and started to sound like an electric toothbrush for about 12 hours.

27-07-2012

  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power

28-07-2012

  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Multiple unauthorised interventions in my Apple MacBook Pro operations
  • Targeting of lower intestinal cavity on low power

29-07-2012

  • Psychotronics standard interface
  • Non-standard unauthorised targeting of lower intestinal cavity on full power 
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • Multiple unauthorised intervention in my Apple MacBook Pro operations

30-07-2012

  • My iPhoto application containing about 5,000 original photographs wiped twice, but I had a back-up
  • Psychotronics standard interface
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • Multiple unauthorised interventions in my Apple MacBook Pro operations.

31-07-2012

  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • Unauthorised interventions in my Apple MacBook Pro operations, including alteration of this record, both off-line before it was published, and systematically freezing some WordPress functions on-line while it  was being published.
  • Alteration of the colour settings on the photographs in my iPhoto library.

01-08-2012

  • Psychotronics standard interface.
  • Unauthorised interventions in my Apple MacBook Pro operations including attempted block on access to Blogspot and WordPress, which were reported to Apple Computers.

02-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices
  • Unauthorised interventions in my Apple MacBook Pro operations affecting the colour settings of my photographs in iPhoto.

03-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto and other applications.
  • Block on  internet access for two hours necessitating assistance from internet service provider.
  • Unauthorised intervention in Blogspot while drafting my blog.

04-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto and other applications.
  • Block on internet access to Blogspot, reported to Apple Computers.
  • Unauthorised intervention in Blogspot while drafting my blog.

05-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices, including, during shift 24.00 – 08.00 BST 4-5/7/12/, microwave heating 15 minutes – the relevant US research time allowance.
  • Block on  internet access to Blogspot, reported to Apple Computers.
  • Unauthorised intervention in Blogspot while drafting my blog.
  • Sleep deprivation.

06-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • During shift 24.00 – 08.00 BST 5-6/7/12, non standard exposure to frequency and other devices including targeting of heart and attempts at ‘waterboard’ asphyxiation  experience, by contracting throat area and expanding internal nasal tissue to reduce breathing space.
  • My perception was that the targeting perpetraitor had been taking alcohol or a mood-changing substance.
  • During shift 24.00 – 08.00 BST 5-6/7/12, non standard targeting by exposure to waves, starting at 04.05 BST.  Time did not exceed the fifteen minutes research allowance as targeting unit lost power, because the headset was vacated and left on. Both perptraitors were absent from the unit during that time.  The vacated headset appeared to trigger the attention of others, who logged on to a virtual environment, not physically located at the same installation, to establish why the headset was left on.
  • Sleep deprivation.

07-08-2012

  • Sleep deprivation.
  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised intervention in Blogspot while drafting my blog, reported to Apple Computers.
  • Sense of smell targeted.

08-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Block on internet access to mail, reported to Apple Computers.
  • Sense of smell targeted.
  • Sleep deprivation.

09-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.
  • Digestive system ph targeted.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.

10-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.
  • Digestive system ph targeted.
  • Sleep deprivation.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.
  • Blocking internet access to Blogspot, reported to Apple Computers.

14-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Blocking internet access to Blogspot, reported to Apple Computers.
  • Sleep deprivation.

15-08-2012

  •  Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Blocking internet access to Blogspot and WordPress, reported to Apple Computers.
  • Sleep deprivation.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.

16-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions on WordPress blog.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.

17-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.

18-08-2012

  • Psychotronics standard interface.
  • Exposed to infrared frequency for over 40 minutes.
  • RMN stimultion of cerebral cortex to induce symptoms of dehydration, toxification and breathing difficulties.
  • Interference with eye focus, laser targeting of eye
  • Sleep deprivation
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.

19-08-2012

  • Psychotronics standard interface.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.
  • Blocking internet access to Blogspot, reported to Apple Computers.
  • Sleep deprivation.

20-08-2012

  • Psychotronics standard interface.
  • Unauthorised intervention blocking internet access.

