Do You Want To Be A “Government Guinea Pig” For The Rest of Your Life?

Do You Want To Be A “Government Guinea Pig” For The Rest of Your Life?

“We Don’t Want To Kill Science, but Don’t Want Science To Kill, Mange, & Abuse Us”

Contact Congress & the President to Request an Emergency Moratorium on Human Subjects Experiments on Dec. 19 & 20 or Join Us In Washington DC on Dec. 20

December 16, 2011-Trenton, NJ- Like our future, the future of America is at stake. Many of us have been placed in a non-consensual human experiment, which utilizes advanced electronic/electromagnetic radiation technology and COINTELPRO tactics. Electromagnetic radiation (ionizing radiation) is invisible to the naked eye, which can cause cancer and kill you. You can visit gammascout.com and learn about it. This started out being about saving my family, but now I maybe saving yours, too. Do I have your attention now?” Many Americans (and those worldwide) have been placed in non-consensual human experimentation, which utilizes advanced electronic/ electromagnetic radiation technology and COINTELPRO tactics. The United States has a long history of putting people in experiments without their consent. Do you remember the Tuskegee Syphilis Experiment, which lasted for over 40 years? In August 2011, the Presidential Commission for the Bioethical Ethics declared the Guatemala experiment as “unethical”. It made national and international news all across the world.

On December 15, 2011 (ironically, it was Bill of Rights Day), The Bioethics Commission published their final report. The Commission Chair, Amy Gutmann, Ph.D. said, “The Commission is confident that what happened in Guatemala in the 1940s could not happen today,” Many non-consensual human subjects testified at their 4th and 5th meetings (www.bioethics.gov) and 3 of us (a retired attorney, a 3rd year student, & myself; a former Federal Government engineer) have provided them with substantial evidence that the current Federal laws and International statutes are not adequate to protect human subjects. First, the informed consent is not on the law books because Congress has failed to pass the Human Subjects Protection Act in 1997, 2002, 2003, 2006, 2008 and 2011 which has allowed for unethical, non-consensual human subject experiments to continue. The researchers must get permission first, before experimenting with you. A list of the proposed laws is at www.circare.org. Since 1991, the Common Rule has not been a strict, ethical, enforceable and lawfully, promulgated regulation. It is now being updated. None of the Federal Agencies implemented the May 27, 1997 Executive Order by former President William Clinton that “Prohibits waiver of informed consent and requires researchers to disclose that the project is classified. For all, but minimal risk studies, it requires researchers to inform subjects of the sponsoring agency.” Since 1991, there have been numerous cases similar to the Guatemala syphilis experiment, which are listed at www.mnwelldir.org/docs/history/experiments.htm. Government attorneys have cited that the 45 CFR 46 are not laws, but “guidelines”. It makes it impossible to get compensated for injuries, due to being a non-consensual human subject There are many more reasons inose 3 investigative reports

None of our concerns were even mentioned in the 200 pages. You can watch Meeting 4 session 10 (March 1, 2011) and Meeting 5 Session 6 (May 18, 2011): Public Comments at bioethics.gov/cms/meeting-four and bioethics.gov/cms/meeting-five . In addition, you can download the transcript in pdf file or watch the live archived sessions.

We are asking for your support for two days: December 19 and 20, 2011. Please contact your Congressional Representatives & President Obama to ask for an emergency moratorium for all human subject experiments until strict, ethical, enforceable & lawfully, promulgated Federal regulations & International standards are ratified. We are also requesting that investigations are conducted into determining which Federal agencies are torturing law-abiding U.S. citizens. We would like this emergency moratorium passed before Christmas. You can use all of those words.

Here are the activities for the next 3 days:

1. Join us by praying & fasting from sundown on Saturday, Dec. 17, 2011 to sundown on Monday, Dec. 20, 2011.
2. Conference Call on Sunday, Dec. 18, 2011 @ 9:00 p.m. Call: 724-444-7444 Call ID #: 112450 Pin: 1#.
3. You can join us in Washington, DC on Tuesday, Dec. 20, 2011 @ 9:00 a.m. in front of U.S. Capitol Building. It will be a day full of blessing the Federal buildings, prayers, passing out literature & meeting with Congressional Representatives in DC.
4. Contact your Congressional representatives & the President Obama starting at 9:00 a.m. on Dec. 19. One Congressional representative said that if they got 20 phone calls on one issue, then they will investigate it. Will you be one of the 20?

Who are the Non-Consensual Human Subjects? Many are Law-Abiding Citizens & Heroes

Ms. Peters states, “Many people who are in this “experiment” are whistleblowers, people of faith, people of color, alternative media, journalists, human rights & peace workers, environmentalists, activists, celebrities, dissidents and women, especially women who live alone. People with infirmities, elderly people, and children are not exempt. Even the military is experimenting on its own; without his or her informed consent. We know now that they are not supposed to be doing it, but they are. This is happening to millions of innocent law-abiding people in America and worldwide known as Targeted Individuals or TIs.

While many Americans are caught up with the latest “celebrity tabloid” or watching their favorite “reality show”, many heroes are risking their lives to stop the corruption that is happening around you every day. Have you heard the story of Richard Taus, John Carman, Darlene Fitzgerald (bordergate.net), or Rodney Stich? They are some of our heroes. Many have died, been incarcerated, or even been committed to a mental institution. This is happening because “the organization” thinks that they can. They are “ABOVE THE LAW AND WHO IS GOING TO STOP THEM”. Their motto is “EVERYONE CAN BE BROUGHT FOR A PRICE”, or those heroes listed on www.defraudingamerica.com. They would whether do the right thing in order for justice to prevail, than be silent, take a bribe, or look the other way. Many have suffered such incredible loss that no one would imagine, unless you lived through it. What price can your soul be brought? People are “abusing” the law to do whatever they feel like it. This is not being reported in your major newspapers or on the nightly news, because they are being controlled. People should subscribe to alternative newspapers or watch alternative news.

I believe that many of you are unaware that your rights may have been violated by a Federal Investigator, please read, “IF AN AGENT KNOCKS”: FEDERAL INVESTIGATORS AND YOUR RIGHTS, which can be found at http://whatreallyhappened.com/RANCHO/POLITICS/COINTELPRO/agent.knocks.html.

Message To Our “Perps”- Repent & Confess

How could you do this to your family members, friends, neighbors, church members, or someone that you do not even know? You have been deceived. You are doing Satan’s work. You are murdering, maiming, and killing innocent law-abiding citizens. In the book, “Spies of Mississippi: The True Story of the Spy Network that Tried to Destroy the Civil Rights Movement” by Rick Bowers, he tells the story of Rev. Henry Hume, a conservative Black Baptist Minister who was very influential in the Black community became a spy for the Mississippi Sovereignty Commission in the 1950’s. When he was exposed in the newspaper, he tried to lie, but no one believed him. When he went to his “handler” for assistance, they did nothing for him. He fell from grace. They did not want to get involved. When he died suddenly of a heart attack, they came to get all of his paperwork. Do you want to end up like Rev. Hume? We are praying that you will confess & repent of your sins and tell the truth by 9:00 a.m. on Dec. 20, 2011. God loves you. You have been tricked by the devil. There’s a message for every prep to read called “perp email” on the document page. Murder is a sin! Doing physical or mental harm to someone is a sin. No one has the right to try to play “god”, even you. You are not a vigilante or a super Government spy! You are someone that they can use to do their dirty work.

Conference Calls:

We will host a conference call 2011 at 9:00 p.m EST on Sunday, December 18, 2011. EST. The call ID name is “CANCHE”. You can participate in the conference calls by phone OR computer:

Phone/Calling:

The call-in number is (724) 444-7444, Enter: 112450# (Call ID), Enter: 1# or your Pin.

Computer via 2 ways:

 You can become a TalkShoe Member at www.talkshoe.com to be able to listen, text, or talk live.

 You can click on this link to join the call or just listen along: http://www.talkshoe.com/talkshoe/web/talkCast.jsp?masterId=113966&cmd=tc

Letitia Peters states, “We are fighting for the human, civil, and constitutional rights of countless men, women, and children who have been placed into this “experiment” without your knowledge or informed consent into a federally funded human subject experiments nationally & internationally. They have invaded every aspect of our lives. How you would like it, if you came home to find that someone had rummaged through your personal items, taken your food, clothes, or worse yet, contaminated your items with some poison. There is NO PRIVACY! THIS IS NOT OF GOD, IT IS PURE EVIL! We need many prayer warriors. There is no coercion, you decide, but don’t say that I have not been warning you. You should turn away from your sin and turn back to God!

I challenge everyone

1) Do you want to see if you are implanted without your knowledge? I suggest that you buy this brand because it worked for me and I found it at Wal-Mart. You will need to go to the Hardware section and pick-up a Stanley Stud Sensor (this is a carpenter’s tool for $16.00). You will also need a 9V battery. If it beeps continuously, then there is a very strong possibility that you are implanted, then go to the doctor and request for an x-ray to be done in that area. If the doctor refuses, then there is a chance that you have been placed in the non-consensual experiment. Many Americans are being implanted without their consent. Read the saga of “Bob Boyce’s Un-Requested VeriChip and Associated Tumor Removed”, who was diagnosed with terminal cancer, which can be found at http://pesn.com/2010/12/07/9501740_Bob_Boyce_verichip_removed/ In 2009, VeriChip announced sales to Maryland’s Calvert Memorial Hospital and to Mercer and Atlantic counties in New Jersey. Did you know that VeriChips causes cancer?

2) Do you want to see the invisible realm? You can turn your camera to see into the visible realm by purchasing an infrared filter or infrared cover at Amazon. I have found that 2 cell phones can detect the electromagnetic radiation; Blackberry Pearl and the Samsung T140G. The Samsung T140G, a pre-paid phone detects the electromagnetic radiation. These cell phones do not need to be activated to use the camera or video camera on them.

About International Spiritual Awakening Ministries

International Spiritual Awakening Ministries is a new ministry. We use the power of prayer, fasting & action like Nehemiah did. All of the files are at http://www.4shared.com/folder/pMxveIBF/_online.html , which is a free file sharing website. You can reach us by e-mail at thecanche@gmail.com .

You can follow us at www.twitter.com/C_A_N_C_H_E.

Related Images:

Unilever stalks its customers with GPS trackers secretly placed in laundry detergent boxes (opinion)

Unilever stalks its customers with GPS trackers secretly placed in laundry detergent boxes (opinion)

(NaturalNews) The household cleaning product giant Unilever has secretly placed GPS tracker transmitters in laundry detergent boxes to track consumers to their homes. With an array of electronic sensors, team of Unilever agents can now pinpoint the exact location of the GPS trackers and walk right up to your front door. They can even remotely set off a beeper inside the box using radio electronics…

The point of all this? It’s part of Unilever’s new marketing campaign to convince consumers in Brazil to purchase more boxes of Omo laundry detergent…

This creepy “Big Brother” marketing idea is apparently exactly the kind of thing the Unilever company approves of: Spying on your customers. Unilever, by the way, is the parent company that brings you brands like Lipton tea, Skippy peanut butter, Axe cologne, and the infamous Slim-Fast sugar drink that’s somehow positioned as a “weight loss” product.
Corporations can track what you buy and where you take it!

The really important part about all this, by the way, is the realization that just about any consumer product company could be inserting tracking devices in their products right now while using surveillance analysis to determine exactly which brands you have in your home. This information could, in turn, be used to target you for further marketing or surveillance. But why would consumer product companies want to spy on you? To gather information that they can use to more effectively market products to you, of course…

…Note that this is not merely an RFID tracking tag. This is something far more technically advanced: Unilever is inserting GPS tracking transmitters (basically a transponder) into these boxes of Omo detergent, and additional circuitry allows two-way communication so that Unilever agents can remotely set off a beeper in the detergent box.

Unilever isn’t currently doing this, but it is technologically possible that the company could insert a listening device in your laundry products, too, and listen in as your family talks about cleaning products. (Market research surveillance!).

Some company could even conceivably insert a remote video camera and spy on your in your home by transmitting a video feed that they might later use for marketing purposes. The truth is, when you buy big-name corporate brands, you really don’t know what you’re bringing home…

Read more

Related Images:

Big Pharma Nanotechnology Encodes Pills With Tracking Data That You

Big Pharma Nanotechnology Encodes Pills With Tracking Data That You

Big Pharma Nanotechnology Encodes Pills With Tracking Data That You Swallow : UPDATE 1

bibliotecapleyades.net | Jul 15th 2010

by Mike Adams

The emerging field of nanotechnology is currently gaining a lot of attention across many industries.

Nanotechnology allows scientists to manipulate individual atoms and molecules to create unique materials and even micro-scale devices, and this is leading to a wide range of applications in clothing, textiles, electronics and even food and medicine.

Sounds great, right?

Except for the fact that, like genetic modification of food crops, nanotechnology tampers with Mother Nature in a way that’s largely untested for safety. And here’s something really bizarre: The pharmaceutical industry may soon begin using nanotechnology to encode drug tablets and capsules with brand and tracking data that you swallow as part of the pill.

To really explain how this works, let me simplify how nanotechnology works so you’ll see why this is so bizarre (and potentially dangerous).

Instead of using materials and elements as they’re found in nature to build and construct things, nanotechnologists are deconstructing the basic building blocks of these materials and elements to make completely new ones. In other words, nanoscientists are reconstructing the molecular building blocks of our world without yet knowing what it will do to humans and to the environment.

The long-term consequences of nanotechnology are still largely unknown because not a single formidable study has ever been conducted on this emerging science that proves it to be safe. In fact, most of the studies that have been conducted on nanotechnology show that it’s actually detrimental to health and to the environment (which I’ll cover further, below).

But that hasn’t stopped Big Pharma from potentially adopting it for use in a new tracking and identification system that could be integrated into the very drug pills and capsules that millions of people swallow every day.
Nano-encrypted barcode in every dose
Now don’t get me wrong.

Big Pharma isn’t the only industry using nanotechnology despite a complete lack of safety evidence.

“Nanoparticles” are present in sunscreens, fabric protectors, plastic food liners, and other products. But what’s different about the nanoparticles soon to be found in a pill near you is that they are capable of storing data about where the drug was made, when it was made, and where it has traveled.

It’s a lot like the barcodes used on parcels to track them along their shipping journeys, except that in the drugs, it’s a molecular barcode that people will be swallowing.

During digestion of the pill, the nano data bits will be distributed throughout your body and can become lodged in your body’s tissues.

A company that’s introducing this system for pharmaceuticals, says it this way on its website:

“In the NanoEncryption process, NanoCodes are incorporated directly onto tablets, capsules and vial caps. These codes may be associated with an unlimited amount of manufacturer-determined data, including product information (strength and expiration date), manufacturing information (location date, batch and lot number) and distribution information (country, distributor, wholesaler and chain).”

So if you take these drugs, you’ll be swallowing nano “hard drives” that can store data – data that will be distributed throughout your body and can be read by medical technicians who could then track what drugs you took in the past.

And what’s the rationale for this? According to the company, it’s to,

“defen[d] against pharmaceutical counterfeiting and illegal diversion”.

It sounds like a good idea, right?

Unfortunately, there’s a whole lot more to this technology than meets the eye.

Editor’s Note:

UPDATE 1 – The company originally mentioned in this story now denies what NaturalNews reported. Their own website text as quoted in this story, was apparently misleading, and they now claim they do not use nano “material” of any kind to achieve their nano encoding. We are temporarily removing the name of this company from this story while we attempts to sort out the truth of the matter. In the past, we’ve had many company rush to change their own website text after we ran a story on them. All quotes published in this story were 100% accurate at the time of publication, and we made a good faith attempt to report this story accurately.
The dangers of nanotechnology
Though you’ll rarely hear about it in the mainstream media, little is known about what nanoparticles really do to people’s bodies and to the environment in the long term.

Studies continue to show that nanoparticles tend to easily build up in the body where they can potentially cause damage. They also behave differently than the materials from which they are derived and constructed, posing unknown hazards.

Researchers from the University of Rochester discovered back in 2006 that nanoparticles are easily absorbed throughout the body via inhalation.

According to the report, nanoparticles travel from the nasal cavity directly to brain tissue where they deposit themselves and cause brain inflammation. In other words, nanoparticles very easily cross the blood-brain barrier, which is the mechanism by which the brain normally protects itself from foreign materials.

The same study, which is part of a five-year, $5.5 million investigation into the safety of nanoparticles, also determined that this artificial micro-matter makes its way to the lungs when inhaled.
Nanoparticles are different from their parent particles
Nanoparticle use is on the rise based on the flawed assumption that if the elements and compounds from which they are derived are considered safe, then the nanoparticles themselves must also be safe. But research reveals that this simply isn’t the case.

A study from 2004 found that low levels of fullerenes, a type of carbon nanoparticle used in electronics and other materials, changed the entire physiology of fish that were exposed to it.

Exposure to just 0.5 parts per million (ppm) over the course of two days literally caused significant brain damage in these fish.

“Given the rapid onset of brain damage, it is important to further test and assess the risks and benefits of this new technology (nanotechnology) before use becomes even more widespread,” emphasized Dr. Eva Oberdorster, author of the study, back in 2004.

Again in 2007, scientists from the University of California, San Diego, discovered that iron nanoparticles are toxic to nerve cells and nerve function. Even though iron is a necessary mineral that benefits the body in its natural form, its nanoparticle is quite dangerous, it turns out.

According to Sungho Jin, senior author of the study which was published in the journal Biomaterials, nanoparticles in general “may not be as safe as we had once thought.”

But none of the nation’s regulatory bodies seem to be paying any attention to these studies, or to the many others I didn’t mention that also highlight the toxicity of nanoparticles. Instead, they’ve allowed nanoparticles to invade our society without so much as a single piece of credible evidence showing that they’re safe.

Based on all the research, we know that nanoparticles cross through the skin, lungs, and blood-brain barrier, where they lodge themselves in body tissues. We also know that their compositional differences cause them to be highly reactive with other chemicals, particularly in the body where they create damaging free radicals.

But there’s more to this story… it gets even worse.
Nanoparticles are safe in food?
It’s amazing to me that altered molecules with no scientific backing of safety are now being deliberately allowed in the food supply. It would seem unacceptable to allow their use in food manufacturing equipment because of the potential for residue contamination, but that’s exactly where they are being used right now.

According to a DiscoveryNews report from 2009, nanoparticles are everywhere in the food supply. Externally, they’re used in the packaging, containers, films, and other storage materials to kill bacteria and increase shelf life. Internally, they’re used to enhance or alter the flavors and textures of food.

Nanoparticles are even being used in some vitamins, supplements and other “nutraceuticals” to allegedly improve nutrient assimilation and delivery.

The report actually encourages the use of nanotechnology in food, citing all the potential benefits (but remaining silent on all the dangers). One section even hawks nanotechnology as a “green” technology.

But the real truth is that using nanoparticles in food is a grant experiment with an unknown outcome.

When it comes to nanotechnology in food, there’s a lot of speculation and pseudo-science being peddled as scientific fact, but there’s truly no scientific backing to support the safe use of man-made nanoparticles in things we consume.
Do the people actually benefit from nanotechnology?
It’s quite common for big industry to persuade the public into accepting new technologies based on promises that they will make their lives better and safer.

And that’s exactly what’s happening with nanotechnology:

We’re all being sold a bill of goods on something that’s entirely unproven.

And getting back to the issue of embedding nanoparticles in drugs, the whole argument for why this is necessary stems from the notion that there’s a lot of drug fraud occurring, and that it could be stopped if only drugs contained proprietary nanocode data that could be read from your body tissues.

  • But does this benefit the consumer in any way?
  • Who really stands to benefit from this?

Protecting their monopolies
Most NaturalNews readers already know this, but when a pharmaceutical company creates a new drug, it patents it so that no other company can sell it until the patent expires.

After acquiring FDA approval for the drug, the company then sells it for thousands of times more than what it costs to produce it. This is the FDA-enforced monopoly known as the modern pharmaceutical industry.

How does this tie into nano protection for drugs?

Since drugs are exclusively owned and protected by 20-year patents here in the U.S., which allows drug companies to charge whatever they want for them with no competition, Big Pharma stands to benefit tremendously from a technology that ensures no one else can “counterfeit” its patented drugs.

Because right now, all those counterfeit imitations (which are actually the same chemicals without the brand name) are sold for far less than the brand name drugs, and some people are buying them because they can’t afford the real thing. By integrating nanotechnology into each and every drug pill, it will be easier for Big Pharma to verify and control the drugs people are taking.

Nano-protected pills can be scanned by a detection device that will verify their authenticity and trace them back to the factories where they were manufactured, the warehouses where they were distributed, the pharmacies where they were stocked and sold, and so on.

But here’s the part where this all turns Big Brother:

The same scanning technology can theoretically be used to scan your body tissues and determine which drugs you’ve been taking, who sold them, where you bought them, where they were made and possibly even how long you’ve been taking them.

By swallowing these nano-protected pills, you are essentially turning your body into a walking Big Pharma hard drive that’s storing all kinds of data on your particular drug habits.

This data could be read by law enforcement or even used against you in a court of law. It’s sort of like swallowing RFID technology that tracks your medication use.
Take your approved meds, or else
A few years ago, a friend of mine showed me a clever device that uses a laser to detect antioxidant levels in the body.

It basically takes a reading based on the molecular signature of antioxidants in your skin. It uses a blue laser to produce a number revealing your antioxidant level. (Mine was very high, something like 90,000 on this machine.)

Theoretically, a similar detection device could be used to scan patients for nano-particles to see whether or not they’ve taken their meds for the day, for the week, or even for the year. You could be scanned by a laser that you don’t even see, and the government or anyone else could “read” your entire history of medication use.

This information could be used against you in many ways:

  • To deny you employment
  • To deny you health insurance coverage
  • To serve as evidence against you in a court of law
  • To take away your children by labeling you mentally unstable
  • To force you to take vaccines that you’ve been avoiding,

… and so on.

This is a “drug enforcement” technology that makes all your private medication habits easily and instantly available to Big Brother and health industry drug enforcers who want you to “take all your meds.”

As such, this technology could further destroy health freedom. The federal government would no doubt attempt to use this technology to control your medication and vaccination intake while enforcing your compliance with random scanning of your hand or other tissues.

Imagine this scenario. Your government-approved doctor says you have a mental disorder because you prefer healthy foods (See my recent article on “orthorexia” if you don’t know what I’m talking about), and he prescribes you a brand name drug to treat it.

You decide that eating healthy is normal and you refuse to take the drug. The next time you go in for a checkup, your doctor scans you to check your nanoparticle count and discovers that you haven’t been taking your meds. Since he ordered you to take them and you didn’t, he assesses you a fine and tells you begin taking them or else face potential arrest and prison time.

This scenario is entirely fictitious at the moment, but with the way things are going with Big Brother and Big Pharma, it’s a very real possibility in the near future. Nano technologies can be used in precisely this way to enforce compliance with things like drug prescriptions and treatment mandates.

Big Brother will have access to your medical records because they’ll have been implanted into your body tissues through nanotechnology, sort of like radio-frequency identification (RFID) for pharmaceuticals.

