Very little changes

Attention!

It has been a while since I have posted an update about my situation. Well, it really hasn’t change, except I’m dealing with a noise campaign. The noise campaign compose of devices place in my immediate area, which gives different sound. The sounds are continuous and only changes when I walk towards these devices.

I have tried to locate these devices, but was not successful. If you had not been targeted like this before, you thought some crickets are birds have invaded the area. But that isn’t what happening.

I first noticed these devices last year, but it wasn’t as irritating. Now the average person would notice it.

They have also upgrade their pulsing devices to squeak instead of pop. The squeaking sound is similar to a bird call, but it is very animated.

Other than that , I’m still dealing with ethereal devices placed in my area, manipulation of food and liquid products in various supermarket and store chains and some level of GPS stalking.

Chris J. Brunson

Noise Campaign Through Technology

The noise campaign involves the use of devices that have been installed in the “TARGETED” area for the purpose of creating noise and enhancing the input of the surrounding technologies. 

The noise is in a form of a cricket at night, but differs as the sound is constant and technology sounding. The bird chirping is constant and does not vary in pitch. 

The sounds interfere with sleeping patterns, as I believe that is the purpose of this targeting. 

Everything they do is for the benefit of the installer of these devices and does nothing to enhance my human abilities. 

Besides, it is another devices to their arsenal against my quality of life. 

OH… It appears that the devices work off the trees root system and needs additional investigation on how they actually are powered.

QuWave Customer Support Letter

This really sounds like a good deal. If you have not tried it, you have the most 30 days and if it doesn’t work, you just pay for the shipping twice. That isn’t bad. So I wonder if it would work for me. I must test it to believe it. Letter below:

Greetings Chris,

We attempted to reach you but only got voicemail. We will attempt getting in touch with you again soon. It sounds like you are inquiring about the Defender.  The Defender uses scalar energy to protect Targeted Individuals from harmful emf, elf, psychotronic/electronic attacks, and psychic attacks. The Scalar energy creates an energy cocoon around your body that protects you from all harmful waves or frequencies. The Defender also has the solfeggio frequencies, these frequencies enter the pineal glands of your brain to strengthen your human biofield and make you less prone to attacks.

Please remember all our units have a free 1 year warranty and a free 30 day money back guarantee, so if you were not satisfied for any reason you are welcomed to return the unit no questions asked and receive a full refund. If you have any other questions feel free to ask them and I will answer them for you no problem. Enjoy the rest of your day!

Ken

“Products to Improve Your Life with Wave Technology:  Scalar – Schumann – Solfeggio – Orgone.”
www.QuWave.com
Phone: 201-279-9929
________________________________________
From: dispatch@answerfirst.com [dispatch@answerfirst.com]
Sent: Sunday, March 09, 2014 1:35 PM
To: sales3@quwave.com
Subject: Call Center Messages

Acct#: 936 3/9/2014 1:32:21 PM MMW Message #: 720
Caller ID: 3472857954
Call Type: All Others
From: Chris Brunson
Phone: 347-285-7954
Best Callback Time: Leave a message so I can call back
Time
Zone: EST
Email: bmarkforce@yahoo.com
Heard
About Us: research
RE: He is  a targeted individual, he does not keep his phone on for this reason. He would like more information about what this will protect him from.

How to make Orgonite Tower buster

Photo of Crystal placed in the center of mold.


You can see the metal is not quite to the top. This allows your pour to completely cover everything. If metal is sticking out then you can cut yourself if not careful.


Here is how the TB looks after the resin has fully cured. Notice it is very shiney and glairy. Very noticable if not barried or placed in a hole.


Green and brown paint works great to camoflous the TB. If tossed on the side of the road they will look like stones. If you are gifting an area that has a certain color tone then paint the TB to match. Matte finish is the best because of the lack of glare.

Also in the photo is a 1oz TB, these are great for surrounding an area that has small cracks and holes which larger 3oz TB won’t fit into.

Ryan

Source: http://ethericwarriors.com

2) http://www.orgonite.info/how-to-make-orgonite-tbs.html

3) Video: http://www.youtube.com/watch?v=EwBF7vTEoyE

4) http://www.lifeenergysolutions.com/orgonite/

 

What should you do with the Tower Busters

Tower Busters are the most effective way to clean up any environment from electrical radiation.  Because of their simple and convenient design, TB’s can easily be used to grid your home, property, and community.  Our TB’s are made with various metal shavings and one double terminated Tibetan quartz crystal. The Tibetan quartz we use are of high quality and greatly increase the effectiveness of the Tower Buster ability to clean up electrical pollution.