21-08-2012

  • Psychotronics standard interface.
  • Unauthorised intervention blocking internet access.
  • RMN stimulation of cerebral cortex to induce symptoms of breathing difficulties.
  • Short-term memory manipulation.

22-08-2012

  • Psychotronics intermittent signal.
  • Breathing difficulties from synthetic noxious chemical frequency applied to living space.
  • Short-term memory manipulation.

23-08-2012

  • Psychotronics intermittent signal.
  • Force field created in attempt to break perceived jamming of signal. Side effects.
  • Unauthorised blocking of several Apple computer applications.
  • Breathing difficulties from synthetic noxious chemical frequency applied to living space.

24-08-2012

  • Psychotronics intermittent signal. Tests to establish cause and extent of signal disfunction including visual imaging, audio reception, subject intervention, subject response.

25-08-2012

  • Psychotronics intermittent signal.
  • Reduced exposure to frequency devices.
  • Unauthorised blocking of several Apple computer applications.
  • Breathing difficulties from synthetic noxious chemical frequencies.
  • RNM used to produce synthetic acid within thyroid and digestive tract, to alter ph level and linked to fast acting cancers.

26-08-2012

  • Psychotronics intermittent signal.
  • Reduced exposure to frequency devices.
  • Interference with natural eye focus function.
  • Unauthorised blocking of access to WordPress blog, reported to Apple computers.

27-08-2012

  • Psychotronics intermittent signal
  • RNM used to produce breathing difficulties for over 30 minutes from 21.34-22.10 BST.
  • RNM used to produce synthetic heart beat anomalies
  • RNM used to produce synthetic acid within thyroid and digestive tract, to alter ph level, linked to fast acting cancers.

28-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • RNM used to produce synthetic heart beat anomalies
  • Unauthorised blocking of several Apple computer applications.
  • Malicious damage to files in iPhoto library.
  • Breathing difficulties from synthetic noxious chemical frequencies.
  • RNM used to produce synthetic acid within digestive tract, to alter ph level, linked to fast acting cancers.

29-08-2012

  • Psychotronics reduced interface.
  • Reduced exposure to frequency devices.

Targeted individual was out of doors or travelling for over 12 hours.

30-08-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised blocking of access to Blogspot and WordPress, reported to Apple computers.
  • Malicious damage to files in iPhoto library.

31-08-201

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Malicious alteration of family photographs in Apple computer IPhoto Library.
  • Creation of illict shared areas on Apple computer Finder in names of Bert, bthub3 and kat-pc.  Reported to Apple computers.
  • Attempt to wipe short-term memory to prevent reporting.
  • RNM targeting of lymph glands and thorax, linked to  fast acting cancers.

01-09-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised blocking of access to Blogspot and WordPress, reported to Apple computers and Google.  Access enabled.
  • Targeting eyes.  Note: This used to be included in ‘Standard Exposure’, but in future will be specified.
  • Several events of exposure to heat either by microwaves or infrared radiation.

02-09-2012

  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Targeting eyes.
  • Several events of exposure to heat either by microwaves or infrared radiation.
  • Incapacitating breathing difficulties from synthetic noxious chemical frequencies.
  • Unauthorised removal of copies of documents on my Apple computer, including this one.
  • Re-creating password-protected shared area ‘bthub3’ on my Apple computer.

03-09-2012

  • Psychotronics standard interface.
  • Exposure to heat either by microwaves or infrared radiation.
  • Unauthorised changes to photographs of people.
  • Intermittent attempts to block internet access throughout a 6-hour period from 06.10 a.m.- 12.10 p.m BST.

04-09-2012

  • Recreation of illicit shared area on Apple computer Finder in name of bthub3.
  • Exposure to heat either by microwaves or infrared radiation for over one hour.
  • Exposure to other microwave technology with greater tissue-depth of impact.
  • Targeting eyes.
  • Re-creating unauthorised password-protected shared area ‘bthub3’ on my Apple computer.