It’s a way for the drug industry to turn a human body into a compliant profit machine. And it’s being marketed right now.
Real questions that need to be answered about nanotechnology
It’s not my intention to sound alarmist about nanotechnology, but rather to ask some obvious questions that have yet to be answered.

  • Why has nanotechnology essentially been approved for practically any and every use with absolutely no credible backing showing that it’s safe?
  • Why have most of the studies showing its dangers been ignored by most mainstream scientists?
  • Why are nano particles about to start showing up in our pharmaceuticals?

In theory, nanotechnology may sound like a great thing, but as I’ve mentioned in previous articles I’ve written on the subject, we should be wary of its seductive promises.

Not only are nanoparticles potentially dangerous, but many of its uses are completely unnecessary.

Back in 2004, I wrote a piece about the top ten technologies that were around at the time, and nanotechnology wasn’t one of them. My reasoning for this was that nanotechnology, particularly in the field of medicine where it was being promoted the most, was entirely unnecessary because our bodies contain their own built-in “nanoparticles”, so to speak, that cause the body to heal itself naturally.

The best nanotechnology in the world already exists inside you – it’s called your immune system.

But science has decided instead to try to engineer its own imitation of the immune system by constructing artificial nanoparticle “robots” to do the job instead. It’s an example of Man’s arrogance over nature. Instead of supporting the human body’s innate immune system technology, arrogant scientists want to overthrow it with their own micro-mechanical robots that attempt to serve the same role.

And now, with the nano technology mentioned here, Big Pharma could be embedding your body’s tissues with nanoparticle data that turns you into a compliant, monopoly-priced drug consumer whose medication habits can now be scanned right off your skin.

That’s what Big Pharma wants, of course: Total control over your body.

Combined with targeted lobbying of corrupt Washington lawmakers and bureaucrats, Big Pharma could achieve a “mandatory medication requirement” across the entire country, where every citizen is required to dose themselves with

Your compliance will be verified with a nanotech scan that reads the nanodata right off your skin, and if you’re found to be non-compliant, you could be arrested and forcibly medicated on the spot.

Don’t think this is possible? Much of this has already come true with forced vaccinations of children.

See the article I wrote in 2007, Children herded like cattle into Maryland courthouse for forced vaccinations as armed police and attack dogs stand guard.

The conspiracy between Big Government and Big Pharma will always try to find a way to make you take more meds (whether you need them or not). This nano-protection technology could play right into their hands, providing an enforcement and tracking technology that would turn your body into a walking Big Pharma storage device.

It’s just one more reason to avoid taking pharmaceuticals in the first place (as if there weren’t enough already!).

Original Page: http://www.bibliotecapleyades.net/ciencia/ciencia_nanotechnology06.htm

Shared from Read It Later

Elyssa Durant, Ed.M.

United States of America

Related Images:

New GPS satellite begins testing at Peterson

New GPS satellite begins testing at Peterson

By Dan Elliott – The Associated Press
Posted : Tuesday Dec 13, 2011 11:13:32 EST

DENVER — A $5.5 billion upgrade to the GPS moved a step closer to launch this week when a prototype arrived at a Lockheed Martin complex in Colorado to begin months of tests.

It’s the guinea pig for a new generation of GPS satellites, called Block III, that’s expected to make military and civilian receivers more accurate, powerful and reliable.

They’re also part of an international effort to allow civilian receivers to use signals from U.S., European, Russian and perhaps other satellite navigation systems.

GPS has become ubiquitous in American civilian and military life, with hundreds of thousands of receivers in cars, and weapons systems. Financial systems use GPS receivers to get precise time stamps for transactions, relying on the atomic clocks onboard the satellites.

The Air Force Space Command oversees the U.S. GPS satellites and ground control systems from its headquarters at Peterson Air Force Base, Colo.

The Block III satellites are expected to allow military and civilian users to determine their position within 3 feet, compared with 10 feet with current technology, according to the Congressional Budget Office.

Higher-powered signals from Block III satellites are expected to be harder for enemies to jam and easier for receivers to tune in, especially in urban canyons or under thick tree canopies.

The U.S. and other countries have agreed to make a new, common frequency available to civilians. That means civilian receivers could calculate their position from a number of different satellite navigation systems.

The Block III prototype arrived at Lockheed Martin’s Waterton Canyon complex south of Denver on Monday. Workers will do final assembly work on the prototype and then run it through a gantlet of tests, including extreme temperatures to mimic conditions in space and measurements to see whether the satellite’s radio frequencies interfere with each other.

The prototype won’t be launched into space.

The first flight model is expected to arrive at Waterton Canyon next summer and be launched in May 2014.

Lockheed Martin, based in Bethesda, Md., has a $1.5 billion Air Force contract to build and test the GPS III prototype and build the first two satellites for launch. The contract includes an option for two more.

The Pentagon expects to buy and launch a total of 32 Block III satellites. The Air Force says it will cost about $5.5 billion to design, build and launch all the satellites and upgrade the ground control systems.

Related Images:

Eliminate slaves of the strong man over the attack

Eliminate slaves of the strong man over the attack

In Jesus’ name I bind all other spirits and entities under the command of the strong man over this attack upon me and in Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal bond that you have on me, in Jesus’ name. In Jesus’ name I loose you from all commands, controls, attachments, mind control, programming, agreements, oaths and bonds to the strongman over this attack upon me or the subordinates of the strong man and I command all demons to go where Jesus’ wants you to go and I command all other entities to go home and never return, in Jesus’ name I pray, amen.

Eliminate demonic infrastructure of the strong man over the attack

In Jesus’ name I break, crush, sever, dissolve, smash and destroy all the demonic infrastructure of this strong man. Father, I ask you to please send hundreds, hundreds, hundreds and hundreds of millions of legions of angels to attack and destroy this strong man’s computers, networks, programs, storage devices, data files, backup data files, communication lines and power sources and every other component of his infrastructure that I do not know about, in Jesus’ name I pray, amen.

Break ties with originator of the attack

In the name of the Lord Jesus Christ I break, dissolve, sever, crush & destroy every ungodly soul tie, hook, link, attachment and connection between myself and the originator of this attack and between the originator of this attack and myself in Jesus’ name. In Jesus’ name I bind every thing that came into me from those connections. In Jesus’ name I close every door that was open to those things, I take away every legal bond and every legal hold they have on me and I cut them loose from all their assignments, in Jesus’ name. In the name of the Lord Jesus Christ I order every thing that came into me to leave now. Father, In Jesus’ name I ask you to send angels to bind up these things and return them to whoever sent them, to bring them to repentance, in Jesus’ name I pray, amen.

Eliminate the strong man over the originator of the attack

In Jesus’ name I bind the strong man over the originator of this attack and I toss him off his throne in Jesus’ name. Father I ask you to send angels to bind this strong man inside of boxes, inside of more boxes to 1,000,000 levels deep, with angels singing scripture to him night and day, in Jesus’ name. Father I ask you to send angels to guard that box so the demons cannot free him, in Jesus’ name.

Eliminate subordinates of the strong man over the originator of the attack

In Jesus’ name I bind all demons subordinate to the strong man over the originator of this attack upon me. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all demons subordinate to the strong man over the originator of this attack upon me to leave now, in Jesus’ name.

Eliminate slaves of the strong man over the originator of the attack

In Jesus’ name I bind all spirits, entities, slaves and prisoners under the command of the strong man over the originator of this attack upon me and in Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. In Jesus’ name I loose you from all commands, controls, attachments, mind control, programming, agreements, oaths and bonds to the strong man over the originator of this attack upon me or the subordinates of the strong man and I command all demons to go where Jesus’ wants you to go and I command all other entities to go home and never return, in Jesus’ name I pray, amen.

Eliminate demonic infrastructure of the strong man over the originator of the attack

In Jesus’ name I break, crush, sever, dissolve, smash and destroy all the demonic infrastructure of this strong man. Father, I ask you to please send hundreds, hundreds, hundreds and hundreds of millions of legions of angels to attack and destroy this strong man’s computers, networks, programs, storage devices, data files, backup data files, communication lines and power sources and every other component of his infrastructure that I do not know about, in Jesus’ name I pray, amen.

Eliminate originator of the attack

Heavenly Father, in the name of the Lord Jesus Christ, I break, crush, sever, smash, dissolve and destroy every curse, spell, psychic prayer and attack put upon me by the originator of this attack in Jesus’ name I pray, amen. In Jesus’ name I break every soul tie, hook, link, attachment, connection and device between myself and the originator of this attack and between the originator of this attack and myself, in Jesus’ name. In Jesus’ name I bind everything that came into me from these soul ties, hooks, links and connections and I cut you loose from all your assignments, I close all doors open to you and I take away every legal hold and legal ground you have to attack me, in Jesus’ name. In the name of The Lord Jesus Christ, I break every curse, spell and psychic prayer that made the originator of this attack the way they are. In Jesus’ name, Father I ask you to send as many legions of angels as necessary to bind all demons in the originator of this attack, that give them their power, rank, prestige, wealth, metaphysical abilities and position and I ask you to remove those demons and send them far away, in Jesus’ name. In Jesus’ name I break, crush and destroy all bonds of mind control and coercion this entity is under and I cancel and void all oaths, contracts and agreements this entity is under, in Jesus’ name. Father, I ask you to free the mind of originator of this attack and allow them choose their destiny without influence of any kind, in Jesus’ name I pray, amen.

Eliminate subordinates of the originator of the attack

In Jesus’ name I bind all demons and entities subordinate to the originator of this attack upon me. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all subordinates to the originator of this attack upon me to leave now, in Jesus’ name. In Jesus’ name I break, crush and destroy all bonds of mind control and coercion these subordinates are under and I cancel and void all oaths, contracts and agreements that control them, in Jesus’ name. Father, I ask you to free the mind of these subordinates and allow them choose their destiny without influence of any kind, in Jesus’ name I pray, amen.

Eliminate slaves of the originator of the attack

In Jesus’ name I bind all slaves, prisoners and remaining entities of the originator of this attack upon me. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all slaves and prisoners of the originator of this attack upon me to leave now, in Jesus’ name. In Jesus’ name I break, crush and destroy all bonds of mind control and coercion these slaves and prisoners are under and I cancel and void all oaths, contracts and agreements that control them, in Jesus’ name. Father, I ask you to free the mind of these slaves and prisoners and allow them choose their destiny without influence of any kind, in Jesus’ name I pray, amen

Eliminate infrastructure of the originator of the attack

Father, I ask you to please send hundreds, hundreds, hundreds and hundreds of millions of legions of angels to attack and destroy the computers, networks, programs, storage devices, data files, backup data files, communication lines and power sources and every other component of the infrastructure of the originator of this attack, in Jesus’ name I pray, amen.

Eliminate the strong man over the attacker(s)

In Jesus’ name I bind the strong man over the attacker executing this attack and I toss him off his throne in Jesus’ name. Father I ask you to send angels to bind this strongman inside of boxes, inside of more boxes to 1,000,000 levels deep, with angels singing scripture to him night and day, in Jesus’ name. Father I ask you to send angels to guard that box so the demons cannot free him, in Jesus’ name.

Eliminate subordinates of the strong man over the attacker(s)

In Jesus’ name I bind all demons subordinate to the strong man over the attacker executing this attack upon me. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all demons subordinate to the strong man over the attacker to leave now, in Jesus’ name. In Jesus’ name I loose you from all commands, controls, attachments, mind control, programming, agreements, oaths and bonds to the strong man over the attacker and I command all demons to go where Jesus’ wants you to go and I command all other entities to go home and never return, in Jesus’ name I pray, amen.

Eliminate slaves of the strong man over the attacker(s)

In Jesus’ name I bind all other spirits, entities, slaves and prisoners under the command of the strong man over the attacker executing this attack upon me and in Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. In Jesus’ name I loose you from all commands, controls, attachments, mind control, programming, agreements, oaths and bonds to the strong man over the attacker executing this attack upon me or the subordinates of the strong man and I command all demons to go where Jesus’ wants you to go and I command all other entities to go home and never return, in Jesus’ name I pray, amen.

Eliminate demonic infrastructure of the strong man over the attacker(s)

In Jesus’ name I break, crush, sever, dissolve, smash and destroy all the demonic infrastructure of this strong man. Father, I ask you to please send hundreds, hundreds, hundreds and hundreds of millions of legions of angels to attack and destroy this strongman’s computers, networks, programs, storage devices, data files, backup data files, communication lines and power sources and every other component of his infrastructure that I do not know about, in Jesus’ name I pray, amen.

Eliminate the attacker (each member of the attacking group)

Heavenly Father, in the name of the Lord Jesus Christ, I break, crush, sever, smash, dissolve and destroy every curse, spell, psychic prayer and attack put upon me by these attacking forces in Jesus’ name I pray, amen.

In Jesus’ name I break every soul tie, hook, link, attachment, connection and device between myself and the attacker and between the attacker and myself, in Jesus’ name. In Jesus’ name I bind everything that came into me from these soul ties, hooks, links and connections and I cut you loose from all your assignments, I close all doors open to you and I take away every legal hold and legal ground you have to attack me, in Jesus’ name. In the name of The Lord Jesus Christ, I break every curse, spell and psychic prayer that made the attacker the way they are. In Jesus’ name, Father I ask you to send as many legions of angels as necessary to bind all demons in the this attacker, that give them their power, rank, prestige, wealth, metaphysical abilities and position and I ask you to remove those demons and send them far away, in Jesus’ name. In Jesus’ name I break, crush and destroy all bonds of mind control and coercion this entity is under and I cancel and void all oaths, contracts and agreements this entity is under, in Jesus’ name. Father, I ask you to free the mind of this attacker and allow them choose their destiny without influence of any kind, in Jesus’ name I pray, amen.

Eliminate subordinates of the attacker(s)

In Jesus’ name I bind all demons subordinate to the attacker executing this attack upon me. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all demons subordinate to this attacker to leave now, in Jesus’ name.

Eliminate slaves of the attacker(s)

In Jesus’ name I bind all slaves, prisoners and remaining entities of the attacker executing this attack upon me. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all slaves and prisoners of the attacker executing this attack upon me to leave now, in Jesus’ name. In Jesus’ name I break, crush and destroy all bonds of mind control and coercion these slaves and prisoners are under and I cancel and void all oaths, contracts and agreements that control them, in Jesus’ name. Father, I ask you to free the mind of these slaves and prisoners and allow them choose their destiny without influence of any kind, in Jesus’ name I pray, amen

Eliminate infrastructure of the attacker(s)

Father, I ask you to please send hundreds, hundreds, hundreds and hundreds of millions of legions of angels to attack and destroy the computers, networks, programs, storage devices, data files, backup data files, communication lines and power sources and every other component of the infrastructure of the attackers executing this attack upon me, in Jesus’ name I pray, amen.

Eliminate the curse, spell or psychic attack itself

Heavenly Father, in the name of the Lord Jesus Christ, I break, crush, sever, smash, dissolve and destroy every curse, spell, psychic prayer and attack put upon me by any person, place, thing, witch, occult source, psychic source, machine, reptilian, draconian, grey, insect or any other entity, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ, I break, crush, sever, smash, dissolve and destroy every satanic attack, druid witch attack, wicca witch attack, kabalah witch attack, wizard attack, shaman attack, witchdoctor attack, witchcraft attack, vampire attack, werewolf attack, santaria attack, voodoo attack, magical attack, sorcery attack, luciferian attack, demonic attack, satanic attack, psychic attack, telepathic attack, mental attack, remote viewing attack, mind control attack, radionics attack, psychotronic attack, psionic attack, death signal attack, disease signal attack, scalar wave attack, tesla wave attack, laser wave attack, ELF attack, RF attack, microwave attack, magnetic attack, acoustic attack, infrared attack and every kind of attack that I don’t know the name of from :

Every person, place, thing, witch, occult source, psychic source, machine, satanist, druid witch, wicca witch, kabalah witch, wizard, shaman, witchdoctor, vampire, werewolf, santaria practitioner, voodoo practitioner, remote viewing operator, radionics operator, psychotronics operator, psionic operator, pine gap group, MIB group, government group, witches, satanist or masonic group, new world order group, shadow government group, illuminati group, MJ12 group, faction 1 group, faction 2 group, faction 3 group, faction 4 group, NSA group, NRO group, CIA group, FBI group, NIMA Group, DOJ Group, DON group, ACIO group, ASIO group, PSICORPS Group, MJTF Group, military group, intelligence group, Army group, Navy group, Air Force group, Marine Corps group, NIS group, DIA group, OSI group, ONI group, OSS Group, UFOS group, MI5 group, MI6 group, Mars Defence Force group, Mars Intelligence Force group, Mars Project group, reptilian group, draconian group, grey group, insect group and every group I don’t know the name of, in Jesus’ name I pray, amen.

In the name of The Lord Jesus Christ, I bind everything that came into me from those attacks. In Jesus’ name I close every door that was opened to you, I take away every legal hold and legal ground that you have on me and I cut you loose from all your assignments, in Jesus’ name I pray, amen.

In Jesus’ name I command everything that came into me from those attacks to leave me now, in Jesus’ name. Father, I ask you to send these things back to whoever sent them to me, to bring them to repentance. In Jesus’ name I pray, amen.

YOU can Stop Alien & Military Abduction!

YOU can Stop Alien & Military Abduction!

These prayers contain a complete description of the procedure that God gave Michael Relfe to stop the enemy’s abduction process. The initial understanding of these prayers came as a result of his praying for guidance on how to defeat the periodic abductions he was being exposed to (See themarsrecords.com). Some of these prayers may be relevant for you and your situation and some may not. As I learn of more I will post them.

If you are not covered by the power of the blood of Jesus that will put these prayers in action to protect you, then click here salvation prayer Without Salvation these prayers will not work because you will not have the protection and victory only Jesus can provide.

· Although most abductions usually involve U.S. military personnel, a non-human being (Grey Alien and/or Reptilian) might be briefly observed working with them. On several occasions only Grey Aliens or only Reptilians will perform the abduction.

· If you are located near a base or installation, they may attempt to acquire you by visiting your home/apartment/hotel and taking you in person. This can be defeated by using a portable door lock (the kind used by travellers in hotels) on EVERY door in their home. For those who are taken in your sleep, these prayers will help close that access down as well.

These agencies have tools to defeat every type of commercially available lock as well as the various chains and swing latches that allow the door to be “cracked” open. Only the portable door locks are secure.

· The enemy has at their disposal multiple technologies that will allow them to abduct an individual from their bedroom, examine/operate/indoctrinate them and return them to their bedroom without being detected. They can “keep” an individual for weeks and return them to a time a few minutes after they were taken. The names of those technologies that I am aware of are :

Jumpgate Technology
Fractal Jumpgate Technology
Transporter Technology
Fractal Transporter Technology
Time Travel Technology
Fractal Time Travel Technology
Dimensional Travel Technology
Fractal Dimensional Travel Technology
Wormhole Travel Technology
Fractal Wormhole Travel Technology

Other technologies will be developed. They must be added to the list. God will help you to “know” what they are while praying. Change your attack strategy accordingly.

· God will answer your prayers to prevent the above listed technologies from functioning in your home, apartment or hotel.

· When you begin to engage in spiritual warfare against the enemy, they will pull out all the stops in attacking you. They may use witchcraft, black magic, different types of psychic and remote viewing attack and radionics, psychotronics and psionics attacks against you. Sometimes you won’t even know the name of what they are doing.

· Spiritual warfare is the act of engaging in battle against the enemy: breaking curses, spells and psychic prayers, binding the demons and entities that are attacking, loosing the angels of God into battle, praying for angelic protection, among others. Deliverance is the casting out of demons from a person or object. ALL of these ways of warfare require power and authority from God Himself.

· The ONLY known way to obtain the required power and authority to defeat the enemy and to stop the abductions of you and your family is to accept The Lord Jesus Christ as your Lord and saviour. When you take that first step of faith, you immediately leave the jurisdiction of “Satan, the god of this world” and enter into the kingdom of God Almighty. You are drafted into the army of God and are given power and authority over the enemy. From that moment forward you are expected to fight the enemy and to fulfil God’s plan in your life while on earth. You are assured of eternal life when your days are done.

· You absolutely will not defeat this enemy by using your own metaphysical abilities, prayer to anything outside of God Almighty and His son Jesus Christ, machines or devices you make or by any help from any ET, “Spacebrother”, Alien, Witch, Psychic, Occultist or anyone or anything else. I know from personal experience. I was not abducted into their “service”. I volunteered. I was a highly efficient killing machine for these beings. I have a high “horsepower” rating as well as several rare skill sets. My mission profiles were extensive and successful and beyond anything described by the so called remote viewers on the best seller list. And while reading The Mars Records you will see how easily these beings controlled me. They turned me on and off as easily as you would a toaster. I had absolutely ZERO chance of escape. ONLY by the grace of God Himself and the power of The Lord Jesus Christ did I escape to the degree I presently have.

· YOU can do the exact same things as I have if you have a personal relationship with The Lord Jesus Christ and if you have faith and follow the warfare prayers in this document. Prayer does NOT rely on metaphysical abilities or training. I myself do NOTHING. God performs the miracles.

· The following warfare prayers work. Regardless of what your church corporation or untrained pastor may think, spiritual warfare works, is infinitely powerful and the only thing known that will defeat the enemy. While pastors argue over whether a Christian can have a demon or whether or not to lay hands on a member while they are dying, the military alien complex continues to abduct, operate on and indoctrinate many thousands of people worldwide, while the churches stay silent.

· Spiritual Warfare is a daily endeavour. God will show you what to pray for during prayer, while reading what has happened to others or while being told things about other people’s experiences. If you pray against something that is not there or that doesn’t apply to you, nothing happens. It is better to pray than not to pray.

· If you are serious about spiritual warfare and fighting the enemy and are willing to put yourself on the line for others, I would suggest you contact Hegewisch Baptist Church in Highland, IN (www.hbcdelivers.com) for their book and tape catalog. The book series “Battling The Host Of Hell” is an 8 volume set of intensive training in spiritual warfare. In addition you will require many of the taped sermons by Win Worley. The first tape should be “Group Deliverance”. Other valuable subjects are Soul Fragmentation, Breaking Curses, Binding and Loosing, Soul Ties, among others. The videos will convince even the most unbelieving person concerning the reality of the demonic world. Hegewisch Baptist Church is a small, independent church not affiliated with any organization of any kind. You can visit Hegewisch for to receive help at any time.

Warfare Prayers

Protect yourself

Heavenly Father, in the name of the Lord Jesus Christ, I ask you in Jesus’ name to please send hundreds, hundreds, hundreds and hundreds of millions of legions of angels to surround me and encamp around me and setup angelic shields, protective devices, impenetrable force fields and angels to protect me against every attack of the enemy, in Jesus name I pray, amen. Please put upon me the full armour of God. Please put upon me spiritual camouflage to make me invisible to the enemy. Please put upon me the armour light, the breastplate of righteousness, the shield of faith, the helmet of salvation and the sword of the spirit, in Jesus’ name I pray, amen.