    Tower Busters can also be used to grid your home and your property.  The best way to do this is to place one at the each corner of your house and then each corner of your land.  All cell phone towers that are within a couple miles of you should be “gifted” with some form of orgone purifying device as these towers are the source of massive amounts of DOR (dead orgone radiation).  ELF Waves, Microwaves, and 60 hertz frequencies are harmful to nature and should be neutralized with energy transforming orgone generators.  The shift that takes place after transforming these energies speaks for itself.

Why Crystals and Minerals are important for HUMAN development

Why Crystals and Minerals are important for HUMAN development

Compositions and Descriptions

I’m covering this information in this posts, because it is one out of many solutions to the targeting that Targeted Individuals are experiencing. However, the post is for information and should not be taken as scientific fact. Please use your own judgement.

Readers advised. Government Sponsored Stalking does not endorse the content below. Please use your own judgement.
amazonite Amazonite is a beautiful green variety of microcline feldspar. Its chemical formula is KAlSi3O8 , potassium aluminum silicate.
tanzanite Tanzanite is a variety of Zoisite. It is valued as a gem stone and has the chemical formula Ca2Al3Si3O12(OH).
mica The Mica Group is the name given to a group of silicate minerals that have silicon and oxygen as their two major components.
muscovite Muscovite is a member of the mica mineral group. It is more important as a rock-forming mineral than as a collectible specimen.
biotite Biotite Biotite is a member of the mica branch of the silicate mineral group. It is common as a rock-forming mineral and is present in all three rock types: igneous, metamorphic, and sedimentary.
sodalite Sodalite is a deep royal blue silicate. The deep color and the fact that it will take a high polish makes it popular in jewelry and other decorative items. The chemical formula is Na8Al6Si6O24Cl2.
talc Talc is a metamorphic mineral from the silicate family. Its chemical formula is hydrated magnesium silicate H2Mg3(SiO3)4. Talc is commonly used as talcum powder to reduce friction, promote dry skin, and prevent rashes.
quartz crystals Quartz is one of the most common of all minerals that make up the continental crust. It is found in igneous, metamorphic, and sedimentary rocks. It is associated with many valuable ore deposits as well.
amethyst crystal Amethyst is a variety of quartz and owes its purple color to the presence of iron. It is composed of silicone dioxide SiO2.
fire agate Agate is the name given to a group of silicates that are made up primarily of chalcedony. Chalcedony is a member of the quartz family of minerals. Like quartz chalcedony is silicone dioxide with a chemical formula of SiO2.
tiger eye Tigers Eye is a form of quartz with some special characteristics. Like all quartz it is made up primarily of silicone dioxide, SiO2. Within this matrix are asbestos fibers usually occurring in layers. It is the asbestos that makes Tiger eye a chatoyant gemstone.
barite barite is a sulfate mineral with a chemical formula of BaSO4, sometimes called heavy spar. Its chemical name is barium sulfate. It is the primary source of the element barium.
celestite Celestite is made up of strontium sulfate. The chemical formula is SrSO4. Its name comes from Latin, caelestis meaning celestial.
selenite selenite Selenite is a very common chemical sedimentary mineral. Its chemical formula is Calcium Sulfate dihydrate CaSO42H20, It is a form of gypsum. It is a very soft mineral.
rhodochrosite-sweet home mine Rhodochrosite is a manganese carbonate mineral. Its chemical composition is MnCO3. In its purest form it is a transparent rose red, but this is fairly rare. It can also be formed in stalactites. This form can be sliced revealing circular layers of rose and pink to milky white. These lighter colors are formed when the manganese is replaced by calcium, manganese or zinc. The depth of color from red to pink depends on the amount of substitution.
azurite Azurite is a copper carbonate. The chemical formula is Cu3[OH CO3]2and results from the oxidation of copper sulfides.
malachite Malachite is a copper carbonate with a chemical formula of Cu2[(OH)2 CO3]. It is a vibrant green color often banded with light and dark greens.
calcite Calcite Calcite is a very common sedimentary mineral. It has the chemical formula CaCO3 calcium carbonate. Calcite dissolves in water and so is carried along with water into cracks, fissures, and caves. It can over time build up layer upon layer to form stalactites and stalagmites in caves.
magnetite Magnetite is sometimes called lodestone. It is strongly magnetic. It was used by the ancient Chinese to make the first magnetic compasses. The chemical formula is Fe3O4.
Hematite Hematite is one of the most prevalent and useful forms of iron on our planet. It is a common iron ore and is often used in jewelry and other decorative items. The chemical formula is Fe2O3.
Halite Halite Halite is also known as rock salt. The chemical name is sodium chloride NaCl It is called an evaporate. It forms in places where sea water has been isolated from the ocean forming a lake.
fluorite Fluorite Fluorite is a halide that is soft and usually colorless but can be blue, purple, green, brown, or yellow. Some times several colors are present in the same crystal creating a striking affect.
galena Galena has been mined for lead and silver since the time of the Romans. It is a form of lead sulfide. The chemical formula is PbS. It is the most important source of lead and is abundant and widespread in occurance.
stibnite Stibnite Stibnite is a sulfide found in low temperature hydrothermal veins and hot springs deposits. It is prized by collectors for the long slender bladed crystals. These can occur in clumps with many orthorhombic crystals radiating in all directions. It is very soft only a 2 on the Mohs hardness scale.
pyrite cube Pyrite sometimes called iron pyrite is a compound of iron and sulfur, iron sulfide FeS2. Depending upon the conditions under which it forms pyrite can form crystals of different shapes.
apatite Apatite is the name given to a group of phosphate minerals that are widely distributed in all rock types, usually in tiny crystals spread throughout the host rock. It is usually green in color.
turquoise Turquoise is classed as a phosphate mineral. The chemical formula is CuAl6(PO4)4(OH)8 4H2O a hydrous phosphate of copper and Aluminum.
gold nugget Gold is a soft metallic element. Its symbol is Au. It is very dense. As one of the noble metals it is resistant to corrosion and oxidation in moist air.
copper Copper is a soft metallic element. Its symbol is Cu. Native copper is rare because it has been mined for centuries. Today it is used for making wire, tubing, and coins to name a few. Long ago it was combined with tin to create bronze.
bismuth crystals Bismuth Crystals Bismuth in its elemental form is a rare occurance in nature, even more so for bismuth crystals. Lab grown crystals are popular because of their intricate shapes and dazzaling colors.
silicon Silicon Silicon is a metallic element used to make computer chips and other electronic equipment. Although it is the second most abundant element in the world it was not discovered until 1824.
Mineraloids Mineraloid is the term used for those substances that do not fit neatly into one of these eight classes. Opal, jet, amber, and mother of pearl all belong to the mineraloids. 

