Tag Archives: Electronic harassment


There are a few things I wanted to say about developments affecting Targeted Individuals, from my
perspective.  Everything I refer to is in the public domain, and no doubt much more will be flooding
out over the coming weeks and months.


We all know about US mind control experiments and the bad things that went on in the 1950s after the second world war, the cold war, Vietnam and more recent developments. After Vietnam, which used conscripted US troops, the Targeted Individuals began to appear, but it was not obvious to everyone where that was going.

Picture opposite: Peasants suspected of being Vietcong under detention of U.S. army, 1966, en.wikipedia.org/Wik/Vietnam_War

‘Thousands of American citizens have been publicly claiming for years that they are under attack from directed energy weapons that attack their physical bodies, and their central nervous systems. Hundreds of websites have sprung up on the internet and these distraught and tormented people have banded together in numerous groups seeking redress and relief from their elected representatives. They have brought legal cases to trial in both the United States and in international forums on human rights. Human rights activists have been besieged by them for help, but all such petitions, and court cases have run up against the problem of a lack of physical evidence. The entire judicial system is built upon the concept of physical evidence and people who are being attacked with invisible bullets are left with none’. Source: Marshall Thomas – Monarch II  -Victims.pdf http://www.monarchnewphoenix.com/

At first it seemed to be some sort of internal problem for one nation state. But with so many international groupings, special friends clubs etc, it was not appreciated at the time that there could be an international dimension that did not represent any nation state and transcended national boundaries.


No nation state, whatever their political structure, wants to give their power away to an invisible enemy. That’s what defence and military intelligence are meant to deal with. But most human beings tend to assume that there are standards, ethics, boundaries that they and others would not cross, and that even within defence organisations they would be able to spot anyone who didn’t share those standards.

But what if there was a technology that could capture people invisibly, not just brain-wash them, but impose subtle re-wiring on their brains and in some cases squirt somebody else’s mindset onto them. Those programmed individuals would then be released back into their environment to engage in every-day life under remote control.

Whether or not perpetrators interacted with TIs thereafter, they would use them in any way that served their purposes, as:

  • unwitting spies on others, recruiting more Tis,
  • unwitting sleeping activists
  • non consensual research subjects for all kinds of weapons research, including research on methods of torture.
There is a theory that if a group of 2000 strategically significant people in a country are taken
over, supported by a number of tactical people also targeted, the country is vanquished by default.
This stealth method relies on invisible electronic weapons. But the plans failed. In the new
scenario, perpetraitors’ bosses may begin to focus on TIs as hostages, in the hopes that
negotiation might be a possibility.
Perpetraitors were not told that at first, but now they know, and they are treading water, waiting for
new instructions that may never come, while those that managed to leave the sinking ship
negotiate their exit visas.
Picture opposite, courtesy of  Project Gutenberg – free ebooks www.gutenberg.org/
How could all this happen without governments
finding out? Well the mafia has always been in
town, and governments were always aware of
that, but no matter how senior an elected
representative may be, they are still individuals,
with loved ones.At first, the implications of invisibility technology for ‘virtual’ abduction of targeted
individuals may not have dawned on everybody immediately. But by now, you can be sure the
implications of what has been going on definitely have dawned on everyone.


If you worked for a nation state in an international grouping of national representatives, perhaps in the area of intelligence and security, the last thing you would want is for your country, your town, your family to be taken over by some ghastly group of nasties. Even allowing for diplomatic niceties, you would soon be networking with others who didn’t like what they saw either. The threat would be identified, assessed, and other arrangements would be put in hand to ensure the defence of the nation and protection of loved ones. And increasingly, that is what is happening.


The plan relied on major covert initiatives in a large number of other countries. But in practice it was never going to work on residents of other countries, because the system required gang-stalking – physical threats and brutality to support invisible weaponry. And that is too hard to arrange across the world on the scale necessary to ensure success, particularly when people realised that collaboration did not buy protection.


No one now thinks that war is the answer to problems that have blighted human life throughout history. Particularly when traditional weapons of last resort are no longer operational for wartime purposes. The diplomatic approach is containment and isolation, disentanglement from old out-of-date treaties, reduction in shared information, building of new bridges elsewhere, and development of feasible new technologies to keep the nasties out.

This in my view is what has been quietly going on, and already many people have turned their face
towards new objectives that offer real prospects of a better life for everyone while providing an
effective defence system. I say defence, rather than attack, because the old belief that attack is the
best method of defence no longer applies, if it ever did. If you have a system that will stop invisible
weapons:- electronic, radio, light, sound, atomic, particle or other systems, from reaching your
country or its people, that is a good start. And this is now happening.
How can we tell it is happening? Well for one thing, the flood of technical and scientific information
that is appearing in the mainstream press indicates that there is now greater freedom of
information. See my previous posts for details of what is now being openly reported. Gone are the
days when you had to scour the alternative media for hints of what might be going on. And this is
reflecting recent well-publicised changes in control over the media at international levels.
What is being reported now  includes incredible advances in science, particularly weapons
technologies.  Less is being discussed about measures to counter such weapons, but measures
do exist, and information about them is available in the technical media, for those who know where
to find it.

If certain insane plans had gone ahead unobstructed, one day, everyone would be a Targeted Individual. There is a beautiful part of Utah called ‘Zion National Park’, but the beauty of that part of the world, and some others, was smeared with a terrible stain – torture, cruelty, insensitivity to life and crimes against humanity. Some people made a link between what was going on there and the 2012 Olympics… but the 2012 Olympics were planned long ago, and many things changed, in ways that perpetraitor bosses had not predicted.

Some people thought that the 2012 Olympic Games would signal a special event that finally announced to the world what supposedly many people would already know – that key players and elected representatives across the world had been vanquished by an invisible enemy, and that a fait-accompli had been achieved, not through war but through stealth and invisible weapons. BUT IT DIDN’T HAPPEN. Why? Because most countries wised up to what was going on long ago, and took sensible preventative action.

‘The Games present an attractive target for our enemies and they will be at the centre of the world’s attention in a month or so. No doubt some terrorist networks have thought about whether they could pull off an attack. But the Games are not an easy target and the fact that we have disrupted multiple terrorist plots here and abroad in recent years demonstrates that the UK as a whole is not an easy target for terrorism. The national threat level at present is assessed to be SUBSTANTIAL – meaning that an attack is a strong possibility – one notch lower than has been the case for much of the last ten years. We are far from complacent. A lot of hard work still lies ahead and there is no such thing as guaranteed security. But I think that we shall see a successful and memorable Games this summer in London’…
‘The security preparations for the Games have been long and thorough. Members of my Service have been involved in advising on the physical design and security of the sites, but also in the accreditation of those working at the venues and in ensuring that intelligence collection and analysis for the security operation can meet the increased demand. This is not a solo activity. We are working as part of a mature and well developed counter-terrorist community in the UK and with the close support and co-operation of friendly Services overseas, who have been extremely generous in their assistance. We are also anticipating an Olympic security legacy after the Games – better intelligence coverage of potential threats, better integration at the local and national level of security and intelligence effort, and new, closer and better developed intelligence co-operation at the international level. I hope and expect that this legacy will live on well after the Games themselves have closed.’  
Source: THE OLYMPICS AND BEYOND, Address at the Lord Mayor’s Annual Defence and Security Lecture by the Director General of the Security Service, Jonathan Evans. Mansion House, City of London, 25 June 2012
‘More than 1,000 troops who had been on standby to bolster security at the Olympic Games have been deployed. Culture Secretary Jeremy Hunt said the 1,200 troops were to be used because ministers were clear that “we don’t want to leave anything to chance”…The move means 18,200 troops have now been deployed to the Games.’ http://www.bbc.co.uk/news/uk-18966360.

‘The shadow of terrorism has hung over the Games for a reason. The day after London won its Olympic bid on 6 July 2005, suicide bombers struck the city. After that, everyone knew these Olympics would be the first to be held in a “high threat” environment’…

‘The number of players involved in delivering what has been called the largest peacetime security operation in British history is certainly bewildering.’..Critics have asked whether the security is all too much, pointing for instance to the missiles on rooftops in east London. Would they really be used?’ … 
‘There is a secret chart locked in a drawer somewhere in Whitehall, another of those involved in security tells me when I ask that question, which plots with clinical detail how many people would die if an airliner crashed into the Olympic Stadium’…  http://www.bbc.co.uk/news/magazine-18923741
First of all, potentially everyone is a targeted individual.
There are particular problems for people living in the United States, though much has been going
on behind the scenes, with help from the international community, to stop further erosion of
internal and external national security. Some living in the US may smile wryly at the apparent
naivety of such a statement, and I understand why. But believe it or not, the nasties are actually on
the run. No you may not notice any change yet, but you may be one of the lucky ones who do.
If you live in a country in Europe, or some other places which have certain foreign bases permitted
within your national boundaries, you will have been allocated to an overseas perpetrator
‘supervisor’ for potential targeting. The way that works is that every country is divided up into
rectangles, and a perpetraitor unit using hand-held devices that can be carried in a small suitcase
is given charge of that area. They can’t target everyone, but they planned to focus on individuals
who might play a tactical or strategic role in their unfolding strategy.

That is bad enough, but what if a dividing line between one rectangle and another happens to fall between houses. And what if perpetraitors are not too fussy about who gets caught up in the beams they direct at Tis. There may be an overlap. That could mean that people get targeted twice by different units on a daily basis, and that others living in those houses may be affected.

Not all perpetrators can be bothered to do precision targeting of energy beams. This can mean that birds, bees, animals and fish may be affected. Where I live, birds can be seen dodging the microwaves to get to the food table. Only one song-thrush has fallen to the ground dead so far. But perpetrators don’t like our birds singing in the morning, because it isn’t morning for some of them, and a few of the louder birds have received personal attention from the perpetrators.

Recently I was rescued from a microwave
attack that began to affect not only people
where I live, but anyone in my vicinity. Hard-
working rescuers had jammed the perpetraitors’ signal, reducing their synthetic telepathy to a
murmur. In an attempt to counteract the jamming and recover their investment, the dim-witted
criminal perpetraitors exposed me and anyone near me to a 36-hour dose of microwaves with
enough power to support a large town, or fight a small war.
People walking towards me would suddenly lurch sideways as the illegally imposed
electromagnetic field surrounding me attempted to pull them into its ‘orbit’.  That type of microwave
beam does many things, including wiping short-term memory. So the memories of some
individuals in my vicinity may have been temporarily affected, not to mention credit card machines
in shops, bar-code readers in supermarkets and electrical circuits.
I tried to buy something in a shop using a debit card, and they had a power cut. Then it turned out
that a whole area of shops had a power cut. So we just had to go home. Luckily it was lunchtime…
But it was more disturbing when I went to a supermarket check-out one night, and the poor
gentleman at the till was so phased by the microwaves, that he couldn’t remember what he was
doing and asked me the same questions twice. He tried to input some bar codes but they didn’t
work, and a supervisor had to be called. At that moment, my perpetraitors realised their slip was
showing, and reduced the power for a little while.


