Neural Dust

A tiny implant the size of a grain of sand has been created that can connect computers to the human body without the need for wires or batteries, opening up a host of futuristic possibilities.
 
The devices, dubbed “neural dust”, could be used to continually monitor organs like the heart in real time and, if they can be made even smaller, implanted into the brain to control robotic devices like prosthetic arms or legs.
 
It is believed they could help treat conditions like epilepsy by stimulating nerves and muscles, help people with incontinence control their bladder and even suppress appetite. They could also potentially either be used to prompt the immune system into action or reduce inflammation.
 
One of the inventors, Professor Michel Maharbiz, of University of California, Berkeley, said: “I think the long-term prospects for neural dust are not only within nerves and the brain, but much broader.
 
Dissolvable brain implant the size of a grain of rice invented by scientists
PayPal wants to replace passwords with brain implants and computers you swallow
 
“Having access to in-body telemetry has never been possible because there has been no way to put something super-tiny super-deep [in the body].
 
“But now I can take a speck of nothing and park it next to a nerve or organ, your [gastro-intestinal] tract or a muscle, and read out the data.”
 
(This explains the concentration of stomach attacks when I digest these Neural Dust, which is placed in the food and liquids).
 
Ultrasound vibrations, which can penetrate almost every part of the body, are used to power the sensors, which are about a millimetre across.
 
(This explains the directed energy used to manipulate the Neural Dust, which I often refer to as Smart Dust or Nano Technology)
 
They contain a special crystal that converts ultrasound into electricity to power a tiny transistor.
 
(This explains the crystal sensations that I taste in my mouth after or while consuming the food).
 
If there is a voltage spike in a nerve or muscle fibre this alters the vibration of the crystal, changing the way the sound echoes back to an ultrasound receiver.
So far, experiments have been carried out on muscles and the peripheral nervous system of rats, but the researchers believe the dust could also work in the central nervous system and brain to control prosthetics.
 
(This explains from time-to-time the crystal forming in my mouth many hours after consuming the food or drink).
 
This can already be done using brain implants, but these require wires that go through a hole in the skull, potentially allowing in infection or movement of the sensor within the brain. They must also be replaced after about one to two years.
The researchers are currently building neural dust that could last in the body for more than 10 years. And because they are wireless there is no need for holes to remain in the skull.
 
Professor Jose Carmena, a neuroscientist at Berkeley, said: “The technology is not really there yet to get to the 50-micron target size which we would need for the brain and central nervous system.
 
(This technology is very much here TODAY and have been around since the 10 years of my Targeting).
 
“Once it’s clinically proven, however, neural dust will just replace wire electrodes. This time, once you close up the brain, you’re done.”
 
However he added: “The beauty is that now, the sensors are small enough to have a good application in the peripheral nervous system, for bladder control or appetite suppression, for example.”
Share

One thought on “Neural Dust

  1. Share

    This entry was posted in Washington DC by Qolspony. Bookmark the permalink.

    One thought on “For Targeted Individuals in the DC area”

    david claywell on 07/22/2017 at 10:24 AM said:
    Your comment is awaiting moderation.

    DEFENSIVE ORGANIZED GANG STALKING TACTCIS THAT WORKS, https://www.facebook.com/david.claywell.90 … stop this horrible crime learn here, win here

    REVERSE GANG STALKING TACTICS THAT WORKS…

    okay, point A, is your phone, your text message is sent, intercepted and broadcasted to others under the tactic direct connection of organized gangstalking also happens to your emails.

    This is done illegally and is very horrible, over the years got tired of law enforcement doing nothing so started to research this topic and found out only the recipient of the email or text message can complain.

    So knowing you have this illegal intercept nobody wants to help you stop then use that to your advantage, send an email or text message to yourself. You can send this to your own account or another free yahoo or google email account or another phone. Now you control the information and nobody will complain about what you say in the message because you are not going to tell on yourself.
    Now you own point A and point B controlling what is being said.