05-09-2012

  • Psychotronics standard interface.
  • Reduced exposure to standard frequency devices.
  • Exposure to microwave technology with greater tissue-depth of impact.
  • Breathing difficulties.
  • Illicit manipulation of computer data.

06-09-2012

  • Psychotronics standard interface.
  • Exposure to heat either by microwaves or infrared radiation.
  • Illicit manipulation of computer data.

07-09-2012

  • Psychotronics standard interface
  • Reduced exposure to standard frequency devices.

08-09-2012

  • Psychotronics standard interface.
  • Reduced exposure to standard frequency devices.
  • Subject of training for perpetraitors on synthetic telepathy – possibly exam conditions.
  • Illicit manipulation of computer data.

09-09-2012

  • Psychotronics standard interface.
  • Exposure to electromagnetic force field.
  • Focused microwave targeting of head.
  • ELF targeting of intestine using non-standard equipment at 18.20 BST.
  • Exposure of face to heat either by microwaves or infrared radiation.
  • Microwave targeting of body.
  • Illicit manipulation of computer data and reconstruction of illicit shared area.

10-09-2012

  • Psychotronics standard interface.
  • Standard Exposure to frequency devices.
  • ELF targeting of intestine using non-standard equipment at 03.30 a.m. BST – halted by Targeted Individual activity.
  • Interference with Apple computer operations and Pages computer files.

 

While updating this blog on 11 August 2012, I observed that unauthorised alterations were made after I saved the update, requiring further amendment.  I check the accuracy of this record, but cannot guarantee that what is recorded at a specific point in time is what I intended the record to state.  My gratitude goes to WordPress, for maintaining the best security they can under difficult circumstances.

Targeted Individuals: Perpetraitor Parasites

PERPETRAITOR PARASITES

The development of psychotronics represents an amazing technological advance, with beneficial therapeutic applications, such as  enhancements for those with impaired hearing and eyesight.  Tragically  the technology is being pursued for the potential harm it can cause. Those who seek to use the technology for criminal activities have deselected themselves from the human race. Since my post on Perpetraitor Profiles I have had further opportunities to note and record more about those who carry out electronic harassment and psychotronic torture of targeted individuals.

THEIR MINDS HAVE NO FIREWALL

Bearing in mind that psychotronic interaction with Targeted Individuals is a two-way communication process, that means that when they are studying me, I might get insights into what’s going on with them as well.  And they know that, because they tried to install a human firewall after my last post, but that arrangement hasn’t been working too well.

What does that mean?  Well when I first got targeted, the criminal bosses allowed less experienced staff to interact directly with my mind.  But later they realised that this could enable me to look over their shoulders.  Then they tried having one suitably-equipped person to interact with me and tell less experienced staff what I was thinking and doing.  That meant that the less experienced staff got it second hand. I noticed that this arrangement might not be too effective, because only the ‘equipped’ person could say anything, and it might not be accurate and no one would know. Possibly for this reason, the criminal bosses gave the supervisor separate simultaneous access.

The problem with giving the supervisor separate simultaneous access is that, in this particular business model, the supervisor is the one operating the torture equipment.  Having separate access means that no one knows exactly what he is doing. There are volumetric reports for the equipment, but I doubt if that that is enough to ensure an accurate record. Also, certain events led me to conclude that those with access to torture equipment had other equipment as well, which did not have an automatic activity record, and which could be exploited to abuse others.

EQUIPMENT DOESN’T ALWAYS HIT THE TARGET

According to the author and technical specialist, Robert Duncan*, perpetraitors have screen monitors that show them where to point when directing harmful/painful energy towards victims. For about two weeks I noticed that perpetraitors seemed fixated on one point on my leg.Eventually I realised that it was probably not my leg they were aiming for. Could it be that their shiny new equipment needs calibration?

Perpetraitors are sitting in their brand new ivory tower, having interaction with their screens, but if their equipment isn’t correctly calibrated they may not be getting reliable feedback about what TIs are experiencing. It could mean that when perpetrators thought they were administering a medium shock, they might be administering a higher level, in situations that could be life-threatening to the targeted individual.  This is unlikely to be what perpetraitors want,  because without a continuing population of TIs, they would be out of a job. If there is any business rationale for what they are doing, a possible flaw in technical performance might have implications for things like research contracts and continued viability.