From what I have observed so far, the plan for targeted individuals was intended to be that:

1. Strategic and tactical targets were identified.

2. TIs were prioritised in terms of threat or usefulness to the enemy.

3. Those with sufficient priority were assessed for viability, and if considered suitable, were given
tracking implants, and some mapping of brain and body neurology etc.4. There may be a long
backlog of such cases, but at some point, a TI gets to be called into the operating theatre, where
retinal camera, internal viewing screen, and communication wiring are implanted, using laser eye
surgery techniques, along with other things. How this is done I leave you to figure
out…Technologies for fast skin repair, using artificial tissue and skin as well, ensure that implants to
body parts fade quickly, and go unnoticed. But I had one double implant which took 8 days to fade.
I’m sorry if the picture below is harsh and crude, but it was taken shortly after I began to be
targeted. I woke up one day and found this mark on my leg.

Apparently, under terms recently negotiated, the new perpetraitors’ guidance manual says that TIs
should be asked – presumably telepathically – whether they are willing to work cooperatively with
the perpetraitors. This may be have a bearing on future international arrangements affecting how
TIs are identified and rescued.
Previously, this never happened, as far as I can tell, and perpetraitors were under the impression
that they should conceal the purpose of their torture activities from individuals. But now they are
supposed to explain to TIs that they are potential recruits to the invisible cause. So if you hear
them ask if you want to do something, that is your opportunity to make it clear to any independent
reviewers, or as a record on any perpetraitor recording systems or other recording systems, that
you declined to work with them.
Of course perpetrators don’t take no for an answer, and they prefer to make offers you cannot
refuse, linked to well being of loved ones. But they target those anyway, so don’t be fooled. In
practice, TI negotiation cannot happen with perpetraitors as they are all chipped, mind controlled,
and on incentives to target so many more TIs per week/month. The torture targeting is partly to
make TIs do what they want, but also because they want to research how best to torture people.
And Tis will get that whether they say yes or no.
If, despite electronic torture, TIs don’t cooperate, they may not be aware that the re-wiring has
happened. They may not be aware that others can see through their eyes, take pictures of what is
seen, and create visual and auditory hallucinations in their brains. They may at times be ill, lose
their jobs or relationships, or retain both if they hold strategically important posts. They may not
realise that the same thing is happening to their loved ones.
If Targeted Individuals do realise what is going on and resist, until recently, they were destined to
follow a familiar route –  torture, research and termination, depending on how much research
money they could bring in for their criminal perpetrators.  However, TIs are not noticeably dying in
large numbers these days, whereas the prognosis for perpetraitors is increasingly sombre.


To be effective, declining the perpetraitors’ invitation to collaborate must be loud, clear, capable of being picked up by a third party, and of sufficient duration that if a record is wiped it shows up on some other system. I have found that telepathic repetition / thinking of ‘Out demons out’ for a few minutes works quite well. Perpetraitors know there is a risk they may be monitored by international law enforcement groups and they take a coffee break.

There is a song from the 1970s by Edgar Broughton Band which includes chants of ‘Out demons out’- not for everyone as it is raucous, but its at:

It appears that perpetraitors are currently using me as one of their cases for training recruits on
how best to to make Tis do what they want, amongst other things. That really is adding insult to
injury.  Based on what I have observed, selection criteria for perpetraitor recruits must be very
esoteric, as intelligence, perception, knowledge of current affairs and awareness of what goes on
outside the USA are not essential requirements.

UPDATE – 15 November 2012

The table below shows details of people who I believe or know to be targeted individuals, most of whom live or work close to where I live, or with whom I have had regular dealings.  The reported ailments are not surprising, given the ages of those concerned, and would not arouse suspicion, apart from the sudden onset of the symptoms in people who were generally in reasonable health and did not have a medical history of such health complaints.  Details that might lead to recognition of the individuals have been altered to protect their identities.

I would have been on the list except that I use various shielding methods that prevent perpetrators from achieving results that would enable them to claim financial rewards under illegal research contracts.  Rather than waste the investment in mapping and tracking my frequency indicators, perpetrators locked onto me every night and then went fishing in the surrounding area for potential research cases.  After an initial period during which mapping and tracking presumably took place, the ill-health problems began to surface, although I was not always aware of this.  The cases listed below may be the tip of the iceberg.

The two perpetrators concerned, David – based in the US and Philip – based in the UK, cooperated in targeting the individuals concerned. Each are known to favour particular methods.  David uses infrasound cavitation techniques, typically to achieve fast-acting bowel complaints.  Philip targets hip joints with harsh pain consistent with electronic weapons, possibly maser delivery.  Philip operates using hand-held devices that fit into a special suitcase.  There is a time delay between initiating an attack and its impact.  David’s electronic delivery system from the US achieves real-time impacts.  It would not be impossible to establish, retrospectively, whether perpetrators had targeted these individuals, if access was obtained to records of their electronic weapons usage.

Targeted Individual
Nature of Apparent Criminal Assault
Elderly gentleman over 90 years, former military background, electronics specialism, US contacts. 3 months ago, following one afternoon in my vicinity, sudden onset of confusion as in a stroke or Alzheimer’s, followed by weakness, and then sleep state almost 24/7.
Lady over 70 years May 2012 reported pain in one hip, hip replacement operation performed 5 months later, now reporting pain in other hip.
Lady over 95 years Found wandering in bewildered state January  2012, followed by onset of chronic bowel complaint that has not responded to treatment.
Lady over 60 years After 5 days in my vicinity reported bowel complaint –consistent with infrasound cavitation weapon attack,diagnosed as bowel cancer, successfully treated with chemotherapy. 8 months later, after further day in my vicinity reported complications.
Lady over 50 years January 2012, acute bowel pains for several weeks –consistent with cavitation weapon attack – followed by quadruple bypass.
Lady over 80 years Sudden unexpected onset of psychosis, followed by removal to mental care unit.  Tests could not identify cause.  Psychosis disappeared on visit from her children.
Gentleman over 70 years, military background. Reported pacemaker problems.  Following investigations, put under observation.
The day following publication of this post, in which I reported the impact of high-intensity
microwaves on birds and insects, I went shopping and on returning to the house, found the front
door open.  We were unsure how this happened.  Next morning, on going into an upstairs room I

discovered what appeared to be a dead bird stuck to a piece of fly-paper suspended from the window.  See photograph opposite.  

When I first moved to my present address, in February 2012, the house was infested with large black flies.  I removed them by opening windows, fly-swats and fly-paper, which is safer than chemical sprays.  When my elderly relative living nearby began to be targeted, she also experienced a swarm of such flies. She happened to know an elderly gentleman who reported a similar experience, and who had the flies identified. Apparently they are a rare species not normally found in the UK.

While drafting this post on Blogspot, perpetrators were altering it as quickly as I wrote it.  Because of this, there may be alterations and omissions.  The WordPress version has also been illegally tampered with, changing formats.  Who would be so dumb as to leave their fingerprints all over the shop, after breaking in?  … That’s right, you’ve guessed it – xxx.

Websites that provide TI advice include the following:






 This post is about:

–  Implications of synthetic telepathy.

 – What is meant by ‘synthetic telepathy’.

–  What Targeted Individuals say they    experience. 

–  Technical basis of synthetic telepathy.

‘Without freedom of thought there can be no such thing as wisdom & no such thing as publick liberty without freedom of speech, Benjamin Franklin, 1722.’




How would you feel if someone far away could listen not only to what you were saying, but also to what you were THINKING!!  And what if that person commented on what you were thinking, in a way that no one else could hear.

That is what synthetic telepathy is about.  It is an invasion of privacy, and a breach of human rights. It offers the opportunity for espionage, impersonation and theft of intellectual property. Most people, including those inside military and state organisations, may not know or really believe it is happening, but corporate criminals within security industries are involved in weaponising thought.  Many Targeted Individuals know all too well what weaponisation of thought is about, because it is with them every waking and sleeping moment of their lives.

‘Freedom of thought (also called the freedom of conscience or ideas) is the freedom of an individual to hold or consider a fact, viewpoint, or thought, independent of others’ viewpoints. It is different from and not to be confused with the concept of freedom of speech or expression.’ http://en.wikipedia.org/wiki/Freedom_of_thought.

In the Universal Declaration of Human Rights (UDHR), which is legally binding on member states of the International Covenant on Civil and Political Rights, freedom of thought is listed under Article 18:

Everyone has the right to freedom of thought, conscience and religion; this right includes freedom to change his religion or belief, and freedom, either alone or in community with others and in public or private, to manifest his religion or belief in teaching, practice, worship and observancewww.en.wikipedia.org/wiki/Freedom_of_thought


Synthetic telepathy refers to a technology that can make you hear real people’s voices broadcast in your head, as if you were hearing a cell-phone conversation.  Perpetraitors can listen to your thoughts too, and you may not be aware they are doing so.  The implications of that are huge, and though the technology has been understood for some time, there is silence about it.  But now synthetic telepathy is becoming openly acknowledged as part of new weapons strategies in the US. Credibility gap?? Check these links:

  • Youtube video demonstrates synthetic telepathy 

All you need to do is point the energy device accurately at the electromagnetic field of the targeted individual, and they will hear the speech transmitted from the microphone.  The Youtube video at the link below demonstrates synthetic telepathy in action.


  • Pentagon report investigated lasers that put voices in your head:

‘A recently unclassified report from the Pentagon from 1998 has revealed an investigation into using laser beams for a few intriguing potential methods of non-lethal torture. Some of the applications the report investigated include putting voices in people’s heads, using lasers to trigger uncontrolled neuron firing, and slowly heating the human body to a point of feverish confusion – all from hundreds of meters away’. http://phys.org/news122567894.html#jCp, 2008.

  • The Army’s Bold Plan to Turn Soldiers Into Telepaths:

‘The U.S. Army wants to allow soldiers to communicate just by thinking.

The new science of synthetic telepathy could soon make that happen’.

http://discovermagazine.com/2011/apr/15-armys-bold-plan-turn-soldiers-into-telepaths,2011 and www.dailymail.co.uk/news/article-2127115/Pentagon-plans-telepathic-troops-read-minds–field-years, 2012.