further definitions can be found here: http://www.bestcrystals.com/crystals2.html

Dehydration To Avoid Nano-Tech

It has been a very difficult 5 days. It hasn’t rain in 6 days and ran out of water supply three days ago. The other options of water is not a good options at all. They are tap water and bottle water. The tap water is laced with chemicals, nano tech and other microscopic technology implants. The implants and chemicals allows various parts of the body to be manipulated including the mind.

In the days I drank the rain water and did not eat the laced food, the attacks minimized. I did not experienced a rapid heartbeat especially the 2nd day and thereafter. But after drinking the tap water, I experienced a rapid heartbeat. So this couldn’t be just 1) all the water is contaminated or 2) the tech that is already in my body is causing them to do this.

The water taste drastic different than the water I get from the rain. It is like drinking coffee with cream. There is an undercurrent in the water that makes it taste like this. So no matter how much water that I consume, I never quench my thrust.

I can tell you from my experienced that when I do drink the tap and bottle water that it only contains 75 percent water and the rest is laced with chemicals. The chemicals is covered up with high levels of chlorine.

If you could only place yourself in this situation, you will understand how difficult it is to be without half-way decent clean water for a period of time. 6 days is a long time for it not to rain, especially if you have to use this water for drinking, cleaning and cooking.

The summers are always my worse period. It doesn’t rain as often and the heat requires me to drink more water. I have setup a canopy to shield me from the sun, but it does not shield you from humidity. And when the temperature rises, so does the possibility of being dehydrated.

Water also helps in cooling. The kind of water that is coming from the tap is not useable. I used it yesterday for both drinking and cooling and I noticed immediately the signals increasing around my entire body. It’s because the tech that is in the water is interfacing with the tech that is in my body. This allows the criminals to gain even more access to the tech in my body.

Before using this water I was just hot and weak (I was not tired). After using this tap water, I was more attacked and then I became drained. That’s because the muscles of my body was being manipulated to the point of exhaustion.

Once the tech is depleted by perspiration the symptoms decrease considerably. The tech is like a group of magnets. Inside the body they attach themselves to vital organs. These magnets can be access by other magnets and devices. This is what is happening to me.

That’s why these business (they are many), dollar tree, dollar general, family dollar, food lion, IGA Carlie C’s, Aldis, etc. put so much effort to switch out items before I enter or as I shop in the store. This is because these tech devices have a limit shelf life. They become less effective as the time goes on. I know this by eating the food.

For instance, when I first eat the laced food, the attacks are at there worse. The second day is never as bad as the first day. And so on.

It is so easy to stop this criminal organization, because of the fact the evidence is in the food. But the government agencies have been so infiltrated by these criminal organizations that this activity could go on year after year and no one does nothing. The only mind control script that is going on is the majority of sale’s persons who places these items on the shelves.

I wish it was a psychology ploy as so many people are telling me, but it isn’t. I have dealt with this from day one. It isn’t some micro-wave weapon transmitting to a frequencized human body. It is the tech that is being placed in the food and water that is magnetizing the body so that it can be attacked.

GPS Selected Targeting

Because of increased GPS selected targeting, I will be discontinuing my Internet activity. Recently I purchased T-mobile WIFI stick, which gives me access to the web all over Fayetteville, NC. Unfortunately, like the Cell phone GPS coverage, it is being used to manipulate both the Technology in my body and the Technology in my surrounding area. It can be felt in the form of burning and stinging. Then, involuntary muscle contracts occur and sometimes signalling of the burned areas. Also, I will be limiting my consumtion of Food, because 10/10 times the Tech has been placed in the food and drinks sold in surrounding grocery stores. I have documented these crimes from day one and have contacted the regulatory agencies about this situation, but they do nothing about it. they are on stand-down mode to these government human torture programs that I, as well as, so many people find themselves in. I have looked at other ways to limit this torture and this is the next best thing.

Amendment to stop NSA Spying: How our legislators voted

FINAL VOTE RESULTS FOR ROLL CALL 412
(Republicans in roman; Democrats in italic; Independents underlined)

H R 2397      RECORDED VOTE      24-Jul-2013      6:51 PM
AUTHOR(S):  Amash of Michigan Amendment No. 100
QUESTION:  On Agreeing to the Amendment

AYES NOES PRES NV
REPUBLICAN 94 134 6
DEMOCRATIC 111 83 6
INDEPENDENT
TOTALS 205 217   12


—- AYES    205 —
 

Amash
Amodei
Bachus
Barton
Bass
Becerra
Bentivolio
Bishop (UT)
Black
Blackburn
Blumenauer
Bonamici
Brady (PA)
Braley (IA)
Bridenstine
Broun (GA)
Buchanan
Burgess
Capps
Capuano
Cárdenas
Carson (IN)
Cartwright
Cassidy
Chabot
Chaffetz
Chu
Cicilline
Clarke
Clay
Cleaver
Clyburn
Coffman
Cohen
Connolly
Conyers
Courtney
Cramer
Crowley
Cummings
Daines
Davis, Danny
Davis, Rodney
DeFazio
DeGette
DeLauro
DelBene
DeSantis
DesJarlais
Deutch
Dingell
Doggett
Doyle
Duffy
Duncan (SC)
Duncan (TN)
Edwards
Ellison
Eshoo
Farenthold
Farr
Fattah
Fincher
Fitzpatrick
Fleischmann
Fleming
Fudge
Gabbard
Garamendi
Gardner
Garrett
Gibson
Gohmert
Gosar
Gowdy
Graves (GA)
Grayson
Green, Gene
Griffin (AR)
Griffith (VA)
Grijalva
Hahn
Hall
Harris
Hastings (FL)
Holt
Honda
Huelskamp
Huffman
Huizenga (MI)
Hultgren
Jeffries
Jenkins
Johnson (OH)
Jones
Jordan
Keating
Kildee
Kingston
Labrador
LaMalfa
Lamborn
Larson (CT)
Lee (CA)
Lewis
Loebsack
Lofgren
Lowenthal
Lujan Grisham (NM)
Luján, Ben Ray (NM)
Lummis
Lynch
Maffei
Maloney, Carolyn
Marchant
Massie
Matsui
McClintock
McCollum
McDermott
McGovern
McHenry
McMorris Rodgers
Meadows
Mica
Michaud
Miller, Gary
Miller, George
Moore
Moran
Mullin
Mulvaney
Nadler
Napolitano
Neal
Nolan
Nugent
O’Rourke
Owens
Pascrell
Pastor (AZ)
Pearce
Perlmutter
Perry
Petri
Pingree (ME)
Pocan
Poe (TX)
Polis
Posey
Price (GA)
Radel
Rahall
Rangel
Ribble
Rice (SC)
Richmond
Roe (TN)
Rohrabacher
Ross
Rothfus
Roybal-Allard
Rush
Salmon
Sánchez, Linda T.
Sanchez, Loretta
Sanford
Sarbanes
Scalise
Schiff
Schrader
Schweikert
Scott (VA)
Sensenbrenner
Serrano
Shea-Porter
Sherman
Smith (MO)
Smith (NJ)
Southerland
Speier
Stewart
Stockman
Swalwell (CA)
Takano
Thompson (MS)
Thompson (PA)
Tierney
Tipton
Tonko
Tsongas
Vela
Velázquez
Walz
Waters
Watt
Waxman
Weber (TX)
Welch
Williams
Wilson (SC)
Yarmuth
Yoder
Yoho
Young (AK)