Protect your spouse – Repeat above for your spouse.
Protect your children – Repeat above for each of your children

Break curses on yourself

In the name of the Lord Jesus Christ, I break, crush, sever, smash, dissolve and destroy every curse, spell, psychic prayer and attack put upon me by any person, place, thing, witch, occult source, psychic source, machine, reptilian, draconian, grey, insect or any other entity, in Jesus’ name I pray, amen.

(do this 3 or more times)

Break curses on your spouse. Repeat above for your spouse.
Break curses on your children. Repeat above for each of your children

Break energy drains on yourself

Heavenly Father, in the name of the Lord Jesus Christ, I break, crush, dissolve, destroy and smash every energy drain attached to me by any source, in Jesus’ name I pray, amen. In Jesus’ name I command everything that came into me from the energy drain to leave now, in Jesus’ name. In Jesus’ name I break and destroy every soul tie, hook, link, connection and attachment between myself and whatever or whoever put the energy drain into me, in both directions. In Jesus’ name I command everything that came into me from those soul ties, hooks, links, connections and attachments to leave now, in Jesus’ name. Thank You Lord for setting me free.

Break energy drains on your spouse. Repeat above for your spouse
Break energy drains on your children. Repeat above for each of your children

Break attacks on yourself

Heavenly Father, in the name of the Lord Jesus Christ, I break, crush, dissolve and destroy every satanic attack, druid witch attack, wicca witch attack, kabalah witch attack, wizard attack, shaman attack, witchdoctor attack, witchcraft attack, vampire attack, werewolf attack, santaria attack, voodoo attack, magical attack, sorcery attack, luciferian attack, demonic attack, satanic attack, psychic attack, telepathic attack, mental attack, remote viewing attack, mind control attack, radionics attack, psychotronic attack, psionic attack, death signal attack, disease signal attack, scalar wave attack, tesla wave attack, laser wave attack, ELF attack, RF attack, microwave attack, magnetic attack, acoustic attack, infrared attack and every kind of attack that I don’t know the name of from :

Every person, place, thing, witch, occult source, psychic source, machine, satanist, druid witch, wicca witch, kabalah witch, wizard, shaman, witchdoctor, vampire, werewolf, santaria practitioner, voodoo practitioner, remote viewing operator, radionics operator, psychotronics operator, psionic operator, pine gap group, MIB group, government group, witches, satanist or masonic group, new world order group, shadow government group, illuminati group, MJ12 group, faction 1 group, faction 2 group, faction 3 group, faction 4 group, NSA group, NRO group, CIA group, FBI group, NIMA Group, DOJ Group, DON group, ACIO group, ASIO group, PSICORPS Group, MJTF Group, military group, intelligence group, Army group, Navy group, Air Force group, Marine Corps group, NIS group, DIA group, OSI group, ONI group, OSS Group, UFOS group, MI5 group, MI6 group, Mars Defence Force group, Mars Intelligence Force group, Mars Project group, reptilian group, draconian group, grey group, insect group and every group I don’t know the name of, in Jesus’ name I pray, amen. In the name of The Lord Jesus Christ, I bind everything that came into me from those attacks. In Jesus’ name I close every door that was opened to you, I take away every legal hold and legal ground that you have on me and I cut you loose from all your assignments, in Jesus’ name I pray, amen. In Jesus’ name I command everything that came into me from those attacks to leave me now, in Jesus’ name. Father, I ask you to send these things back to whoever sent them to me, to bring them to repentance. In Jesus’ name I pray, amen.

Break attacks on your spouse. Repeat above for your spouse

Break attacks on your children. Repeat above for each of your children

Thank the LORD for miracles and what HE is doing

Father, In Jesus’ name I praise you and Thank You for these blessings and for setting me free from these attacks, In Jesus’ name I pray, amen.

Changing The Quantum Matrix

Pray for angelic shields around your house or apartment.

Father, In the name of The Lord Jesus Christ I ask you to please send hundreds, hundreds, hundreds and hundreds of millions of legions of angels to surround and encamp around this house and to set up angelic shields, protective devices, impenetrable force fields and angels and to seal off this house from the world, in Jesus’ name I pray, amen.

Remove any trapped demons

Father, In the name of The Lord Jesus Christ I ask you to please send angels to bind up and remove all demons that were trapped when the shield was closed, in Jesus’ name I pray, amen.

Break any remaining hooks into you

In the name of The Lord Jesus Christ I break, crush, dissolve, smash and destroy every line of remote viewing, energy drain, energy supply, remote influence, surveillance and command & control attached to me in Jesus’ name. In Jesus’ name I bind everything that came into me with these lines and Father, I ask you to send all these things back to whoever send them, to bring them to repentance, in Jesus’ name I pray, amen.

Remove all interference.

Father, In the name of The Lord Jesus Christ I ask you to please remove every thing inside me that would hinder, jam, interfere or prevent me from praying and changing the quantum matrix, in Jesus name I pray, amen.

Note: If you start doing this on a regular basis, the enemy will pour a lot of interference in your direction, trying to discourage you. God will sometimes allow this to make you a better soldier. The following are some of the things that have been sent to interfere with me. This list is not complete.

Shadows Dampening Field

Spiders Force Field

Worm Holes Blackness

Black Holes Darkness

Alien Circuitry Blocks

In the name of The Lord Jesus Christ, I break the power of the Shadows over me. In Jesus’ name I bind the strongman over the Shadows and I toss him off his throne in Jesus’ name. Father I ask you to send angels to bind the strongman inside of boxes, inside of more boxes to 1,000,000 levels deep, with angels singing scripture to him night and day, in Jesus’ name. Father I ask you to send angels to guard that box so the demons cannot free him, in Jesus’ name. In Jesus’ name I bind all demons subordinate to the strongman over the Shadows. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all demons subordinate to the strongman over the Shadows to leave now, in Jesus’ name. In Jesus’ name I bind all other spirits and entities under the command of the strongman over the Shadows. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. In Jesus’ name I loose you from all commands, controls, attachments, mind control, programming, agreements, oaths and bonds to the strongman over the Shadows or the Shadows themselves. I command all demons to go where Jesus’ wants you to go and I command all other entities to go home and never return, in Jesus’ name I pray, amen. (Do this for each thing interfering)

Change The Quantum Matrix in your home

Father in heaven, In the name of The Lord Jesus Christ I ask you to change the quantum matrix in this sealed off house, across all space time continuums, all dimensions, all time lines and all frequency domains in this universe, across all bubbles in the omniverse and across all planes of existence so that:

The enemy’s jump gate technology will not function in this sealed off house.

The enemy’s fractal jump gate technology will not function in this sealed off house.

The enemy’s transporter technology will not function in this sealed off house.

The enemy’s fractal transporter technology will not function in this sealed off house.

The enemy’s time travel technology will not function in this sealed off house.

The enemy’s fractal time travel technology will not function in this sealed off house.

The enemy’s dimensional travel technology will not function in this sealed off house.

The enemy’s fractal dimensional travel technology will not function in this sealed off

house.

The enemy’s wormhole travel technology will not function in this sealed off house.

The enemy’s fractal wormhole travel technology will not function in this sealed off house.

The enemy’s implant technology will not function in this sealed off house.

The enemy’s walk-thru-walls technology will not function in this sealed off house.

The enemy’s sleep ray technology will not function in this sealed off house.

The enemy’s remote viewing capability will not function in this sealed off house.

The enemy’s radionics technology will not function in this sealed off house.

The enemy’s psychotronics technology will not function in this sealed off house.

The enemy’s psionic technology will not function in this sealed off house.

The enemy’s death signal technology will not function in this sealed off house.

The enemy’s disease signal technology will not function in this sealed off house.

Important note: When praying to change the quantum matrix, all members of a family should be holding hands or be in physical contact with one another. The head of the household prays and the other members should pray in agreement.

Change The Quantum Matrix inside yourself

Father in heaven, In the name of The Lord Jesus Christ I ask you to change the quantum matrix inside me, across all space time continuums, all dimensions, all time lines and all frequency domains in this universe, across all bubbles in the omniverse and across all planes of existence so that:

The enemy’s jump gate technology will not function on me.

The enemy’s fractal jump gate technology will not function on me.

The enemy’s transporter technology will not function on me.

The enemy’s fractal transporter technology will not function on me

The enemy’s time travel technology will not function on me.

The enemy’s fractal time travel technology will not function on me.

The enemy’s dimensional travel technology will not function on me.

The enemy’s fractal dimensional travel technology will not function on me.

The enemy’s wormhole travel technology will not function on me.

The enemy’s fractal wormhole travel technology will not function on me.

The enemy’s implant technology will not function on me.

The enemy’s walk-thru-walls technology will not function on me.

The enemy’s sleep ray technology will not function on me.

The enemy’s remote viewing capability will not function on me.

The enemy’s radionics technology will not function on me.

The enemy’s psychotronics technology will not function on me.

The enemy’s psionic technology will not function on me.

The enemy’s death signal technology will not function on me.

The enemy’s disease signal technology will not function on me.

Ask God for an energy shield against the enemy.

Father in heaven, in the name of The Lord Jesus Christ, I ask you to put around me an impenetrable, impregnable multi-layer, multi-phase, multispectral, multi-frequency domain, multi-dimensional, multi-continuum, multi-timeline shield around my physical body, etheric body, astral body and all my other energy bodies and all components that I consist of, across all space time continuums, time lines and dimensions in this universe, across all “bubbles” in the omniverse and across all planes of existence, in Jesus’ name I pray, amen.

SOUL TIES To CHAKRAS

Note: The following refers to the body’s energy centers known as chakras. It doesn’t matter if you believe they exist or not. God created them just like he created your arm or leg. The enemy attacks them and since most don’t believe they exist, the attack goes unchallenged and the damage will accumulate. Always divide the technology from the superstition. And never go looking for things or exploring outside of God’s protection. Just understand they exist and protect them from the enemy. And learn the difference between physical, metaphysical and spiritual.

In the name of the Lord Jesus Christ I break, dissolve, sever, crush & destroy every ungodly soul tie, hook, link and connection attached to my BASE chakra in Jesus’ name. In Jesus’ name I bind every thing that came into me from those connections. In Jesus’ name I close every door that was open to those things, I take away every legal bond and every legal hold they have on me and I cut them loose from all their assignments, in Jesus’ name. In the name of the Lord Jesus Christ I order every thing that came into me to leave now. Father, In Jesus’ name I ask you to send angels to bind up these things and return them to whoever sent them, to bring them to repentance, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I break, dissolve, sever, crush & destroy every ungodly soul tie, hook, link and connection attached to my SEX chakra in Jesus’ name. In Jesus’ name I bind every thing that came into me from those connections. In Jesus’ name I close every door that was open to those things, I take away every legal bond and every legal hold they have on me and I cut them loose from all their assignments, in Jesus’ name. In the name of the Lord Jesus Christ I order every thing that came into me to leave now. Father, In Jesus’ name I ask you to send angels to bind up these things and return them to whoever sent them, to bring them to repentance, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I break, dissolve, sever, crush & destroy every ungodly soul tie, hook, link and connection attached to my SPLEEN chakra in Jesus’ name. In Jesus’ name I bind every thing that came into me from those connections. In Jesus’ name I close every door that was open to those things, I take away every legal bond and every legal hold they have on me and I cut them loose from all their assignments, in Jesus’ name. In the name of the Lord Jesus Christ I order every thing that came into me to leave now. Father, In Jesus’ name I ask you to send angels to bind up these things and return them to whoever sent them, to bring them to repentance, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I break, dissolve, sever, crush & destroy every ungodly soul tie, hook, link and connection attached to my HEART chakra in Jesus’ name. In Jesus’ name I bind every thing that came into me from those connections. In Jesus’ name I close every door that was open to those things, I take away every legal bond and every legal hold they have on me and I cut them loose from all their assignments, in Jesus’ name. In the name of the Lord Jesus Christ I order every thing that came into me to leave now. Father, In Jesus’ name I ask you to send angels to bind up these things and return them to whoever sent them, to bring them to repentance, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I break, dissolve, sever, crush & destroy every ungodly soul tie, hook, link and connection attached to my THROAT chakra in Jesus’ name. In Jesus’ name I bind every thing that came into me from those connections. In Jesus’ name I close every door that was open to those things, I take away every legal bond and every legal hold they have on me and I cut them loose from all their assignments, in Jesus’ name. In the name of the Lord Jesus Christ I order every thing that came into me to leave now. Father, In Jesus’ name I ask you to send angels to bind up these things and return them to whoever sent them, to bring them to repentance, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I break, dissolve, sever, crush & destroy every ungodly soul tie, hook, link and connection attached to my THIRD EYE chakra in Jesus’ name. In Jesus’ name I bind every thing that came into me from those connections. In Jesus’ name I close every door that was open to those things, I take away every legal bond and every legal hold they have on me and I cut them loose from all their assignments, in Jesus’ name. In the name of the Lord Jesus Christ I order every thing that came into me to leave now. Father, In Jesus’ name I ask you to send angels to bind up these things and return them to whoever sent them, to bring them to repentance, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I break, dissolve, sever, crush & destroy every ungodly soul tie, hook, link and connection attached to my CROWN chakra in Jesus’ name. In Jesus’ name I bind every thing that came into me from those connections. In Jesus’ name I close every door that was open to those things, I take away every legal bond and every legal hold they have on me and I cut them loose from all their assignments, in Jesus’ name. In the name of the Lord Jesus Christ I order every thing that came into me to leave now. Father, In Jesus’ name I ask you to send angels to bind up these things and return them to whoever sent them, to bring them to repentance, in Jesus’ name I pray, amen.

BLOCKED CHAKRAS

In the name of the Lord Jesus Christ I bind all Blocks attached to my BASE chakra. In Jesus’ name I bind the strongman over the Blocks attached to my base chakra and I toss him off his throne in Jesus’ name.

In Jesus’ name, Father I ask you to send angels to bind the strong man inside of boxes, inside of boxes, to 1,000,000 levels deep, with angels reading scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all demons controlling these Blocks and I command you to leave now, in Jesus’ name. Father, please send angels to bind these demons and send them where you want them to go, in Jesus’ name. In Jesus’ name I break, deactivate, cut, sever and destroy every interconnect support device between these Blocks. In Jesus’ name I break, deactivate, cut, sever and destroy every hook device that allows attachment to my chakra, in Jesus’ name. In Jesus’ name I bind all Blocks to my authority in the third heaven and I command you to leave me now, in Jesus’ name. Father, please send angels to bind these Blocks and send them to where you want them to go, in Jesus’ name. Father in heaven, please send angels to repair all the damage done to me by these blocks and to change me so that they won’t be able to hook into me again, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I bind all Blocks attached to my SEX chakra. In Jesus’ name I bind the strongman over the Blocks attached to my base chakra and I toss him off his throne in Jesus’ name. In Jesus’ name, Father I ask you to send angels to bind the strong man inside of boxes, inside of boxes, to 1,000,000 levels deep, with angels reading scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all demons controlling these Blocks and I command you to leave now, in Jesus’ name. Father, please send angels to bind these demons and send them where you want them to go, in Jesus’ name. In Jesus’ name I break, deactivate, cut, sever and destroy every interconnect support device between these Blocks. In Jesus’ name I break, deactivate, cut, sever and destroy every hook device that allows attachment to my chakra, in Jesus’ name. In Jesus’ name I bind all Blocks to my authority in the third heaven and I command you to leave me now, in Jesus’ name. Father, please send angels to bind these Blocks and send them to where you want them to go, in Jesus’ name. Father in heaven, please send angels to repair all the damage done to me by these blocks and to change me so that they won’t be able to hook into me again, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I bind all Blocks attached to my SPLEEN chakra. In Jesus’ name I bind the strongman over the Blocks attached to my base chakra and I toss him off his throne in Jesus’ name.

In Jesus’ name, Father I ask you to send angels to bind the strong man inside of boxes, inside of boxes, to 1,000,000 levels deep, with angels reading scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all demons controlling these Blocks and I command you to leave now,

in Jesus’ name. Father, please send angels to bind these demons and send them where you want them to go, in Jesus’ name. In Jesus’ name I break, deactivate, cut, sever and destroy every interconnect support device between these Blocks. In Jesus’ name I break, deactivate, cut, sever and destroy every hook device that allows attachment to my chakra, in Jesus name. In Jesus’ name I bind all Blocks to my authority in the third heaven and I command you to leave me now, in Jesus’ name. Father, please send angels to bind these Blocks and send them to where you want them to go, in Jesus’ name. Father in heaven, please send angels to repair all the damage done to me by these blocks and to change me so that they won’t be able to hook into me again, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I bind all Blocks attached to my HEART chakra. In Jesus’ name I bind the strongman over the Blocks attached to my base chakra and I toss him off his throne in Jesus’ name.

In Jesus’ name, Father I ask you to send angels to bind the strong man inside of boxes, inside of boxes, to 1,000,000 levels deep, with angels reading scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all demons controlling these Blocks and I command you to leave now, in Jesus’ name. Father, please send angels to bind these demons and send them where you want them to go, in Jesus’ name. In Jesus’ name I break, deactivate, cut, sever and destroy every interconnect support device between these Blocks. In Jesus’ name I break, deactivate, cut, sever and destroy every hook device that allows attachment to my chakra, in Jesus’ name. In Jesus’ name I bind all Blocks to my authority in the third heaven and I command you to leave me now, in Jesus’ name. Father, please send angels to bind these Blocks and send them to where you want them to go, in Jesus’ name. Father in heaven, please send angels to repair all the damage done to me by these blocks and to change me so that they won’t be able to hook into me again, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I bind all Blocks attached to my THROAT chakra. In Jesus’ name I bind the strongman over the Blocks attached to my base chakra and I toss him off his throne in Jesus’ name. In Jesus’ name, Father I ask you to send angels to bind the strong man inside of boxes, inside of boxes, to 1,000,000 levels deep, with angels reading scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all demons controlling these Blocks and I command you to leave now, in Jesus’ name. Father, please send angels to bind these demons and send them where you want them to go, in Jesus’ name. In Jesus’ name I break, deactivate, cut, sever and destroy every interconnect support device between these Blocks. In Jesus’ name I break, deactivate, cut, sever and destroy every hook device that allows attachment to my chakra, in Jesus’ name. In Jesus’ name I bind all Blocks to my authority in the third heaven and I command you to leave me now, in Jesus’ name. Father, please send angels to bind these Blocks and send them to where you want them to go, in Jesus’ name. Father in heaven, please send angels to repair all the damage done to me by these blocks and to change me so that they won’t be able to hook into me again, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I bind all Blocks attached to my THIRD EYE chakra. In Jesus’ name I bind the strongman over the Blocks attached to my base chakra and I toss him off his throne in Jesus’ name. In Jesus’ name, Father I ask you to send angels to bind the strong man inside of boxes, inside of boxes, to 1,000,000 levels deep, with angels reading scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all demons controlling these Blocks and I command you to leave now, in Jesus’ name. Father, please send angels to bind these demons and send them where you want them to go, in Jesus’ name. In Jesus’ name I break, deactivate, cut, sever and destroy every interconnect support device between these Blocks.

In Jesus’ name I break, deactivate, cut, sever and destroy every hook device that allows attachment to my chakra, in Jesus’ name. In Jesus’ name I bind all Blocks to my authority in the third heaven and I command you to leave me now, in Jesus’ name. Father, please send angels to bind these Blocks and send them to where you want them to go, in Jesus’ name. Father in heaven, please send angels to repair all the damage done to me by these blocks and to change me so that they won’t be able to hook into me again, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I bind all Blocks attached to my CROWN chakra. In Jesus’ name I bind the strongman over the Blocks attached to my base chakra and I toss him off his throne in Jesus’ name.

In Jesus’ name, Father I ask you to send angels to bind the strong man inside of boxes, inside of boxes, to 1,000,000 levels deep, with angels reading scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all demons controlling these Blocks and I command you to leave now, in Jesus’ name. Father, please send angels to bind these demons and send them where you want them to go, in Jesus’ name. In Jesus name I break, deactivate, cut, sever and destroy every interconnect support device between these Blocks. In Jesus’ name I break, deactivate, cut, sever and destroy every hook device that allows attachment to my chakra, in Jesus’ name. In Jesus’ name I bind all Blocks to my authority in the third heaven and I command you to leave me now, in Jesus’ name. Father, please send angels to bind these Blocks and send them to where you want them to go, in Jesus’ name. Father in heaven, please send angels to repair all the damage done to me by these blocks and to change me so that they won’t be able to hook into me again, in Jesus’ name I pray, amen.

Cancel Satan’s plan in your life

Satan has a plan for everyone’s life, just as GOD has a plan for everyone’s life. That plan has someone in charge of it and a lot of subordinate spirits directing it. It is a very good idea to get rid of Satan’s plan and substitute GOD’s plan.

In the name of The Lord Jesus Christ, I bind the strongman over Satan’s plan for my life and I toss him off his throne in Jesus name. Father I ask you to send angels to bind this strongman inside of boxes, inside of more boxes to 1,000,000 levels deep, with angels singing scripture to him night and day, in Jesus name. Father I ask you to send angels to guard that box so the demons cannot free him, in Jesus name. In Jesus name I bind all demons subordinate to the strongman over Satan’s plan for my life. In Jesus name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus name. I command all demons subordinate to the strongman over Satan’s plan for my life to leave now, in Jesus name. In Jesus name I bind all other spirits and entities under the command of the strongman over Satan’s plan for my life. In Jesus name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus name. In Jesus name I loose you from all commands, controls, attachments, mind control, programming, agreements, oaths and bonds to the strongman over Satan’s plan for my life or any of his subordinates. I command all demons to go where Jesus wants you to go and I command all other entities to go home and never return, in Jesus name I pray, amen.

Akashic Records

While praying one night I was led to believe that the forces of darkness use the Akashic records 13 database against people and that it would in fact be a good idea to remove oneself from it. It is quite possible that Lucifer himself is the owner of such a database. I believe the following prayer accomplished that objective.

Father, in the name of The Lord Jesus Christ I break, crush, destroy and sever every soul tie, hook, link, connection, attachment and device from myself to the Akashic records and from the Akashic records back to myself, in Jesus’ name. Father, I ask you to remove, delete, purge and destroy all my records, images, thoughts, words and actions stored in this system as well as all duplicate copies, backup copies, emergency copies and extra copies stored anywhere in creation, in Jesus’ name. Father, I ask you to totally remove me from every system, database, storage device, archive and library owned or operated by the forces of darkness and to prevent my information from being put back into those systems, in Jesus’ name I pray, amen.

13 Akashic Records: A theosophical term referring to an universal filing system which records every occurring thought, word, and action. The records are impressed on a subtle substance called akasha (or Soniferous Ether). In Hindu mysticism this akasha is thought to be the primary principle of nature from which the other four natural principles, fire, air, earth, and water, are created. These five principles also represent the five senses of the human being. Some indicate the akashic records are similar to a Cosmic or collective consciousness. The records have been referred to by different names including the Cosmic Mind, the Universal Mind, the collective unconscious, or the collective subconscious. Others think the akashic records make clairvoyance and psychic perception possible. From an metaphysical database website www.themystica.com

Defeating Electronic Witchcraft

Ask God to have the angels destroy the hardware, software, systems, networks and

energy supplies of the attacking installation. Spells can be and are transmitted by radionics.