  • Army developing ‘synthetic telepathy’:

‘Similar technology marketed as a way to control video games by thought’…

Read This Thought: The U.S. Army is developing a technology known as synthetic telepathy that would allow someone to create email or voice mail and send it by thought alone. The concept is based on reading electrical activity in the brain using an electroencephalograph, or EEG.’ 

http://www.msnbc.msn.com/id/27162401/ns/technology_and_science-science/t/army-developing-synthetic-telepathy/#.UFHxIUITvL8, 2008.

  • Army budgeted $4 million to give soldiers telepathy

The United States Army Research Office budgeted $4 million in 2009 to researchers at the University of California, Irvine to develop EEG processing techniques to identify correlates of imagined speech and intended direction to enable soldiers on the battlefield to communicate via computer-mediated telepathy. Source: http://en.wikipedia.org/wiki/Electroencephalography.


From what I have read, it is possible to direct waves at a person’s electromagnetic field and, using a microphone, to speak directly to their inner hearing function, bypassing the ears.  It may be that several types of radio waves could be used for this including infrasound – considered by some to have higher health risks – microwaves, and ultrasound, which has its origins in sonar.  The sound waves may resonate via the bones in the skull, or it could be that the waves are converted to audible speech by the earth, acting as a transducer.  The picture below was removed by perpetrators and had to be replaced. Perhaps this was because it reflects their synthetic telepathy systems too closely.


[A transducer is a device that converts one form of energy to another. Energy types include (but are not limited to) electrical, mechanical, electromagnetic (including light), chemical, acoustic or thermal energy.] http://en.wikipedia.org/wiki/Transducer

Theoretically, synthetic telepathy could be transmitted via satellite in the same way that satellite TV, long distance cellphones and Global Positioning Satellite data are communicated.  I live in the UK and regularly receive invasive transmissions from different parts of the US, often via a virtual chat room.


Many TIs report hearing voices of perpetrators abusing them, impersonating others and trying to manipulate them:

Ti Experience & Source

I had very violent depreciating vile voices or thoughts that came from people in hollywood. Leonardo De Caprio was one of them. Ben Kingsly was another. I have also had Arnold Shwarzenneger.’ Germany, 09/08/2012. http://www.godlikeproductions.com/forum1/message1112151/pg6
On January 13, 2009 I started to hear a voice that was nearly as loud as normal spoken words. I think that it was about 3 PM. This continued for exactly 10 weeks. As soon as I woke up, within 1 second I heared a message spoken by an angry male voice with aggressive intonation. This was repeated every few seconds the whole day long, until I fell asleep…In the summer of 2011 I heard a voice say regularly “I have cancer.” Then the voice disappeared.http://www.hearingvoices-is-voicetoskull.com/AboutTheAuthor.htm
I hear now voices in my head, which threaten me personally: We will kill you, you are already a zombie! We will erase your memory; We will kill your relatives!; On the 22nd of September you do not go to the demonstration ! Think about your relatives ! We will remove your legs and hands and all other body organs! We will turn you into a zombie! These voices torment me at night and inhibit any sleep. They ask me questions and demand that these are answered.. They affect my free will and control me. Without any doubt my human dignity is permanently violated and as the Human Rights are guaranteed by the German Constitution not only national but international rules of law are violated. www.scribd.com/doc/78957226/250-Cases-Torture-From-Europe.Page 128.

‘Attempted murder by arrhythmia brutal forced effort at maximum power.

Inductions to suicide through “Synthetic telepathy” Sound + + Stimulation (to nudge Stimoceiver) + generation of mental state (5 or 6 days of torture started 24 hr ON apparatus open (10-15 January 2005) + Possible psychoactive (17/70 hz)’






When I got targeted, I could hear people talking, quietly, in a different medium from normal hearing, more like what you would hear if you wore headphones.  If friends or family were talking to me, I didn’t notice the voices, but when I was alone, or on waking, I could hear them.  Generally they were talking to each other about me, consciously for me to hear, but sometimes they forgot and started talking to each other.  Very rarely did they address me directly.  That was nearly a year ago, and it continues. 

If you go out to a show, do sport, sing in a choir or watch something interesting on television, it is less likely that you will notice the voices. That may be why TIs report losing their job and becoming more isolated.  Perpetrators want your undivided attention, but they cannot get it unless you are alone or asleep. So if you want to avoid them, go outside, take part in things, and if possible, be around family and friends.

It may seem easy for perpetrators to talk via synthetic telepathy, but I found out they have to learn and practise before they reach a recognised standard, and they have to take an examination. I remember the first time that the perpetrator referred to by his peers as Phillip – the son of the perpetrator referred to as David, was learning how to use the psychotronic head set.  He wanted to talk to his colleagues, but he couldn’t.  They were shouting ‘Take the head-set off!”.  He was talking to me, not them, but didn’t realise it.


Communicating sounds from one person to another is possible over distances in the same way as with a cell phone, using microwave and lasers/masers.  Just as each person has a cell phone number, each person has their own unique electromagnetic field frequency, which can be identified by sound wave devices of many types, in a similar way to television, you have a transmitter and a receiver, and for long distances, satellite may be necessary.

Electrical activity can best be demonstrated by looking at the way an EEG machine works.  It shows brain wave activity and responses to sounds and other interventions.

But how are microwaves turned into words?  Apparently it is based on measuring blood flow to the brain for different sounds, reflected in electrical activity. A technique called functional magnetic resonance imaging to track blood flow in the brain has shown promise for identifying which words or ideas someone may be thinking about.

So first you dial a person’s frequency number, using a satellite tracking device like GPS.  Then you speak into a headset that translates your brain blood flow patterns into electronic impulses.

There is now a variety of brainwave-reading headsets on the market, mostly used for video gaming’.  Headset picture and quote from: http://www.bbc.co.uk/news/technology-15200386 and http://www.bbc.co.uk/news/technology-10647555

The electrical impulses are pointed by a focused laser/maser beam towards someone’s electromagnetic field and they pick up the resonance via the bones in their skull and ear. The impulses are translated into words by the brain in the same way as for normal speech.  Satellite is used except where both people are located nearby. Satellite tracking implies that the person receiving the call has an implant that transmits a frequency signal, but this is not always required. 

HOW SYNTHETIC TELEPATHY WORKSMeasuring Blood flow to the brain  

A new brain scanner has been developed to help people who are completely paralysed speak by enabling them to spell words using their thoughts.  http://www.bbc.co.uk/news/technology-18644084

fMRI is usually used to track brain activity by measuring blood flow.’ 

In June 2012 the BBC reported that  ’A new brain scanner has been developed to help people who are completely paralysed speak by enabling them to spell words using their thoughts.

It uses functional magnetic resonance imaging (fMRI) to help patients choose between 27 characters – the alphabet and a blank space… fMRI is normally used to track brain activity by measuring blood flow… Each character produces a different pattern of blood flow in the brain, and the device interprets these patterns…The study appears in Current Biology journal of Cell Press.  Bettina Sorger of Maastricht University in The Netherlands, one of the researchers working on the current study, told the BBC:

“The work of Adrian Owen and colleagues led me to wonder whether it might even become possible to use fMRI, mental tasks, and appropriate experimental designs to freely encode thoughts, letter-by-letter, and therewith enable back-and-forth communication in the absence of motor behavior.”

The team writes in the paper that because the noninvasive device requires “only little effort and pre-training, it is immediately operational and possesses high potential for clinical applications. www.bbc.co.uk/news/technology-18644084


On 1 February 2012 the BBC reported that ‘By studying patterns of blood flow related to particular images, Jack Gallant’s group at the University of California Berkeley showed in September that patterns can be used to guess images being thought of – recreating “movies in the mind”. http://www.bbc.co.uk/news/science-environment-16811042

The team focused on an area of the brain called the superior temporal gyrus, or STG. This broad region is not just part of the hearing apparatus but one of the “higher-order” brain regions that help us make linguistic sense of the sounds we hear.  According to the BBC, researchers at University of California Berkeley: ‘have demonstrated a striking method to reconstruct words, based on the brain waves of patients thinking of those words. 


The technique reported in PLoS Biology relies on gathering electrical signals directly from patients’ brains. Based on signals from listening patients, a computer model was used to reconstruct the sounds of words that patients were thinking of. The method may in future help comatose and locked-in patients communicate.

Several approaches have in recent years suggested that scientists are closing in on methods to tap into our very thoughts; the current study achieved its result by implanting electrodes directly into a part of participants’ brains: The discovery of language – electrical brain wave patterns:

 http://www.bbc.co.uk/news/science-environment-16811042.  The technique hinges on plotting brain activity across a number of frequencies


Science decodes ‘internal voices’, BBC News


In a 2011 study, participants with electrodes in direct brain contact were able to move a cursor on a screen by simply thinking of vowel sounds..The team employed a computer model that helped map out which parts of the brain were firing at what rate, when different frequencies of of sound were played.

With the help of that model, when patients were presented with words to think about, the team was able to guess which word the participants had chosen. They were even able to reconstruct some of the words, turning the brain waves they saw back into sound on the basis of what the computer model suggested those waves,meant.



On 10 October 2011 the BBC reported on a headset, developed by Australian company Emotiv for the games industry, which used software connected to various electronic devices. The headset has been around for some time, but it is only now that companies such as IBM are beginning to harness the wealth of data that it can provide.  Using software developed in-house, researchers have linked the Emotiv to devices such as a model car, a light switch and a television.

Control signals come from two main sources; electroencephalography (EEG) measurements of brain activity, and readings of nerve impulses as they travel outwards to the muscles…At Brown Institute for Brain Science in the US, scientists are busy inserting chips right into the human brain. The technology, dubbed BrainGate, sends mental commands directly to a PC.

Subjects still have to be physically “plugged” into a computer via cables coming out of their heads, in a setup reminiscent of the film The Matrix. However, the team is now working on miniaturising the chips and making them wireless. http://www.bbc.co.uk/news/technology-15200386


There are various modes of operation for synthetic telepathy including:


  • One person listening to another’s thoughts or speech;
  • Listening in a group to another’s thoughts and speech;
  • Talking and listening to one person;
  • Talking to one person and being listened to by many people;
  • A virtual chat room in which anyone could talk or listen, if they followed set procedures.


‘Synthetic telepathy requires techniques for scanning the specific brain emissions given off when the targeted victim subvocalises. The techniques must be able to detect the 15-Hz, 5-milliwatt auditory cortex brain emissions that are linked with sound that bypasses the ear; the ELF frequencies that are linked with the excitation potentials in the brain that are associated with subvocalised thought; and EEG signals, such as the P300 signals mentioned previously’*


Picture opposite: – http://www.bbc.co.uk/news/technology-15200386


*http://en.wikipedia.org/wiki/Synthetic_telepathy at http://geeldon.wordpress.com/2010/09/06/synthetic-telepathy-also-known-as-techlepathy-or-psychotronics/

‘Contrary to popular belief, synthetic telepathy does not provide the ability to read a person’s mind or memories. What it does provide is the ability to read the internal monologue (or anything that causes electrical change/radiation) and the trick is to get the subject to “voice” their memories and cross-reference that with their emotional state. In other words, basic psychological manipulation is a key factor and makes the technology not much more reliable than a standard lie-detector test. In practice, passive monitoring of the internal monologue over a long time period (months-years) is probably the most effective method of intelligence gathering. http://en.wikipedia.org/wiki/Synthetic_telepathy at http://geeldon.wordpress.com/2010/09/06/synthetic-telepathy-also-known-as-techlepathy-or-psychotronics/


The device that makes the leap from  electronic brain impulses into words is said to be an electroencephalograph or EEG. In clinical contexts, EEG refers to the recording of the brain’s spontaneous electrical activity over a short period of time, usually 20–40 minutes, as recorded from multiple electrodes placed on the scalp. EEG used to be a first-line method for the diagnosis of tumours, stroke and other focal brain disorders, but this use has decreased with the advent of anatomical imaging techniques with high spatial resolution such as MRI and CT. http://en.wikipedia.org/wiki/Electroencephalography


Picture below: The first human EEG recording obtained by Hans Berger in 1924. The upper tracing is EEG, and the lower is a 10 Hz timing signal. www.en.wikipedia.org/wiki/Electroencephalography



According to Wikipedia:  ‘Derivatives of the EEG technique include ‘evoked potentials’, which involves averaging the EEG activity time-locked to the presentation of a stimulus of some sort (visual, somatosensory, or auditory)’‘Event-related potentials (ERPs) refer to averaged EEG responses that are time-locked to more complex processing of stimuli; this technique is used in cognitive science, cognitive psychology, and psychophysiological research‘. www.en.wikipedia.org/wiki/Electroencephalography.

What that means is that when perpetraitors inflict something on a TI,  they can see that event reflected in TI brain waves recorded on a machine. ‘Event-related potentials’ refers to the machine read-out of the TI’s reaction to being tortured, abused or harassed by perpetraitors.


In her acclaimed book ‘1996’*, author Gloria Naylor describes in her fictionalized memoir how she was exposed to synthetic telepathy. Perpetraitor technology at that time involved a small satellite dish with a lap-top computer connected to it.  Perpetrators typed in the words they wanted Gloria to hear, and that translated into ‘heard thought’ in her perception.  The method described is similar to a Text-to-Speech system. Perpetraitors removed the picture above several times in an attempt to prevent it being published.  

*Third World Press, Chicago, 2005.

Technology has advanced since 1996, and from what I have observed, there is now no need for typing text onto a computer in order to create synthetic telepathy. Perpetraitors speak directly into microphones, and speech recognition equipment is used with computer-brain interface instead. http://en.wikipedia.org/wiki/Brain–computer_interface.


According to John J. McMurtry, in his article ‘*Remote Behavioral Influence Technology Evidence’:

‘A Defense Intelligence Agency review of Communist literature affirmed microwave sound and indicated voice transmission. The report states, “Sounds and possibly even words which appear to be originating intracranially (within the head) can be induced by signal modulation at very low average power densities.” Among microwave weapon implications are “great potential for development into a system for disorientating or disrupting the behavior patterns of military or diplomatic personnel.”+


‘An Army Mobility Equipment Research and Development Command report affirms microwave speech transmission… “One decoy and deception concept presently being considered is to remotely create noise in the heads of personnel by exposing them to low power, pulsed microwaves . . . By proper choice of pulse characteristics, intelligible speech may be created” quotes the report.’…


“Communicating Via the Microwave Auditory Effect.” is the title of a small business contract for the Department of Defense. Communication initial results are: “The feasibility of the concept has been established” using both low and high power systems…

Such a contract’s purpose is elaborated by the Air Force’s “New World Vistas” report: “It would also appear possible to create high fidelity speech in the human body, raising the possibility of covert suggestion and psychological direction . . . . If a pulse stream is used, it should be possible to create an internal acoustic field in the 5-15 kilohertz range, which is audible.

Thus it may be possible to ‘talk’ to selected adversaries in a fashion that would be most disturbing to them.” Robert Becker, whose eminence was enough to have been twice nominated for the Nobel Prize in biological electromagnetic fields research, is more explicit: “Such a device has obvious applications in covert operations designed to drive a target crazy with “voices” or deliver undetectable instructions to a programmed assassin.”++

Not all commentators are impressed with synthetic telepathy’s application on a battle field: 

Synthetic telepathy has limited uses as a communication system unless direct-contact headset systems are used and supported by encrypted channels. As such, standard radios are more effective in combat situations. Synthetic telepathy also requires the thought stream to be processed,+ which results in a minor lapse of attention, rather like a daydream, that could have deadly consequences on the battlefield.’ + My emphasis.

http://en.wikipedia.org/wiki/Synthetic_telepathy at http://geeldon.wordpress.com/2010/09/06/synthetic-telepathy-also-known-as-techlepathy-or-psychotronics/

1975 – A.W. Guy describes pulsed microwave effect

According to Richard Alan Miller, a researcher called A. W. Guy observed the effects of pulsed microwaves on humans. He noted that low levels of microwave energy could penetrate the skull and heat up the brain cells, causing expansion of brain tissue at cellular level. This caused a sound wave to pass from the skull to the ear, creating the microwave auditory effect.+++

*John J. McMurtrey, M. S.Copyright 2003, 23 Dec. 2003. Address: 903 N. Calvert St., Baltimore MD 21202. Email- Johnmcmurt@aol.com Phone- 410-539-5140.

+ “Surveillance Technology, 1976: policy and implications, an analysis and compendium of materials: a staff report of the Subcommittee on Constitutional Rights of the Committee of the Judiciary. United States Senate, Ninety-fourth Congress, second session, p 1280, US GOV DOC Y 4.J 882:SU 7/6/976.

++ Becker RO and Selden G. The Body Electric: Electromagnetism and the Foundation of Life Quill William Morrow, New York, p 319 & 320, 1985.

+++SYNTHETIC TELEPATHY AND THE EARLY MIND WARS By Richard Alan Miller, copyright 2001, [Presented at the Consciousness Technologies Conference-July 19-21, 2001,on Saturday, July 20th, 2001, in Sisters, OR], updated 03/04/2003, http://www.nwbotanicals.org/oak/newphysics/synthtele/synthtele.html


John J. McMurtrey also cites patents for ultrasound as the basis for synthetic telepathy:

‘Internal voice capability, without discernment by others nearby. is also evident in ultrasound-based technology. Lowrey Patent # 6052336 “Apparatus and method of broadcasting audible sound using ultrasonic sound as a carrier” clearly focuses on non- lethal weapon application against crowds or directed at an individual…’

‘Norris Patent # 5889870 “Acoustic heterodyne device and method”, directionally produces sound on interference (or heterodyning) of two ultrasound beams. The cancellation leaves the carried audible sound perceivable. The effect becomes apparent particularly within cavities such as the ear canal. An individual readily understands communication across a noisy crowed room without nearby discernment. Sound can also be produced from mid-air or as reflecting from any surface’.

Source: ‘*Remote Behavioral Influence Technology Evidence’:John J. McMurtrey, M. S.Copyright 2003, 23 Dec. 2003. Address: 903 N. Calvert St., Baltimore MD 21202. Email- Johnmcmurt@aol.com Phone- 410-539-5140.


At the moment, Targeted Individuals do not have a lot of choice, because of the costs of shielding. There is no point in covering just our ears or head, because our whole body is enclosed in an electromagnetic field that operates like a TV satellite dish.  We need to be in a shielded environment.  Solutions do exist, and clearly where  government and state operations are involved, specialist security equipment must provide appropriate shielding.      


Picture opposite: Electromagnetic shielding cages inside a disassembled mobile phone.

Here are some examples of shielding materials:

  • Acoustic or silent glass, available as double glazing
  • Leaded glass
  • Silicon / plastic-based materials in walls, roofs and windows
  • Metal sheeting and wire such as used in microwave ovens.

These may not be easily affordable or practical for every-day life, but it is worth knowing they exist.  Jamming devices are another option, and they are more affordable, but they may have health risks, just as microwaves may do. Tall office blocks encased in green glass are likely to be sound-proof against synthetic eavesdropping, as are airports and modern deluxe airport hotels.

But what happens when the state representatives go home after their meetings?  What about all those intelligence, security and military personnel around the world who don’t discuss classified material, but know about it?  What if someone tries to listen to what they are thinking by pointing a microwave auditory device at them?  My theory is that they must have some kind of implanted devices, that operate radio wave jamming frequencies.  If so, that may work in the short-term, but it is not doing the health of such people any good.

This post was altered by perpetrators while I was preparing to publish it, and after it had been published. Only IT technicians have access permissions to do that, but family influence can be brought to bear. The main perpetrator involved was referred to by others as Philip, a trainee IT technician, the son of the perpetrator referred to by others as David. Based in England, on an overseas military base near where I live, Philip has been part of a group of new entrant perpetraitors participating in training in the US, with his father acting as mentor. As a trainee, he is still on probation, wherever his current location may be.

Posted 6 days ago by Martina Cable

Labels: Psychotronics Infrasound Targeted Individuals Electronic Harassment Mind Control Synthetic Telepathy Ultrasound Implants.



Like 0



Add a comment




This post provides a brief update on what happened when a friend’s windscreen was hit by a stone-coloured object.  The windscreen was hit in the place where my eyes were focused. A couple of stories from the BBC and Fox News throw light on how this might have occurred.

Picture opposite: An LED attached to a prototype bullet shows its flightpath during a night-time field test – www.bbc.co.uk/news/technology-16810107

Recap of the point from my post Seeing Through Perpetraitors

In my post ‘Seeing through perpetraitors I reported how after reading articles in the UK newspaper the Daily Mail, and adding to them information from my own experience, it occurred to me that a Targeted Individual with a camera embedded in one eye could be part of a weapons system, providing additional close up vision that could be transmitted to a drone/satellite and also to a third party, possibly but not necessarily a human with weapons capability.