—- NOES    217 —
 

Aderholt
Alexander
Andrews
Bachmann
Barber
Barr
Barrow (GA)
Benishek
Bera (CA)
Bilirakis
Bishop (GA)
Bishop (NY)
Boehner
Bonner
Boustany
Brady (TX)
Brooks (AL)
Brooks (IN)
Brown (FL)
Brownley (CA)
Bucshon
Butterfield
Calvert
Camp
Cantor
Capito
Carney
Carter
Castor (FL)
Castro (TX)
Cole
Collins (GA)
Collins (NY)
Conaway
Cook
Cooper
Costa
Cotton
Crawford
Crenshaw
Cuellar
Culberson
Davis (CA)
Delaney
Denham
Dent
Diaz-Balart
Duckworth
Ellmers
Engel
Enyart
Esty
Flores
Forbes
Fortenberry
Foster
Foxx
Frankel (FL)
Franks (AZ)
Frelinghuysen
Gallego
Garcia
Gerlach
Gibbs
Gingrey (GA)
Goodlatte
Granger
Graves (MO)
Green, Al
Grimm
Guthrie
Gutiérrez
Hanabusa
Hanna
Harper
Hartzler
Hastings (WA)
Heck (NV)
Heck (WA)
Hensarling
Higgins
Himes
Hinojosa
Holding
Hoyer
Hudson
Hunter
Hurt
Israel
Issa
Jackson Lee
Johnson (GA)
Johnson, E. B.
Johnson, Sam
Joyce
Kaptur
Kelly (IL)
Kelly (PA)
Kennedy
Kilmer
Kind
King (IA)
King (NY)
Kinzinger (IL)
Kirkpatrick
Kline
Kuster
Lance
Langevin
Lankford
Larsen (WA)
Latham
Latta
Levin
Lipinski
LoBiondo
Long
Lowey
Lucas
Luetkemeyer
Maloney, Sean
Marino
Matheson
McCarthy (CA)
McCaul
McIntyre
McKeon
McKinley
McNerney
Meehan
Meeks
Meng
Messer
Miller (FL)
Miller (MI)
Murphy (FL)
Murphy (PA)
Neugebauer
Noem
Nunes
Nunnelee
Olson
Palazzo
Paulsen
Payne
Pelosi
Peters (CA)
Peters (MI)
Peterson
Pittenger
Pitts
Pompeo
Price (NC)
Quigley
Reed
Reichert
Renacci
Rigell
Roby
Rogers (AL)
Rogers (KY)
Rogers (MI)
Rooney
Ros-Lehtinen
Roskam
Royce
Ruiz
Runyan
Ruppersberger
Ryan (OH)
Ryan (WI)
Schakowsky
Schneider
Schwartz
Scott, Austin
Scott, David
Sessions
Sewell (AL)
Shimkus
Shuster
Simpson
Sinema
Sires
Slaughter
Smith (NE)
Smith (TX)
Smith (WA)
Stivers
Stutzman
Terry
Thompson (CA)
Thornberry
Tiberi
Titus
Turner
Upton
Valadao
Van Hollen
Vargas
Veasey
Visclosky
Wagner
Walberg
Walden
Walorski
Wasserman Schultz
Webster (FL)
Wenstrup
Westmoreland
Whitfield
Wilson (FL)
Wittman
Wolf
Womack
Woodall
Young (FL)
Young (IN)

—- NOT VOTING    12 —
 

Barletta
Beatty
Bustos
Campbell
Coble
Herrera Beutler
Horsford
McCarthy (NY)
Negrete McLeod
Pallone
Rokita
Schock

State of NC To Pay $10 million To Women Who Were Victims of Forced Sterilization

There have only been 48 people that have come forward in this case. The job of finding the other few thousand who are still believed to be alive falls on the shoulders of the North Carolina Institute for Sterilization Victims Foundation.

One of the survivors is named Elaine Riddick. She was r@ped when she was just 13 years old and became pregnant as a result. When she gave birth, she was sterilized. She has been a huge force and is trying to speak out for herself and the other survivors, and has tried to get compensation from the state for a while, but nothing ever seemed to work. She says she is amazed at what they are doing now, but money isn’t enough. Riddick says there is no amount of money that can take away the humiliation of someone stealing your ability to reproduce and castrating you.  read more

Covert Operations of the U.S. National Security Agency

A lawsuit filed against the U.S. National Security Agency reveals a frightening array of technologies and programs designed to keep tabs on individuals.

From an article in Nexus Magazine April/May 96

[pdf version]

John St Clair Akwei
vs
National Security Agency
Ft George G. Meade, MD, USA
(Civil Action 92-0449)

The following document comprises evidence for a lawsuit filed at the U.S. Courthouse in Washington, DC, by John St Clair Akwei against the National Security Agency, Ft George G. Meade, Maryland (Civil Action 92-0449), constitutes his knowledge of the NSA’s structure, national security activities proprietary technologies and covert operations to monitor individual citizens.