Ask for help

Heavenly Father, In the name of The Lord Jesus Christ I come to you and I praise you and Thank You for the blessings you have given to Stephanie and I. Thank You for keeping us safe and sound against the attacks of the enemy. In Jesus’ name I ask you to please free Stephanie from these attacks and keep her safe from the enemy. In Jesus’ name, please remove all these things attacking Stephanie and send them back to whoever sent them, in Jesus’ name I Pray, Amen.

Ask for tactical information

Father, In The name Of The Lord Jesus Christ, I ask you to please give me discernment to discover where these attacks are coming from and to give me wisdom, knowledge, understanding and determination to defeat the enemy making these attacks, in Jesus name I pray, amen.

Break curses

In the name of The Lord Jesus Christ I break every curse, every spell, every psychic prayer and attack put upon Stephanie by any person, place, thing, witch, occult source, psychic source, Reptilian, Draconian, Grey, Insect or any other entity, in Jesus’ name. In Jesus’ name I bind every thing that came into Stephanie from those curses, spells, psychic prayers and attacks. In Jesus’ name I cut you spirits loose from all your assignments, I take away every legal ground and legal hold you have on Stephanie and I close every door that was opened to you, in Jesus’ name.

In Jesus’ name, I order every thing that came into Stephanie to leave her now. Father, please send these things back to who or whatever sent them, to bring them to repentance, in Jesus’ name I pray, Amen.

Change your frequencies

In the name of The Lord Jesus Christ, Father I ask you to change all of Stephanie’s frequencies so that the radionics machines won’t be able to lock on to her and so that the enemy won’t be able to find her, in Jesus’ name I pray, Amen.

Remove energy drains

In the name of The Lord Jesus Christ, I break every energy drain put upon Stephanie and I command everything that came into Stephanie from that energy drain to leave her now, in Jesus’ name, amen.

Deactivate the radionics machine

In the name of the Lord Jesus Christ, I bind the strongman over the radionics machine attacking Stephanie and I throw him off his throne, in Jesus’ name. In Jesus’ name Father I ask you to send angels to bind the strongman over the radionics machine attacking Stephanie. I ask you to bind him inside of boxes, inside of boxes, 1,000,000 levels deep, with angels singing scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all subordinate demons that are directing and controlling the radionics machine attacking Stephanie. I cut you loose from all you assignments, I remove every legal hold and legal ground you have on Stephanie and I close every door that was opened to you, in Jesus’ name. I command you to leave the machine now, in Jesus’ name. In Jesus’ name I command the radionics machine to be dead, deactivated and destroyed permanently, in Jesus’ name.

Deactivate the spell

In the name of the Lord Jesus Christ, I bind the strongman over the spell put upon the object inside the witness well of the radionics machine attacking Stephanie and I throw him off his throne, in Jesus’ name. In Jesus’ name Father I ask you to send angels to bind the strongman over the spell put upon the object inside the witness well of the radionics machine attacking Stephanie. I ask you to bind him inside of boxes, inside of boxes, 1,000,000 levels deep, with angels singing scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all subordinate demons that are directing and controlling the spell put upon the object inside the witness well of the radionics machine attacking Stephanie. I cut you loose from all you assignments, I remove every legal hold and legal ground you have on Stephanie and I close every door that was opened to you, in Jesus’ name. I command you to leave the object now, in Jesus’ name. In Jesus’ name I command the witness well object to be dead, deactivated and destroyed permanently, in Jesus’ name I pray, amen.

Sever all soul ties

In the name of The Lord Jesus Christ I break, cut, sever, dissolve and destroy every soul tie, hook, link and connection attached to Stephanie from any external source, in Jesus’ name. I command everything that came into Stephanie from those soul ties, hooks, links and connections to leave her NOW in Jesus’ name. Father, I ask you to send all these things back to whoever sent them, to bring them to repentance. in Jesus’ name I pray, Amen.

Praise God for His help

Heavenly Father, In the Name of The Lord Jesus Christ I come to you and I praise you and Thank You for the blessings you have given to me. Thank You for keeping me safe and sound against the attacks of the enemy. In Jesus’ name I ask you to please free me from these attacks and keep me safe from the enemy. In Jesus’ name, please remove all these things attacking me and send them back to whoever sent them, In Jesus’ Name I Pray, Amen.

Ask God for tactical information

Father, In The Name Of The Lord Jesus Christ, I ask you to please give me discernment to discover where these attacks are coming from and to give me wisdom, knowledge, understanding and determination to defeat the enemy making these attacks, in Jesus’ name I pray, amen.

Break general or ordinary attacks on your self (do this a few times)

In the name of The Lord Jesus Christ I break every curse, every spell, every psychic prayer and attack put upon me by any person, place, thing, witch, occult source, psychic source, Reptilian, Draconian, Grey, Insect or any other entity, In Jesus’ name. In Jesus’ name I bind every thing that came into me from those curses, spells, psychic prayers and attacks. In Jesus name I cut all such spirits loose from all your assignments, I take away every legal ground and legal hold you have on me and I close every door that was opened to you, In Jesus’ name. In Jesus’ name, I order every thing that came into me to leave me now. Father, please send these things back to who or whatever sent them, to bring them to repentance, In Jesus’ name, Amen.

Remove any extra soul ties or enemy surprises

In the name of The Lord Jesus Christ I break, cut, sever, dissolve and destroy every soul tie, hook, link, connection, attachment and device of an ungodly type attached to me from any external source, in Jesus’ name. I command everything that came into me from those soul ties, hooks, links, connections, attachments and devices to leave me NOW in Jesus’ name. Father, I ask you to send all these things back to whoever sent them, to bring them to repentance, in Jesus’ name I pray, Amen

Break and remove the energy drain

In the name of The Lord Jesus Christ, I break, crush, dissolve, sever, smash and destroy every energy drain of every type put upon me and I command everything that came into me from those energy drains to leave me now, in Jesus’ name.

Remove all attachments to the energy drain

In the name of The Lord Jesus Christ, I break, crush, dissolve, sever, smash and destroy every soul tie, hook, link, connection and attachment between myself and whoever or whatever put the energy drain in me and I command everything that came into me from those soul ties, hooks, links, connections or attachments to leave now, in Jesus’ name.

Repair the damage

Father, In the name of The Lord Jesus Christ, I ask you to repair all the damage done to me by this attack. I ask you to reverse all the injury done to my physical body, etheric body, astral body and all my energy bodies, in Jesus’ name I pray, amen.

Remove all relationships to photographs (*** VERY IMPORTANT ***)

Father, In the name of The Lord Jesus Christ, I ask you break every soul tie, hook, link, connection, attachment and relationship between myself and every photograph or image that has ever been created of me, in Jesus’ name I pray, amen.

Change your bio frequencies

In the name of The Lord Jesus Christ, Father I ask you to change all of my frequencies so that the metaphysical science technology won’t be able to lock on to me, in Jesus’ name, Amen.

Attack and destroy the source of the problem

In the name of The Lord Jesus Christ, Father I ask you to send millions and millions of legions of angels to directly attack the place from which this attack originated. Father, please direct the angels to destroy the hardware, software, systems, files, backup files, networks, routers and energy supplies of the attacking installation, in Jesus’ name I pray, amen.

Destroying a Coven

Disclaimer: The following information is made available to assist believers to resist the attacks of those individuals that have chosen the “left hand” path of the occult (black magic). You know who you are. This article is not an attack upon any group or individual that does not harm others. The response to this article by those that serve the dark side is predictable. I am not responsible for any consequences to anyone as the result of any attack directed against my family or myself. (The real book of shadows declares that you shall not cast upon a child of the living God. You should obey your own religion)

The following procedure has proven useful when being attacked by witchcraft from multiple targets (a coven, triad or other group). When dealing with occultists I have found two main ways to counter their attacks.

· Hard way: Whatever was sent to me would be returned to them

multiplied by a factor of 1000, 100,000 or a million. After much

experience I would now only do this in an emergency if the attacks

were very damaging. The problem with this type of countermeasure is

that the resources of the enemy are large and that they can attack you

in a “swarm” and escalate the battle beyond what you may be able to

take. Another problem is that the enemy still exists and the attacks just

get bigger. It would be better if the enemy was eliminated and so the

source of the attack would vanish.

· Soft Way: I believe that this is the more effective type of

countermeasure. In this procedure we use spiritual warfare techniques

to “disassemble” the attacking group and eliminate each component

individually. This takes more prayer, discernment and time, however

the end result is more effective and longer lasting. There are five main

targets in this counter attack:

1. The strongman over the attack

2. Whoever ordered the attack

3. Whoever executed the attack

4. Any machines or devices involved in the attack

5. The curse, spell or psychic attack itself

When you are being attacked by those trapped in the occult, remember that they are not your enemy. These are human beings, with families, that also have wants and needs and that love, just like you do. They are trapped and ensnared in things that they never knew existed and by the time they learned, it was too late. Many of these people were born into families where they have been abused and/or subjected to mind control since early childhood. All practitioners of the occult suffer from soul fragmentation. After participation in their first initiation, their soul is fragmented and they aren’t quite the same person as they were before that procedure. After each ritual less and less of the original soul remains and more and more of the enemy takes hold upon them.

God wants these people to be freed, just like He is freeing you. Your enemies are the entities that influence and control these occultists, whether grey alien, reptilian, draconian, demon, power, principality, world ruler or any other demon or life form. Occultists are a dime a dozen. Satanist, Wicca witch, Druid witch, Freemason or any member of any secret society or secret church, it doesn’t matter. The demonic hierarchy is constantly recruiting new members and burning out and sacrificing old ones. Do not worry about their numbers. Just pray for whomever God puts in your path.

Occultists never win You should be encouraged to remember that those who practice the occult arts to kill, hurt, influence or control others can never be victorious. Occult power comes from the demonic world and is limited in strength. An individual practitioner derives power and influence from the number and rank of demonic spirits that have come into them by way of casting spells, performing rituals and direct conjuring of demons. During this learning period soul fragmentation gets worse and as time goes on very little of the original human being remains. This is true whether a person is born into an occult surrounding or whether they are trained by occult books and the demons contained within them.

An individual human body can only be subject to a certain amount of this abuse before it begins to break down and various diseases appear. By the time the practitioner realizes what is happening, it is too late. As time goes on they require more and more life force energy to keep the demons at bay. They are forced to steal this energy from other beings (animal and human) by the use of ritual and sacrifice. High-level initiates frequently utilize the techniques related to tantra yoga to steal energy from children during ritual. Eventually the practitioner is unable to obtain enough energy and they are taken over completely or destroyed.

The occultist has only two choices. They can attack you and they will be defeated and probably damaged in the fight. Or they can ignore you and search for easier prey. Also remember that you are soldier and it is your job to do whatever God tells you, nothing else. It is not your job to save the world by yourself or to compare yourself with any other person. Learn and study and God will put you to work. In contrast to this, the life of the believer in The Lord Jesus Christ has no such limitations or problems. Because of the shed blood of Jesus, the believer is spiritually at the same level as the creator of the universe Himself! No enemy of any kind can ever defeat the believer. Every enemy of Jesus Christ was defeated when Jesus was resurrected over 2000 years ago. These enemies of Jesus Christ are just living on borrowed time.

It is clear to me that God gives his children complete victory over the enemy’s attacks even so far as changing the very structure of space-time itself so that the enemy’s devices will be brought to nothing. All we have to do is put the world behind us, stand forward, have faith in our Lord and determination in ourselves. Always remember that by praying for the enemy and helping turn them away from the dark side, you do massive damage to the kingdom of Satan. The results echo throughout the kingdom of darkness and do much to undermine Satan’s authority and power.

Soft Way

Eliminate the strong man over the attack

In the name of The Lord Jesus Christ, I break the power of this attack over me. In Jesus’ name I bind the strong man over this attack and I toss him off his throne in Jesus’ name. Father I ask you to send angels to bind this strong man inside of boxes, inside of more boxes to 1,000,000 levels deep, with angels singing scripture to him night and day, in Jesus’ name. Father I ask you to send angels to guard that box so the demons cannot free him, in Jesus’ name.

Eliminate subordinates of the strong man over the attack

In Jesus’ name I bind all demons subordinate to the strong man over this attack upon me. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all demons subordinate to the strong man over this attack upon me to leave now, in Jesus’ name.

**The “strong man” is a demon that has delegated authority over a certain thing.

No man can enter into a strong man’s house, and spoil his goods, except he will first bind the strong man; and then he will spoil his house. Mark 3:27 KJV

Eliminate slaves of the strong man over the attack

In Jesus’ name I bind all other spirits and entities under the command of the strong man over this attack upon me and in Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal bond that you have on me, in Jesus’ name. In Jesus’ name I loose you from all commands, controls, attachments, mind control, programming, agreements, oaths and bonds to the strongman over this attack upon me or the subordinates of the strong man and I command all demons to go where Jesus’ wants you to go and I command all other entities to go home and never return, in Jesus’ name I pray, amen.

Eliminate demonic infrastructure of the strong man over the attack

In Jesus’ name I break, crush, sever, dissolve, smash and destroy all the demonic infrastructure of this strong man. Father, I ask you to please send hundreds, hundreds, hundreds and hundreds of millions of legions of angels to attack and destroy this strong man’s computers, networks, programs, storage devices, data files, backup data files, communication lines and power sources and every other component of his infrastructure that I do not know about, in Jesus’ name I pray, amen.

Break ties with originator of the attack

In the name of the Lord Jesus Christ I break, dissolve, sever, crush & destroy every ungodly soul tie, hook, link, attachment and connection between myself and the originator of this attack and between the originator of this attack and myself in Jesus’ name. In Jesus’ name I bind every thing that came into me from those connections. In Jesus’ name I close every door that was open to those things, I take away every legal bond and every legal hold they have on me and I cut them loose from all their assignments, in Jesus’ name. In the name of the Lord Jesus Christ I order every thing that came into me to leave now. Father, In Jesus’ name I ask you to send angels to bind up these things and return them to whoever sent them, to bring them to repentance, in Jesus’ name I pray, amen.

Eliminate the strong man over the originator of the attack

In Jesus’ name I bind the strong man over the originator of this attack and I toss him off his throne in Jesus’ name. Father I ask you to send angels to bind this strong man inside of boxes, inside of more boxes to 1,000,000 levels deep, with angels singing scripture to him night and day, in Jesus’ name. Father I ask you to send angels to guard that box so the demons cannot free him, in Jesus’ name.

Eliminate subordinates of the strong man over the originator of the attack

In Jesus’ name I bind all demons subordinate to the strong man over the originator of this attack upon me. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all demons subordinate to the strong man over the originator of this attack upon me to leave now, in Jesus’ name.

Eliminate slaves of the strong man over the originator of the attack

In Jesus’ name I bind all spirits, entities, slaves and prisoners under the command of the strong man over the originator of this attack upon me and in Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. In Jesus’ name I loose you from all commands, controls, attachments, mind control, programming, agreements, oaths and bonds to the strong man over the originator of this attack upon me or the subordinates of the strong man and I command all demons to go where Jesus’ wants you to go and I command all other entities to go home and never return, in Jesus’ name I pray, amen.

Eliminate demonic infrastructure of the strong man over the originator of the attack

In Jesus’ name I break, crush, sever, dissolve, smash and destroy all the demonic infrastructure of this strong man. Father, I ask you to please send hundreds, hundreds, hundreds and hundreds of millions of legions of angels to attack and destroy this strong man’s computers, networks, programs, storage devices, data files, backup data files, communication lines and power sources and every other component of his infrastructure that I do not know about, in Jesus’ name I pray, amen.

Eliminate originator of the attack

Heavenly Father, in the name of the Lord Jesus Christ, I break, crush, sever, smash, dissolve and destroy every curse, spell, psychic prayer and attack put upon me by the originator of this attack in Jesus’ name I pray, amen. In Jesus’ name I break every soul tie, hook, link, attachment, connection and device between myself and the originator of this attack and between the originator of this attack and myself, in Jesus’ name. In Jesus’ name I bind everything that came into me from these soul ties, hooks, links and connections and I cut you loose from all your assignments, I close all doors open to you and I take away every legal hold and legal ground you have to attack me, in Jesus’ name. In the name of The Lord Jesus Christ, I break every curse, spell and psychic prayer that made the originator of this attack the way they are. In Jesus’ name, Father I ask you to send as many legions of angels as necessary to bind all demons in the originator of this attack, that give them their power, rank, prestige, wealth, metaphysical abilities and position and I ask you to remove those demons and send them far away, in Jesus’ name. In Jesus’ name I break, crush and destroy all bonds of mind control and coercion this entity is under and I cancel and void all oaths, contracts and agreements this entity is under, in Jesus’ name. Father, I ask you to free the mind of originator of this attack and allow them choose their destiny without influence of any kind, in Jesus’ name I pray, amen.

Eliminate subordinates of the originator of the attack

In Jesus’ name I bind all demons and entities subordinate to the originator of this attack upon me. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all subordinates to the originator of this attack upon me to leave now, in Jesus’ name. In Jesus’ name I break, crush and destroy all bonds of mind control and coercion these subordinates are under and I cancel and void all oaths, contracts and agreements that control them, in Jesus’ name. Father, I ask you to free the mind of these subordinates and allow them choose their destiny without influence of any kind, in Jesus’ name I pray, amen.

Eliminate slaves of the originator of the attack

In Jesus’ name I bind all slaves, prisoners and remaining entities of the originator of this attack upon me. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all slaves and prisoners of the originator of this attack upon me to leave now, in Jesus’ name. In Jesus’ name I break, crush and destroy all bonds of mind control and coercion these slaves and prisoners are under and I cancel and void all oaths, contracts and agreements that control them, in Jesus’ name. Father, I ask you to free the mind of these slaves and prisoners and allow them choose their destiny without influence of any kind, in Jesus’ name I pray, amen

Eliminate infrastructure of the originator of the attack

Father, I ask you to please send hundreds, hundreds, hundreds and hundreds of millions of legions of angels to attack and destroy the computers, networks, programs, storage devices, data files, backup data files, communication lines and power sources and every other component of the infrastructure of the originator of this attack, in Jesus’ name I pray, amen.

Eliminate the strong man over the attacker(s)

In Jesus’ name I bind the strong man over the attacker executing this attack and I toss him off his throne in Jesus’ name. Father I ask you to send angels to bind this strongman inside of boxes, inside of more boxes to 1,000,000 levels deep, with angels singing scripture to him night and day, in Jesus’ name. Father I ask you to send angels to guard that box so the demons cannot free him, in Jesus’ name.

Eliminate subordinates of the strong man over the attacker(s)

In Jesus’ name I bind all demons subordinate to the strong man over the attacker executing this attack upon me. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all demons subordinate to the strong man over the attacker to leave now, in Jesus’ name. In Jesus’ name I loose you from all commands, controls, attachments, mind control, programming, agreements, oaths and bonds to the strong man over the attacker and I command all demons to go where Jesus’ wants you to go and I command all other entities to go home and never return, in Jesus’ name I pray, amen.

Eliminate slaves of the strong man over the attacker(s)

In Jesus’ name I bind all other spirits, entities, slaves and prisoners under the command of t…

Related Images:

NSA transmissions ELF mind control Cancer corruptions (July 1, 2010)

Description

IN THE UNITED STATES DISTRICT COURTS

FOR THE DISTRICT OF COLUMBIA

MIREILLE TORJMAN CASE NO.:

Plaintiff

V.

FEDERAL BUREAU OF INVESTIGATIONS, et al.

935 Pennsylvania Avenue Northwest

Washington, DC 20535-0001;

CENTRAL INTELLIGENCE AGENCY

Office of Public Affairs

Washington, D.C. 20505;

NATIONAL SECURITY AGENCY

9800 Savage Road, Suite 6711

Fort Meade, MD 20755-6711;

DEPARTMENT OF JUSTICE

600 E Street, N.W.

Washington, D.C. 20530;

DEPARTMENT OF DEFENSE

1400 Defense Pentagon

Washington, DC 20301-1400;

DEPARTMENT OF ENERGY

1000 Independence Ave

Washington, DC 20585;

UNITED STATES OF AMERICA

Defendants

COMPLAINT

1. Plaintiff, Mireille Torjman hereby brings this action for injunction relief and damages based on personal knowledge and belief, as a victim and expert witness, to the information provided, as to all other matters, as to which allegations Plaintiff, without doubt or delusion, will provide proof, unrefuted evidence, overwhelming evidentiary support, witnesses, substantial facts, research, and investigation that exists as follows:

PRELIMINARY STATEMENT

2. This case is about the wiretapping, civil rights violations, privacy, communications technology, and crimes of humanity, in use by the Intelligence Community. With the advanced technology unknown to most, of shadow network of surveillance and spying under DARPA projects, defendants are, transmitting, intercepting, tampering, and blocking the content of a significant portion of the Plaintiff’s phone calls, emails, instant messaging, text messaging, www, Skype, electronic and wireless communications, and other communications, both internationally and domestic, including Plaintiff’s family and practically every American, for the past 4 years, beginning on or about January 2007.

3. Plaintiff’s records will show communications are intercepted, manipulated, tampered with, stored, (data mining), harassed, and impeded. Plaintiff will provide numerous emails hijacked, fabricated, UNREAD, manipulated, deleted, including facsimile, and internet manipulations, since 2007. Plaintiff’s numerous impeded electronic communications with all her service providers were debilitating to her work and she had no resolve available from providers who were not able to correct or detect the situations. This includes manufactured emails, phone calls, and government employee’s unwitting involvement. In 2008, Plaintiff was also accused legally of false communications during her service with Qwest, by using wiretapped calls and disconnects to create false records with her utilities company, including defamation to her character. (Kay Griggs, Military wife; whistle blow case on tampered communication CHAOS and automobile impediments not to testify).

4. Plaintiff is not delusional and has provided her records to DOJ in early 2009, with documents from many other credible sources and whistle blowers. Plaintiff requests that the Russell Tice case and Articles below § 35 is read with disclosures being made as to her allegations, Injunction relief, various separate counts, and tort damages throughout. Plaintiff has demonstrated courage, risked her reputation, risked her life, and family’s, and has been threatened, prior to receiving an anonymous email of the NSA article (below) in February 2009. Plaintiff tried to blow the whistle to the DA late 2007, and was not aware what NSA was or government corruption, but knew she had to report what was going on. As quoted by Mr. Tice and others; “Statement by NSA, “THE TIP OF THE ICEBERG and WIRETAPPING SURVEILLANCE LOOK LIKE SMALL POTATOES”. Most recently, Plaintiff was able to meet with the FBI in early 2010, and provided some information for investigation by various FBI analysts.

5. The President and other executive officials have described some activities of surveillance and spying which are conducted outside the procedures of the Foreign Intelligence Surveillance Act (“FISA”) and without authorization by the Foreign Intelligence Court, Communities, Committees, Senate, or Congress.