*Project: Soul Catcher, Volume Two, Secrets of Cyber and Cybernetic Warfare Revealed, Page 237 – Torture Database Screen’, Robert Duncan and   the Mind Hacking Strategy Group 2010, http://www.freedomfchs.com/thematrixdeciph.pdf.

THEIR MINDS HAVE NO FIREWALL – NOR HAS THE TARGETED INDIVIDUAL

The perps were chatting on to each other as usual, and what they were saying was echoing through my mind, because I was obliged to listen to them.  If I had been wearing the right headset or had electronic receptors stuck to my brain, the frequencies I was hearing could have been recorded.   Even if  perpetraitors have paid for the best security at their hideout, other parties that have the technology could be eavesdropping through me.  The perpetraitors seem to disagree with my view on this, but that doesn’t mean it isn’t happening.

According to Dr John Hall*, criminal perpetraitors are hacking into satellites. If that is happening, it could mean that other parties could also listen in and record what I was hearing, using advanced satellite frequency detection devices.  They could then translate the frequencies into speech for their own purposes.

To use an analogy, if the perpetraitors were a bank, they might have reasonable in-house security, but that wouldn’t stop other criminals from abusing their ‘ATMs’, because the weak link in the chain is the person who has a bank account and who may not be aware that their PIN number could be detected. And none of this sounds like good news for the targeted individual. I hope the perpetraitors take care not to think about their credit card details and passwords when interacting with their equipment.

*A New Breed. Satellite Terrorism in America, Dr John Hall, 2009.

SATELLITE TECHNOLOGY GIVES THEM THE EDGE BUT THEY CAN GET CUT

I do not claim to have any knowledge of technical things, so this is just how it comes across to me: TIs often report that the perps can see what TIs are seeing, as if looking through their victims’ eyes.  This involves satellite technology* and Remote Neural Monitoring**.

On 30 April 2012, in an article about enhancements to US Navy uniforms, the UK Newspaper the Daily Mail also revealed one of a range of new ‘cyborg’ technologies under test by the Pentagon. The article  stated:

‘Another groundbreaking high-tech military system will allow any soldier in a unit to ‘see’ through the eyes of any of his comrades’.*** 

On October 11 1999 the BBC News Online Science Editor Dr David Whitehouse reported that ‘a team of US scientists have wired a computer to a cat’s brain and created videos of what the animal was seeing’.****  

The article anticipated that ‘It is also conceivable that, given time, it will be possible to record what one person sees and “play it back” to someone else either as it is happening or at a later date’. 

Perpetraitors also have the option of looking not only at what you see, but also directly at you from satellites, using laser particle beam technology that allows them to see through walls, roofs, cars etc.  This option is more likely  to be available to the supervisor. If perpetraitors only have ‘see-through-eyes’ vision, they may be left in the dark if the TI closes both eyes or is in an unlit room. Having both views  usually clarifies what is going on, but can create two interpretations of what is happening. Sometimes it can be like two people blindfolded trying to put the tail on the donkey.

*See ‘A New Breed. Satellite Terrorism in America, Dr John Hall, 2009.

** Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. http://www.bibliotecapleyades.net/scalar_tech/esp_scalartech12.htm.

***Http://www.dailymail.co.uk/sciencetech/article-2137347/Cyborg-New-American-military-uniforms-test-soldiers-urine-warn-nuclear-biological-attack.html.

**** BBC News Online Oct 11, 1999, Looking Through Cats’ Eyes Fuzzy, But Recognizable, Dr. David Whitehouse, A BBC News article reported on the first pictures from an experiment to see through the eyes of a cat. http://news.bbc.co.uk/hi/english/sci/tech/newsid 471000/471786.stm.  Source: Cold War Nonconsensual Experiments: The Threat of Neuroweapons and the Danger it will happen again, Cheryl Welsh, J.D., www.mindjustice.com.


