Tag Archives: Satellite Technology. Psychotronics


 This post is about:

–  Implications of synthetic telepathy.

 – What is meant by ‘synthetic telepathy’.

–  What Targeted Individuals say they    experience. 

–  Technical basis of synthetic telepathy.

‘Without freedom of thought there can be no such thing as wisdom & no such thing as publick liberty without freedom of speech, Benjamin Franklin, 1722.’




How would you feel if someone far away could listen not only to what you were saying, but also to what you were THINKING!!  And what if that person commented on what you were thinking, in a way that no one else could hear.

That is what synthetic telepathy is about.  It is an invasion of privacy, and a breach of human rights. It offers the opportunity for espionage, impersonation and theft of intellectual property. Most people, including those inside military and state organisations, may not know or really believe it is happening, but corporate criminals within security industries are involved in weaponising thought.  Many Targeted Individuals know all too well what weaponisation of thought is about, because it is with them every waking and sleeping moment of their lives.

‘Freedom of thought (also called the freedom of conscience or ideas) is the freedom of an individual to hold or consider a fact, viewpoint, or thought, independent of others’ viewpoints. It is different from and not to be confused with the concept of freedom of speech or expression.’ http://en.wikipedia.org/wiki/Freedom_of_thought.

In the Universal Declaration of Human Rights (UDHR), which is legally binding on member states of the International Covenant on Civil and Political Rights, freedom of thought is listed under Article 18:

Everyone has the right to freedom of thought, conscience and religion; this right includes freedom to change his religion or belief, and freedom, either alone or in community with others and in public or private, to manifest his religion or belief in teaching, practice, worship and observancewww.en.wikipedia.org/wiki/Freedom_of_thought


Synthetic telepathy refers to a technology that can make you hear real people’s voices broadcast in your head, as if you were hearing a cell-phone conversation.  Perpetraitors can listen to your thoughts too, and you may not be aware they are doing so.  The implications of that are huge, and though the technology has been understood for some time, there is silence about it.  But now synthetic telepathy is becoming openly acknowledged as part of new weapons strategies in the US. Credibility gap?? Check these links:

  • Youtube video demonstrates synthetic telepathy 

All you need to do is point the energy device accurately at the electromagnetic field of the targeted individual, and they will hear the speech transmitted from the microphone.  The Youtube video at the link below demonstrates synthetic telepathy in action.


  • Pentagon report investigated lasers that put voices in your head:

‘A recently unclassified report from the Pentagon from 1998 has revealed an investigation into using laser beams for a few intriguing potential methods of non-lethal torture. Some of the applications the report investigated include putting voices in people’s heads, using lasers to trigger uncontrolled neuron firing, and slowly heating the human body to a point of feverish confusion – all from hundreds of meters away’. http://phys.org/news122567894.html#jCp, 2008.

  • The Army’s Bold Plan to Turn Soldiers Into Telepaths:

‘The U.S. Army wants to allow soldiers to communicate just by thinking.

The new science of synthetic telepathy could soon make that happen’.

http://discovermagazine.com/2011/apr/15-armys-bold-plan-turn-soldiers-into-telepaths,2011 and www.dailymail.co.uk/news/article-2127115/Pentagon-plans-telepathic-troops-read-minds–field-years, 2012.

  • Army developing ‘synthetic telepathy’:

‘Similar technology marketed as a way to control video games by thought’…

Read This Thought: The U.S. Army is developing a technology known as synthetic telepathy that would allow someone to create email or voice mail and send it by thought alone. The concept is based on reading electrical activity in the brain using an electroencephalograph, or EEG.’ 

http://www.msnbc.msn.com/id/27162401/ns/technology_and_science-science/t/army-developing-synthetic-telepathy/#.UFHxIUITvL8, 2008.

  • Army budgeted $4 million to give soldiers telepathy

The United States Army Research Office budgeted $4 million in 2009 to researchers at the University of California, Irvine to develop EEG processing techniques to identify correlates of imagined speech and intended direction to enable soldiers on the battlefield to communicate via computer-mediated telepathy. Source: http://en.wikipedia.org/wiki/Electroencephalography.


From what I have read, it is possible to direct waves at a person’s electromagnetic field and, using a microphone, to speak directly to their inner hearing function, bypassing the ears.  It may be that several types of radio waves could be used for this including infrasound – considered by some to have higher health risks – microwaves, and ultrasound, which has its origins in sonar.  The sound waves may resonate via the bones in the skull, or it could be that the waves are converted to audible speech by the earth, acting as a transducer.  The picture below was removed by perpetrators and had to be replaced. Perhaps this was because it reflects their synthetic telepathy systems too closely.


[A transducer is a device that converts one form of energy to another. Energy types include (but are not limited to) electrical, mechanical, electromagnetic (including light), chemical, acoustic or thermal energy.] http://en.wikipedia.org/wiki/Transducer

Theoretically, synthetic telepathy could be transmitted via satellite in the same way that satellite TV, long distance cellphones and Global Positioning Satellite data are communicated.  I live in the UK and regularly receive invasive transmissions from different parts of the US, often via a virtual chat room.