1. THE NSA’S MISSION AND DOMESTIC INTELLIGENCE OPERATION
Communications Intelligence
Signals Intelligence
Domestic Intelligence
Independently Operating Personnel Target Citizens
2. NSA’S DOMESTIC ELECTRONIC SURVEILLANCE NETWORK
  Signals Intelligence Remote Computer Tampering
Detecting EMF Fields in Humans for Surveillance
3. NSA SIGNALS INTELLIGENCE USE OF EMF BRAIN STIMULATION
  Capabilities of NSA operatives using RNM
4. NATIONAL SECURITY AGENCY SIGNALS INTELLIGENCE ELECTRONIC BRAIN LINK TECHNOLOGY
5. [NO HEADING IN ORIGINAL DOCUMENT]

6. NSA TECHNIQUES AND RESOURCES
  Remote RNM Devices
Spotters and Walk-Bys in Metropolitan Areas
Chemicals and Drugs into Residential Buildings with Hidden NSA Installed and Maintained Plastic Plumbing lines
Brief Overview of Proprietary US Intelligence/Anti- Terrorist Equipment Mentioned
Table: An example of EMF Brain Stimulation
RESOURCES

1. THE NSA’S MISSION AND DOMESTIC INTELLIGENCE OPERATION

Communications Intelligence (COMINT)

Blanket coverage of all electronic communications in the US and the world to ensure national security. The NSA at Ft Meade, Maryland has had the most advanced computers in the world since the early 1960s. NSA technology is developed and implemented in secret from private corporations, academia and the general public.

Signals Intelligence (SICINT)

The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and track persons with the electrical currents in their bodies. Signals Intelligence is based on fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves. The NSA/DoD [Department of Defence] developed proprietary advanced digital equipment which can remotely analyze all objects whether manmade or organic, that have electrical activity.

Domestic Intelligence (DOMINT)

The NSA has records on all US citizens. The NSA gathers information on US citizen who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent national security anti-terrorist surveillance network in place. This surveillance network is completely disguised and hidden from the public.

Tracking individuals in the US is easily and cost-effectively implemented with NSA’s electronic surveillance network. This network (DOMINT) covers the entire US, involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously . Cost-effective implementation of operations is assured by NSA computer technology designed to minimize operations costs. NSA personnel serve in quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track. NSA personnel in the community usually have cover identities such as social workers, lawyers and business owners.

Individual Citizens Occasionally Targeted for Surveillance by Independently Operating NSA Personnel

NSA personnel can control the lives of hundreds of thousands of individuals in the US by using the NSA’s domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen. NSA DOMINT has the ability to assassinate US citizens covertly or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.

2. NSA’S DOMESTIC ELECTRONIC SURVEILLANCE NETWORK

As of the early 1960s, the most advanced computers in the world were at the NSA, Ft Meade. Research breakthroughs with these computers were kept for the NSA. At the present time the NSA has nanotechnology computers that are 15 years ahead of present computer technology. The NSA obtains blanket coverage of information in the US by using advanced computers that use artificial intelligence to screen all communications, regardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists. These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the US is a result of the NSA’s Signals Intelligence (SIGINT) mission. The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF spectrum. This equipment was developed, implemented and kept secret in the same manner as other electronic warfare programs.

Signals Intelligence Remote Computer Tampering

The NSA keeps track of all PCs and other computers sold in the US. This is an integral part of the Domestic Intelligence network. The NSA’s EMF equipment can tune in RF emissions from personal computer circuit boards (while filtering out emissions from monitors and power supplies). The RF emission from PC circuit boards contains digital information in the PC. Coded RF waves from the NSA’s equipment can resonate PC circuits and change data in the PCs. Thus the NSA can gain wireless modem-style entry into any computer in the country for surveillance or anti-terrorist electronic warfare.

Detecting EMF Fields in Humans for Surveillance

A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance. NSA personnel can dial up any individual in the country on the Signals Intelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours a day. The NSA can pick out and track anyone in the US.

3. NSA SIGNALS INTELLIGENCE USE OF EMF BRAIN STIMULATION

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKULTRA program of the early 1950s, which included neurological research into radiation (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as “Radiation Intelligence”, defined as “information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation”. Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the US Government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyze electrical activity in humans from a distance. NSA computer generated brain mapping can continuously monitor all of the electrical activity in the brain continuously. The NSA records and decode individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for brain-to-computer link (in military fighter aircraft, for example).

For electronic surveillance purposes, electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex, thus allowing audio communications direct to the brain (bypassing the ears). NSA operatives can use this covertly to debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia.