6. As with The Attorney General and the Director of National Intelligence having since publicly admitting that the TSP was only one particular aspect of the surveillance activities authorized by the

Programs, and are being abused. (Jewel v United States, United States v Yahoo)

7. In addition to eavesdropping on or reading specific communications, Defendants have intercepted the communications contents across the United States and overseas, and targeted the Plaintiff with intense sabotage and impediments, Electronic Stalking, Slander, including Internet Communications, and Google’s Access Portals. Plaintiff wrote to Google to let them know what was going on behind the scenes with all the tampering including remote viewing, password access, and covert data-mining in SG3 dating back prior to 911. (EFF v Google and Street View) DOD’s ELF transmitters were already in full scale by 1981 in Australia and Africa, followed by additional covert superior Projects as Combat Zones also under DARPA formerly ARPA)

ALLEGATIONS AND FACTUAL ALLEGATIONS RELATED TO ALL COUNTS

8. With suspicious FBI allegations and $122 Million Virtual Case File Project gone wrong in 2001, prior Board Members and Government Officials’, the new Parent Company SAIC’s (C I A Spacestar) servers and the (“Occult Connections”). Chief of Staff Jack E Thomas Air Force Intelligence, 1997 ties with DOD, NSA, CIA, and former Executives, Directors, Secretaries, Army Generals, all had knowledge of REMOTE VIEWING experiments spy biz, SPAWAR at the Naval Electronics System Command in San Diego and Los Alamos National Labs for Medical Oversight to American Intelligence Agencies (1996). A surge of Federal Spending raised Multi-Billion dollar Defense concerns with SAIC and Titan (moon) in 2004 (San Diego) and the mid 90’s on technology projects that REQUIRE HUMAN EXPERIMENTING as well. These BLACK BUDGETS are corruption hiding behind SSP.

9. Joseph McMoneagle, eventually revealed as such, but for the purposes of the Army’s psychic intelligence unit, he was simply Remote Viewer No. 1.” In his Memoirs of a Psychic Spy is a look at the most remarkable exploits in a most astonishing career of military service. Remote Viewer 001 in Army’s Stargate Project reports this as still classified. The top secret intelligence gathering initiative launched at height of Cold War- David Morehouse 1998. This project was first used to retrieve intentions in a criminal or terrorist’s mind. (The Lucid View, Investigations in Occultism, 2004 and included in MK ULTRA is Project “VOICE of GOD”) This is used for unexplained phenomenon and to manipulate religion and/or to compel a crime, command or order. It is undeniable that government agencies have tested citizens without permission as The Manchurian Candidates in the United States and the IRS. Cognitive Sciences Laboratories CIA research 24 years ago when Tom Beardon warned about these weapons and activities as serious dangers.

10. The core component of these Programs is Defendants’ nationwide network of sophisticated communications surveillance and spy devices installed overtly. NSA transmissions and NASA Remote Viewing have been in place and are being connected to the key facilities of telecommunications with advanced technologies like that of HAARP stations and Satellites for many years prior and covertly. As Quantum Physics (sound and/or radio WAVES) and subliminal are being used for Spying and breaching contracts with other Countries and Embassies, HAARP is used for Earth and human manipulations. (Jerry Smith, Jim Keith; Politician and Dr. Nick Begich, Alaska; “HAARP; THE ULTIMATE CONSPIRACY” 1998) The “Method of Inducing Mental Emotional and Physical States in Human Beings” was patented for the CIA in Virginia in 1993.

11. These projects of CointelPro, Psyops experiments for drones, and Surveillance/spying have continued covertly to develop weapons that were first patented by Russia and China. Since the 1950’s, first revealed to the public were the Alien UFO Projects, and the subliminal cravings of coca cola, movies and pop corn. Shortly thereafter as technology advanced, mass control continued to this day nefariously against all Americans, called NSA transmissions today. Since 1974 under the Pentagon, DOD funded the ELF radio broadcasting in conjunction with hypnotic control and prior to that Doctors Bill Nelson and Tom Beardon had their own patents at NASA on Medicinal Energy and Biofeedback, already in use in other Countries with the same remote scalar waves and frequencies. (Apollo and Whistleblowers Second craft 11, shadowing Apollo 13 and no witnesses returned after the Shuttle)

12. In early 2008, after 25 years of being an accountant, and raised in the Mediterranean, Plaintiff purchased the Non FDA device from a NASA physicist at $21,000.00 with Scalar waves, (Russian Woodpecker frequencies), and Military Patents. Plaintiff became a certified practitioner to protect herself and attempt to deprogram. Plaintiff was intercepted by this HAARP and NSA’s SIG-INT Satellites, thus became a certified hypnotist trained in NLP (Neuro-Linguistic Programming; CIA taught techniques, (Bandler and Grinder 1976) and (Project Paperclip; Dr. Strughold Space Medicine 1963)

13. In her travels, Plaintiff witnessed these transmissions used in Israel, Australia, England, European Countries, and was further impeded when attempting to whistle blow the nefarious uses and crimes of humanity, to the embassies. Plaintiff will show documents or connections to MAFIOSO, KGB, and AL Qaeda, within the CIA, as with Donald Rumsfeld and his banking ties. World Banks (1910) JP Morgan, Black Budgets, and Nikola Tesla 1940)

14. Some aspects of the Programs of MKULTRA were publicly acknowledged by President Clinton with partial apologies on October 3, 1995 as past tense and not being done currently to down play their uses. The Pentagon has new buzz words SYNTHETIC TELEPATHY-Psychotronics. However, Plaintiff spoke with many other victims today, and the latest FT Hood Mind Control soldier. Psychotronics also has a non-profit organization of former scientists and whistleblowers of same. (Lynn Surgella-Cancer; Central Nervous System diseases and Immune System-FDA drug corruptions) Furthermore, under DOD, Combat Zones That See, or CTS, project of the United States Defense Advanced Research Projects Agency (DARPA-1957) whose goal was to “track everything that moves” in a city by linking up a massive network of surveillance cameras to a centralized computer system. (Russell Tice called Spy Apparatus.) Artificial intelligence software will then identify and track all movement throughout the city. In 1958, immediately after Sputnick, DARPA began to secure our space and airways with these Directed Energy Weapons. (Project AGILE-1966 Pentagon). Plaintiff has knowledge that after this project was field-tested with experiments on Vietnam VETERANS disguised as Agent Orange. Plaintiff spoke with many suffering from ELF induced nervous central system attacks and complain of mind control. One of many victims is suing the Bar due to the VA computer systems uses. In an undisclosed report dated March 9, 2005, 8 more projects with strategic thrusts included Bio-Revolution, DIRECTED ENERGY, and Urban Operation of sensors on the existing Airborne Video Surveillance, all under the Iraq theory, also data mining all information from the Human. CTS is described by DARPA as intended for use in combat zones, to deter enemy attacks on American troops and to identify and track enemy combatants who launch attacks against American soldiers, under Martial Law for a Police State and legalize Fascism.

DARPA’s current Projects, XG, Robotic assured Military communication, CALO; Cognitive Impairment (ADDHD and Optical), and Silent Talk; A planned program attempting to identify EEG patterns for words and transmit these for covert communications. Telepathy were part of the tests the Plaintiff was sent for, including warming her blood without the Doctor’s consent and her eyes physically taken over by an MRI, data mining the Plaintiff’s optic pattern, DNA, and more. This computer-mediated telepathy allows user-to-user communication through analysis of neural signals. The research aims to detect and analyze the word-specific neural signals, using EEG, which occur before speech is vocalized, and to see if the patterns are generalizable. As of 2009 the research is focused on military uses. Plaintiff, an unwitting guinea pig of these programs went for tests, as her hair has not grown since 1996, with induced rapid loss, a skin condition from the blood unknown to the doctors. In addition, since 1962, ARPA initiated the Office of Information Processing Technique and Behavior Sciences for Artificial Intelligence, Command and Control, known today as Behavior Modification or BRAINWASH.

15. Julianne McKinney, 1994 former Military Intelligence Officer and Director of these very PROJECTS is still battling with it today, demanding oversight and cease and desist of Microwave Harassment. (“The Classic Mind Control Operation Revealed” June 2003, surveillance and ‘neurocybernetics’ systems, which DOD refers to as ‘psychotechnologies’. (Former Pentagon Reporter, Sharon Weinberger (misfits scientists, remote viewing; internal emails, 1996)

16. John Herschel Glenn Jr., 1974-1999, former astronaut and U.S. politician who Introduced a Bill and Joint Resolutions (Page S645) Human Research Subject Protection Act, stated “In fact, our own Constitution says, ‘The right of the people to be secure in their persons . . . shall not be violated.’“, and compared it to the Nuremberg Code. His own experience and knowledge of unwitting civilians with Radiation experiments has already been proven that Directed Energy Weapons increased CANCER rates DRAMATICALLY in this COUNTRY thus far. Furthermore, patients have discovered leaving the Country for natural cures worked without further Chemotherapy. During Plaintiff’s brief work at the ACLU, Plaintiff learned that calls were made from patients complaining of being electrocuted while in Hospitals. the reason knowledgeable professionals warn against this Technology in the wrong hands; OUR CIA’s Cointelpro division of Terrorists within, and keeping their enemies close, unfortunately. Plaintiff met with FBI and Congress on two occasions and warned them of her discoveries, and the Gulf’s Red Tide in Florida before the spill as corruptions at the hands of our Shadow Government, and did same with Documentary “Un-Covered” as Marionettes. ELF Waves used in getting a war by Congress not reading full documents to invade Iraq. (Judicial Watch various lawsuits, FBI 2008 spinning their wheels)

17. Plaintiff also has knowledge of the manipulations to the media and miscommunications for the use of quashing, suppressions and propaganda to block exposing the government’s advertising corruptions with misuses in the 21st Century technology. (Operation Mockingbird Media, beginning in the 1950’s). The HAARP and HIPPA stations were set up reaching Woodpecker waves with Russia about the time space activities began 1970 when “Big Brother was watching” today known as “Big Brother gets a Brain”. Whereas Russia was in fact only deployed with these Weapons on the U.S. or on its own people. Paranoid, our Intelligence, DIA launched against its own people in 1983. Astronomical Defense budgets developed as black budgets, and SPYING nefariously went covert from media and public’s knowledge. (Jerry Smith, CARABAS Coherent All Radio Band Sensing, HAARP printed in Canada 1998)

18. Plaintiff and Plaintiff’s family members are ordinary Americans who were initially picked up in the “Big Brother radar” unwittingly in 1971, whereas Plaintiff was informed others who have ties with Military, Minorities, Government employees and buildings, all being picked up in radar with data mining human information for world domination powers. “Dumbed Down and red tape bureaucratic culture induced”

19. Plaintiff was informed that Pilots were mind controlled in advance in the U.S. and San Diego, and that 911 was created to lose our FREEDOMS and the commission investigation was sabotaged. (Naomi Wolf (Yale Journalist)-10 Steps-Freedom to Fascism, 2007- also harassed by and on no fly zone list)

“Death Ray” for planes was Tesla’s invention in 1940 and a $2,000,000,00 device to zap and melt an airplane motor 250 miles away and an Invisible Chinese Wall of defense was built around the Country, no matter how large an attack, (Teleforce, manifests energy and creates rays; zapping beams, the new invisible war). Today, this Wardencliff Tower is in full action in Long Island NY, along with 36 other stations or sites as GWEN, Globally and beam massive volume of Free Energy. (The New York Times, Sunday September 22, 1940-Science and Patents, Education News) One energy zapping causes confusion, mistakes, body temp-freeze, heat, miscommunication, fatigue, radio-sleep (Kucinich), and stalling engines.

On or about January 3, 2009, upon contacting the United Nation’s African Human Rights; provided her information of these weapons in use for mind control overseas and found Alison Des Forges, senior Africa adviser for Human Rights Watch was deceased in the Buffalo NY crash in February 2009. On or about May 2008, the same occurred after contacting Ted Kennedy for assistance and suddenly became unavailable with Cancer. Plaintiff was scheduled to testify in NY senate hearing with the help of Senator Eric Adams which was delayed with a busy nation in transition, until his second home caught fire and the hearing never occurred. Plaintiff had numerous impediments of busy delays from everyone she contacted daily to block her and has more disclosures not included in this complaint.

On or about January 2007, Plaintiff witnessed people and companies pointing the finger at each other, and creating a doubt to sabotaged lives and the LEGAL SYSTEM further. “What the courts should also know.” Today, Society’s Chief complaints are demanding OVERSIGHT and TRANSPANCY. Plaintiff has knowledge that it is the CORRUPTION and the bigger Agenda to change the Constitution, that’s HIDING behind SSP. Furthermore, testimonies made in 1977 to U.S. Courts and Congress by whistleblowers Cathy O’brien and Mark Phillips were blocked for reasons of National Security. This SSP has unwittingly allowed the crimes to continue. Today we are finally seeing the same has continued to bigger Government crimes and corruption with technology and war. Step #9 closer to legalizing Fascism, eyes wide shut: (Access Denied, Trance-formation of America 2003). The Judicial System has not connected the dots yet, on prior crimes from these technology weapons that blighted the Courts 40 years ago to bring us to this point and a corrupted culture. Plaintiff will show that smokescreens are created through propaganda to cover up what is going on in this Country from “We the People”, collectively since “Big Brother Technology” that outsiders already noticed or realize. (See § 34)

20. Plaintiff is also suing Defendants to enjoin their unlawful ABUSES of communications, records, and intrusions. Plaintiff makes demand for the inventory of records since 1971 when Defendant’s family applied to come to America. Plaintiff motions the court to compel the safety of “WE THE PEOPLE” by dismantling these Weapon Stations, and the CIA, which were born with the National Security’s Act in 1947, with criminal and punitive damages.

21. Plaintiff is also suing Defendants for treason, crimes, violations, and threats attempted on her and her family, when disseminating the information and ARTICLE, and reporting it to the Authorities.

22. Plaintiff was pre-empted with these Serious Accusations to whitewash history, brainwash the public, and keep Washington in their bubble, as being too late. (CIA techniques; Jacketing- against each other or one against the other, and changing minds, Past Presidents-Dr. Walter Bowart, False Memory Syndrome Foundation 1992, and Alzheimer’s disease-like memory loss, 1996)

23. These are unconstitutional programs under Cointelpro divisions (Operation Mind Control and DIA Remote Viewing experiments and NSA transmissions) as described to include Monarch-The New Phoenix Program, MKULTRA (Constantine-Virtual Government, CIA Mind Control Operations in America, 1997), Project Philadelphia, Echelon, Clear eyes, Mockingbird media), and Military Pandora’s Box, Voice of GOD, Operation Northwoods (creating wars), Project Stargate and Spacestar, (CIA Psychic Remote Viewing and FBI Virtual Project, 1996 respectively), Project Paperclip (Space Medicine), along with many others), and include corruption crimes of abusive powers.

24. Plaintiff is suffering from the violations of her constitutional rights, and privacy acts, (US code 5 and 18) at the hands of, the direction of or with the knowledge of, the Defendants. Defendants in concert with other Intelligence agencies and/or service providers and means are set forth in paragraphs below).

25. Plaintiff, was comatosed for 72 hours in her home and recruited for experimental remote mind control ESPIONAGE, SEXUAL SLAVERY, AND BEHAVIOR MODIFICATION, (brainwash) The Cult of Intelligence (1974) but censored in the U.S. During her research and travels, Plaintiff made acquaintance with retired government employees and other spies, using remote viewing on their target and countless victims. Plaintiff also interviewed others and found millions of victims complaining of the same tactics and tortures from electricity and Energy. Plaintiff called Lt. Col. Tom Beardon in 2007, and spoke to his wife as he was on a respirator, Kathleen Sullivan (Mind Controlled CIA child whistleblower) who was frantic about nursing her husband with CANCER. Plaintiff has many other murders to report with Automobile accidents, suicide, and offered to testify to Congress. With the use of surveillance technology, spying, and NSA Transmission conducted by top secret, Q clearance, Defendants and DIA, Plaintiff hereby makes these serious accusations against the United States Secret Government for the past 50 years on U.S. Soil.

JURISDICTION AND VENUE

26. This court has subject matter jurisdiction over the federal claims pursuant to 28 U.S.C. § 1331, 18 U.S.C. § 2712, and 5 U.S.C. § 702.

27. Plaintiffs are informed, believe and thereon allege that Defendants have sufficient contacts with this

district generally and, in particular, with the events herein alleged, that Defendants are subject to the exercise

of jurisdiction of this court over the person of such Defendants and that venue is proper in this judicial district pursuant to 28 U.S.C. § 1391.

28. Plaintiff is informed, believe and thereon allege that a substantial part of the events giving rise to the claims herein alleged occurred in this district jurisdiction, and Defendants and/or agents of Defendants may be found in this district, nationally, and internationally.

PARTIES

29. Plaintiff, Mireille Torjman is an intelligent native French speaking refugee from Marrakesh, Morocco. Plaintiff is a divorced woman of 48 years of age and was an accountant for 25 years. Plaintiff comes from a religious background, disciplined and educated, has spent 25 years in the Philadelphia area, currently in South Florida with her Mother.

30. Defendant Federal Bureau of Investigations (FBI) is an agency under the direction and control of the Department of Justice and the Pentagon that investigates and protects the Nation with Programs of CointelPro joined by CIA operating on U.S. Soil.

31. Defendant Central Intelligence Agency (CIA) is an agency that protects the Country in first line of Defense and collects information that reveals the plans, intentions and capabilities of our adversaries and provides the basis for decision and action.

32. Defendant NSA Defendant National Security Agency (NSA) is an agency under the direction and control of the Department of Defense that collects, processes, and disseminates foreign signals intelligence. It is responsible for carrying out the Programs challenged herein.

33. Defendant United States is the United States of America, its departments, agencies, and entities. Including DOJ, and Congresswoman Ginny Browne-Waite as the current Florida Congress Representative of the United States, who Plaintiff attempted to warn on numerous occasions since early 2008 and Senator Bill Nelson, currently on Florida’s Intelligence Committee.

BACKGROUND

34. Counter Intelligence Program was a series of covert, and often illegal, projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at investigating and disrupting dissident political organizations within the United States. The FBI used covert operations from its inception; however formal COINTELPRO operations took place between 1956 and 1971. The FBI’s stated motivation at the time was “protecting national security, preventing violence, and maintaining the existing social and political order.” According to FBI records, 85% of COINTELPRO resources were expended on infiltrating, disrupting, marginalizing, and/or subverting groups suspected of being subversive, such as communist and socialist organizations; the women’s rights movement; militant black nationalist groups, and the non-violent civil rights movement, including individuals such as Martin Luther King, Jr. and others associated with the Southern Christian Leadership Conference, the National Association for the Advancement of Colored People, the Congress of Racial Equality, the American Indian Movement, and other civil rights groups; a broad range of organizations labeled “New Left”, including Students for a Democratic Society, the National Lawyers Guild, the Weathermen, almost all groups protesting the Vietnam War, and even individual student demonstrators with no group affiliation; and nationalist groups such as those “seeking independence for Puerto Rico.” The other 15% of COINTELPRO resources were expended to marginalize and subvert “white hate groups,” including the Ku Klux Klan and National States’ Rights Party. The directives governing COINTELPRO were issued by FBI Director J. Edgar Hoover, who ordered FBI agents to “expose, disrupt, misdirect, discredit, or otherwise neutralize” the activities of these movements and their leaders. Hoover disclosed how horrific these weapons were thus, hard to believe. MKULTRA mind control experiments began at the end of WWII and then became public in the 1970’s, however imperfectly, and went ‘black” again because of Senate hearings, but these experiments have continued to this day. The only reason that MKULTRA was ever brought into the light of day was that a dissident group stole government documents and released them to the press, which initially refused to publish them. The MKULTRA archive was destroyed because of the seriousness of the crimes perpetrated by the intelligence communities. If it became public knowledge that the intelligence agencies had allowed Nazi war criminals to experiment upon American citizens, including children, and then replicated these techniques themselves, the damage to their reputation could never be undone. The only aspects of CIA criminal activity in general, or MKULTRA in particular, that the intelligence community ever admitted to were the ones that were already public, or details that had very little to do with the current capabilities of mind control weapons and techniques. Microwave weapons and remote influence of the Human Central Nervous System are the crown jewels of the intelligence community. The DEFENDER and AGILE Programs formed the foundation of DARPA sensor, surveillance, spying, and directed energy R&D, particularly in the study of radar, infrared sensing, and x-ray/gamma ray detection. During the late 1960s, with the transfer of these mature programs to the Services, ARPA redefined its role and concentrated on a diverse set of relatively small, essentially exploratory research programs. The Agency was renamed the Defense Advanced Research Projects Agency (DARPA) in 1972, and during the early 1970s, it emphasized direct energy programs, information processing, and tactical technologies.

Today we know we have had the Technology as warfare and/or medicine, coupled with the Conspiracy theories of HAARP, (Dr. Hubertus Strughold, space medicine-project paperclip-The Jewish Telegraphic Agency 1995; “Dark Moon; Apollo and Whistleblowers Second craft 11, shadowing Apollo 13” and technical difficulties with no witnesses returned. Issues of Mind Control reported by Dr. Rauni-Leena Luukanen Kilde – Nyhetsspeilet.no with 50 year old technology from our government being disclosed as new, have consistently been deceiving the public, while mapping out a grid across the Country. DUPLICITOUS and INDUCED manipulations of grave mass control escalations have been documented and quashed over the decades. Experiments under MK ULTRA for Behavior Modification also became corrupted for tax gains with massive funding to LEAA Law Enforcements while Crimes were induced in major cities in 1968 by 50% (Newsweek, FBI reports) Unwitting citizens blighted the courts with lawsuits, prisons and Hospitals in this Country with complaints of mind control that the Media refused to cover. This erupted suddenly and massively over one year. Today this continues tenfold and is still uncovered by media. Forty years later the COURTS are now being blighted with cases of privacy rights, War, and Technology combined. Thus we have an agenda of larger government and agencies, created for more tax dollars and controls. CONGRESS spinning their wheels instead of meeting once a year, as intended in the Constitution. A Country is being usurped since the 1910 secret meeting on Jekyll Island and a blank check to create “The Federal Reserve”.

35. Is the NSA Conducting Electronic Warfare On Americans?

Jonas Holmes May 19, 2006 CHRONICLE ARTICLE

Russ Tice, former NSA intelligence officer and current Whistleblower, was to testify before the Senate Armed Services Committee this week. Apparently the testimony, Mr. Tice wanted to give, makes General Hayden’s phone surveillance program look like very small potatoes. Mr. Tice’s testimony is expected to reveal further illegal activity overseen by General Michael Hayden which even loyal and patriotic NSA employees view as unlawful. I think the people I talk to next week are going to be shocked when I tell them what I have to tell them. IT’S PRETTY HARD TO BELIEVE, Tice said. I hope that they’ll clean up the abuses and have some oversight into these programs, which doesn’t exist right now. According to Mr. Tice, what has been disclosed so far is only the tip of the iceberg. What in the world could Russ Tice be talking about! To figure it out let us take a look at Russ Tice’s work at the NSA.