Many TIs report hearing voices of perpetrators abusing them, impersonating others and trying to manipulate them:

Ti Experience & Source

I had very violent depreciating vile voices or thoughts that came from people in hollywood. Leonardo De Caprio was one of them. Ben Kingsly was another. I have also had Arnold Shwarzenneger.’ Germany, 09/08/2012. http://www.godlikeproductions.com/forum1/message1112151/pg6
On January 13, 2009 I started to hear a voice that was nearly as loud as normal spoken words. I think that it was about 3 PM. This continued for exactly 10 weeks. As soon as I woke up, within 1 second I heared a message spoken by an angry male voice with aggressive intonation. This was repeated every few seconds the whole day long, until I fell asleep…In the summer of 2011 I heard a voice say regularly “I have cancer.” Then the voice disappeared.http://www.hearingvoices-is-voicetoskull.com/AboutTheAuthor.htm
I hear now voices in my head, which threaten me personally: We will kill you, you are already a zombie! We will erase your memory; We will kill your relatives!; On the 22nd of September you do not go to the demonstration ! Think about your relatives ! We will remove your legs and hands and all other body organs! We will turn you into a zombie! These voices torment me at night and inhibit any sleep. They ask me questions and demand that these are answered.. They affect my free will and control me. Without any doubt my human dignity is permanently violated and as the Human Rights are guaranteed by the German Constitution not only national but international rules of law are violated. www.scribd.com/doc/78957226/250-Cases-Torture-From-Europe.Page 128.

‘Attempted murder by arrhythmia brutal forced effort at maximum power.

Inductions to suicide through “Synthetic telepathy” Sound + + Stimulation (to nudge Stimoceiver) + generation of mental state (5 or 6 days of torture started 24 hr ON apparatus open (10-15 January 2005) + Possible psychoactive (17/70 hz)’






When I got targeted, I could hear people talking, quietly, in a different medium from normal hearing, more like what you would hear if you wore headphones.  If friends or family were talking to me, I didn’t notice the voices, but when I was alone, or on waking, I could hear them.  Generally they were talking to each other about me, consciously for me to hear, but sometimes they forgot and started talking to each other.  Very rarely did they address me directly.  That was nearly a year ago, and it continues. 

If you go out to a show, do sport, sing in a choir or watch something interesting on television, it is less likely that you will notice the voices. That may be why TIs report losing their job and becoming more isolated.  Perpetrators want your undivided attention, but they cannot get it unless you are alone or asleep. So if you want to avoid them, go outside, take part in things, and if possible, be around family and friends.

It may seem easy for perpetrators to talk via synthetic telepathy, but I found out they have to learn and practise before they reach a recognised standard, and they have to take an examination. I remember the first time that the perpetrator referred to by his peers as Phillip – the son of the perpetrator referred to as David, was learning how to use the psychotronic head set.  He wanted to talk to his colleagues, but he couldn’t.  They were shouting ‘Take the head-set off!”.  He was talking to me, not them, but didn’t realise it.


Communicating sounds from one person to another is possible over distances in the same way as with a cell phone, using microwave and lasers/masers.  Just as each person has a cell phone number, each person has their own unique electromagnetic field frequency, which can be identified by sound wave devices of many types, in a similar way to television, you have a transmitter and a receiver, and for long distances, satellite may be necessary.

Electrical activity can best be demonstrated by looking at the way an EEG machine works.  It shows brain wave activity and responses to sounds and other interventions.

But how are microwaves turned into words?  Apparently it is based on measuring blood flow to the brain for different sounds, reflected in electrical activity. A technique called functional magnetic resonance imaging to track blood flow in the brain has shown promise for identifying which words or ideas someone may be thinking about.

So first you dial a person’s frequency number, using a satellite tracking device like GPS.  Then you speak into a headset that translates your brain blood flow patterns into electronic impulses.

There is now a variety of brainwave-reading headsets on the market, mostly used for video gaming’.  Headset picture and quote from: http://www.bbc.co.uk/news/technology-15200386 and http://www.bbc.co.uk/news/technology-10647555

The electrical impulses are pointed by a focused laser/maser beam towards someone’s electromagnetic field and they pick up the resonance via the bones in their skull and ear. The impulses are translated into words by the brain in the same way as for normal speech.  Satellite is used except where both people are located nearby. Satellite tracking implies that the person receiving the call has an implant that transmits a frequency signal, but this is not always required. 

HOW SYNTHETIC TELEPATHY WORKSMeasuring Blood flow to the brain  

A new brain scanner has been developed to help people who are completely paralysed speak by enabling them to spell words using their thoughts.  http://www.bbc.co.uk/news/technology-18644084

fMRI is usually used to track brain activity by measuring blood flow.’ 

In June 2012 the BBC reported that  ’A new brain scanner has been developed to help people who are completely paralysed speak by enabling them to spell words using their thoughts.

It uses functional magnetic resonance imaging (fMRI) to help patients choose between 27 characters – the alphabet and a blank space… fMRI is normally used to track brain activity by measuring blood flow… Each character produces a different pattern of blood flow in the brain, and the device interprets these patterns…The study appears in Current Biology journal of Cell Press.  Bettina Sorger of Maastricht University in The Netherlands, one of the researchers working on the current study, told the BBC:

“The work of Adrian Owen and colleagues led me to wonder whether it might even become possible to use fMRI, mental tasks, and appropriate experimental designs to freely encode thoughts, letter-by-letter, and therewith enable back-and-forth communication in the absence of motor behavior.”