Shortly afterwards I was sitting next to a friend who was driving, when something the colour of a stone seemed to come from slightly above eye level opposite us and hit the windscreen, leaving a mark in the glass.  The mark in the glass was where my eyes were focused when the windscreen got hit.



–   On 31 January 2012 the Royal United Services Institute think tank told the BBC ‘A self-guiding bullet that can steer itself towards its target is being developed for use by the US military’ -www.bbc.co.uk/news/technology-16810107.

–  On 28 June 2012 the BBC reported that ‘US Army scientists are developing a weapon which can fire a laser-guided lightning bolt at a target.

The Laser-Induced Plasma Channel (LIPC) is designed to hit targets that conduct electricity better than the air or ground that surrounds them. The weapon went through extensive testing in January…”This plasma is located along the path of the laser beam, so we can direct it wherever we want by moving a mirror.” http://www.bbc.co.uk/news/technology-18630622.

Fox News also stated that ‘a U.S. Army lab is testing how lasers can create an energized plasma channel in the air — an invisible pathway for electricity to follow. The laser-guided lightning weapon could precisely hit targets such as enemy tanks or unexploded roadside bombs, because such targets represent better conductors for electricity than the ground’.

http://www.foxnews.com/tech/2012/06/27/army-looks-to-strike-foes-with-lightning-weapon/#ixzz252EY1zaY.  Original military report at http://www.army.mil/article/82262/Picatinny_engineers_set_phasers_to__fry_/.

Reading these news stories it seemed there was a possible explanation as to how the windscreen of my friend’s car might have been targeted.  Looking at the picture of the laser travelling horizontally and then going straight down to the target, the trajectory was exactly how it appeared when the ‘stone’ was delivered, except that the laser would have to be pointing at our windscreen.  Was the laser guided to a point on the windscreen where my eyes were focused?


As stated in the BBC article on 31 January, Light-emitting diodes are used to guide lasers in military scenarios.   LEDs already have numerous peaceful applications such as aviation lighting, automotive lighting,  advertising, general lighting, and traffic signals. LEDs have enabled new text, video displays, and sensors to be developed, while their high switching rates are also useful in advanced communications technology.

Infrared LEDs are also used in  remote control units of many commercial products including televisions, DVD players, and other domestic appliances. http://www.en.wikipedia.org/wiki/Light-emitting_diode.


If LEDS can be used to guide a lightning bullet, could there be some kind of LED in the eyes of some TIs?  Recently I was taking photographs of some ancient buildings.  When I stared through the camera lens I noticed a tiny green light reflecting back at me.  This only happened if I used the eye with an embedded camera lens.  Could the light be an LED?  And if so, what could I do about it?


Since then I have been wearing dark ‘pinhole’ glasses when travelling with friends, to avoid the risk of a recurrence of such incidents.  There have been no further problems so far.

If TIs are aware that they have a nano-camera and lens implanted in one eye, then temporarily obscuring vision in that eye may be a simple way to reduce the risks that criminals could be using their eyes for some harmful purpose.www.en.wikipedia.org/wiki/Pinhole_glasses.

In the course of preparing this post, criminal perpetrators living in the USA, but not in any way connected with its authorised elected representatives,  intervened in the functionality of WordPress, attempting to prevent its publication.  I live in Europe, and such activity is a breach of international law.

Targeted Individuals: The Myth of ‘Non-Lethal’ Research

Targeted Individuals: The Myth of ‘Non-Lethal’ Research

This post is about:
1.  Why the number of targeted individuals may be increasing.
2.  Why targeted individuals may be used in nonconsensual research.
3.  Why such research can never be regarded as valid.
Targeted Individuals consistently report that they are being used in research experiments. These innocent people are being tortured by criminals, and such torture is a crime against humanity. It is hard to think of a more distasteful subject than cruel nonconsensual experimentation on human beings, motivated by profiteering and greed.
In an earlier post on PerpeTraitor Profiles I mentioned a petition started in 2007, calling for a ban on electronic warfare on civilians.  To date the petition has received over 1500 over signatures, mainly from those describing themselves as TIs. An analysis of those signing the petition by year up to 13 June 2012 is produced in the graph below.
The graph shows a significant increase in those signing in 2011 and a likely similar results for 2012.  Why did the numbers signing increase significantly from 2011?  There could be several reasons including:
–  More TIs finding out about the petition.
–  Increasing internet interest in the plight of targeted individuals – last time I typed in “Targeted Individuals” into a search engine, it produced over 82 million references.
–  A significant increase in the number of TIs.
Some TIs wrote in their survey responses that they had been targeted for over ten or even twenty years.  From this it appears unlikely that TIs are ever released from remote electronic torture.  According to Marshall Thomas, TIs continue to live on, despite what perpetraitors do to them. He states that TI mortality rates are ‘surprisingly low’. In a compilation of evidence for the Presidents Advisory Committee on Human Radiation Experiments March 1995, Marshall Thomas stated:
‘One thing is very clear about the program these people are under…once it starts it never stops until they are dead.  Having said this, it should be noted that the mortality factor for TI’s is surprisingly low considering the ferocity of the torture program that they are under. Though it is difficult to be exact, only about one out of 20 or one out of 40 TI’s appear to die each year.*’
*Extracts from ‘Monarch-the-New-Phoenix-Program-II’, Page 34 onwards.  www.scribd.com/doc/15360318/Monarch-the-New-Phoenix-Program-II
Also, nonconsensual research on TIs is a profitable criminal business, so it is in the interest of the perpetraitors to keep them alive.
Why could there be a sudden increase in the number of TIs?  If the criminals running the TI “business” operate the kind of technology used by large corporations that interact with the public – such as call centres, and back up of records in a data centre – there must be a limit to the capacity of the business to take on new TIs.  So if suddenly more individuals  are being targeted, it could be that perpetraitors recently had a major expansion of capacity. The increase in TI numbers from 2011 would suggest a capacity increase of at least 100%.
What is the implication of a capacity increase for Targeted Individuals?  From what I have seen in my interaction with perpetraitors, they now have a lot of upgraded spare capacity.  It looks as if far more Targeted Individuals than ever before are planned to be targeted.
I suspect that for the perpetraitors, expansion of capacity means larger profits. The more Targeted Individuals they have in their net, the more money they can get. The possible implications of this are that:
–  TIs are becoming a kind of ‘cash crop’ that can be farmed, with increasing reliance on automation and modern facilities.  The primary source of income is through offering TIs as subjects for nonconsensual research.
–  But there are other lucrative markets as well. According to Marshall Thomas, the illicit surveillance of TIs provides for a kind of reality TV which is sold to viewers within the criminal fraternity. See inset below:
‘The TI is both a very  expensive lab rat for the health effects of microwave  weapons, a training tool for a stalking army, a psychology experiment to perfect mind control, fodder for publishing scientific papers, and a commodity to be sold for entertainment purposes a la reality TV.
The incredible expense of gang stalking several thousand people on an enemies list is offset by selling the TI as a human guinea pig for weapons development programs, medical experiments, psychology experiments  (GSA contracts), and a “reality TV show” that might be sold on the internet, satellite TV, or satellite radio.
The audience is made up of several tiers of viewers and participants. The perspective of the drama that unfolds before the satellite TV and internet audience is the action as seen through the eyes of the TI with the targets “inner voice” typed out on the screen below.’  Extract from Page 33 of:
From 28 February to 1 March 2011, the Presidential Commission on Bioethics discussed non-consensual experiments on human beings. During this discussion, Targeted Individuals talked about their experience, and what their life was like because of the experimentation done on them. A few of the Targeted Individuals’ observations on human experimentation are included below:
Observations by Targeted Individuals
1. ‘Gang stalking and harassment was used to implement this nonconsensual biotechnology application that is being used on me… I now experience involuntary limb movements. I receive stingings. I get pains to my head, to my abdomen… I get burning on my lower legs and my ankles. I get ringing in my ears that’s pitch is like they pitch it.’
2. ‘Since 2008 and before, I have endured the following physical and psychological symptoms: extreme debilitating and chronic fatigue, weakness and dizziness for days and weeks at a time… I have an unusual dental filling of unknown origin on the side of one of my back upper right teeth and no memory of having this procedure done… And I have X-ray printouts and a signed affidavit from my dentist stating this.’
3. ‘I wanted to speak about bio-technology applications being utilized on my person. I have medical reports showing eye damage being done to my eyes, my eyes does not have a mirror image, I also have nano wiring inside my eyes, I have pictures of the actual implants from the eye doctor, once enlarging the nano implants, you will see a copy of the actual particles in my eyes. I have CAT scans in my eyes and PETs showing wiring, nano wiring in my head.’
4. ‘I am requesting that the Presidential Commission conduct an investigative hearing on non-consensual human experimentation and I do have credible evidence I’m submitting, 1158 videos and pictures that’s been occurring for the last two years. I’m also presenting 10 attachments which includes my 14-page public comment…’
5.‘For decades I have suffered the following due to these remote weapons and research…To date I have: Non age related cataracts, nodule on thyroid, nodule on adrenal gland and sudden hearing loss syndrome. These are all resulting from being subject to electromagnetic weapons.  Endless MRI’s, X-rays, test after test, specialist after specialist. Thousands of dollars in debt and the doctors cannot find a reason.  I have witnesses.’ www.targetedindividuals.blogspot.co.uk/2011/09/
If one of the main reasons for targeting individuals is to conduct research testing of electromagnetic microwave, laser and psychotronic weapons on various populations, presumably there are groups of people who have commissioned such research, and people who have provided funding – sometimes referred to as donors.
The groups with most interest in the outcome of this research would include the manufacturers and suppliers of these weapons. Is it likely that such groups are going to be concerned about testing weapons on human subjects?  They will, presumably, need evidence of exactly how their weapons affect human populations if they are to sell their products. But they can hardly be seen to commission nonconsensual research. So perpetraitors can profit by exploiting their slave population of targeted individuals as research guinea pigs.
One thing that perpetraitors and electronic weapons salesmen seem to have overlooked – you can’t pull the wool over the eyes of the international community when it comes to proper registration and conduct of weapons research, even if it is not ‘non-lethal’ i.e. not for battlefield use.  There are rigorous standards for all types of research, and evidence of compliance with them will be expected.
Non-consensual human experimentation is outlawed in all humane societies. The targeted individuals who had the courage to give their testimonies to the Presidential Commission on Bioethics had clearly not given their consent to being used as research subjects.  The US Office for Human Research Protections has set out guidance about the basics of obtaining informed consent:- Office for Human Research Protections (OHRP) §46.116 – Informed Consent Checklist – Basic and Additional Elements.  These require that human subjects are clearly informed, amongst other things, about:
– the purpose of the research
– what the research will cover
– how long the research will last
– what tests they will be involved in
– who do contact with questions
– personal confidentiality of records
– what the risks to health are, and
– what will happen if the subject wishes to withdraw before the end of the research project.
Any research testing on humans must comply with fairly stringent standards if the results are to be recognised as valid within the international community.  Human research subjects should not have been experimented on for the same thing before, otherwise their health and mental outlook might have been affected by previous research, and conclusions about current research results could be based on invalid data, and therefore flawed. This would mean that Targeted Individuals must not automatically be transferred from one research project to a subsequent one, although criminals might well do so for financial considerations.
Here are a few of requirements that perpetrators would need to have checked before selecting individuals for targeting:
– Complete health history of research subject and close family and known health risks.
– All medical drugs, vitamins and other remedies taken by the human subject.
– Any substance abuse including alcohol and nicotine.
– Any previous mental health issues.
– Any actions taken subsequently by human subjects to counteract torture and victimisation,
  including shielding against microwaves, diet to counter cancer, maintaining a healthy ph level,
  exercise etc.
– Any medical prostheses such as pacemakers and automatic insulin dispensers, that might be at
  risk of failure because of electronic interventions.
– Previous work in a nuclear power station, which might have exposed a subject to nuclear
– Previous work in an industry involving nuclear radiation products.
– Previous work involving toxic chemicals.
– Previous work in a cell phone factory.
– Previous involvement as a human research subject in similar research projects.
In commercial research for medical drugs, the clinical records and the full testing records for each human subject must be available for scrutiny by the relevant independent standards checking authorities.  The perpetraitors would have to maintain similar research records and make them available to independent scrutiny, if their ‘research projects’ were to be recognised by the international community.
We have heard what some targeted Individuals reported to the Presidential Commission on Bioethics about their experiences.  Does this sound like research to you?  Is it likely that a bunch of criminals went about drawing on TIs’ official health records and establishing their suitability before selecting them for targeting?  And are the so-called ‘research case papers’ going to be examined by an independent research body to ensure records can be relied on?  If not, then whatever research results the criminal perpetraitors eventually come up with must be open to question, making the whole research project unviable.
Anyone having doubts about this? Read the provisions of the Belmont Report – ‘Ethical Principles and Guidelines for the Protection of Human Subjects of Research’, summarised at the end of this post.
If you look at what Targeted Individuals have to say about their experiences, the only conclusion that can be drawn is that whatever is happening to them cannot be classified as research. It is also clearly nonconsensual, and therefore against the law.
Based on what appears to be the significant increase in the numbers of Targeted Individuals, major investment is being made in this criminal activity, perhaps for decades to come.  If that is being done in the mistaken view that results from targeting individuals can be used to prove that some kind of research has been conducted, then billions of dollars have already been wasted for no justifiable reason, and thousands of innocent human beings have been subject to appalling misery and torture.
In 1979, the Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research, was published in the United States to provide a succinct description of the mandate for review of research involving human research participants.  Regulation and guidelines concerning the use of human research participants in the U.S., and increasingly so in other countries, are based on the following fundamental elements excerpted from the Belmont Report:
Respect for Persons – In research, respect for persons demands that participants enter into a research program voluntarily and with good information about the research goals.
Beneficence – to do no harm and to “maximize possible benefits and minimize possible harms” to the individual research participant.  Investigators – or in this case perpetraitors – and their institutions have to plan to maximize benefits and minimize risks.
Informed consent – the informed consent process must allow human participants, as much as they are able, to be given opportunity to choose what will or will not happen to them.  The consent process must include information to the participant about the research; the participant must understand the information and volunteer rather then be coerced into participation.
Assessment of Risks and Benefits – Assessing risks and benefits means the researcher needs to assemble all data that explains why the research will obtain the benefits that are sought by the research project. The review committee of the researcher’s sponsoring institution, upon review of the collected data, can decide whether the risks to the subjects are justified.  Prospective participant can determine whether or not to participate.
Selection of Participants – The principle of justice—that benefits and risks of research be distributed fairly.  Researchers are not just if they only select disadvantages persons for risky research or only provide beneficial research to groups they favor.  Special classes of injustice arise when participants are drawn from vulnerable populations, like those institutionalized or incarcerated in prisons, racial minorities, economically disadvantaged or the very sick. www.hhs.gov/ohrp/humansubjects/guidance/belmont.html
Sources of images for this post:
Slavery Frieze – Detail from ‘Slavery’ frieze www.bbc.co.uk/london/content/articles/2007/03/16/passage_of_time_feature.shtml
While drafting this post, unauthorised alterations were made to it, prior to publication.  There are those who do not want information to be made available publicly even though it is already in the public domain. They know that they have committed crimes against humanity, and they fear that the consequences of their actions will confront them.


Targeted Individuals: Seeing Through The Perpetraitors

This post is about information in the public domain, recently highlighted in the UK and   US media, about miniature lenses that can sit on an eyeball and communicate with other devices used for military purposes.  Based on reports of targeted individuals, similar  technology may already be in use to enable perpetrators to see through our eyes.

In my post on ‘Perpetraitor Profiles’ I mentioned that several Targeted Individuals recorded that perpetraitors were looking through one or both of their eyes, and that a technology called Remote Neural Monitoring could be used to do that.  But it wasn’t clear how that worked in practice.  

Since then I have done some more research and, based on the information and evidence quoted below, I have come up with a theory about how perpetrators could look through the eyes of Targeted Individuals.  So here is my argument for what technology is being used, and how it works.


In 1999 scientists proved that they could look through the eyes of a cat. BBC News Online Science Editor Dr David Whitehouse reported: ‘ A team of US scientists have wired a computer to a cat’s brain and created videos of what the animal was seeing… To their amazement they say they saw natural scenes with recognisable objects such as people’s faces. They had literally seen the world through cat’s eyes.’



In March 2008 Fox News reported that ‘U.S. military engineers are trying to design flying robots disguised as insects that could one day spy on enemies and conduct dangerous missions without risking lives… In essence, the research seeks to miniaturize the Unmanned Aerial Vehicle drones used in Iraq and Afghanistan for surveillance and reconnaissance.’ www.foxnews.com/story/0,2933,456384,00.

In November 2008 Fox News also reported that ‘The next generation of drones, called Micro Aerial Vehicles, or MAVs, could be as tiny as bumblebees and capable of flying undetected into buildings, where they could photograph, record, and even attack insurgents and terrorists.’www.foxnews.com/story/0,2933,456384,00.html#ixzz22s2VQHy3

 In July 2009 the journalist Chares Q. Choi reported that: ‘Scientists can already control the flight of real moths using implanted devices.  The military and spy world no doubt would love tiny, live camera-wielding versions of Predator drones that could fly undetected into places where no human could ever go to snoop on the enemy.’www.dailymail.co.uk/sciencetech/article-527328/Insects-fly-wall-spies-tiny-cameras-radio-controls-microphones.html#ixzz22s0vDPMK



On 3 February 2012 the UK newspaper the Daily Mail reported:

‘DARPA – the Defense Advanced Research Projects Agency, thought of as the American military’s ‘mad scientist’ wing – has been funding research on ‘soldier mounted displays’ for some time, but previous versions have been bulky.

The lenses, made with nano-scale engineering processes,work as a hi-tech focusing device, which allows Innovega’s glasses to be considerably less bulky than previous devices.   The lenses themselves require no power, and thus can sit safely on the eyeball.’*  *My emphasis 

DARPA Says, ‘Innovega’s  iOptiks are contact lenses that enhance normal vision by allowing a wearer to view virtual and augmented reality images without the need for bulky apparatus. ‘

‘Instead of oversized virtual reality helmets, digital images are projected onto tiny full-color displays that are very near the eye.’

These novel contact lenses allow users to focus simultaneously on objects that are close up and far away. www.dailymail.co.uk/sciencetech/article-2095987/Virtual-reality-contact-lenses-beam-images-directly-eyes-sale-2014

On 14 April 2012, the Daily Mail ran an article under the headlines:


  • Lenses can let troops see through ‘eyes’ of drones flying above.
  • Can ‘layer’ target information over view of world.
  • Contact lenses don’t impede fighter’s vision.
  • Equivalent to a 240-inch 3D television from 10 feet’.

The Daily Mail reporter, Rob Waugh, stated that:

‘The Pentagon has placed an order with Innovega for lenses which focus 3D battlefield information from drones and satellites directly into people’s eyeballs*. The tiny ‘screens’ sit directly on users’ eyeballs and work with a pair of lightweight glasses with a built-in translucent screen. *My emphasis 


On Sunday 29 July 2012, the Daily Mail also reported that:

‘The system is designed to improve the awareness of a military team as a whole, allowing soldiers to see through the eyes of their team mates in real-time’.* *My emphasis 



According to John St Clair Akwei, a former surveillance specialist, Remote Neural Monitoring plays a key role in the targeting of individuals:

‘Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves.’ 

From an article in Nexus Magazine April/May 96 from MindControlForums Websitehttp://www.bibliotecapleyades.net/scalar_tech/esp_scalartech12.htm

John St Clair Akwei does not say how Remote Neural Monitoring is achieved.  Dr John Hall, medical anesthesiologist, author of ‘A New Breed: Satellite Terrorism in America’ and a targeted individual, states that satellite technology was used at an early stage to connect electronically with computers. Drawing on his experience in the medical profession he notes that Electroencephalograms – EEGs – are routinely used in hospitals to monitor brain wave frequency activity, and that when connected with satellite technology, a similar type of equipment will enable a perpetraitor to hear what you hear and see what you are seeing in real-time.


For Remote Neural Monitoring to work, satellite technology must have some way to connect with the targeted individual. Perpetraitors can see Targeted Individuals all the time using lasers and satellite technology. But they can also look through the eyes of a Targeted Individual. So far I have not been able to find anything that describes how this is achieved, but I think that nano-scale cameras must play a part in enabling perpetraitors to see through the eyes of targeted individuals.

The reason I think this is that:

  • The Daily Mail reported how US military battlefield methods are being upgraded with drones or satellites connected to cameras that can ‘safely sit on the eyeball’ of soldiers, allowing them to ‘see through the eyes of their team mates’.
  • If  the US military weapons described in the Daily Mail articles could connect with drones and satellites without using nano-scale eye cameras they would have done so, as it can hardly be convenient  for soldiers to be fitted with a type of contact lense attached to a camera, however small.  If the US Military didn’t need nano-scale cameras I doubt if the US army would be doing what they are doing.
  • The US military weapons system has some similarities with the Remote Neural Monitoring, and it is quite possible that RMN would need nano-scale cameras in the same way.
  • TIs report that perpetraitors only look through one of their eyes.  This is consistent with having a camera installed in one eye.

My theory is that perpetraitors can see through both our eyes, using satellite technology to track into our brains and connect with a nano-scale camera attached to or implanted on the outside of the eye.


My impression was that perpetraitors could look through one of my eyes, although I now think they can see through both eyes, even if our eyes are closed.  Something else I noticed was that in the dark I could see the nano-scale camera implant equipment shining white inside both my eyes, although it appears that only one eye has a camera.

And in daylight I saw something in one of my eyes that looked like a black comma.  At first I thought it was a floater. Then I saw a clothing advert on a bill board, and noticed that the model had a comma drawn above her cheekbone. It looked like the one in my eye.   I searched the words ‘comma symbol’  on the Internet and found that there is a computer game called Naruto which has a huge following, and that the comma symbol is known as a Sharingan.

I also found out that you can buy contact lenses that give you a whole range of Sharingans. Could it be that some perpetraitor technician is into Naruto games and is making nano-scale eye camera implants that have a Sharingan on them?

Picture opposite: Sharingans. http://en.wikipedia.org/wiki/File:Sharingan.jpg


After reading the articles referred to above in the Daily Mail, and adding to them the information I had from my own experience, I began to realise that a TI with a camera embedded in one eye could be part of a weapons system, providing additional close up vision that could be transmitted to a drone/satellite and also to a third party, possibly but not necessarily a human with weapons capability.

But the set up could work just as well if the Targeted Individual was the third party with weapons capability, if the camera in the TI’s eye could be used as a weapon to be fired at someone or somthing. Could some Targeted Individuals be used as human handgrenades? And could the system work just as well if the Targeted Individual had a separate camera in each eye? Or could the second camera be embedded centrally somewhere else in the TIs head?

I put a patch over my eye – the one with the Sharingan in it. I could see as well with the other eye as if I had two eyes. But for the first time, I noticed a blurred patch in the middle of the other eye. Could that blurred patch be an invisible camera sight? I had already seen the placement socket shining in the dark as if reflecting ultraviolet light. Did it make any difference whether my eyes were open or closed?

At this stage, I hope I am wrong in my conclusions. Last week, I was sitting next to a friend who was driving, when something the colour of a stone seemed to come from slightly above eye level opposite us and hit the windscreen, leaving a mark in the glass. The mark in the glass was where my eyes were focused when the windscreen got hit.


Are nearby people and living things at risk when individuals are targeted electronically?

When perpetraitors target me with microwaves, birds and squirrels do not visit the food table outside. When perpetraitors stop targeting me with microwaves, birds crowd the table, as if making up for lost time.

This made me wonder how wide a space is covered when perpetraitors target individuals.  Could it affect people nearby, for example sleeping in the next room.  Could it affect neighbours sleeping in a semi-detached house.  And what effect could it have on partners of targeted individuals.


Anti-histamine cream and tablets appear to be helpful, based on my experience.  Maintaining an alkaline ph balance may also assist – for example, drinking lemon juice or cider vinegar.  Perpetraitors  get agitated by this, so it may nullify the results of some laser or microwave research testing.  Microwaves leach calcium out of bones, with results similar to osteoporosis. Taking a sufficiently strong dose of calcium citrate with vitamin D3 on a regular basis can counter the effects of this. 1000 mg of calcium with D3 a day would be the lowest suggested level.  Seeking the advice of a pharmacist is advisable.

After using aluminium protective eye shades at night for a while I could see that I had a ‘sunglass mark’.  My face was more red – except where the eye shades covered my face. One side of my face was less red than the other, probably because I sleep  on that side. I am not sure if this was caused by directed laser or microwave energy.  Sleeping in sunglasses or eye shades covered with aluminium foil may be beneficial. Attaching a cloth container such as a sunglass case to eye shades, and filling it with aluminium is another option.

NOTE: This post may not read as I would wish, owing to multiple interventions made on my Blogspot post by perpetraitors while I was trying to draft it. In recent weeks I have been subject to an onslaught of interventions and attacks by perpetrators while drafting, and I sometimes find that publishing the post as work in progress is best. Criminal encroachment in the internet operations of another country is a breach of international law.

Targeted Individual: Perpetraitor Event Record


The table below is a record of perpetraitor interaction with the targeted individual – author of this blog.  It was started in view of the increasing difficulties facing the targeted individual in writing and publishing posts. At the time of writing, one laptop has been broken, and Broadband filters have had to be replaced.

I do not live in the United States.

This post was first published on 31 July 2012.



  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Multiple unauthorised intervention in my Apple MacBook Pro operations
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • While cleaning teeth, ‘frequency cleaning’ toothbrush got targeted and started to sound like an electric toothbrush for about 12 hours.


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Multiple unauthorised interventions in my Apple MacBook Pro operations
  • Targeting of lower intestinal cavity on low power


  • Psychotronics standard interface
  • Non-standard unauthorised targeting of lower intestinal cavity on full power 
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • Multiple unauthorised intervention in my Apple MacBook Pro operations


  • My iPhoto application containing about 5,000 original photographs wiped twice, but I had a back-up
  • Psychotronics standard interface
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • Multiple unauthorised interventions in my Apple MacBook Pro operations.


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • Unauthorised interventions in my Apple MacBook Pro operations, including alteration of this record, both off-line before it was published, and systematically freezing some WordPress functions on-line while it  was being published.
  • Alteration of the colour settings on the photographs in my iPhoto library.


  • Psychotronics standard interface.
  • Unauthorised interventions in my Apple MacBook Pro operations including attempted block on access to Blogspot and WordPress, which were reported to Apple Computers.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices
  • Unauthorised interventions in my Apple MacBook Pro operations affecting the colour settings of my photographs in iPhoto.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto and other applications.
  • Block on  internet access for two hours necessitating assistance from internet service provider.
  • Unauthorised intervention in Blogspot while drafting my blog.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto and other applications.
  • Block on internet access to Blogspot, reported to Apple Computers.
  • Unauthorised intervention in Blogspot while drafting my blog.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices, including, during shift 24.00 – 08.00 BST 4-5/7/12/, microwave heating 15 minutes – the relevant US research time allowance.
  • Block on  internet access to Blogspot, reported to Apple Computers.
  • Unauthorised intervention in Blogspot while drafting my blog.
  • Sleep deprivation.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • During shift 24.00 – 08.00 BST 5-6/7/12, non standard exposure to frequency and other devices including targeting of heart and attempts at ‘waterboard’ asphyxiation  experience, by contracting throat area and expanding internal nasal tissue to reduce breathing space.
  • My perception was that the targeting perpetraitor had been taking alcohol or a mood-changing substance.
  • During shift 24.00 – 08.00 BST 5-6/7/12, non standard targeting by exposure to waves, starting at 04.05 BST.  Time did not exceed the fifteen minutes research allowance as targeting unit lost power, because the headset was vacated and left on. Both perptraitors were absent from the unit during that time.  The vacated headset appeared to trigger the attention of others, who logged on to a virtual environment, not physically located at the same installation, to establish why the headset was left on.
  • Sleep deprivation.


  • Sleep deprivation.
  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised intervention in Blogspot while drafting my blog, reported to Apple Computers.
  • Sense of smell targeted.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Block on internet access to mail, reported to Apple Computers.
  • Sense of smell targeted.
  • Sleep deprivation.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.
  • Digestive system ph targeted.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.
  • Digestive system ph targeted.
  • Sleep deprivation.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.
  • Blocking internet access to Blogspot, reported to Apple Computers.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Blocking internet access to Blogspot, reported to Apple Computers.
  • Sleep deprivation.


  •  Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Blocking internet access to Blogspot and WordPress, reported to Apple Computers.
  • Sleep deprivation.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions on WordPress blog.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.


  • Psychotronics standard interface.
  • Exposed to infrared frequency for over 40 minutes.
  • RMN stimultion of cerebral cortex to induce symptoms of dehydration, toxification and breathing difficulties.
  • Interference with eye focus, laser targeting of eye
  • Sleep deprivation
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.


  • Psychotronics standard interface.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.
  • Blocking internet access to Blogspot, reported to Apple Computers.
  • Sleep deprivation.


  • Psychotronics standard interface.
  • Unauthorised intervention blocking internet access.


  • Psychotronics standard interface.
  • Unauthorised intervention blocking internet access.
  • RMN stimulation of cerebral cortex to induce symptoms of breathing difficulties.
  • Short-term memory manipulation.


  • Psychotronics intermittent signal.
  • Breathing difficulties from synthetic noxious chemical frequency applied to living space.
  • Short-term memory manipulation.


  • Psychotronics intermittent signal.
  • Force field created in attempt to break perceived jamming of signal. Side effects.
  • Unauthorised blocking of several Apple computer applications.
  • Breathing difficulties from synthetic noxious chemical frequency applied to living space.


  • Psychotronics intermittent signal. Tests to establish cause and extent of signal disfunction including visual imaging, audio reception, subject intervention, subject response.


  • Psychotronics intermittent signal.
  • Reduced exposure to frequency devices.
  • Unauthorised blocking of several Apple computer applications.
  • Breathing difficulties from synthetic noxious chemical frequencies.
  • RNM used to produce synthetic acid within thyroid and digestive tract, to alter ph level and linked to fast acting cancers.


  • Psychotronics intermittent signal.
  • Reduced exposure to frequency devices.
  • Interference with natural eye focus function.
  • Unauthorised blocking of access to WordPress blog, reported to Apple computers.


  • Psychotronics intermittent signal
  • RNM used to produce breathing difficulties for over 30 minutes from 21.34-22.10 BST.
  • RNM used to produce synthetic heart beat anomalies
  • RNM used to produce synthetic acid within thyroid and digestive tract, to alter ph level, linked to fast acting cancers.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • RNM used to produce synthetic heart beat anomalies
  • Unauthorised blocking of several Apple computer applications.
  • Malicious damage to files in iPhoto library.
  • Breathing difficulties from synthetic noxious chemical frequencies.
  • RNM used to produce synthetic acid within digestive tract, to alter ph level, linked to fast acting cancers.


  • Psychotronics reduced interface.
  • Reduced exposure to frequency devices.