According to the Washington Times and numerous other sources, Mr. Tice worked on special access programs related to electronic intelligence gathering while working for the NSA and DIA, where he took part in space systems communications, non-communications signals, electronic warfare, satellite control, telemetry, sensors, and special capability systems. Special Access Programs or SAPs refer to Black Budgets or Black Operations. Black means that they are covert and hidden from everyone except the participants. Feasibly there would be no arena with a greater potential for abuse and misuse than Special Access Programs. Even now Congress and the Justice Department are being denied the ability to investigate these programs because they don’t have clearance. To put it in CNN’s Jack Cafferty’s words a top secret government agency, the NSA, the largest of its kind in the world, is denying oversight or investigation by the American people because investigators lack clearance. To add a layer of irony to the Black Ops cake this travesty is occurring in America, the supposed bastion of Freedom and Democracy, which we are currently trying to export to Iraq.

It just gets scarier. The Black Ops that Mr. Tice was involved in related to electronic intelligence gathering via space systems communications, non-communications signals, electronic warfare, satellite control, telemetry, sensors, and special capability systems. For greater insight as to the impact of these programs readers should review decades old FOIA authenticated programs such as MKULTRA, BLUEBIRD, COINTELPRO and ARTICHOKE. Radar based Telemetry involves the ability to see through walls without thermal imaging. Electronic Warfare is even scarier if we take a look at the science. NSA Signals Intelligence Use of EMF Brain Stimulation. NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra program of the early 1950’s, which included neurological research into “radiation” (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as “Radiation Intelligence,” defined as “information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation.” Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in the brain continuously. The NSA records and decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In military fighter aircraft, for example.) For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia. Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain-programming purposes. Individual citizens occasionally targeted for surveillance by independently operating NSA personnel

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA’s domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and SABOTAGE OF TENS OF THOUSANDS OF UNWITTING CITIZENS by NSA operatives is likely to happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health. National Security Agency Signals Intelligence Electronic Brain Link Technology NSA SigInt can remotely detect, identify and monitor a person’s bioelectric fields. The NSA’s Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz,.5 milliwatt electro-magnetic emissions from the brain. Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called “evoked potentials.”

Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials.” The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain.

NSA SigInt uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level).

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control. Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain). Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community. RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in that specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band.

An example of EMF Brain Stimulation: Brain Area

Bioelectric Resonance Frequency Information Induced Through Modulation

Motor Control Cortex 10 HZ Motor Impulse Co-ordination

Auditory Cortex 15 HZ Sound which bypasses the ears

Visual Cortex 25 HZ Images in the brain, bypassing the eyes

Somatosensory Cortex 09 HZ Phantom Touch Sense

Thought Center 20 HZ Imposed Subconscious Thoughts

This modulated information can be put into the brain at varying intensities from subliminal to perceptible. Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived. Additionally, A 1994 congressional hearing reported that nearly half a million Americans were subjected to some kind of cold war era tests, often without being informed and without their consent. In addition, experimentation law is well grounded in constitutional and international law. It is an under-reported fact that two major reports on human rights and torture in the U.S. recently listed illegal radiation experiments. Many more facts are documented below. Therefore, human research subject protections should be a high priority and are just as significant as current issues of torture and illegal wiretapping. IT IS TIME FOR AMERICA TO WAKE UP. It is time for America to protect its Whistleblowers who are our last line of defense against dictatorship and despotism. It is time for America to take responsibility for oversight of its tax dollars and elect leaders who will assume such responsibility now. Yes, the war on terrorism is important. It is even more important and fearful if the terrorism is from within and unknowingly funded by hard working American citizens. There is no Special Access Program beyond the oversight of political leaders elected by the people and for the people. If these political leaders jeopardize national security then that shall be handled in a court of law. But to tell America, to tell the American people, to tell the political leaders elected by the American people that America does not deserve to know what happening in the NSA’s dark, black rooms, with billions of dollars, behind closed doors, when we know that privilege has already been abused; that is the true definition of TERRORISM. That is the true definition of Communism and a Police State, no oversight. So fellow Americans, you may hem and haw in the face of truth but know that one day you will realize that your country has been USURPED from the very principles upon which it was founded.

Godspeed, Russ Tice, the Patriots are with you.

Why hasn’t the press–aside from MSNBC–covered Russell Tice’s revelations on the government’s massive spy apparatus that according to Tice illegally survey’s every US citizens’ purchasing records, emails, phone calls, bank transactions, etc. and maintains the information in massive databases for nefarious uses?

In the Interview of January 03, 2006 the following was revealed:

AMY GOODMAN: That was Sibel Edmonds. Russell Tice, you are a member of her group, the National Security Whistleblowers Coalition.

AMY GOODMAN: What do you think of the Justice Department launching an investigation into the leak, who leaked the fact that President Bush was spying on American citizens?

RUSSELL TICE: Well, I think this is an attempt to make sure that no intelligence officer ever considers doing this. What was done to me was basically an attempt to tell other intelligence officers, ‘HEY, IF YOU DO SOMETHING LIKE THIS, IF YOU DO SOMETHING TO TICK US OFF, WE’RE GOING TO TAKE YOUR JOB FROM YOU, WE’RE GONNA DO SOME UNPLEASANT THINGS TO YOU.’

So, right now, the atmosphere at N.S.A. and D.I.A., for that matter, is fear. The security services basically rule over the employees with fear, and people are afraid to come forward. People know if they come forward even in the legal means, like coming to Congress with a concern, your career is over. And that’s just the best scenario. There’s all sorts of other unfortunate things like, perhaps, if someone gets thrown in jail for either a witch-hunt or something trumping up charges or, you know, this guy who is basically reporting a crime.

AMY GOODMAN: Were you ever asked to engage in this?

RUSSELL TICE: No, no, and if I did so, I did so unwittingly, which I have a feeling would be the case for many of the people involved in this. More than likely this was very closely held at the upper echelons at N.S.A., and mainly because these people knew—General Hayden, Bill Black, and probably the new one, Keith Alexander, they all knew this was illegal. So, you know, they kept it from the populace of N.S.A., because every N.S.A. officer certainly knows this is illegal.

AMY GOODMAN: What do you mean if you did so, you did so unwittingly?

RUSSELL TICE: Well, there are certain elements of the aspects of what is done where there are functionaries or technicians or analysts that are given information, and you just process that information. You don’t necessarily know the nitty gritty as to where the information came from or the—it’s called compartmentalization. It’s ironic, but you could be working on programs, and the very person sitting next to you is not cleared for the programs you’re working on, and they’re working on their own programs, and each person knows to keep their nose out of the other person’s business, because everything’s compartmentalized, and you’re only allowed to work on what you have a need to know to work on.

AMY GOODMAN: What about the telecoms, the telecommunications corporations working with the Bush administration to open up a back door to eavesdropping, to wiretapping?

RUSSELL TICE: If that was done and, you know, I USE A BIG “IF” HERE, AND, REMEMBER, I CAN’T TELL YOU WHAT I KNOW of how N.S.A. does its business, but I can use the wiggle words like “if” and scenarios that don’t incorporate specifics, but nonetheless, if U.S. gateways and junction points in the United States were used to siphon off information, I would think that the corporate executives of these companies need to be held accountable, as well, because they would certainly also know that what they’re doing is wrong and illegal. And if they have some sort of court order or some sort of paper or something signed from some government official, Congress needs to look at those papers and look at the bottom line and see whose signature is there. And these corporations know that this is illegal, as well. So everyone needs to be held accountable in this mess.

AMY GOODMAN: When you come on board at these intelligence agencies, as at the National Security Agency, what are you told? I mean, were you aware of the Church hearings in the 1970s that went into the illegal spying on monitoring, of surveilling, of wiretapping of American citizens?

RUSSELL TICE: Well, that’s something that’s really not drummed in your head. That’s more of a history lesson, I think. And the reasoning, ultimately, for the FISA laws and for what’s called USSID 18, which is sort of the SIGINTer’s bible of how they conduct their business, but the law itself is drilled into your head, as well as the tenets of USSID 18, of which the number one commandment is ‘Thou shalt not spy on Americans.’

But ultimately, when we’re using that on—if we’re using that with U.S. databases, then ultimately, once again, the American people are—their civil rights are being violated.

AMY GOODMAN: Do you expect you are being monitored, surveilled, wiretapped right now?

RUSSELL TICE: Yes, I do. As a matter of fact,

AMY GOODMAN: You’re saying in the leadership of your own agency, the National Security Agency?

RUSSELL TICE: That’s correct, yeah, because certainly General Alexander and General Hayden and Bill Black knew that this was illegal.

AMY GOODMAN: But they clearly had to have authorization from above, and Bush is not contending that he did not know.

RUSSELL TICE: Well, that’s true. But the question has to be asked: What did the President know? What was the President told about this? It’s just—there’s just too many variables out there that we don’t know yet. And, ultimately, I think Congress needs to find out those answers. If the President was fed a bill of goods in this matter, then that’s something that has to be addressed. Or if the President himself knew every aspect of what’s going on, if this was some sort of vacuum cleaner deal, then it is ultimately, I would think, the President himself that needs to be held responsible for what’s going on here.

AMY GOODMAN: This investigation that the Justice Department has launched—it’s interesting that Alberto Gonzales is now Attorney General of the United States—the latest story of The New York Times: Gonzales, when he was White House Counsel, when Andrew Card, chief of staff, went to Ashcroft at his hospital bedside to get authorization for this. Can he be a disinterested party in investigating this now, as Attorney General himself?

RUSSELL TICE: Yeah, I think that for anyone to say that the Attorney General is going to be totally unbiased about something like this, I think that’s silly. Of course, the answer is “No.” He can’t be unbiased in this. I think that a special prosecutor or something like that may have to be involved in something like this, otherwise we’re just liable to have a whitewash.

AMY GOODMAN: What do you think of the term “police state”?

RUSSELL TICE: Well, anytime where you have a situation where U.S. citizens are being arrested and thrown in jail with the key being thrown away, you know, potentially being sent overseas to be tortured, U.S. citizens being spied on, you know, and it doesn’t even go to the court that deals with these secret things, you know, I mean, think about it, you could have potentially somebody getting the wrong phone call from a terrorist and having him spirited away to some back-alley country to get the rubber hose treatment and who knows what else. I think that would kind of qualify as a police state, in my judgment. I certainly hope that Congress or somebody sort of does something about this, because, you know, for Americans just to say, ‘Oh, well, we have to do this because, you know, because of terrorism,’ you know, it’s the same argument that we used with communism years ago: take away your civil liberties, but use some threat that’s, you know, been out there for a long time.

Terrorism has been there for—certainly before 9/11 we had terrorism problems, and I have a feeling it’s going to be around for quite some time after whatever we deem is a victory in what we’re doing now in the Middle East. But, you know, it’s just something that has to be addressed. We just can’t continue to see our civil liberties degraded. Ultimately, as Ben Franklin, I think, had said, you know, those who would give up their essential liberties for a little freedom deserve neither liberty or freedom, and I tend to agree with Ben Franklin.

AMY GOODMAN: And your colleagues at the N.S.A. right now, their feelings, the National Security Agency?

RUSSELL TICE: Boy, I think most folks at N.S.A. right now are just running scared. They have the security office hanging over their head, which has always been a bunch of vicious folks, and now they’ve got, you know, this potential witch hunt going on with the Attorney General. People in the intelligence community are afraid. They know that you can’t come forward. You have no protections as a whistleblower. These things need to be addressed.

AMY GOODMAN: What do you mean you have no protection?

RUSSELL TICE: No. No, I do not. As far as—of course, I’m not witting of anyone that was told they will spy on an American. So, ultimately, when this was going on, I have a feeling it was closely held at some of the upper echelon levels. And you’ve got to understand, I was a worker bee. I was a guy that wrote the reports and did the analysis work and—you know, the detail guy. At some point, your reports have to get sent up up the line and then, you know, the management takes action at some point or another, but at my level, no, I was not involved in this.

RUSSELL TICE: I sent it to the chairs of the Senate Intelligence Committee and the House Intelligence Committee, the SSCI and the HPSCI.

The CIA and the cult of intelligence (1974) Reviewed by JamesRMacLean on 2007-04-09. Incompetence leads to Monstrosity Marchetti’s expose of the CIA was published on the eve of the Church Commission, at a moment when domestic outrage at the culture of duplicity and domestic interference had reached its peak. Since that time, successful public relations have greatly enhanced the image of intelligence services. Marchetti’s thesis is that, contrary to widespread public belief, the USA was not locked in an existential struggle with Soviet or Chinese subversion, and never really was. Soviet intelligence utterly surpassed the CIA in effectiveness, initiative, and recruitment of allied agents abroad. In fact, the CIA was effective only against 3rd world intelligence organizations, and there, spectacularly so. This extreme Soviet edge in espionage was more than offset by the superior resources of the conventional Western militaries and the impossibility of waging a direct confrontation owing to the nuclear stalemate. Worse, this advantage was not seriously mitigated by the abundance of high-tech gadgets, such as satellites; such tools merely facilitated the collection of large amounts of raw data, with virtually no practical usefulness.

Far from rendering the US intelligence community harmless, however, it made the agency focus on a campaign against 3rd world allies, and ultimately, against the US population. The CIA tried its hand at waging secret wars in Latin America, Southeast Asia, and Africa; it developed a vast group of businesses to serve as cover for illicit shipping and arms supplies; and it became utterly habituated to corrupting legislators in the Free World. The CIA became an eager tool for an unaccountable executive branch, provided that the executive had a flair for covert action; and it tended to create an echo chamber of self-deception that threatened the entire national security establishment. At the very top of its list of priorities was the urgent need to defend its mission publicly, and validate its immense budget. Marchetti spends a modest amount of time discussing the inability of the CIA to confront the Soviet KGB. When he mentions it, he avers the KGB and its allied bureaux are indeed odious, but also defensive–by necessity. He dwells in somewhat greater detail on the CIA’s structure and specialized fields of performance. He includes a broad-brush description of the overall US intelligence community, before turning to an analysis of the separate divisions and their respective behavior. This included covert operations (such as the Bay of Pigs invasion), proprietaries (such as Interarmco and Air America), propaganda and disinformation, and espionage/counterespionage. In all of these enterprises, the same motivation prevails: the CIA seeks self-perpetuation and influence WITHIN the Western world, but lacks will or ability to seriously combat the Soviets. Towards the end, he discusses the increasing tendency of the CIA to interfere in regular US politics, chiefly to ingratiate itself with the president.

Marchetti’s criticisms of the intelligence community were surprisingly mild. I should mention in passing that his book had about 170 or so passages deleted by court order; the CIA had earlier demanded well in excess of 300, and the court awarded it half of what it demanded. Some of the deletions are downright silly (as where it refers to a base in [DELETED] granted by Haile Selassie!), and elsewhere I was amused to observe the most numerous deletions in the part dealing with funding appropriations. The extreme secrecy of the intelligence community with respect to funding has greatly intensified since this book was published, and usually the motivation is quite obviously to conceal how much money these agencies actually waste. However, Marchetti concludes that the CIA is essentially past reform, useless, and so incompetent at its mission as to have become narrowly focused on extorting billions from the nation.

PSYCHOTRONIC WEAPONS

Former United States Government Physicist! 1981-Lt Col. US Army Retired, Pentagon analyst

(McRae, Ronald, Mind Wars, St. Martin’s Press, 1984, p 127)

In a slide Bearden illustrates how a Scalar War would involve a psychoenergetics attack on the operators of the enemy scalar installation, entraining their minds into hypnogogic trance and getting them to shut down their systems. And ultimately psychoenergetic warfare goes to the very heart of human identity itself. For if my thoughts might no longer be “mine,” then who and what am I? Can my very sense of being “me” be hijacked by some nefarious psychoenergetic scheme? One paper to begin with is “Mind Control and EM Wave Polarization Transductions” This is such serious stuff that Bearden includes a strong warning about misuse of this knowledge. Psychoenergetics weapons can MENTALLY MAIM AND PHYSICALLY KILL. “UNAWARE FORCED SPEECH by- passing memory, Channelled DREAMS, Split personalities etc.

SPACE PRESERVATION ACT-House Resolution (bill 2977)

Brain manipulation from a distance-2001-2002

Last year, in October, the Congressman Dennis J. Kucinich introduced in the American Congress a bill, obliging the American president to get engaged in the negotiations aimed at the ban of space based weapons. In this bill the definition of a weapon system includes: any other unacknowledged or as yet undeveloped means inflicting death or injury on, or damaging or destroying, a person (or the biological life, bodily health, mental health, or physical and economic well-being of a person) through the use of land-based, sea-based, or space-based systems using radiation, electromagnetic, psychotronic, sonic, laser, or other energies directed at individual persons or targeted populations or the purpose of information war, mood management, or mind control of such persons or populations” (12). As in all legislative acts quoted in this article the bill counts with sound, light or electromagnetic stimulation of human brain. Psychotronic weapons remain, at least for a layman uninformed of secret military research, in the sphere of science fiction, since so far none of the published scientific experiments was presented in the way which would allow for its replication. That it is feasible to manipulate human behavior with the use of subliminal, either sound or visual, messages is now generally known. This is why in most of the countries the use of such technologies, without consent of the user, is banned. Devices using light for the stimulation of the brain show another way how the light flashing in certain frequencies could be used for the manipulation of human psychic life. As for the sound, a report on the device transmitting a beam of sound waves, which can hear only persons at whom the beam of sound waves is targeted, appeared last year in the world newspapers. The beam is formed by a combination of sound and ultrasound waves which causes that a person targeted by this beam hears the sound inside of his head. Such a perception could easily convince the human being that it is mentally ill. The acts presented in this article suggest that with the development of technology and knowledge of the functioning of human brain new ways of manipulation of human mind keep emerging. One of them seems to be the electromagnetic energy.

Though in the open scientific literature only some 30 experiments were published, supporting this assumption (1),(2), already in 1974, in the USSR, after successful testing with military unit in Novosibirsk, the installation Radioson (Radiosleep) was registered with the Government Committee on the Matters of Inventions and Discoveries of the USSR, described as a method of induction of sleep by means of radio waves (3), (4), (5)…

Dear Senator-Attorney Letter included:

We seek your office’s assistance in initiating hearings and a fact-finding congressional inquiry into the government agencies and/or private companies that are targeting citizens. Many citizens are desperate to be freed from the disturbing, intrusive and oppressive targeting.

Evidence supports the conclusion that weapons exist that could be used against individuals, based on U.S. Patent and Trademark Office filings, public releases by agencies, and other technologies that indicate the level of technological sophistication. The weapons are believed to be based on electromagnetism, microwaves, sonic waves, lasers and other types of directed energy, and were characterized as “psychotronic” in Rep. Dennis Kucinich’s draft of House Resolution 2977, the Space Preservation Act of 2001. Furthermore, it is undeniable that government agencies have tested citizens without permission in the past; for example, the CIA’s human experimentation discussed in Orlikow v. U.S., 682 F.Supp. 77 (D.D.C. 1988), secretly administered lysergic acid diethylamide discussed in United States v. Stanley, 483 U.S. 669 (1987), and military chemical experimentation as discussed in Congressional Committee Report 103-97, 103d Congress, 2d Session, S. Prt. 103-97 (Dec. 8, 1994). Lastly, the sheer numbers of people complaining of being targeted, including people with post-graduate degrees and a lifetime of achievements, and the similarities in symptoms tend to outweigh a dismissive response based on charges of anecdotal evidence or group paranoia.

there is a certain risk of sounding too conspiratorial, however, common denominators such as physical symptoms and medical reports, surveillance scenarios, harassment techniques, and more can be readily established.

Very truly yours,

36. Around January 2003, the NSA designed and implemented a program “THE DRAGNET” in collaboration with AT&T to build a surveillance operation at AT&T’s Folsom Street Facility, inside a secret room known as the “SG3 Secure Room”. In February 2003, the “Splitter Cabinet” split diverting to and from Qwest, XO, PAIX, Allegiance, and many more Service Providers at the SG3 Location.

37. As some “X or zero” files kept covertly in Silicon Valley and NSA and “Data Mining” with SIG-INT Satellites used as the scapegoat of illegal covert spying of 50 years. Plaintiff received communication through Qwest and T-Mobile, and many other carriers that were tampered with, Plaintiff found her computer files wiped out for over one year (2007-2008 of all her Government research and email communications to the public, since she began attempts for help, and notified Qwest of the activities behind the scenes as they had found them undetectable. Plaintiff’s communications verbally and electronically, including facsimiles, muting one party in conversation to sabotage meaning, emails were intercepted and manipulated, as destroyed documents, videos, and photographs, preventing the reporting her story and the torture and abuse to non-conspiring authorities and individuals.

38. Defendant’s daily tortures are being done without judicial, statutory, or other lawful authorization, in violation of statutory and constitutional limitations, and in excess of statutory and constitutional authority.

39. Defendants’ daily tortures are being done without probable cause or reasonable suspicion to believe that Plaintiff has committed or are about to commit any crime or engage in any terrorist activity.

40. Defendants’ daily tortures are being done without probable cause or reasonable suspicion to believe that Plaintiff is of foreign powers or agents thereof and these activities are crimes of humanity.

41. Defendants’ daily tortures are being done without any reason to believe that the information is relevant to an authorized criminal investigation or to an authorized investigation to protect against international terrorism or clandestine intelligence activities.

42. Plaintiff was targeted in 1996 for 5 years of her life, unwittingly after calling the FBI from her work place and was told “They were already on it”. On another experiment for war allies, Plaintiff, UNREALIZED, was told she was free and arrived in San Diego 5 days later on 9/11/01. Plaintiff flew to Atlanta wondering why she was invited to sit in a co-pilot’s chair on the runway, while waiting to take off from snow on the ground, in the height of the new steel door installation climate and high security. This information was sent to the U.N. BEFORE the Buffalo crash. In her Florida home, early 2007, naive and without knowledge of corruptions, wars, or weapons, Plaintiff was comatosed for 72 hours and her memory began to be wiped out each night and corrupted with transmissions in each day. Plaintiff ran away TERRORIZED after being transmitted to start “THE PROCESS”, which today she knows was to brainwash her into the cult of intelligence and experiments. Plaintiff left her home terrorized and traveled around the world programmed to keep copious notes. Plaintiff was attacked for no reason on the streets, by UNREALIZED doctors, by kids, dogs, on planes (International Airways), and was held hostage in a food establishment in Nice when on her way to whistle blow the information to other embassies. Plaintiff had her house contents hijacked from AZ, leaving her homeless numerous times to sabotage her life and work and was falsely detained upon each attempt to whistle blow. Plaintiff was transmitted to send a letter to FBI Director Mueller, demanding to cease and invert her family, when she returned from AZ in February of 2008. Plaintiff was informed that it was too late as they had already “gotten to him” and she would never be believed. Not until one year later in February 2009, someone sent Plaintiff an email of the Russell Tice article and Plaintiff IMMEDIATELY came to DC in April 2009 to talk with DOJ Officials and their Attorneys. Plaintiff’s many computers and car batteries, etc were zapped the same day again while en route. Plaintiff’s communication chaos with NSA transmissions sabotaged her life, and others with unwitting false memories. In January 2010 Plaintiff was told her surveillance/spying recordings could be sold overseas and that the FBI had joined forces with the Shadow Government to suppress her further from whistle blowing. Plaintiff’s behavior was modified and resembled what she found on u-tube in the 911 brainwashing process to the public for Weapons of Mass Destruction (the opposite of most news reports). Plaintiff was jacketed (against each other) and isolated during the 4 years Defendants’ daily tortures against her will and religion is directly performed, and/or aided, abetted, counseled, commanded, induced or procured, by Defendants. On information and belief, Defendants will continue to directly target the Plaintiff and the Public and /or will continue to aid, abet, counsel, command, induce or procure that conduct. (Mind Control and the American Government; “Prevailing Winds” 1994) On information and belief, since Tesla’s Directed Energy Weapons were invented and launched or picked up by DOD covert ops, The United States unlike the rest of the Globe, rapidly began down a culture of Cancer, corruptions, crimes (another experiment in 1968 on crimes in major cities hidden behind LSD like aliens) paranoia, immoral behaviors, AIDS, ANTHRAX, obesity, division, Trash TV, paranormal phenomenon, and a greater necessity of guinea pigs for TECHNOLOGY experimentation and corruptions.