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves. NSA operatives can use this surreptitiously to put images into a surveillance subject’s brain while they are in REM sleep for brain-programming purposes.

Capabilities of NSA Operatives Using RNM

There has been a Signals Intelligence network in the US since the 1940s. The NSA, Ft Meade has in place a vast two-way wireless RNM system which is used to track subjects and noninvasively monitor audio-visual information in their brains. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech, 3D sound and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears), and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods and motor control.

Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to- computer link.

4. NATIONAL SECURITY AGENCY SIGNALS INTELLIGENCE ELECTRONIC BRAIN LINK TECHNOLOGY

NSA SIGINT can remotely detect, identify and monitor a person’s bioelectric fields.

The NSA’s Signals Intelligence has the proprietary ability to monitor remotely and non-invasively information in the human brain by digitally decoding the evoked potentials in the 30-50 Hz, 5 milliwatt electromagnetic emissions from the brain.

Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 Hz, 5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called “evoked potentials”. Every thought, reaction, motor command, auditory event and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials”. The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain.

NSA SIGINT uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level).

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control.

Two-way electronic Brain Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes). The images appear as floating 2D screens in the brain.

Two-way electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote neural monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the US Intelligence Community.

5. [NO HEADING IN ORIGINAL DOCUMENT]

RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in that specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band. (See Table 1.) This modulated information can be put into the brain at varying intensities from subliminal to perceptible. Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived.

The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft Meade.

They used RNM 3D sound direct to the brain to harass the Plaintiff from October 1990 to May 1991.

As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to the authorities about their activities against the Plaintiff in the last 12 years. The Kinnecome group has about 100 persons working 24 hours a day at Ft Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.

6. NSA TECHNIQUES AND RESOURCES

Remote monitoring/tracking of individuals in any location, inside any building, continuously, anywhere in the country. A system for inexpensive implementation of these operations allows for thousands of persons in every community to be spied on constantly by the NSA.

Remote RNM Devices

NSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals, and can send messages through the nervous systems to affect their performance. RNM can electronically identify individuals and track them anywhere in the US. This equipment is on a network and is used for domestic intelligence operations, government security and military base security, and in case of bioelectric warfare.

Spotters and Walk-Bys in Metropolitan Areas

Tens of thousands of persons in each area working as spotters and neighbourhood/business place spies (sometimes unwittingly) following and checking on subjects who have been identified for covert control by NSA personnel.

Agents working out of offices can be in constant communication with spotters who are keeping track of the NSA’s thousands of subjects in public. NSA agents in remote offices can instantly identify (using~ RNM) any individual spotted in public who is in contact with surveillance subject.

Chemicals and Drugs into Residential Buildings with Hidden NSA Installed and Maintained Plastic Plumbing lines.

The NSA has kits for running lines into residential tap water and air ducts of subjects for the delivery of drugs (such as sleeping gas or brainwashing-aiding drugs). This is an outgrowth of CIA pharmapsychology (psychopharmacology).

Brief Overview of Proprietary US Intelligence/Anti- Terrorist Equipment Mentioned

Fixed network of special EMF equipment that can read EEGs in human brains and identify/track individuals by using digital computers. ESB (Electrical Stimulation to the Brain) via EMF signal from the NSA Signals Intelligence is used to control subjects.

EMF equipment that gathers information from PC circuit boards by deciphering RF emissions, thereby gaining wireless modem- style entry into any personal computer in the country. All equipment hidden, all technology secret, all scientific research unreported (as in electronic warfare research). Not known to the public at all, yet complete and thorough implementation of this method of domestic intelligence has been in place since the early 1980s.

Editor’s Note: I tried ringing Mr Akwei to find out what was the out- come, if any, of his court case. He firmly but kindly told me that he could not speak about anything to do with the case over the phone and hung up. A subsequent conversation of similar length resulted in the information that he did not wish his address or phone number published with this article. So, if we hear of any developments, we’ll let you know.

Table 1: An example of EMF Brain Stimulation

Brain Area
Bioelectric Resonance Frequency
Information Induced Through Modulation
Motor Control Cortex
10 Hz
Motor Impulse co-ordination
Auditory Cortex
15 Hz
Sound which bypasses the ears
Visual Cortex
25 Hz
Images in the brain bypassing the eyes
Somatosensory
9 Hz
Phantom touch sense
Thought Center
20 Hz
Imposed subconscious thoughts

RESOURCES

These publications have only been discovered since December 1991, after Plaintiff had already notified authorities (Dept of Justice, etc.) of Public Corruption by named NSA employees. When no action was taken against the NSA employees, I researched the Intelligence Community electronic surveillance technology involved and discovered the following publications.