The team writes in the paper that because the noninvasive device requires “only little effort and pre-training, it is immediately operational and possesses high potential for clinical applications. www.bbc.co.uk/news/technology-18644084


On 1 February 2012 the BBC reported that ‘By studying patterns of blood flow related to particular images, Jack Gallant’s group at the University of California Berkeley showed in September that patterns can be used to guess images being thought of – recreating “movies in the mind”. http://www.bbc.co.uk/news/science-environment-16811042

The team focused on an area of the brain called the superior temporal gyrus, or STG. This broad region is not just part of the hearing apparatus but one of the “higher-order” brain regions that help us make linguistic sense of the sounds we hear.  According to the BBC, researchers at University of California Berkeley: ‘have demonstrated a striking method to reconstruct words, based on the brain waves of patients thinking of those words. 


The technique reported in PLoS Biology relies on gathering electrical signals directly from patients’ brains. Based on signals from listening patients, a computer model was used to reconstruct the sounds of words that patients were thinking of. The method may in future help comatose and locked-in patients communicate.

Several approaches have in recent years suggested that scientists are closing in on methods to tap into our very thoughts; the current study achieved its result by implanting electrodes directly into a part of participants’ brains: The discovery of language – electrical brain wave patterns:

 http://www.bbc.co.uk/news/science-environment-16811042.  The technique hinges on plotting brain activity across a number of frequencies


Science decodes ‘internal voices’, BBC News


In a 2011 study, participants with electrodes in direct brain contact were able to move a cursor on a screen by simply thinking of vowel sounds..The team employed a computer model that helped map out which parts of the brain were firing at what rate, when different frequencies of of sound were played.

With the help of that model, when patients were presented with words to think about, the team was able to guess which word the participants had chosen. They were even able to reconstruct some of the words, turning the brain waves they saw back into sound on the basis of what the computer model suggested those waves,meant.



On 10 October 2011 the BBC reported on a headset, developed by Australian company Emotiv for the games industry, which used software connected to various electronic devices. The headset has been around for some time, but it is only now that companies such as IBM are beginning to harness the wealth of data that it can provide.  Using software developed in-house, researchers have linked the Emotiv to devices such as a model car, a light switch and a television.

Control signals come from two main sources; electroencephalography (EEG) measurements of brain activity, and readings of nerve impulses as they travel outwards to the muscles…At Brown Institute for Brain Science in the US, scientists are busy inserting chips right into the human brain. The technology, dubbed BrainGate, sends mental commands directly to a PC.

Subjects still have to be physically “plugged” into a computer via cables coming out of their heads, in a setup reminiscent of the film The Matrix. However, the team is now working on miniaturising the chips and making them wireless. http://www.bbc.co.uk/news/technology-15200386


There are various modes of operation for synthetic telepathy including:


  • One person listening to another’s thoughts or speech;
  • Listening in a group to another’s thoughts and speech;
  • Talking and listening to one person;
  • Talking to one person and being listened to by many people;
  • A virtual chat room in which anyone could talk or listen, if they followed set procedures.


‘Synthetic telepathy requires techniques for scanning the specific brain emissions given off when the targeted victim subvocalises. The techniques must be able to detect the 15-Hz, 5-milliwatt auditory cortex brain emissions that are linked with sound that bypasses the ear; the ELF frequencies that are linked with the excitation potentials in the brain that are associated with subvocalised thought; and EEG signals, such as the P300 signals mentioned previously’*


Picture opposite: – http://www.bbc.co.uk/news/technology-15200386


*http://en.wikipedia.org/wiki/Synthetic_telepathy at http://geeldon.wordpress.com/2010/09/06/synthetic-telepathy-also-known-as-techlepathy-or-psychotronics/

‘Contrary to popular belief, synthetic telepathy does not provide the ability to read a person’s mind or memories. What it does provide is the ability to read the internal monologue (or anything that causes electrical change/radiation) and the trick is to get the subject to “voice” their memories and cross-reference that with their emotional state. In other words, basic psychological manipulation is a key factor and makes the technology not much more reliable than a standard lie-detector test. In practice, passive monitoring of the internal monologue over a long time period (months-years) is probably the most effective method of intelligence gathering. http://en.wikipedia.org/wiki/Synthetic_telepathy at http://geeldon.wordpress.com/2010/09/06/synthetic-telepathy-also-known-as-techlepathy-or-psychotronics/


The device that makes the leap from  electronic brain impulses into words is said to be an electroencephalograph or EEG. In clinical contexts, EEG refers to the recording of the brain’s spontaneous electrical activity over a short period of time, usually 20–40 minutes, as recorded from multiple electrodes placed on the scalp. EEG used to be a first-line method for the diagnosis of tumours, stroke and other focal brain disorders, but this use has decreased with the advent of anatomical imaging techniques with high spatial resolution such as MRI and CT. http://en.wikipedia.org/wiki/Electroencephalography


Picture below: The first human EEG recording obtained by Hans Berger in 1924. The upper tracing is EEG, and the lower is a 10 Hz timing signal. www.en.wikipedia.org/wiki/Electroencephalography



According to Wikipedia:  ‘Derivatives of the EEG technique include ‘evoked potentials’, which involves averaging the EEG activity time-locked to the presentation of a stimulus of some sort (visual, somatosensory, or auditory)’‘Event-related potentials (ERPs) refer to averaged EEG responses that are time-locked to more complex processing of stimuli; this technique is used in cognitive science, cognitive psychology, and psychophysiological research‘. www.en.wikipedia.org/wiki/Electroencephalography.