TIPS FOR TARGETED INDIVIDUALS

  • if perpetraitors are invading your thoughts and you can think in another language, try doing that for a bit. It puts the perpetraitors off, because their criminal bosses want them to understand what you are saying.  If you carry on they will have to bring in someone who can speak the same language, and that is not always easy, even when no expense is spared.
  • I tried this, using a few phrases of a foreign language that I had picked up, and some songs from a CD in that language. I regularly repeated the words in my mind.  This resulted in two language experts being brought in.  They both left almost immediately on ethical grounds, and one of them was traumatised by what he  found out about targeting of individuals.
  • If you are fed up with intruders trying to take you over, and want to meet up with your friends, pick a venue that has built-in protection against a range of frequency devices.  Many airport hotels now have this, and some can be reasonably priced.  Just make sure you are within the shielding – avoid the foyer and bars open to non-guests.
  • Most people are aware of the next point, but I wasn’t, so I will mention it.  Before you go to sleep, it is advisable to switch off all wireless/internet routers and unplug internet cable connections to phone filters before you go to sleep.  Take strategic electric plugs out of sockets. Ensure that cell phones, tablets etc are not only switched off but encased in metal or wrapped in aluminium, as they can be used as tracking devices even when switched off.

 

 In the course of preparing this post my laptop was crashed externally so many times that it no longer worked, and I had to buy another one.  I also had to get a new filter for my Broadband internet.  The day after publishing this post the photo library in my iPhoto application, containing nearly 5,000 photographs was wiped out.  I do have a back up, so I reloaded the photos, and half an hour later they were wiped again.

Targeted Individuals: Why People Get Targeted

EVER WONDERED WHY PEOPLE GET TARGETED?

An independent researcher Marshall Thomas developed an assessment of why some people got targeted and not others.   In his book ‘Monarch-the New Phoenix-Program’* he states that:

‘After meeting with 220 individuals and subjecting their case studies to an epidemiological analysis it was possible to assign the group with a collective set of risk factors. It is helpful if the reader will imagine a huge database with millions and millions of names… perhaps everyone in the United States. The targets are chosen with a computer program that gives a cumulative weighted score to each name when they engage in a certain proscribed activity. Picture this computer program acting as an elaborate three strikes and you’re out program. Every targeted activity or behavior carries a weighted score and every entry to the TI’s name increases their cumulative score. When the score reaches a certain quantity then that person is automatically enrolled in the program as a target’.

www.scribd.com/doc/15360318/Monarch-the-New-Phoenix-Program-II,

TARGETING CRITERIA

Marshall Thomas shows how the scoring works. Taking the case of a lady in her seventies who was targeted, he examines the reasons:

  • Strike One: Civil rights activity.
  • Strike Two: An FBI file.
  • Strike Three: Working for a major oil company as well as any personal or family association with the intelligence community.
  • Strike Four: Foreign travel to certain countries as well as learning a foreign language and integrating with a foreign culture.
  • Strike Five: Being permanently injured and on disability – a “drain on the system”*.

*Extracts from ‘Monarch-the-New-Phoenix-Program-II’, Part VIII, Page 34 onwards. 

Marshall Thomas notes an additional criteria – whistleblowers, which he considers ‘may comprise as many as 5-10% of all cases of targeted individuals’.

He states that ‘There is a great deal of variability across the range of TI’s in both the reasons for their targeting as well as in the manner that they are targeted. Academics, scientists and inventors who possess intellectual property of value are often targeted to relieve them of their ability to retain their patentable intellectual property. Microbiologists are particularly well represented in the target population.

Multiple targets share the risk factor of belonging to religions such as Jehovah’s Witnesses, Mormons, Buddhists, Christian sects, and other groups that are not mainstream religions, a category that will be referred to as religious dissidents. Twins are very common targets, usually one twin is overtly targeted with electronic harassment and microwave weapons while the other twin functions as the control group’.