The Body Electric: Electromagnetism and the Foundation of Life, by Robert Becker, M.D. Monitoring neuroelectric information in the brain ESB. (p. 265,313,318)

Cross currents, by Robert Becker. Simulating auditory hallucinations. Remote computer tampering using RF emissions from the logic board. (p. 70,78,105,174,210,216,220,242,299,303)

Currents of Death, by Paul Brodeur. Driving brain electrical activity with external EM; magnetophosphenes; Delgado. (p. 27,93)

The Zapping of America, by Paul Brodeur. DoD EM ESB research; simulating auditory hallucinations.

Of Mice, Men and Molecules, by John H. Heller 1963 Bioelectricity; probing the brain with EM waves. (p, 110)

The Three-Pound Universe, by Judith Hooper. CIA EEG research; EEGs for surveillance. (p.29,132,137)

In the Palaces of Memory, by George Johnson. EM emissions from the brain; the brain as an open electromagnetic circuit.

The Puzzle Palace, by James Bamford. Signals Intelligence; most advanced computers in the early ‘sixties.

The US Intelligence Community. Glossary terms at National Security Archives; Radiation Intelligence (information from unintentionally emanated electromagnetic energy, excluding radioactive sources).

The Search for the “Manchurian Candidate”, by John Marks. Electrical or radio stimulation to the brain; CIA R&D in bioelectrics. (p.227)

Secret Agenda, by Jim Hougan. National security cult groups.

Crimes of the Intelligence Community, by Morton Halperin. Surreptitious entries; intelligence agents running operations against government workers.

War in the Age of Intelligent Machines, NSA computer supremacy, complete control of information.

Alternate Computers, by Time-Life Books. Molecule computers.

The Mind, by Richard Restak, M.D. EEG Systems inc.; decoding brain EM emanations, tracking thoughts on a computer. (p. 258)

MedTech, by Lawrence Galton. Triggering events in the brain, direct to auditory cortex signals.

Cyborg, by D.S. Halacy, Jr, 1965. Brain-to-computer link research contracts given out by the US government.

Psychiatry and the CIA: Victims of Mind Control, by Harvey M. Weinstein M.D. Dr. Cameron; psychic driving; ultraconceptual communications.

Journey Into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, by Gordon Thomas, Intelligence R&D; Delgado; psychic driving with radio telemetry. (p. 127,276,116,168,169)

Mind Manipulators, by Alan Scheflin and Edward M. Opton. MKULTRA brain research for information-gathering.

The Brain Changers, by Maya Pines. Listening to brain EM emissions. (p.19)

Modern Bioelectricity. Inducing audio in the brain with EM waves; DoD cover-up; EM wave ESB; remote EEGs

Magnetic Stimulation in Clinical Neurophysiology, by Sudhansu Chokroverty. Magnetophosphenes; images direct to the visual cortex.

The Mind of Man, by Nigel Calder. US intelligence brain research.

Neuroelectric Society Conference, 1971. Audio direct to the brain with EM waves; 2-way remote EEGs.

Brain Control, by Elliot S. Valenstein. ESB., control of individuals.

Towards Century 21, by C.S. Wallia. Brain Stimulation for direct-to-brain communications (p21)

Mind Wars, by Ron McRae (associate of Jack Anderson). Research into brain-to-brain electronic communications., remote neural EM detection (PP. 62 106, 136).

Mind Tools, by Rudy Rucker. Brain tapping; communications with varying biomagnetic fields (p82).

US News and World report, January 2nd 1984. EM wave brain stimulation; intelligence community hi-tech (p38).

Ear Magazine. Article on extremely low frequencies radio emissions in the natural environment; radio emissions from the human body.

City Paper, Washington DC January 17, 1992. Article FCC and NSA “complete radio spectrum” listening posts.

Frontiers in Science, by Edward Hutchings Jr 1958 (p48).

Beyond Bio Feedback, by Elmer and Alyce Green, 1977 (p118)

The Body Quantum, by Fred Alan Wolf

Cloning; A Biologist Reports, by Robert Gillmore McKinnell. Ethical review of cloning humans.

Hoovers’ FBI, by Former agent William Turner. Routines of electronic surveillance work. (p280).

July 20th 2019, by Arthur C. Clarke LIDA; Neurophonics; Brain-computer link.

MegaBrain, by Michael Hutchison. Brain stimulation with EM waves; CIA research and information control. (pp.107,108,117,120,123).

The Cult of Information, by Theodore Rosnak, 1986. NSA Directive #145; personal files in computers; computer automated telephone tapping.

The Body Shop, 1986 implantation of an electrode array on the visual cortex for video direct to the brain; other 1960’s research into electronically triggering Phosphenes in the brain, thus bypassing the eyes.

Evoked Potentials, by David Regan. Decoding neuroelectric information in the brain.

http://www.brazilboycott.org/profreedom/cov_us.html