What that means is that when perpetraitors inflict something on a TI,  they can see that event reflected in TI brain waves recorded on a machine. ‘Event-related potentials’ refers to the machine read-out of the TI’s reaction to being tortured, abused or harassed by perpetraitors.


In her acclaimed book ‘1996’*, author Gloria Naylor describes in her fictionalized memoir how she was exposed to synthetic telepathy. Perpetraitor technology at that time involved a small satellite dish with a lap-top computer connected to it.  Perpetrators typed in the words they wanted Gloria to hear, and that translated into ‘heard thought’ in her perception.  The method described is similar to a Text-to-Speech system. Perpetraitors removed the picture above several times in an attempt to prevent it being published.  

*Third World Press, Chicago, 2005.

Technology has advanced since 1996, and from what I have observed, there is now no need for typing text onto a computer in order to create synthetic telepathy. Perpetraitors speak directly into microphones, and speech recognition equipment is used with computer-brain interface instead. http://en.wikipedia.org/wiki/Brain–computer_interface.


According to John J. McMurtry, in his article ‘*Remote Behavioral Influence Technology Evidence’:

‘A Defense Intelligence Agency review of Communist literature affirmed microwave sound and indicated voice transmission. The report states, “Sounds and possibly even words which appear to be originating intracranially (within the head) can be induced by signal modulation at very low average power densities.” Among microwave weapon implications are “great potential for development into a system for disorientating or disrupting the behavior patterns of military or diplomatic personnel.”+


‘An Army Mobility Equipment Research and Development Command report affirms microwave speech transmission… “One decoy and deception concept presently being considered is to remotely create noise in the heads of personnel by exposing them to low power, pulsed microwaves . . . By proper choice of pulse characteristics, intelligible speech may be created” quotes the report.’…


“Communicating Via the Microwave Auditory Effect.” is the title of a small business contract for the Department of Defense. Communication initial results are: “The feasibility of the concept has been established” using both low and high power systems…

Such a contract’s purpose is elaborated by the Air Force’s “New World Vistas” report: “It would also appear possible to create high fidelity speech in the human body, raising the possibility of covert suggestion and psychological direction . . . . If a pulse stream is used, it should be possible to create an internal acoustic field in the 5-15 kilohertz range, which is audible.

Thus it may be possible to ‘talk’ to selected adversaries in a fashion that would be most disturbing to them.” Robert Becker, whose eminence was enough to have been twice nominated for the Nobel Prize in biological electromagnetic fields research, is more explicit: “Such a device has obvious applications in covert operations designed to drive a target crazy with “voices” or deliver undetectable instructions to a programmed assassin.”++

Not all commentators are impressed with synthetic telepathy’s application on a battle field: 

Synthetic telepathy has limited uses as a communication system unless direct-contact headset systems are used and supported by encrypted channels. As such, standard radios are more effective in combat situations. Synthetic telepathy also requires the thought stream to be processed,+ which results in a minor lapse of attention, rather like a daydream, that could have deadly consequences on the battlefield.’ + My emphasis.

http://en.wikipedia.org/wiki/Synthetic_telepathy at http://geeldon.wordpress.com/2010/09/06/synthetic-telepathy-also-known-as-techlepathy-or-psychotronics/

1975 – A.W. Guy describes pulsed microwave effect

According to Richard Alan Miller, a researcher called A. W. Guy observed the effects of pulsed microwaves on humans. He noted that low levels of microwave energy could penetrate the skull and heat up the brain cells, causing expansion of brain tissue at cellular level. This caused a sound wave to pass from the skull to the ear, creating the microwave auditory effect.+++

*John J. McMurtrey, M. S.Copyright 2003, 23 Dec. 2003. Address: 903 N. Calvert St., Baltimore MD 21202. Email- Johnmcmurt@aol.com Phone- 410-539-5140.

+ “Surveillance Technology, 1976: policy and implications, an analysis and compendium of materials: a staff report of the Subcommittee on Constitutional Rights of the Committee of the Judiciary. United States Senate, Ninety-fourth Congress, second session, p 1280, US GOV DOC Y 4.J 882:SU 7/6/976.

++ Becker RO and Selden G. The Body Electric: Electromagnetism and the Foundation of Life Quill William Morrow, New York, p 319 & 320, 1985.

+++SYNTHETIC TELEPATHY AND THE EARLY MIND WARS By Richard Alan Miller, copyright 2001, [Presented at the Consciousness Technologies Conference-July 19-21, 2001,on Saturday, July 20th, 2001, in Sisters, OR], updated 03/04/2003, http://www.nwbotanicals.org/oak/newphysics/synthtele/synthtele.html


John J. McMurtrey also cites patents for ultrasound as the basis for synthetic telepathy:

‘Internal voice capability, without discernment by others nearby. is also evident in ultrasound-based technology. Lowrey Patent # 6052336 “Apparatus and method of broadcasting audible sound using ultrasonic sound as a carrier” clearly focuses on non- lethal weapon application against crowds or directed at an individual…’

‘Norris Patent # 5889870 “Acoustic heterodyne device and method”, directionally produces sound on interference (or heterodyning) of two ultrasound beams. The cancellation leaves the carried audible sound perceivable. The effect becomes apparent particularly within cavities such as the ear canal. An individual readily understands communication across a noisy crowed room without nearby discernment. Sound can also be produced from mid-air or as reflecting from any surface’.

Source: ‘*Remote Behavioral Influence Technology Evidence’:John J. McMurtrey, M. S.Copyright 2003, 23 Dec. 2003. Address: 903 N. Calvert St., Baltimore MD 21202. Email- Johnmcmurt@aol.com Phone- 410-539-5140.


At the moment, Targeted Individuals do not have a lot of choice, because of the costs of shielding. There is no point in covering just our ears or head, because our whole body is enclosed in an electromagnetic field that operates like a TV satellite dish.  We need to be in a shielded environment.  Solutions do exist, and clearly where  government and state operations are involved, specialist security equipment must provide appropriate shielding.      


Picture opposite: Electromagnetic shielding cages inside a disassembled mobile phone.

Here are some examples of shielding materials:

  • Acoustic or silent glass, available as double glazing
  • Leaded glass
  • Silicon / plastic-based materials in walls, roofs and windows
  • Metal sheeting and wire such as used in microwave ovens.

These may not be easily affordable or practical for every-day life, but it is worth knowing they exist.  Jamming devices are another option, and they are more affordable, but they may have health risks, just as microwaves may do. Tall office blocks encased in green glass are likely to be sound-proof against synthetic eavesdropping, as are airports and modern deluxe airport hotels.

But what happens when the state representatives go home after their meetings?  What about all those intelligence, security and military personnel around the world who don’t discuss classified material, but know about it?  What if someone tries to listen to what they are thinking by pointing a microwave auditory device at them?  My theory is that they must have some kind of implanted devices, that operate radio wave jamming frequencies.  If so, that may work in the short-term, but it is not doing the health of such people any good.

This post was altered by perpetrators while I was preparing to publish it, and after it had been published. Only IT technicians have access permissions to do that, but family influence can be brought to bear. The main perpetrator involved was referred to by others as Philip, a trainee IT technician, the son of the perpetrator referred to by others as David. Based in England, on an overseas military base near where I live, Philip has been part of a group of new entrant perpetraitors participating in training in the US, with his father acting as mentor. As a trainee, he is still on probation, wherever his current location may be.

Posted 6 days ago by Martina Cable

Labels: Psychotronics Infrasound Targeted Individuals Electronic Harassment Mind Control Synthetic Telepathy Ultrasound Implants.



Like 0



Add a comment





This post provides a brief update on what happened when a friend’s windscreen was hit by a stone-coloured object.  The windscreen was hit in the place where my eyes were focused. A couple of stories from the BBC and Fox News throw light on how this might have occurred.

Picture opposite: An LED attached to a prototype bullet shows its flightpath during a night-time field test – www.bbc.co.uk/news/technology-16810107

Recap of the point from my post Seeing Through Perpetraitors

In my post ‘Seeing through perpetraitors I reported how after reading articles in the UK newspaper the Daily Mail, and adding to them information from my own experience, it occurred to me that a Targeted Individual with a camera embedded in one eye could be part of a weapons system, providing additional close up vision that could be transmitted to a drone/satellite and also to a third party, possibly but not necessarily a human with weapons capability.

Shortly afterwards I was sitting next to a friend who was driving, when something the colour of a stone seemed to come from slightly above eye level opposite us and hit the windscreen, leaving a mark in the glass.  The mark in the glass was where my eyes were focused when the windscreen got hit.



–   On 31 January 2012 the Royal United Services Institute think tank told the BBC ‘A self-guiding bullet that can steer itself towards its target is being developed for use by the US military’ -www.bbc.co.uk/news/technology-16810107.

–  On 28 June 2012 the BBC reported that ‘US Army scientists are developing a weapon which can fire a laser-guided lightning bolt at a target.

The Laser-Induced Plasma Channel (LIPC) is designed to hit targets that conduct electricity better than the air or ground that surrounds them. The weapon went through extensive testing in January…”This plasma is located along the path of the laser beam, so we can direct it wherever we want by moving a mirror.” http://www.bbc.co.uk/news/technology-18630622.

Fox News also stated that ‘a U.S. Army lab is testing how lasers can create an energized plasma channel in the air — an invisible pathway for electricity to follow. The laser-guided lightning weapon could precisely hit targets such as enemy tanks or unexploded roadside bombs, because such targets represent better conductors for electricity than the ground’.

http://www.foxnews.com/tech/2012/06/27/army-looks-to-strike-foes-with-lightning-weapon/#ixzz252EY1zaY.  Original military report at http://www.army.mil/article/82262/Picatinny_engineers_set_phasers_to__fry_/.

Reading these news stories it seemed there was a possible explanation as to how the windscreen of my friend’s car might have been targeted.  Looking at the picture of the laser travelling horizontally and then going straight down to the target, the trajectory was exactly how it appeared when the ‘stone’ was delivered, except that the laser would have to be pointing at our windscreen.  Was the laser guided to a point on the windscreen where my eyes were focused?


As stated in the BBC article on 31 January, Light-emitting diodes are used to guide lasers in military scenarios.   LEDs already have numerous peaceful applications such as aviation lighting, automotive lighting,  advertising, general lighting, and traffic signals. LEDs have enabled new text, video displays, and sensors to be developed, while their high switching rates are also useful in advanced communications technology.

Infrared LEDs are also used in  remote control units of many commercial products including televisions, DVD players, and other domestic appliances. http://www.en.wikipedia.org/wiki/Light-emitting_diode.


If LEDS can be used to guide a lightning bullet, could there be some kind of LED in the eyes of some TIs?  Recently I was taking photographs of some ancient buildings.  When I stared through the camera lens I noticed a tiny green light reflecting back at me.  This only happened if I used the eye with an embedded camera lens.  Could the light be an LED?  And if so, what could I do about it?


Since then I have been wearing dark ‘pinhole’ glasses when travelling with friends, to avoid the risk of a recurrence of such incidents.  There have been no further problems so far.

If TIs are aware that they have a nano-camera and lens implanted in one eye, then temporarily obscuring vision in that eye may be a simple way to reduce the risks that criminals could be using their eyes for some harmful purpose.www.en.wikipedia.org/wiki/Pinhole_glasses.

In the course of preparing this post, criminal perpetrators living in the USA, but not in any way connected with its authorised elected representatives,  intervened in the functionality of WordPress, attempting to prevent its publication.  I live in Europe, and such activity is a breach of international law.

Targeted Individuals: Perpetraitor Parasites


The development of psychotronics represents an amazing technological advance, with beneficial therapeutic applications, such as  enhancements for those with impaired hearing and eyesight.  Tragically  the technology is being pursued for the potential harm it can cause. Those who seek to use the technology for criminal activities have deselected themselves from the human race. Since my post on Perpetraitor Profiles I have had further opportunities to note and record more about those who carry out electronic harassment and psychotronic torture of targeted individuals.


Bearing in mind that psychotronic interaction with Targeted Individuals is a two-way communication process, that means that when they are studying me, I might get insights into what’s going on with them as well.  And they know that, because they tried to install a human firewall after my last post, but that arrangement hasn’t been working too well.

What does that mean?  Well when I first got targeted, the criminal bosses allowed less experienced staff to interact directly with my mind.  But later they realised that this could enable me to look over their shoulders.  Then they tried having one suitably-equipped person to interact with me and tell less experienced staff what I was thinking and doing.  That meant that the less experienced staff got it second hand. I noticed that this arrangement might not be too effective, because only the ‘equipped’ person could say anything, and it might not be accurate and no one would know. Possibly for this reason, the criminal bosses gave the supervisor separate simultaneous access.

The problem with giving the supervisor separate simultaneous access is that, in this particular business model, the supervisor is the one operating the torture equipment.  Having separate access means that no one knows exactly what he is doing. There are volumetric reports for the equipment, but I doubt if that that is enough to ensure an accurate record. Also, certain events led me to conclude that those with access to torture equipment had other equipment as well, which did not have an automatic activity record, and which could be exploited to abuse others.


According to the author and technical specialist, Robert Duncan*, perpetraitors have screen monitors that show them where to point when directing harmful/painful energy towards victims. For about two weeks I noticed that perpetraitors seemed fixated on one point on my leg.Eventually I realised that it was probably not my leg they were aiming for. Could it be that their shiny new equipment needs calibration?

Perpetraitors are sitting in their brand new ivory tower, having interaction with their screens, but if their equipment isn’t correctly calibrated they may not be getting reliable feedback about what TIs are experiencing. It could mean that when perpetrators thought they were administering a medium shock, they might be administering a higher level, in situations that could be life-threatening to the targeted individual.  This is unlikely to be what perpetraitors want,  because without a continuing population of TIs, they would be out of a job. If there is any business rationale for what they are doing, a possible flaw in technical performance might have implications for things like research contracts and continued viability.

*Project: Soul Catcher, Volume Two, Secrets of Cyber and Cybernetic Warfare Revealed, Page 237 – Torture Database Screen’, Robert Duncan and   the Mind Hacking Strategy Group 2010, http://www.freedomfchs.com/thematrixdeciph.pdf.


The perps were chatting on to each other as usual, and what they were saying was echoing through my mind, because I was obliged to listen to them.  If I had been wearing the right headset or had electronic receptors stuck to my brain, the frequencies I was hearing could have been recorded.   Even if  perpetraitors have paid for the best security at their hideout, other parties that have the technology could be eavesdropping through me.  The perpetraitors seem to disagree with my view on this, but that doesn’t mean it isn’t happening.

According to Dr John Hall*, criminal perpetraitors are hacking into satellites. If that is happening, it could mean that other parties could also listen in and record what I was hearing, using advanced satellite frequency detection devices.  They could then translate the frequencies into speech for their own purposes.

To use an analogy, if the perpetraitors were a bank, they might have reasonable in-house security, but that wouldn’t stop other criminals from abusing their ‘ATMs’, because the weak link in the chain is the person who has a bank account and who may not be aware that their PIN number could be detected. And none of this sounds like good news for the targeted individual. I hope the perpetraitors take care not to think about their credit card details and passwords when interacting with their equipment.