PEOPLE ALSO GET TARGETED RANDOMLY FOR USE IN SECRET RESEARCH PROGRAMMES

The author and whistleblower Robert Duncan, in his free e-book ‘The Matrix Deciphered’*- puts human experimentation as the main reason why individuals are targeted. He says that:

‘Two high level FBI agents and a couple CIA agents have come forward to validate the existence of a MKULTRA like project that continues to grab random people for mind control experimentation.’

‘Two of these have since become part of the program and endure daily psychotronic tortures. All the torture can be done using directed energy psychotronic weapons with the so called continental ballistic missile surveillance defense grids’.

Robert Duncan says his reason for writing the book was ‘to help consolidate the technical information about the most advanced, secret military weapons being tested on civilians throughout the world, and to give new test victims a literary reference that they can give to police officers, psychiatrists, and family members so that they can be quickly educated on what is happening them’.

Robert Duncan, himself a TI, is a professor in computer science and business. He states that he has  ‘interviewed over two hundred people and worked on the highest level of military projects for the U.S., NATO, and U.K. and have given videotaped testimony to senators and representatives’

* www.freedomfchs.com/thematrixdeciph.pdf

WHY MORE WOMEN AND MINORITIES GET TARGETED

Several researchers have commented on the significantly higher numbers of women in the population targeted individuals.  One of the reasons for this could be compliance with the US Public Law 103-43 which requires that:

1.  ‘Women and minorities be included in all clinical research studies, as appropriate for the scientific goals of the work proposed.

2.  Additionally, NIH policy requires that women and members of minority groups and their subpopulations be included in Phase III clinical trials in numbers adequate to allow for valid analyses of sex/gender, racial, and/or ethnic differences in intervention effects.

3.  NIH policy also states that children (defined as persons under the age of 21) be included in human subjects research supported by NIH unless an acceptable justification for their exclusion is provided.

4.  The NIH Peer Review regulations (42 C.F.R. 52h) specify that reviewers will take into account, in determining overall impact that the project in the application could have on the research field involved, the adequacy of plans to include both genders, minorities, children and special populations as appropriate for the scientific goals of the research.

5.  Therefore, reviewers must evaluate the proposed plans for inclusion of women, minorities, and children as one of the review criteria that factor into the evaluation of scientific and technical merit’.

This underlines the point that targeting is about nonconsensual human experimentation, and the need to get a suitable research population.

Source: ‘Human Subjects Protection and Inclusion of Women, Minorities, and Children, Guidelines for Review of NIH Grant Applications’, www.grants.nih.gov/grants/peer/guidelines_general/Human_Subjects_Protection_and_Inclusion.pdf

THE COMBINED TARGETING STRATEGY

Marshall Thomas sees the three main reasons for targeting of individuals as merging into an overall strategy:

–  perfecting (EMW) electromagnetic weapons on unwilling people – human guinea pig experiments.

–  neutralizing potential enemies on a hit list, political activists and whistleblowers, by using them as the unwilling subjects of the human experimentation.

–  using extreme trauma, sleep deprivation, and other torture techniques delivered by EMW to the targets to further refine the science of behavior modification.

www.marshallgthomas.blogspot.co.uk

A WORLDWIDE PROGRAM TARGETING THE CIVILIAN POPULATION

In his book The Hidden Evil’, author and researcher, Mark M Rich states:

‘Although whistleblowers, activists and others have been targeted, the scope of this worldwide program is too big for it to be limited to a parallel justice system… According to both McKinney* and Moret*, it has moved beyond experimentation and is being widely used on the civilian population’…  ‘Dr Kilde* adds, “Today ANYONE CAN BECOME A TARGET, even those who invented the system”.  www.freedomfchs.com/thehiddenevil.pdf

Mark M Rich is another targeted individual. His website is www.gangstalking.wordpress.com/category/mark-m-rich/

*Sources quoted by Mark M Rich:

The Investigative Journal, Julianne McKinney; 

www.sm4csi.home.xs4all.nl/nwo/MindControl/Microwave.Harassment.And.Mind-Control.Experimentation.htm

www.arcticbeacon.com/audio/2006/2006-RBN/04-2006-RBN

Co-op Radio, Leuren Moret; 

www.youtube.com/watch?v=YDFoX1Hzo3w

Microwave Mind Control, Dr Kilde;

http://lordlangerz.wordpress.com/2012/03/18/the-illuminatis-secret-mind-control-operations-dr-rauni-leena-luukanen-kilde/

Targeted Individuals: Perpetraitors Secret Weapon

This post covers:

  • The secret weapon that gives perpetraitors control
  • How the criminal perpetraitors do it
  • What methods we can use to protect ourselves
  • My personal experience of trying out one of the methods

Many Targeted Individuals (TIs) have had the courage to write about their experiences, either on the internet, or in books.  Some experiences appear to be common to most TIs, including remote pain transmission, exposure to dangerous levels of microwaves and altered states of awareness. Some also describe ‘gang-stalking’ and others report impressions of synthetic telepathy, paranoia and psychosis.

THE SECRET WEAPON THAT GIVES PERPETRAITORS CONTROL

There is one type of energy weapons approach that gives perpetrators control over their victims. In her article ‘On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology’, Journal of Psycho-Social Studies 2003, the psychoanalyst Dr Carole Smith.PHD, states:

‘In 1969 Dr Jose Delgado, a Yale psychologist, published a book: “Physical Control of the Mind: Towards a Psychocivilized Society”. In essence, he displayed in practical demonstrations how, by means of electrical stimulation of the brain which had been mapped out in its relations between different points and activities, functions and sensations, – by means of electrical stimulation, how the rhythm of breathing and heartbeat could be changed, as well as the function of most of the viscera, and gall bladder secretion. Frowning, opening and closing of eyes and mouth, chewing, yawning, sleep, dizziness, epileptic seizures in healthy persons were induced. The intensity of feelings could be controlled by turning the knob, which controlled the intensity of the electric current.’

http://www.globalresearch.ca/index.php?context=va&aid=7123

What we are talking about in everyday terms – I do not pretend to know much about the technical side – is that by directing an electronic weapon at a very specific part of the  brain, perpetrators can alter the victim’s state of awareness, including:

  • Sudden onset of sleep/sleep deprivation
  • Going unconscious
  • Forgetting what happened to them
  • Experiencing externally induced emotions
  • Synthetically induced paranoia and psychosis
  • Heart malfunction
  • Breathing difficulties – asphyxia can be induced by altering frequencies in the brain that control breathing
  • Synthetically induced frequencies that replicate inhalation of noxious gases/chemicals.

If it wasn’t for this one perpetraitor capability, targeted individuals could probably get up and walk away from much of what was targeted at them, most of the time.

HOW DO THE CRIMINAL PERPETRAITORS DO IT?

In his book ‘A new breed: satellite terrorism in America’ – www.satweapons.com, Dr John Hall has drawn attention to the use of satellite technology by criminal perpetraitors for targeting individuals remotely.  Dr Carole Smith’s article supports this:

‘A more disturbing use is the system developed for manipulating and disturbing the human mental process using pulsed radio frequency radiation (RFR), and their use as a device for causing negative effects on human health and thinking. The victim, the innocent civilian target is locked on to, and unable to evade the menace by moving around. The beam is administered from space’…*

‘The technology that originated in the years of the arms race between the Soviet Union and the West, has resulted in using satellite technology* not only for surveillance and communication systems but also to lock on to human beings, manipulating brain frequencies* by directing laser beams, neural-particle beams, electro-magnetic radiation, sonar waves, radiofrequency radiation (RFR), soliton waves, torsion fields and by use of these or other energy fields which form the areas of study for astro-physics.’

*My emphasis

WHAT CAN WE DO TO PROTECT OURSELVES?

According to Mr Barry Trower, a well-known advocate of targeted individuals*, TIs can protect themselves  using several layers of aluminium foil as shielding.  In a talk recently uploaded to YouTube, he also provides a range of other advice  – www.youtube.com/watch?v=09mpvscHiKI&feature=youtu.be.