Targeted individual was out of doors or travelling for over 12 hours.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised blocking of access to Blogspot and WordPress, reported to Apple computers.
  • Malicious damage to files in iPhoto library.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Malicious alteration of family photographs in Apple computer IPhoto Library.
  • Creation of illict shared areas on Apple computer Finder in names of Bert, bthub3 and kat-pc.  Reported to Apple computers.
  • Attempt to wipe short-term memory to prevent reporting.
  • RNM targeting of lymph glands and thorax, linked to  fast acting cancers.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised blocking of access to Blogspot and WordPress, reported to Apple computers and Google.  Access enabled.
  • Targeting eyes.  Note: This used to be included in ‘Standard Exposure’, but in future will be specified.
  • Several events of exposure to heat either by microwaves or infrared radiation.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Targeting eyes.
  • Several events of exposure to heat either by microwaves or infrared radiation.
  • Incapacitating breathing difficulties from synthetic noxious chemical frequencies.
  • Unauthorised removal of copies of documents on my Apple computer, including this one.
  • Re-creating password-protected shared area ‘bthub3’ on my Apple computer.


  • Psychotronics standard interface.
  • Exposure to heat either by microwaves or infrared radiation.
  • Unauthorised changes to photographs of people.
  • Intermittent attempts to block internet access throughout a 6-hour period from 06.10 a.m.- 12.10 p.m BST.


  • Recreation of illicit shared area on Apple computer Finder in name of bthub3.
  • Exposure to heat either by microwaves or infrared radiation for over one hour.
  • Exposure to other microwave technology with greater tissue-depth of impact.
  • Targeting eyes.
  • Re-creating unauthorised password-protected shared area ‘bthub3’ on my Apple computer.


  • Psychotronics standard interface.
  • Reduced exposure to standard frequency devices.
  • Exposure to microwave technology with greater tissue-depth of impact.
  • Breathing difficulties.
  • Illicit manipulation of computer data.


  • Psychotronics standard interface.
  • Exposure to heat either by microwaves or infrared radiation.
  • Illicit manipulation of computer data.


  • Psychotronics standard interface
  • Reduced exposure to standard frequency devices.


  • Psychotronics standard interface.
  • Reduced exposure to standard frequency devices.
  • Subject of training for perpetraitors on synthetic telepathy – possibly exam conditions.
  • Illicit manipulation of computer data.


  • Psychotronics standard interface.
  • Exposure to electromagnetic force field.
  • Focused microwave targeting of head.
  • ELF targeting of intestine using non-standard equipment at 18.20 BST.
  • Exposure of face to heat either by microwaves or infrared radiation.
  • Microwave targeting of body.
  • Illicit manipulation of computer data and reconstruction of illicit shared area.


  • Psychotronics standard interface.
  • Standard Exposure to frequency devices.
  • ELF targeting of intestine using non-standard equipment at 03.30 a.m. BST – halted by Targeted Individual activity.
  • Interference with Apple computer operations and Pages computer files.


While updating this blog on 11 August 2012, I observed that unauthorised alterations were made after I saved the update, requiring further amendment.  I check the accuracy of this record, but cannot guarantee that what is recorded at a specific point in time is what I intended the record to state.  My gratitude goes to WordPress, for maintaining the best security they can under difficult circumstances.

Targeted Individuals: Perpetraitor Parasites


The development of psychotronics represents an amazing technological advance, with beneficial therapeutic applications, such as  enhancements for those with impaired hearing and eyesight.  Tragically  the technology is being pursued for the potential harm it can cause. Those who seek to use the technology for criminal activities have deselected themselves from the human race. Since my post on Perpetraitor Profiles I have had further opportunities to note and record more about those who carry out electronic harassment and psychotronic torture of targeted individuals.


Bearing in mind that psychotronic interaction with Targeted Individuals is a two-way communication process, that means that when they are studying me, I might get insights into what’s going on with them as well.  And they know that, because they tried to install a human firewall after my last post, but that arrangement hasn’t been working too well.

What does that mean?  Well when I first got targeted, the criminal bosses allowed less experienced staff to interact directly with my mind.  But later they realised that this could enable me to look over their shoulders.  Then they tried having one suitably-equipped person to interact with me and tell less experienced staff what I was thinking and doing.  That meant that the less experienced staff got it second hand. I noticed that this arrangement might not be too effective, because only the ‘equipped’ person could say anything, and it might not be accurate and no one would know. Possibly for this reason, the criminal bosses gave the supervisor separate simultaneous access.

The problem with giving the supervisor separate simultaneous access is that, in this particular business model, the supervisor is the one operating the torture equipment.  Having separate access means that no one knows exactly what he is doing. There are volumetric reports for the equipment, but I doubt if that that is enough to ensure an accurate record. Also, certain events led me to conclude that those with access to torture equipment had other equipment as well, which did not have an automatic activity record, and which could be exploited to abuse others.


According to the author and technical specialist, Robert Duncan*, perpetraitors have screen monitors that show them where to point when directing harmful/painful energy towards victims. For about two weeks I noticed that perpetraitors seemed fixated on one point on my leg.Eventually I realised that it was probably not my leg they were aiming for. Could it be that their shiny new equipment needs calibration?

Perpetraitors are sitting in their brand new ivory tower, having interaction with their screens, but if their equipment isn’t correctly calibrated they may not be getting reliable feedback about what TIs are experiencing. It could mean that when perpetrators thought they were administering a medium shock, they might be administering a higher level, in situations that could be life-threatening to the targeted individual.  This is unlikely to be what perpetraitors want,  because without a continuing population of TIs, they would be out of a job. If there is any business rationale for what they are doing, a possible flaw in technical performance might have implications for things like research contracts and continued viability.

*Project: Soul Catcher, Volume Two, Secrets of Cyber and Cybernetic Warfare Revealed, Page 237 – Torture Database Screen’, Robert Duncan and   the Mind Hacking Strategy Group 2010, http://www.freedomfchs.com/thematrixdeciph.pdf.


The perps were chatting on to each other as usual, and what they were saying was echoing through my mind, because I was obliged to listen to them.  If I had been wearing the right headset or had electronic receptors stuck to my brain, the frequencies I was hearing could have been recorded.   Even if  perpetraitors have paid for the best security at their hideout, other parties that have the technology could be eavesdropping through me.  The perpetraitors seem to disagree with my view on this, but that doesn’t mean it isn’t happening.

According to Dr John Hall*, criminal perpetraitors are hacking into satellites. If that is happening, it could mean that other parties could also listen in and record what I was hearing, using advanced satellite frequency detection devices.  They could then translate the frequencies into speech for their own purposes.

To use an analogy, if the perpetraitors were a bank, they might have reasonable in-house security, but that wouldn’t stop other criminals from abusing their ‘ATMs’, because the weak link in the chain is the person who has a bank account and who may not be aware that their PIN number could be detected. And none of this sounds like good news for the targeted individual. I hope the perpetraitors take care not to think about their credit card details and passwords when interacting with their equipment.

*A New Breed. Satellite Terrorism in America, Dr John Hall, 2009.


I do not claim to have any knowledge of technical things, so this is just how it comes across to me: TIs often report that the perps can see what TIs are seeing, as if looking through their victims’ eyes.  This involves satellite technology* and Remote Neural Monitoring**.

On 30 April 2012, in an article about enhancements to US Navy uniforms, the UK Newspaper the Daily Mail also revealed one of a range of new ‘cyborg’ technologies under test by the Pentagon. The article  stated:

‘Another groundbreaking high-tech military system will allow any soldier in a unit to ‘see’ through the eyes of any of his comrades’.*** 

On October 11 1999 the BBC News Online Science Editor Dr David Whitehouse reported that ‘a team of US scientists have wired a computer to a cat’s brain and created videos of what the animal was seeing’.****  

The article anticipated that ‘It is also conceivable that, given time, it will be possible to record what one person sees and “play it back” to someone else either as it is happening or at a later date’. 

Perpetraitors also have the option of looking not only at what you see, but also directly at you from satellites, using laser particle beam technology that allows them to see through walls, roofs, cars etc.  This option is more likely  to be available to the supervisor. If perpetraitors only have ‘see-through-eyes’ vision, they may be left in the dark if the TI closes both eyes or is in an unlit room. Having both views  usually clarifies what is going on, but can create two interpretations of what is happening. Sometimes it can be like two people blindfolded trying to put the tail on the donkey.

*See ‘A New Breed. Satellite Terrorism in America, Dr John Hall, 2009.

** Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. http://www.bibliotecapleyades.net/scalar_tech/esp_scalartech12.htm.


**** BBC News Online Oct 11, 1999, Looking Through Cats’ Eyes Fuzzy, But Recognizable, Dr. David Whitehouse, A BBC News article reported on the first pictures from an experiment to see through the eyes of a cat. http://news.bbc.co.uk/hi/english/sci/tech/newsid 471000/471786.stm.  Source: Cold War Nonconsensual Experiments: The Threat of Neuroweapons and the Danger it will happen again, Cheryl Welsh, J.D., www.mindjustice.com.


  • if perpetraitors are invading your thoughts and you can think in another language, try doing that for a bit. It puts the perpetraitors off, because their criminal bosses want them to understand what you are saying.  If you carry on they will have to bring in someone who can speak the same language, and that is not always easy, even when no expense is spared.
  • I tried this, using a few phrases of a foreign language that I had picked up, and some songs from a CD in that language. I regularly repeated the words in my mind.  This resulted in two language experts being brought in.  They both left almost immediately on ethical grounds, and one of them was traumatised by what he  found out about targeting of individuals.
  • If you are fed up with intruders trying to take you over, and want to meet up with your friends, pick a venue that has built-in protection against a range of frequency devices.  Many airport hotels now have this, and some can be reasonably priced.  Just make sure you are within the shielding – avoid the foyer and bars open to non-guests.
  • Most people are aware of the next point, but I wasn’t, so I will mention it.  Before you go to sleep, it is advisable to switch off all wireless/internet routers and unplug internet cable connections to phone filters before you go to sleep.  Take strategic electric plugs out of sockets. Ensure that cell phones, tablets etc are not only switched off but encased in metal or wrapped in aluminium, as they can be used as tracking devices even when switched off.


 In the course of preparing this post my laptop was crashed externally so many times that it no longer worked, and I had to buy another one.  I also had to get a new filter for my Broadband internet.  The day after publishing this post the photo library in my iPhoto application, containing nearly 5,000 photographs was wiped out.  I do have a back up, so I reloaded the photos, and half an hour later they were wiped again.