*A New Breed. Satellite Terrorism in America, Dr John Hall, 2009.


I do not claim to have any knowledge of technical things, so this is just how it comes across to me: TIs often report that the perps can see what TIs are seeing, as if looking through their victims’ eyes.  This involves satellite technology* and Remote Neural Monitoring**.

On 30 April 2012, in an article about enhancements to US Navy uniforms, the UK Newspaper the Daily Mail also revealed one of a range of new ‘cyborg’ technologies under test by the Pentagon. The article  stated:

‘Another groundbreaking high-tech military system will allow any soldier in a unit to ‘see’ through the eyes of any of his comrades’.*** 

On October 11 1999 the BBC News Online Science Editor Dr David Whitehouse reported that ‘a team of US scientists have wired a computer to a cat’s brain and created videos of what the animal was seeing’.****  

The article anticipated that ‘It is also conceivable that, given time, it will be possible to record what one person sees and “play it back” to someone else either as it is happening or at a later date’. 

Perpetraitors also have the option of looking not only at what you see, but also directly at you from satellites, using laser particle beam technology that allows them to see through walls, roofs, cars etc.  This option is more likely  to be available to the supervisor. If perpetraitors only have ‘see-through-eyes’ vision, they may be left in the dark if the TI closes both eyes or is in an unlit room. Having both views  usually clarifies what is going on, but can create two interpretations of what is happening. Sometimes it can be like two people blindfolded trying to put the tail on the donkey.

*See ‘A New Breed. Satellite Terrorism in America, Dr John Hall, 2009.

** Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. http://www.bibliotecapleyades.net/scalar_tech/esp_scalartech12.htm.


**** BBC News Online Oct 11, 1999, Looking Through Cats’ Eyes Fuzzy, But Recognizable, Dr. David Whitehouse, A BBC News article reported on the first pictures from an experiment to see through the eyes of a cat. http://news.bbc.co.uk/hi/english/sci/tech/newsid 471000/471786.stm.  Source: Cold War Nonconsensual Experiments: The Threat of Neuroweapons and the Danger it will happen again, Cheryl Welsh, J.D., www.mindjustice.com.


  • if perpetraitors are invading your thoughts and you can think in another language, try doing that for a bit. It puts the perpetraitors off, because their criminal bosses want them to understand what you are saying.  If you carry on they will have to bring in someone who can speak the same language, and that is not always easy, even when no expense is spared.
  • I tried this, using a few phrases of a foreign language that I had picked up, and some songs from a CD in that language. I regularly repeated the words in my mind.  This resulted in two language experts being brought in.  They both left almost immediately on ethical grounds, and one of them was traumatised by what he  found out about targeting of individuals.
  • If you are fed up with intruders trying to take you over, and want to meet up with your friends, pick a venue that has built-in protection against a range of frequency devices.  Many airport hotels now have this, and some can be reasonably priced.  Just make sure you are within the shielding – avoid the foyer and bars open to non-guests.
  • Most people are aware of the next point, but I wasn’t, so I will mention it.  Before you go to sleep, it is advisable to switch off all wireless/internet routers and unplug internet cable connections to phone filters before you go to sleep.  Take strategic electric plugs out of sockets. Ensure that cell phones, tablets etc are not only switched off but encased in metal or wrapped in aluminium, as they can be used as tracking devices even when switched off.


 In the course of preparing this post my laptop was crashed externally so many times that it no longer worked, and I had to buy another one.  I also had to get a new filter for my Broadband internet.  The day after publishing this post the photo library in my iPhoto application, containing nearly 5,000 photographs was wiped out.  I do have a back up, so I reloaded the photos, and half an hour later they were wiped again.

Targeted Individuals: Perpetraitors Secret Weapon

This post covers:

  • The secret weapon that gives perpetraitors control
  • How the criminal perpetraitors do it
  • What methods we can use to protect ourselves
  • My personal experience of trying out one of the methods

Many Targeted Individuals (TIs) have had the courage to write about their experiences, either on the internet, or in books.  Some experiences appear to be common to most TIs, including remote pain transmission, exposure to dangerous levels of microwaves and altered states of awareness. Some also describe ‘gang-stalking’ and others report impressions of synthetic telepathy, paranoia and psychosis.


There is one type of energy weapons approach that gives perpetrators control over their victims. In her article ‘On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology’, Journal of Psycho-Social Studies 2003, the psychoanalyst Dr Carole Smith.PHD, states:

‘In 1969 Dr Jose Delgado, a Yale psychologist, published a book: “Physical Control of the Mind: Towards a Psychocivilized Society”. In essence, he displayed in practical demonstrations how, by means of electrical stimulation of the brain which had been mapped out in its relations between different points and activities, functions and sensations, – by means of electrical stimulation, how the rhythm of breathing and heartbeat could be changed, as well as the function of most of the viscera, and gall bladder secretion. Frowning, opening and closing of eyes and mouth, chewing, yawning, sleep, dizziness, epileptic seizures in healthy persons were induced. The intensity of feelings could be controlled by turning the knob, which controlled the intensity of the electric current.’


What we are talking about in everyday terms – I do not pretend to know much about the technical side – is that by directing an electronic weapon at a very specific part of the  brain, perpetrators can alter the victim’s state of awareness, including:

  • Sudden onset of sleep/sleep deprivation
  • Going unconscious
  • Forgetting what happened to them
  • Experiencing externally induced emotions
  • Synthetically induced paranoia and psychosis
  • Heart malfunction
  • Breathing difficulties – asphyxia can be induced by altering frequencies in the brain that control breathing
  • Synthetically induced frequencies that replicate inhalation of noxious gases/chemicals.

If it wasn’t for this one perpetraitor capability, targeted individuals could probably get up and walk away from much of what was targeted at them, most of the time.


In his book ‘A new breed: satellite terrorism in America’ – www.satweapons.com, Dr John Hall has drawn attention to the use of satellite technology by criminal perpetraitors for targeting individuals remotely.  Dr Carole Smith’s article supports this:

‘A more disturbing use is the system developed for manipulating and disturbing the human mental process using pulsed radio frequency radiation (RFR), and their use as a device for causing negative effects on human health and thinking. The victim, the innocent civilian target is locked on to, and unable to evade the menace by moving around. The beam is administered from space’…*

‘The technology that originated in the years of the arms race between the Soviet Union and the West, has resulted in using satellite technology* not only for surveillance and communication systems but also to lock on to human beings, manipulating brain frequencies* by directing laser beams, neural-particle beams, electro-magnetic radiation, sonar waves, radiofrequency radiation (RFR), soliton waves, torsion fields and by use of these or other energy fields which form the areas of study for astro-physics.’

*My emphasis


According to Mr Barry Trower, a well-known advocate of targeted individuals*, TIs can protect themselves  using several layers of aluminium foil as shielding.  In a talk recently uploaded to YouTube, he also provides a range of other advice  – www.youtube.com/watch?v=09mpvscHiKI&feature=youtu.be.


I have read some things on the internet that suggest that anyone who uses aluminium foil – such as for tin hats – is deluding themselves.  But according to Wikipedia:

‘The notion that a tin foil hat can significantly reduce the intensity of incident radio frequency radiation on the wearer’s brain has some scientific validity, as the effect of strong radio waves has been documented for quite some time. A well-constructed tin foil enclosure would approximate a Faraday cage, reducing the amount of … radiofrequency electromagnetic radiation passing through to the interior of the structure…’

“The efficiency of such an enclosure in blocking such radiation depends on the thickness of the tin foil, as dictated by the skin depth, the distance the radiation can propagate in a particular non-ideal conductor. For half-millimetre-thick tin foil, radiation above about 20 kHz (i.e., including both AM and FM bands) would be partially blocked, although tin foil is not sold in this thickness, so numerous layers of tin foil would be required to achieve this effect’…

‘The effectiveness of the tin foil hat as electromagnetic shielding for stopping radio waves is greatly reduced by it not being a complete enclosure.’



Recently, perpetraitors were directing brain targeting to make me struggle for breath, or lose concentration, particularly when I write this blog.  So I decided to give the aluminium hat a try – and I found that IT WORKS.  The lack of oxygen and loss of focus stopped.

There are things that aluminium foil doesn’t do, including blocking synthetic telepathy, but if you want to stop perpetrators taking over your brain, based on my experience, several layers of aluminium foil, covering the head completely, will do it.  You can buy the foil quite cheaply in places like supermarkets and general purpose stores.

The risk is mainly when you are indoors at home, and staying still, or asleep. If you are outside in fresh air and moving about, the risk is much lower.


Dr Carole Smith.PHD – ‘On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology’ – http://www.globalresearch.ca/index.php?context=va&aid=7123

Dr John Hall – ‘A new breed: satellite terrorism in America’ – www.satweapons.com

Mr Barry Trower – www.youtube.com/watch?v=09mpvscHiKI&feature=youtu.be


Could some British nationals visiting the USA be at risk of becoming targeted individuals from criminal operations?

I have heard reports that a pattern is emerging regarding British nationals visiting North America, who have become targeted individuals, mainly as a result of criminal operations in the Los Angeles area.  I know of several cases, including my own, where this happened.  What is disturbing is that in some cases this activity followed British nationals back to the UK.  In one or two cases, family members or contacts in the UK were also affected.

Those in the UK visiting the US, particularly the South West, may wish to let the Foreign and Commonwealth Office know in advance.  The FCO’s routine advice is to ‘Register with our LOCATE service to tell us when and where you are travelling abroad or where you live abroad so our consular and crisis staff can provide better assistance to you in an emergency’.  That way, if anything happens to you, at least they know where you were, your due date of departure and contact details.   See ‘General Registration’ under http://www.fco.gov.uk/en/travel-and-living-abroad/travel-advice-by-country/north-central-america/united-states.

If you are targeted while in the US, let the FCO know.   It is as well to be aware that targeting of individuals could continue even after you return to the UK.  If you notice anything unusual that makes you suspect that you are still being targeted – see the section in my ‘Home’ post ‘Are you a targeted individual?’, you may want to update the FCO on that as well.  For example, if your internet communications or electronic computer connections appear to be behaving strangely.

It may be that visitors to the US from other countries are having similar experiences.  The more information that is made publicly available about the extent of criminal activity, the more likely it is that perpetraitors will be apprehended.

This post is also available at www.Martinacable.blogspot.com

Other posts are available at www.Martinacable99.blogspot.com