    WHY, do this ? Because there is NO THIRD PARTY LIABILITY FOR ILLEGAL INTERCEPTS OF YOUR MESSAGES.
    You have a blank check to say anything about anyone and it gets broadcasted to ALL those in this illegal direct connection circle. Use that to your advantage include perps picture in the text message, say nasty text about them, and it is broadcasted to everyone.
    Use the sound file, SAY THERE NAME other nasty things about them. Then this is not a silent text message. Anyone standing around the open text message with a sound file you recorded will here what you said. REVERSE GANGSTALK THEM.
    Can do this both on the internet with emails and with text messages using attachments on your smartphone.
    Use your smartphone cameria get a picture of them to use, if you know there full name check out facebook and search for picture to use of them. Also do not forget to check MUGSHOT.COM nothing like using there mugshot picture, usually your worst picture.
    Of course advertise there criminal record sure to have one if involved in organized gangstalking being a PERP OR PERV OR PSYCHO.

    Excellent way to REVERSE THE STALKING, they hate to be EXPOSED. DO IT !!!
    Next TACTIC is my FAVORITE called SPAM OUT THE SCUM

    Knowing I control point A and point B nobody can complain of what I do legally, and point C is illegally intercepted so they can not complain then the stage is set for the ATTACK ON THE SMART PHONE.
    Forget any fancy backdoor tricks, to access the smart phone we have knowledge of this illegal intercept, position, and using there technology to our advantage.

    We are going to create a text message on our smart phone as large as we can use up all the characters with a space bar, include picture, sound file. My file I created maximum was 348 kilo bytes.
    No we are going to use the group send function on our smart phone, we can type in 20 phone numbers and send any message to this selective group. WE ARE GOING TO BE ALL TWENTY GROUP MEMBERS, so we are going to type in our phone number 20 times. When you select new message and type in the phone number other slots should appear where you can type in more phone numbers, this is where you type in your phone number into all the slots. When you finished and select OK, will say “ group message “.

    So, one push of the SEND KEY, we will multiply ourselves and send 20 large files. In my case I sent 20 times 348 kb. Sent this to an old flip phone with a refill card as my point B. My point A is my smart phone with the virus on it. The flip phone or any other smart phone is just your receiving phone. Started out sending message
    To my own phone which prevented me from using the phone, sending and receiving so many messages but also, stop the others from using there phone at point C. Once I used a receiving phone was faster at sending more messages and was able to totally lock down the receiving phone from being used.
    Changed the port speed to max on point A and point B, and all text message are sent with HIGH PRIORITY.
    What is happening at point B, is also happening at point C – THE GROUP OF SCUM, PERPS.
    Now, just going to push the group send button once every two minutes for an hour.
    Any smart phone while receiving the downloadable files is unable to be used, can only receive a text message or a call. Other function are on hold until the download is completed. So keep pusing the send button never let all the files complete downloading.

    Just have to wait for the files to get downloaded but you are unaware at point C, the traffic coming from point A which can be about 200-800 messages all requiring time to download .

    You can see at point B, this phone is totally SPAMMED OUT, TOTALLY USELESS and point C is broadcasting the same.

    You decide after three hours to stop, and that SCUM and PERPS at point C will block your intercept to avoid being SPAMMED OUT AGAIN !

    VICTORY, EXACTLY WHAT YOU WANT TO HAPPEN. GET THE PERPS, PERVS, AND PSYCHOS TO DISCONNECT FROM YOUR BUSINESS.

    LET US ALL GET TOGETHER AND DO THIS NATIONWIDE, SPAM OUT THE SCUM, this can cause so much economic personal chaos and get the attention we need for this cause.
    CALL ME HELP ME GET SOMEONE FROM EVERYSTATE
    DAVID
    423-208-5599

    ADVANCE TACTICS >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

    Get a small team together for a 3 day holiday weekend and just spam out the scum without any prior knowledge 24/7, the perps are totally steamed rolled and have nobody to call on a HOLIDAY WEEKEND. And if you spam enough can never get control of there smartphones to block this SPAM !!!

    Fill the text characters with this IOS information, https://www.techspot.com/news/67835-sending-string-emojis-message-can-crash-iphone-or.html

    This also can effect PROXY SERVERS, which are used to hide IP addresses.

    Should arrange this nationwide, and STAND UNITED

Leave a Reply

Your email address will not be published. Required fields are marked *