*www.thermoguy.com/pdfs/filings/[20]%20Amended%20Declaration%20of%20Barry%20Trower.pdf

I have read some things on the internet that suggest that anyone who uses aluminium foil – such as for tin hats – is deluding themselves.  But according to Wikipedia:

‘The notion that a tin foil hat can significantly reduce the intensity of incident radio frequency radiation on the wearer’s brain has some scientific validity, as the effect of strong radio waves has been documented for quite some time. A well-constructed tin foil enclosure would approximate a Faraday cage, reducing the amount of … radiofrequency electromagnetic radiation passing through to the interior of the structure…’

“The efficiency of such an enclosure in blocking such radiation depends on the thickness of the tin foil, as dictated by the skin depth, the distance the radiation can propagate in a particular non-ideal conductor. For half-millimetre-thick tin foil, radiation above about 20 kHz (i.e., including both AM and FM bands) would be partially blocked, although tin foil is not sold in this thickness, so numerous layers of tin foil would be required to achieve this effect’…

‘The effectiveness of the tin foil hat as electromagnetic shielding for stopping radio waves is greatly reduced by it not being a complete enclosure.’

www.en.wikipedia.org/wiki/Tin_foil_hat

I TRIED IT OUT

Recently, perpetraitors were directing brain targeting to make me struggle for breath, or lose concentration, particularly when I write this blog.  So I decided to give the aluminium hat a try – and I found that IT WORKS.  The lack of oxygen and loss of focus stopped.

There are things that aluminium foil doesn’t do, including blocking synthetic telepathy, but if you want to stop perpetrators taking over your brain, based on my experience, several layers of aluminium foil, covering the head completely, will do it.  You can buy the foil quite cheaply in places like supermarkets and general purpose stores.

The risk is mainly when you are indoors at home, and staying still, or asleep. If you are outside in fresh air and moving about, the risk is much lower.

References

Dr Carole Smith.PHD – ‘On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology’ – http://www.globalresearch.ca/index.php?context=va&aid=7123

Dr John Hall – ‘A new breed: satellite terrorism in America’ – www.satweapons.com

Mr Barry Trower – www.youtube.com/watch?v=09mpvscHiKI&feature=youtu.be

www.thermoguy.com/pdfs/filings/[20]%20Amended%20Declaration%20of%20Barry%20Trower.pdf

Could some British nationals visiting the USA be at risk of becoming targeted individuals from criminal operations?

I have heard reports that a pattern is emerging regarding British nationals visiting North America, who have become targeted individuals, mainly as a result of criminal operations in the Los Angeles area.  I know of several cases, including my own, where this happened.  What is disturbing is that in some cases this activity followed British nationals back to the UK.  In one or two cases, family members or contacts in the UK were also affected.

Those in the UK visiting the US, particularly the South West, may wish to let the Foreign and Commonwealth Office know in advance.  The FCO’s routine advice is to ‘Register with our LOCATE service to tell us when and where you are travelling abroad or where you live abroad so our consular and crisis staff can provide better assistance to you in an emergency’.  That way, if anything happens to you, at least they know where you were, your due date of departure and contact details.   See ‘General Registration’ under http://www.fco.gov.uk/en/travel-and-living-abroad/travel-advice-by-country/north-central-america/united-states.

If you are targeted while in the US, let the FCO know.   It is as well to be aware that targeting of individuals could continue even after you return to the UK.  If you notice anything unusual that makes you suspect that you are still being targeted – see the section in my ‘Home’ post ‘Are you a targeted individual?’, you may want to update the FCO on that as well.  For example, if your internet communications or electronic computer connections appear to be behaving strangely.

It may be that visitors to the US from other countries are having similar experiences.  The more information that is made publicly available about the extent of criminal activity, the more likely it is that perpetraitors will be apprehended.

This post is also available at www.Martinacable.blogspot.com

Other posts are available at www.Martinacable99.blogspot.com