“When even one American -who has done nothing wrong- is forced by fear to shut his mind and close his mouth, then all Americans are in peril.” Harry S. Truman

43. Plaintiff seeks costs, legal fees, and damages applicable by law with protective measures for all COUNTS. Plaintiff was represented under a class suit, before transmissions sabotaged the attorney and his contact information has been disconnected and tampered with. On information and belief, the former attorney may have had brain surgery from Migraines while preparing the Complaint funded by and San Francisco University, after my visit with him to Denver and may be overseas at this time.

ALLEGATIONS also included in Plaintiff’s NSA and/or Electronic Communications

44. Pursuant to Federal Rules of Civil Procedure, Title 5, 22, 42, 142, 18, 18a, and 50, Plaintiff Mireille Torjman brings this action on behalf of herself, and to attest to her family and the public’s victimization, unwittingly and/or unrealized:

(a) TITLE 18 PART I CHAPTER 37 § 793. Gathering, transmitting or losing defense information,

(b) 18 U.S.C. § 241. Conspiracy against rights,

(c) 18 U.S.C. § 373. Solicitation to commit a crime of violence,

(d) 18 U.S.C. § 1091. Genocide,

(e) 18 U.S.C. § 1341. Mail fraud,

(f) 18 U.S.C. § 1512. Tampering with a witness, victim, or an informant,

(g) 18 U.S.C. § 1513. Retaliating against a witness, victim, or an informant,

(h) 18 U.S.C. § 1583 (2). Enticement into slavery,

(i) 18 U.S.C. § 1692. Foreign mail as United States mail,

(j) 18 U.S.C. § 1801. Video voyeurism,

(k) 18 U.S.C. § 1812. Statement of exclusive means by which electronic surveillance and interception of certain communications may be conducted,

(l) 18 U.S.C. § 2242. Sexual abuse,

(m) 18 U.S.C. § 2332 (a) Terrorism, and (h). Use of weapons of mass destruction,

(n) 18 U.S.C. § 2339. Harboring or concealing terrorists,

(o) 18 U.S.C. § 2422. Coercion and enticement, or are currently doing so;

(p) Defendants have subjected the public to electronic surveillance, in violation of 50 U.S.C. § 1809 and 1810, or are currently doing so;

(q) Defendants are intercepting communications in violation of 18 U.S.C. § 2510 and 18 U.S.C. § 2511;

(r) Defendants have transmitted Plaintiff and the public in violation of 18 U.S.C. § 2703, Required Disclosure of communications records, or are currently doing so;

(s) Defendants have transmitted civilians, and non civilians, in violation of 18 U.S.C. § 2381. Treason, or are currently doing so;

(t) Defendants have harassed and transmitted the public to stalk and harass the Plaintiff inclusive of electronically and tangibly, in violation of 18 U.S.C. § 2261: US Code – 2261A: Stalking

(u) Plaintiff was falsely detained and sabotaged with the use of mind control transmissions violating 18a U.S.C. Rule 41. Search and Seizure

(v) Defendants have violated the Administrative Procedures Act, 5 U.S.C. §§ 701 et seq., or are currently doing so;

(w) Defendants have violated the constitutional principle of separation of powers, or are currently doing so;

(x) Defendants have Tortured Plaintiff, her family, and the public electronically in violation of 18 U.S.C. § 2340A, or currently doing so:

(y) Plaintiff is entitled to injunctive, declaratory, and other equitable relief against defendants and freedom from further threats, family, accidents, psychological and physical harm, illnesses, sabotage, bribes, and blackmail;

(z) Defendants have Tortured Plaintiff, her family and the public electronically in violation of 18 U.S.C. § 2422, or currently doing so:

(aa) Plaintiff is entitled to Civil Damages 18 U.S.C. § Rule 2520 in violations of her First, Third, Fifth, and Thirteenth Amendments; 18 U.S.C. § 2510, 18 U.S.C. § 2511, and 18 U.S.C. § 2512.

(ab) Plaintiff is entitled to Grants and Health Care Assistance as a victim in accordance to 22 U.S.C. § 2152: US Code – Section 2152: Assistance for victims of torture.

(ac) United Nations Convention Against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment, G.A. res. 39/46, annex, 39 U.N. GAOR Supp. (No. 51) at 197, U.N. Doc. A/39/51 (1984), entered into force June 26, 1987; Universal Declaration of Human Rights, G.A. res. 217A (III), U.N. Doc. A/810 at 71 (1948); International Convention on Civil and Political Rights, G.A. res. 2200A (XXI), 21 U.N. GAOR Supp. (No. 16) at 52, U.N. Doc. A/6316 (1966), 9.99 U.N.T.S. 171, entered into force Mar. 23, 1976.

(ad) Defendants have Tortured Plaintiff, her family and the public and the prohibitions against torture and other cruel, inhuman, or degrading treatment and the conspiracy to oppress, torture, rape, suppress, is a violation under 142 U.S.C.§ 1985. Conspiracy to interfere with United States Civil Rights.

(ae) Defendants have Tortured Plaintiff, her family and the public and the prohibitions against malicious intent to torture, rape privacy rights, brainwash, and enslave with severe psychological in-humane damages to one’s spirit, and libel is actionable under Tort Claims of damages found under civil and criminal trials.

(af) Plaintiff has made at least 2 requests to the FOIA and both dossiers were denied under the violation of 5 U.S.C. § 552; claims under and 18 U.S.C. § 2707 and 5 U.S.C. § 702

42. Adequacy: Plaintiff and family members are suffering great harm arising from Defendants’ violations of law, as alleged herein. Plaintiff intends to prosecute this action vigorously. Plaintiff hereby demands injunctive relief and damages.

COUNT I

Violation of 18 U.S.C. and 50 U.S.C. Crimes and Criminal Procedures AND War and National Defense Including Titles 5, 22, 42, 142, 18, 18a, and 50 U.S.C. and International Conventional

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

43. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

44. Plaintiff is seeking protection for her and for all family members under the law TITLE 18 U.S.C. § 3521. Witness relocation and protection.

COUNT II

Violation of First and Fourth Amendments, 42 U.S.C and 18 U.S.C. and 50 U.S.C. Crimes and Criminal Procedures AND War and National Defense Including Titles 22, 42, 142, 18, 18a, and 50 U.S.C. and International Conventional

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

45. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

46. Plaintiff motions the COURTS and Defendants to cease and desist and/or injunction for relief, immediately from grave dangerous damaging electronic harassments and that of a religious and personal nature, all other allegations of surveillance, spying, manipulations, torture, censorships, daily sabotage, and blocks electronically and otherwise, retaliations, death threats, thereby violating the constitution and privacy acts, (US code 22, 42, 142, 18, 18a, and 50) at the hands of, the direction of, or with the knowledge of, any and all government and affiliations. Plaintiff seeks declaratory relief against all allegations and all counts. Defendant’s actions described herein violated Plaintiff’s rights under the Free Exercise and Free Speech Clauses of the United States Constitution, the Religious Freedom Restoration Act of 1993, 42 U.S.C. § 2000bb et seq., the Privacy Act, 5 U.S.C. § 552a, and Air Force Instruction 37-132; and all other freedoms and rights under the Law.

COUNT III

Violation of 18 U.S.C. and 50 U.S.C. Crimes and Criminal Procedures AND War and National Defense Including Titles 5, 22, 42, 142, 18, 18a, and 50 U.S.C. and International Conventional

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

47. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

48. Plaintiff numerous attempts sabotaged, hereby requests to compel the court for Defendants to conduct proper and thorough investigations (not failing to include fundamental steps of interviews and psyops techniques on U.S. Soil) even when seemingly undetectable and/or prior to 2008, with all accusations and agencies with full cooperation, including Sports, Cloning, ENGINEERED Poverty-Bankruptcies with individuals with Cancer, also to sabotage economies, under the Law.

COUNT IV

Violation of First Amendment—Declaratory, Injunctive, and Other Equitable Relief

Violation of 18 U.S.C. and 50 U.S.C. Crimes and Criminal Procedures AND War and National Defense Including Titles 22, 42, 142, 18, 18a, and 50 U.S.C. and International Conventional

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

49. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

50. Plaintiff has been sabotaged with proper coverage to expose and warn the public. Plaintiff requests to compel the court for Defendants to provide the Constituents “WE THE PEOPLE” with un-tampered accurate news, APPROPRIATE WARNINGS with Main Stream Media: to heed caution, and be AWARE with knowledge, and choice of action or recourse, under the law of Constituents rights and United States Constitution.

COUNT V

Violation of Fourth Amendment—Declaratory, Injunctive, and Equitable Relief 108.

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

51. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law and aforementioned Amendments of the Constitution, as stated above.

52. Plaintiff is seeking protection for her and for all family members under the law.

53. Plaintiff and have a reasonable expectation of privacy in their communications and/or records, mail communications, as forementioned above, DNA, brain waves, brain activities, brain manipulations, brain recordings, data mining, collected, and/or stored by these activities.

54. Plaintiff have expectations of complete privacy to the intrusions of their minds and bodies, threats and fears, blackmail and choice, thus freedom of thought, emotion, will, and destiny.

55. Defendants have directly performed, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, facilitated, directed, controlled, assisted in, or conspired in the commission of the above-described acts of spying, torture, interception, and/or use of Plaintiff and her activities, by Intelligence, covertly without judicial or other lawful authorization, probable cause, and/or individualized suspicion, in violation of statutory and constitutional limitations, and in excess of statutory and constitutional authority.

56. At all relevant times, Defendants committed, knew of and/or acquiesced in all of the above-described acts, and failed to respect the Constitutional rights of the Plaintiff by obtaining judicial or other lawful authorization and by conforming their conduct to the requirements of the respective Amendments, under the Law of the United States Constitution.

57. By the acts alleged herein, Defendants have violated Plaintiffs’ reasonable expectations of privacy and denied Plaintiff her right to be free from unreasonable searches and seizures as guaranteed by the Fourth Amendment to the Constitution of the United States. By the acts alleged herein, as a victim of the Programs, Defendants violated Plaintiff’s rights of the Fourth Amendment to be free from unreasonable searches and seizures, as guaranteed by the Fourth Amendment of the United States Constitution.

58. By the acts alleged herein, Defendants’ conduct has caused harm to Plaintiff and her family.

59. Defendants’ conduct was done intentionally, with malice and deliberate indifference, against her will and religion, and/or with reckless disregard of, negligent, forceful, trickery, pleasure, premediated conspiracy, in gross violations of Plaintiff constitutional rights.

60. On information and belief, the Count V and all other pertaining Counts Defendants are now engaging in and will continue to engage in the above-described violations of Plaintiffs’ constitutional rights, and are thereby irreparably harming Plaintiff. Plaintiff have no adequate remedy at law for the Count V and all other pertaining Counts to Defendants’ continuing unlawful conduct, and the Count V and all other pertaining Counts Defendants will continue to violate Plaintiffs’ legal rights unless enjoined and restrained by this Court.

61. Plaintiff seeks that this Court declare that Defendants have violated their rights and the rights of the public; enjoin the Count V Defendants, their agents, successors, and assigns, and all those in active concert and participation with them from violating the Plaintiffs’ rights under the Fourth Amendment and respective Amendments, to the United States Constitution; and award such other and further equitable relief as is proper.

COUNT VI

Violation of Fourth Amendment—Damages

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

62. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

63. Plaintiff have a reasonable expectation of privacy in their communications and/or records, mail, communications, Transmissions, intrusions, spying, by all means including electronics and waves as forementioned by Defendants.

64. Plaintiff have expectations of privacy to the atrocious intrusions and gross negligence.

65. Defendants have directly performed, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, facilitated, directed, controlled, assisted in, or conspired in the commission of the above-described acts of acquisition, interception, disclosure, divulgence and/or use of communications, contents of communications, and records pertaining to their communications transmitted, collected, DNA and brain waves from Data Mining and remote transmissions, and/or stored, spying, torture, by Defendants without judicial or other lawful judicial or other lawful authorization, probable cause, and/or individualized suspicion, in violation of statutory and constitutional limitations, and in excess of statutory and constitutional authority.

66. Defendants, and/or the use of electronic communication services acted as the agent in performing, participating in, enabling, contributing to, negligently contributing to, facilitating, at the hands of, direction of, or knowledge of, or assisting in the commission of the above-described acts of interceptions, disclosure and/or use of Plaintiff mind and body, DNA and brain waves from Data Mining and remote transmissions, communications, contents of communications, and records pertaining to their transmissions, collected, and/or stored without judicial or other lawful authorization, probable cause, and/or individualized suspicion of Plaintiff’s records or other information.

67. At all relevant times, Defendants committed, knew of and/or acquiesced, enjoyed all of the above-described acts, and failed to respect the Fourth Amendment rights of Plaintiffs by obtaining judicial or other lawful authorization, and by conforming their conduct to the requirements of the requirements of the respective Amendments.

68. By the acts alleged herein, Defendants have violated Plaintiffs’ reasonable expectations of privacy and denied Plaintiffs their right to be free from unreasonable searches and seizures as guaranteed by the Fourth Amendment to the Constitution of the United States.

69. By the acts alleged herein, Defendants’ conduct has caused harm to Plaintiff.

70. Defendants’ conduct is being done intentionally and with malice, with deliberate indifference, or with reckless disregard of, Plaintiffs’ constitutional rights.

71. Plaintiff seeks an award of her actual damages and punitive damages against the Counts III and V Defendants, and such other or further relief as is proper.

COUNT VII

Violation of First Amendment—Declaratory, Injunctive, and Other Equitable Relief

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

72. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

73. Plaintiff use of communications anonymously and to associate privately and securely with freedoms as their Constitution Rights.

74. Defendants have directly performed, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to negligently contributed to, facilitated, directed, controlled, assisted in, or conspired in the commission of the above-described acts of acquisition, interception, disclosure, divulgence and/or use of Plaintiff and Plaintiff’s communications, contents of communications, and records pertaining to their communications transmitted, collected, DNA and brain waves from any Data Mining and remote transmissions, and/or stored, spying, torture, by Defendants without judicial or other lawful judicial or other lawful authorization, probable cause, and/or individualized suspicion, in violation of statutory and constitutional limitations, and in excess of statutory and constitutional authority.

75. Defendants, and/or the use of electronic communication services acted as the agent in performing, participating in, enabling, contributing to, negligently contributing to, facilitating, at the hands of, direction of, or knowledge of, or assisting in the commission of the above-described acts of acquisition interception, disclosure, divulgence, and/or use of Plaintiff and communications, mind and body, DNA and brain waves, Data Mining and remote transmissions, contents of communications, and records pertaining to their communications transmissions, collected, and/or stored without judicial or other lawful authorization, probable cause, and/or individualized suspicion of Plaintiff’s records or other information without judicial or other lawful authorization, probable cause, and/or individualized suspicion.

76. By the acts alleged herein, Defendants’ violated Plaintiff’s rights to speak and receive speech anonymously and associate privately under the First Amendment.

77. By the acts alleged herein, Defendants’ conduct proximately caused harm to Plaintiff.

78. Defendants’ conduct was done intentionally, with malice and intent, with deliberate indifference, with reckless disregard, and negligence, Plaintiff constitutional rights were grossly violated.

79. On information and belief, the Count VII Defendants are now engaging in and will continue to engage in the above-described violations of Plaintiff’s constitutional rights, and are thereby irreparably harming Plaintiff. Plaintiff has no adequate remedy at law for the Count VII Defendants’ continuing unlawful conduct, and the Count VII Defendants will continue to violate Plaintiff legal rights unless enjoined and restrained by this Court.

80. Plaintiffs seek that this Court declare that Defendants have violated their rights; enjoin the Count VII Defendants, their agents, successors, and assigns, and all those in active concert and participation with them from violating the Plaintiff rights under the First Amendment to the United States Constitution; and award such other and further equitable relief as is proper.

COUNT VIII

Violation of First Amendment—Damages

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

81. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

82. Plaintiff use of communication with privacy to speak or receive speech anonymously and to associate privately.

83. Defendants have directly performed, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to negligently contributed to, facilitated, directed, controlled, assisted in, or conspired in the commission of the above-described acts of acquisition, interception, spying, disclosure, divulgence and/or use of Plaintiff and Plaintiff’s communications, contents of communications, and records pertaining to their communications transmitted, collected, DNA and brain waves from any Data Mining and remote transmissions, and/or stored, spying, torture, by Defendants without judicial or other lawful judicial or other lawful authorization, probable cause, and/or individualized suspicion, in violation of statutory and constitutional limitations, and in excess of statutory and constitutional authority.

84. By the acts alleged herein, Defendants violated Plaintiffs’ rights to speak and receive speech anonymously and associate privately under the First Amendment.

85. By the acts alleged herein, Defendants’ conduct proximately caused harm to Plaintiff.

86. Defendants’ conduct was done intentionally, with malice and sadistic pleasure, with deliberate indifference, or with reckless disregard of, Plaintiff constitutional rights.

87. Plaintiff seeks an award of her actual damages and punitive damages against the Counts IV and VIII Defendants, and for such other or further relief as is proper.

COUNT IX

Violation of Foreign Intelligence Surveillance Act—Declaratory, Injunctive and Other Equitable Relief

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

88. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

89. In relevant part, 50 U.S.C. § 1809 provides that:

(a) Prohibited activities—A person is guilty of an offense if he intentionally—(1) engages in electronic surveillance under color of law except as authorized by this chapter, chapter 119, 121, or 206 of Title 18 or any express statutory authorization that is an additional exclusive means for conducting electronic surveillance under section 1812 of this title; or (2) discloses or uses information obtained under color of law by electronic surveillance, knowing or having reason to know that the information was obtained through electronic surveillance not authorized by this chapter, chapter 119, 121, or 206 of Title 18 or any express statutory authorization that is an additional exclusive means for conducting electronic surveillance under section 1812 of this title.

90. In relevant part 50 U.S.C. § 1801 provides that:

(f) “Electronic surveillance” means – (1) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire or radio communication sent by or intended to be received by a particular, known United States person who is in the United States, if the contents are acquired by intentionally targeting that United States person, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes; (2) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire communication to or from a person in the United States, without the consent of any party thereto, if such acquisition occurs in the United States, but does not include the acquisition of those communications of computer trespassers that would be permissible under section 2511(2)(i) of Title 18; (3) the intentional acquisition by an electronic, mechanical, or other surveillance device of the contents of any radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, and if both the sender and all intended recipients are located within the United States; or (4) the installation or use of an electronic, mechanical, or other surveillance device in the United States for monitoring to acquire information, other than from a wire or radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes.

91. 18 U.S.C. § 2511(2)(f) further provides in relevant part that “procedures in this chapter or chapter 121 and the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in section 101 [50 U.S.C. § 1801] of such Act, and the interception of domestic wire, oral, and electronic communications may be conducted.” (Emphasis added.)

92. 50 U.S.C. § 1812 further provides in relevant part that:

(a) Except as provided in subsection (b), the procedures of chapters 119, 121, and 206 of Title 18 and this chapter shall be the exclusive means by which electronic surveillance and the interception of domestic wire, oral, or electronic communications may be conducted.

(b) Only an express statutory authorization for electronic surveillance or the interception of domestic wire, oral, or electronic communications, other than as an amendment to this chapter or chapters 119, 121, or 206 of Title 18 shall constitute an additional exclusive means for the purpose of subsection (a).

(Emphasis added.)

93. Defendants intentionally acquired, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, negligently contributed to, facilitated, directed, controlled, assisted in, or conspired in the commission of such acquisition, by means of a surveillance and spying devices, the contents of one or more wire and wireless communications to or from Plaintiff or other information in which Plaintiff has a reasonable expectation of privacy, without the consent of any party thereto, and such acquisition occurred in the United States and overseas.

94. Defendants, and/or other electronic communication services acted as the agent in performing, participating in, enabling, contributing to, negligently contributing to, facilitating, at the hands of, direction of, or knowledge of, or assisting in the commission of the above-described acts of acquisition of Plaintiffs’ communications, interceptions, disclosure and/or use of Plaintiff mind and body, DNA and brain waves from Data Mining, remote transmissions, communications records, and contents of communications, pertaining to their transmissions, collected, and/or stored without judicial or other lawful authorization, probable cause, and individualized suspicion of Plaintiff’s records and information.

95. By the acts alleged herein, Defendants acting in excess of their statutory authority and in violation of statutory limitations have intentionally engaged in, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, negligently contributed to, facilitated, directed, controlled, assisted in, or conspired in the commission of, electronic surveillance (as defined by 50 U.S.C. § 1801(f)) under color of law, not authorized by any statute, to which Plaintiff were subjected in violation of 50 U.S.C. § 1809.

96. Additionally or in the alternative, by the acts alleged herein, Defendants acting in excess of their statutory authority and in violation of statutory limitations have intentionally disclosed or used information obtained under color of law by electronic surveillance, knowing or having reason to know that the information was obtained through electronic surveillance and spying not authorized by statute, including information pertaining to Plaintiff, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, facilitated, directed, controlled, assisted in, or conspired in the commission of such acts.

97. Defendants did not notify Plaintiff of the above-described electronic surveillance, disclosure, and/or use, nor did Plaintiffs or class members consent to such.

98. Plaintiff have been and are aggrieved by Defendants’ electronic surveillance, and spying , disclosure, and/or use of their wire communications.

99. On information and belief, the Count IX Defendants are now engaging in and will continue to engage in the above-described acts resulting in the electronic surveillance, spying, disclosure, and/or use of Plaintiff wire communications, acting in excess of the Count IX Defendants’ statutory authority and in violation of statutory limitations, including 50 U.S.C. § 1809 and 18 U.S.C. § 2511(2)(f), and are thereby irreparably harming Plaintiff and Plaintiff’s family. Plaintiffs has no adequate remedy at law for the Count IX Defendants’ continuing unlawful conduct, and the Count IX Defendants will continue to violate Plaintiff legal rights unless enjoined and restrained by this Court.

100. Pursuant to Larson v. United States, 337 U.S. 682 (1949) and to 5 U.S.C. § 702,

Plaintiff seeks that this Court declare that Defendants have violated their rights and the rights of the class; enjoin the Count IX Defendants, their agents, successors, and assigns, and all those in active concert and participation with them from violating the Plaintiff’s statutory rights, including their rights under 50 U.S.C. §§ 1801 et seq.; and award such other and further equitable relief as is proper.

COUNT X

Violation of 50 U.S.C. § 1809, actionable under 50 U.S.C. § 1810—Damages

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

101. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

102. In relevant part, 50 U.S.C. § 1809 provides that:

(a) Prohibited activities—A person is guilty of an offense if he intentionally—(1) engages in electronic surveillance under color of law except as authorized by this chapter, chapter 119, 121, or 206 of Title 18 or any express statutory authorization that is an additional exclusive means for conducting electronic surveillance under section 1812 of this title; or (2) discloses or uses information obtained under color of law by electronic surveillance, knowing or having reason to know that the information was obtained through electronic surveillance not authorized by this chapter, chapter 119, 121, or 206 of Title 18 or any express statutory authorization that is an additional exclusive means for conducting electronic surveillance under section 1812 of this title.

103. In relevant part 50 U.S.C. § 1801 provides that:

(f) “Electronic surveillance” means – (1) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire or radio communication sent by or intended to be received by a particular, known United States person who is in the United States, if the contents are acquired by intentionally targeting that United States person, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes; (2) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire communication to or from a person in the United States, without the consent of any party thereto, if such acquisition occurs in the United States, but does not include the acquisition of those communications of computer trespassers that would be permissible under section 2511(2)(i) of Title 18; (3) the intentional acquisition by an electronic, mechanical, or other surveillance device of the contents of any radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, and if both the sender and all intended recipients are located within the United States; or (4) the installation or use of an electronic, mechanical, or other surveillance device in the United States for monitoring to acquire information, other than from a wire or radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes.

104. 18 U.S.C. § 2511(2)(f) further provides in relevant part that “procedures in this chapter or chapter 121 and the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in section 101 [50 U.S.C. § 1801] of such Act, and the interception of domestic wire, oral, and electronic communications may be conducted.” (Emphasis added.)

105. 50 U.S.C. § 1812 further provides in relevant part that:

(a) Except as provided in subsection (b), the procedures of chapters 119, 121, and 206 of Title 18 and this chapter shall be the exclusive means by which electronic surveillance and the interception of domestic wire, oral, or electronic communications may be conducted.

(b) Only an express statutory authorization for electronic surveillance or the interception of domestic wire, oral, or electronic communications, other than as an amendment to this chapter or chapters 119, 121, or 206 of Title 18 shall constitute an additional exclusive means for the purpose of subsection (a). (Emphasis added.)

106. Defendants intentionally acquired, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, (negligent), facilitated, directed, controlled, assisted in, or conspired in the commission of such acquisition, by means of a surveillance and spying devices, the contents of one or more wire and wireless communications to or from Plaintiff or other information in which Plaintiff has a reasonable expectation of privacy, without the consent of any party thereto, and such acquisition occurred in the United States.

107. Defendants, and/or other electronic communication services acted as the agent in performing, participating in, enabling, contributing to, negligently contributing to, facilitating, at the hands of, direction of, or knowledge of, or assisting in the commission of the above-described acts of acquisition of Plaintiffs’ communications, interceptions, disclosure and/or use of Plaintiff mind and body, DNA and brain waves from Data Mining and remote transmissions, communications, contents, and records pertaining to their transmissions, collected, and/or stored without judicial or other lawful authorization, probable cause, and/or individualized suspicion of Plaintiff’s records or other information.

108. By the acts alleged herein, Defendants have intentionally engaged in, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, (negligent), facilitated, directed, controlled, assisted in, or conspired in the commission of, electronic surveillance (as defined by 50 U.S.C. § 1801(f)) under color of law, not authorized by any statute, to which Plaintiffs were subjected in violation of 50 U.S.C. § 1809.

109. Additionally or in the alternative, by the acts alleged herein, Defendants have intentionally disclosed

or used information obtained under color of law by electronic surveillance, knowing or having reason to know that the information was obtained through electronic surveillance and spying not authorized by statute, including information pertaining to Plaintiffs, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, facilitated, directed, controlled, assisted in, or conspired in the commission of such acts.

110. Defendants did not notify Plaintiff of the above-described electronic surveillance, spying, disclosure, and/or use, nor did Plaintiffs consent to such.

111. Plaintiffs have been and are aggrieved by Defendants’ electronic surveillance, spying, disclosure, and/or use of their wire communications.

112. Pursuant to 50 U.S.C. § 1810, which provides a civil action for any person who has been subjected to an electronic surveillance and spying or about whom information obtained by electronic surveillance of such person has been disclosed or used in violation of 50 U.S.C. § 1809, Plaintiff seeks from the Count X Defendants for each Plaintiff their statutory damages or actual damages; punitive damages as appropriate; and such other and further relief as is proper.

COUNT XI

Violation of 18 U.S.C. § 2510, 18 U.S.C. § 2511, and 18 U.S.C. § 2512—Declaratory, Injunctive, and Other Equitable Relief

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

113. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

114. In relevant part, 18 U.S.C. § 2510, 18 U.S.C. § 2511, and 18 U.S.C. § 2510 provides that:

(1) Except as otherwise specifically provided in this chapter any person who – (a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication . . . (c) intentionally discloses, or endeavors to disclose, to any other person the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection . . . [or](d) intentionally uses, or endeavors to use, the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection . . . shall be punished as provided in subsection (4) or shall be subject to suit as provided in subsection (5).

115. 18 U.S.C. § 2511 further provides that:

(3)(a) Except as provided in paragraph (b) of this subsection, a person or entity providing an electronic communication service to the public shall not intentionally divulge the contents of any communication (other than one to such person or entity, or an agent thereof) while in transmission on that service to any person or entity other than an addressee or intended recipient of such communication or an agent of such addressee or intended recipient.

116. 18 U.S.C. § 2511(2)(f) further provides in relevant part that “procedures in this chapter or chapter 121 and the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in section 101 [50 U.S.C. § 1801] of such Act, and the interception of domestic wire, oral, and electronic communications may be conducted.” (Emphasis added.)

117. 50 U.S.C. § 1812 further provides in relevant part that:

(a) Except as provided in subsection (b), the procedures of chapters 119, 121, and 206 of Title 18 and this chapter shall be the exclusive means by which electronic surveillance and the interception of domestic wire, oral, or electronic communications may be conducted.

(b) Only an express statutory authorization for electronic surveillance or the interception of domestic wire, oral, or electronic communications, other than as an amendment to this chapter or chapters 119, 121, or 206 of Title 18 shall constitute an additional exclusive means for the purpose of subsection (a). (Emphasis added.)

118. By the acts alleged herein, Defendants have intentionally and willfully intercepted, endeavored to intercept, or procured another person to intercept or endeavor to intercept, Plaintiff’s wire or electronic communications in violation of 18 U.S.C. § 2511(1)(a); and/or

119. By the acts alleged herein, Defendants have intentionally and willfully disclosed, or endeavored to disclose, to another person the contents of Plaintiff wire or electronic communications, knowing or having reason to know that the information was obtained through the interception of wire or electronic communications in violation of 18 U.S.C. § 2511(1)(c); and/or

120. By the acts alleged herein, Defendants have intentionally and willfully used, or endeavored to use, the contents of Plaintiff wire or electronic communications, while knowing or having reason to know that the information was obtained through the interception of wire or electronic communications and spying in violation of 18 U.S.C. § 2511(1)(d).

121. By the acts alleged herein, Defendants have intentionally and willfully caused, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, participated in, contributed to, negligently contributed to, facilitated, directed, controlled, assisted in, or conspired to cause unwitting subjects, Plaintiff, and the public, divulgence of Plaintiff wire or electronic communications to Defendants while in transmission by various service providers, and there of tampering with, in violation of 18 U.S.C. § 2511(2)(3)(4)(5).

122. Defendants have committed these acts of interception, disclosure, divulgence and/or use of Plaintiff communications directly or by aiding, abetting, counseling, commanding, inducing, procuring, encouraging, promoting, instigating, advising, willfully causing, participating in, enabling, contributing to, facilitating, directing, controlling, assisting in, or conspiring in their commission. In doing so, Defendants have acted in excess of their statutory authority and in violation of statutory limitations.

123. Defendants, and/or other electronic communication services acted as the agent in performing, participating in, enabling, contributing to, negligently contributing to, facilitating, at the hands of, direction of, or knowledge of, or assisting in the commission of the above-described acts of interceptions, disclosure and/or use of Plaintiff’s mind and body, DNA and brain waves from Data Mining and remote transmissions, communications, contents of communications, and records pertaining to their transmissions, collected, and/or stored without judicial or other lawful authorization, probable cause, and/or individualized suspicion of Plaintiff’s records or other information.

124. Defendants did not notify Plaintiff of the above-described intentional interception, disclosure, divulgence and/or use of their wire or electronic communications, nor did Plaintiff consent to such.

125. Plaintiff have been and are aggrieved by Defendants’ intentional and willful interception, disclosure, divulgence and/or use of their wire or electronic communications.

126. On information and belief, the Count XI Defendants are now engaging in and will continue to engage in the above-described acts resulting in the intentional and willful interception, disclosure, divulgence and/or use of Plaintiff’s wire or electronic communications, acting in excess of the Count XI Defendants’ statutory authority and in violation of statutory limitations, including 18 U.S.C. § 2511, and are thereby irreparably harming Plaintiff. Plaintiffs have no adequate remedy at law for the Count XI Defendants’ continuing unlawful conduct, and the Count XI Defendants will continue to violate Plaintiff’s legal rights unless enjoined and restrained by this Court.

127. Pursuant to 18 U.S.C. § 2520, which provides a civil action for any person whose wire or electronic communications have been intercepted, disclosed, divulged or intentionally used in violation of 18 U.S.C. § 2511, to Larson v. United States, 337 U.S. 682 (1949), and to 5 U.S.C. § 702, Plaintiff seek equitable and declaratory relief against the Count XI Defendants.

128. Plaintiffs seek that this Court declare that Defendants have violated their rights and the rights of the class; enjoin the Count XI Defendants, their agents, successors, and assigns, and all those in active concert and participation with them from violating the Plaintiff statutory rights, including their rights under 18 U.S.C. § 2511; and award such other and further equitable relief as is proper.

COUNT XII

Violation of 18 U.S.C. § 2510, 18 U.S.C. § 2511, and 18 U.S.C. § 2512 actionable under 18 U.S.C. § 2520—Damages

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

129. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

130. In relevant part, 18 U.S.C. § 2510, 18 U.S.C. § 2511, and 18 U.S.C. § 2510 provides that:

(1) Except as otherwise specifically provided in this chapter any person who – (a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication . . . (c) intentionally discloses, or endeavors to disclose, to

any other person the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection . . . [or](d) intentionally uses, or endeavors to use, the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection . . . shall be punished as provided in subsection (4) or shall be subject to suit as provided in subsection (5).

131. 18 U.S.C. § 2511 further provides that:

(3)(a) Except as provided in paragraph (b) of this subsection, a person or entity providing an electronic communication service to the public shall not intentionally divulge the contents of any communication (other than one to such person or entity, or an agent thereof) while in transmission on that service to any person or entity other than an addressee or intended recipient of such communication or an agent of such addressee or intended recipient.

132. 18 U.S.C. § 2511(2)(f) further provides in relevant part that “procedures in this chapter or chapter 121 and the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in section 101 [50 U.S.C. § 1801] of such Act, and the interception of domestic wire, oral, and electronic communications may be conducted.” (Emphasis added.)

133. 50 U.S.C. § 1812 further provides in relevant part that:

(a) Except as provided in subsection (b), the procedures of chapters 119, 121, and 206 of Title 18 and this chapter shall be the exclusive means by which electronic surveillance and the interception of domestic wire, oral, or electronic communications may be conducted.

(b) Only an express statutory authorization for electronic surveillance or the interception of domestic wire, oral, or electronic communications, other than as an amendment to this chapter or chapters 119, 121, or 206 of Title 18 shall constitute an additional exclusive means for the purpose of subsection (a). (Emphasis added.)

134. By the acts alleged herein, Defendants have intentionally and willfully intercepted, endeavored to intercept, or procured another person to intercept or endeavor to intercept, Plaintiff’s and Plaintiff’s family members’ wire or electronic communications in violation of 18 U.S.C. § 2511(1)(a); and/or

135. By the acts alleged herein, Defendants have intentionally and willfully disclosed, or endeavored to disclose, to another person the contents of Plaintiff’s wire or electronic communications, knowing or having reason to know that the information was obtained through the interception of wire or electronic communications in violation of 18 U.S.C. § 2511(1)(c); and/or

136. By the acts alleged herein, Defendants have intentionally and willfully used, or endeavored to use, the contents of Plaintiff’s wire or electronic communications, while knowing or having reason to know that the information was obtained through the interception of wire or electronic communications in violation of 18 U.S.C. § 2511(1)(d).

137. By the acts alleged herein, Defendants have intentionally and willfully caused, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, participated in, contributed to, facilitated, directed, controlled, assisted in, or conspired to cause divulgence of Plaintiff’s and Plaintiff’s family members wire or electronic communications to Defendants while in transmission by various service providers, and there of tampering with, in violation of 18 U.S.C. § 2511(2)(3)(4)(5).

138. Defendants have committed these acts of interception, disclosure, divulgence and/or use of Plaintiff’s communications directly or by aiding, abetting, counseling, commanding, inducing, procuring, encouraging, promoting, instigating, advising, willfully causing, participating in, enabling, contributing to, facilitating, directing, controlling, assisting in, or conspiring in their commission.

139. Defendants, and/or other electronic communication services acted as the agent in performing, participating in, enabling, contributing to, negligently contributing to, facilitating, at the hands of, direction of, or knowledge of, or assisting in the commission of the above-described acts of interceptions, disclosure and/or use of Plaintiff mind and body, DNA and brain waves from Data Mining and remote transmissions, communications, contents of communications, and records pertaining to their transmissions, collected, and/or stored without judicial or other lawful authorization, probable cause, and/or individualized suspicion of Plaintiff’s records or other information.

140. Defendants did not notify Plaintiff of the above-described intentional interception, disclosure, divulgence and/or use of their wire or electronic communications, nor did Plaintiff consent to such.

141. Plaintiff have been and are aggrieved by Defendants’ intentional and willful interception, disclosure, divulgence and/or use of their wire or electronic communications.

142. Pursuant to 18 U.S.C. § 2520, which provides a civil action for any person whose wire or electronic communications have been intercepted, disclosed, divulged or intentionally used in violation of 18 U.S.C. § 2511, Plaintiff seeks from the Count XII Defendants for Plaintiff’s statutory damages or actual damages; punitive damages as appropriate; and such other and further relief as is proper.

COUNT XIII

Violation of 18 U.S.C. § 2511, actionable under 18 U.S.C. § 2712—Damages

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

143. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

144. In relevant part, 18 U.S.C. § 2511 provides that:

(1) Except as otherwise specifically provided in this chapter any person who – (a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication . . . (c) intentionally discloses, or endeavors to disclose, to any other person the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection . . . [or](d) intentionally uses, or endeavors to use, the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection . . . shall be punished as provided in subsection (4) or shall be subject to suit as provided in subsection (5).

145. 18 U.S.C. § 2511 further provides that:

(3)(a) Except as provided in paragraph (b) of this subsection, a person or entity providing an electronic communication service to the public shall not intentionally divulge the contents of any communication (other than one to such person or entity, or an agent thereof) while in transmission on that service to any person or entity other than an addressee or intended recipient of such communication or an agent of such addressee or intended recipient.

146. 18 U.S.C. § 2511(2)(f) further provides in relevant part that “procedures in this chapter or chapter 121 and the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in section 101 [50 U.S.C. § 1801] of such Act, and the interception of domestic wire, oral, and electronic communications may be conducted.”(Emphasis added.)

147. 50 U.S.C. § 1812 further provides in relevant part that:

(a) Except as provided in subsection (b), the procedures of chapters 119, 121, and 206 of Title 18 and this chapter shall be the exclusive means by which electronic surveillance and the interception of domestic wire, oral, or electronic communications may be conducted.

(b) Only an express statutory authorization for electronic surveillance or the interception of domestic wire, oral, or electronic communications, other than as an amendment to this chapter or chapters 119, 121, or 206 of Title 18 shall constitute an additional exclusive means for the purpose of subsection (a).

(Emphasis added.)

148. By the acts alleged herein, Defendants have intentionally and willfully intercepted, endeavored to intercept, or procured another person to intercept or endeavor to intercept, spy, Plaintiff wire or electronic communications in violation of 18 U.S.C. § 2511(1)(a); and/or

149. By the acts alleged herein, Defendants have intentionally and willfully disclosed, or endeavored to disclose, to another person the contents of Plaintiff wire or electronic communications, knowing or having reason to know that the information was obtained through the interception of wire or electronic communications in violation of 18 U.S.C. § 2511(1)(c); and/or

150. By the acts alleged herein, Defendants have intentionally and willfully used, or endeavored to use, the contents of Plaintiff wire or electronic communications, while knowing or having reason to know that the information was obtained through the interception of wire or electronic communications in violation of 18 U.S.C. § 2511(1)(d).

151. By the acts alleged herein, Defendants have intentionally and willfully caused, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, participated in, contributed to, facilitated, spied, directed, controlled, assisted in, or conspired to, negligently conspired to, cause unwitting subjects, Plaintiff, and the public, divulgence of Plaintiff’s wire or electronic communications to Defendants while in transmission by various service providers, and there of tampering with, in violation of 18 U.S.C. § 2511(2)(3)(4)(5).

152. Defendants have committed these acts of interception, disclosure, divulgence and/or use of Plaintiff’s communications directly or by aiding, abetting, counseling, commanding, inducing, procuring, encouraging, promoting, instigating, advising, willfully causing, participating in, enabling, contributing to, facilitating, directing, controlling, assisting in, or conspiring in their commission.

153. Defendants, and/or other electronic communication services acted as the agent in performing, participating in, enabling, contributing to, negligently contributing to, facilitating, at the hands of, direction of, or knowledge of, or assisting in the commission of the above-described acts of interceptions, disclosure and/or use of Plaintiff mind and body, DNA and brain waves from Data Mining and remote transmissions, communications, contents of communications, and records pertaining to their transmissions, collected, and/or stored without judicial or other lawful authorization, probable cause, and/or individualized suspicion of Plaintiff’s records or other information.

154. Defendants did not notify Plaintiffs of the above-described intentional interception, disclosure, divulgence and/or use of their wire or electronic communications, nor did Plaintiff consent to such.

155. Plaintiff have been and are aggrieved by Defendants’ intentional and willful interception, disclosure, divulgence and/or use of their wire or electronic communications.

156. Title 18 U.S.C. § 2712 provides a civil action against the United States and its agencies and departments for any person whose wire or electronic communications have been intercepted, disclosed, divulged or intentionally used in willful violation of 18 U.S.C. § 2511. Plaintiff has complied fully with the claim presentment procedure of 18 U.S.C. § 2712. Pursuant to 18 U.S.C. § 2712, Plaintiff seeks from the Count XIII Defendants for Plaintiff’s statutory damages or actual damages, and such other and further relief as is proper.

COUNT XIV

Violation of 18 U.S.C. § 2703(a) & (b)—Declaratory, Injunctive, and Other Equitable Relief

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

157. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

158. In relevant part, 18 U.S.C. § 2703 provides that:

(a) Contents of Wire or Electronic Communications in Electronic Storage.— A governmental entity may require the disclosure by a provider of electronic communication service of the contents of a wire or electronic communication, that is in electronic storage in an electronic communications system for one hundred and eighty days or less, only pursuant to a warrant issued using the procedures described in the Federal Rules of Criminal Procedure by a court with jurisdiction over the offense under investigation or equivalent State warrant. A governmental entity may require the disclosure by a provider of electronic communications services of the contents of a wire or electronic communication that has been in electronic storage in an electronic communications system for more than one hundred and eighty days by the means available under subsection (b) of this section.

(b) Contents of Wire or Electronic Communications in a Remote Computing Service.—

(1) A governmental entity may require a provider of remote computing service to disclose the contents of any wire or electronic communication to which this paragraph is made applicable by paragraph (2) of this subsection—

more:

Related Images:

DHS wants to read your brain

The US DHS wants to know what's on your insides.

The US DHS wants to know what’s on your insides.

They know where you live and know where you work. Now the government is considering a plan to monitor Americans’ speech rhythms, blinking rate and breathing patterns. This, they say, could help identify and eliminate threats to the nation

.

The CIA doesn’t necessarily want to put a microchip in your brain but what they are trying out isn’t all that far off. Under a project put together by the Department of Homeland Security, the government has been trying out space-age (and pretty damn creepy) techniques to get into the minds of Americans in hopes of figuring out who will cause concern for the country before they can even get out of bed.

It’s called the FAST project and it stands for the Future Attribute Screening Technology Mobile Module. If this technology is implemented quickly on the public, however, it could be an invasion of privacy made for the silver screen.

The website CNET has uncovered evidence of the FAST project through Freedom of Information Act requests sent out by the Electronic Privacy Information Center (EPIC) and has now revealed to the public that they could eventually be in danger of a massive initiative that has already been tested in America.

DHS employees have already served as test subjects in FAST trial runs in which sensors collected “video images, audio recordings and psychophysiological measurements,” among other unidentified evaluations, in order to get into the minds of potential terrorists.

To CNET, DHS Deputy Press Secretary Peter Boogaard says FAST is designed to track and monitor body movements, voice pitch changes, fluctuations in rhythm and intonation, eye movement, body heat changes and breathing patterns in order to gather research that could help pin-point the inner workings of wrong-doers. Boogard says that preliminary research has already been conducted and that the DHS has used technological sensors and observational techniques to signal out signs of stress “associated with intent to do harm.”

The DHS says that they do not intend on deploying FAST program on the public anytime soon, but should they chose to, that means that your every move — inside and out — could be recorded to keep America safe . . . one blink at a time.

Among the materials collected in the FOIA request sent out by EPIC is one document that accounts for every cent of the “ore-crime” system that was contracted out to a Cambridge, Massachusetts laboratory. Amounts, however, were redacted in the documents. EPIC writes that they are pursuing an administrative appeal to challenge those blackened out portions of the files.

Though research has apparently only been conducted on DHS volunteer so far, the documents suggest that a trial will be carried out soon on volunteering public at a large invent where body actions will be used to help researcher’s pin-point “the bad guy.” Should this technology make it outside of the DHS’ trial testing, it wouldn’t be that big surprise if it becomes implemented alongside the already invasive scanners that the DHS has at their many airports across America.

Upon CNET’s initial report on the FAST program, the DHS was quick to fire back that the program really isn’t as invasive as some might think — even if, yes, they have been collecting data on breathing patterns to learn how to kick crime to the curb. They add that data is not kept on participants, which is collected anonymously, after the process is complete.

Related Images: