Edmund Igberaese TI had been ARRESTED!

I was just informed by a GSS forum contributor that a well known Targeted Individual, Edmund Igberaese had been arrested. This explains his long disappearance.
 
Attention TI in the State of Colorado, please contact the Adams County Sheriff Office. We want them to know that Edmund has someone watching over him.
 
He is credit with very thorough research journals explaining the technology used as Targeted Individuals. He is 18 years old and had been a TI since High School.
 
Edmund has been arrested. It does not appear he is released yet.
Adams County Sherriff Inmate Search
Name: IGBERAESE, EDMUND EDEDE DOB: 01/20/1993 Sex: M
Date of Booking: 1/18/2017 12:48:38AM Booking No. : 201700000842
Docket No. : J214281
Holding for Agency: AURORA PD
Bond Amount: $750.00 Bond Type: CASH/SURETY
Next Court Date: Sentence Release Date:
Share

PACTS Newsletter 1/23/17: TI class action lawsuit

People Against Covert Torture & Surveillance, International
Website: http://www.pactsntl.org
PO Box 5405 Hemet, CA 92544
Email: info@pactsntl.org
Toll Free Hotline: 1-888-639-5559

GREAT NEWS, GUYS! The first month of the year is only about two-thirds complete, yet progress is happening rapidly for our cause. 

— Currently, there are at least THREE, possibly four, class-action lawsuit initiatives in the works!  This means that we may finally see a TI class action lawsuit filing in a court of law sometime this year!  Preparations have begun on cases in Canada, Europe, and the United States.  The first two have secured attorneys already.  The ones in the United States may get representation sometime in the coming months. 
LOS ANGELES SUPPORT GROUP CONFERENCE CALL
Friday, February 3, 2017
Time:  7:30 PM
Planning for get-together on Weekend of February 11-12, 2017
Talkshoe:  1-724-444-7444
Call ID:  139780
Pin Number:  1#
Contact person:  Nancy Allen –
Call:  1-888-639-5559
ATLANTA, GEORGIA  AREA
SUPPORT GROUP
Contact:  Ron Pitts
770-683-2991
CHICAGO/MILWAUKEE
/NW INDIANA
SUPPORT GROUP
Contact:
Shavon Walker – von.pray@gmail.com
PORTLAND, OREGON
SUPPORT GROUP MEETING
Saturday, February 4, 2017
3:30 – 5:30 pm
*Optional dinner afterwards
Hollywood District Library
4040 NE Tillamook
Portland, Oregon
Much love, the highest frequency
Amy – 971-207-3401
HOUSTON, TEXAS
SUPPORT GROUP
Contact:
Tereza Dutta – terezaxdutta@gmail.com
SOUTH CAROLINA
SUPPORT GROUP
Please contact:
Gail – mhisinhim4evr@gmail.com

Related Images:

Share

Toronto Targeted Individuals (Meeting Minutes: January 21st, 2017)

Toronto Targeted Individuals
(Meeting Minutes: January 21st, 2017)
(6PM at 483 Bloor Street W)
Members: Present: Joshua Byer, Galina Kurdina, Firas Fahham, Terry Parker Jr. , Jerome Mitchell, Sherry Podolchuk ( via telephone ) Absent: Several
Proceedings:
· Meeting started as scheduled

Points Discussed

1. Review petition submission to MPs.
  • Joshua handed in 5 petition packages.
  • Galina handed in 5 petition packages.
  • William handed in 1 of his 5 petition packages.
  • Joshua has received a response from two constituency offices. Ali Hussein’s doesn’t want to present the petition because the signatures are not all from their riding. Bill Morneau’s has promised to forward the petition on to him in Ottawa.
  • It would be wise to pursue Judy Sgro as the presenter of the petition. She is the MP for Joshua’s riding and Joshua collected most of the signatures.
  • Galina is going to pursue getting the petition presented by her MP John Mckay.
  • There are two MP’s in Etobicoke that were not assigned to anyone.
2. Create a plan to submit petition to remaining MPs
  • Joshua will go to the two MPs in Etobicoke soon.
  • William needs to finish off the work that was assigned to him.
  • Joshua will ask Firas to deliver to Etobicoke since getting their by transit is going to be difficult.
3. Review CSI office space situation.
  • Application process is taking longer then it is supposed to, was told it would be done in a few days.
  • Response keeps getting put off to later dates, several missed deadlines on their end.
  • Joshua will continue to pursue this, going to go in person on Monday.
4. Review Rohinie’s upcoming trial.
  • Rohinie is going to have a court appearance at Old City Hall on the 23rd of January at 10 AM. It is going to be on the third floor inside courtroom G.
  • Members form our group were encouraged to take a pen and a paper so that they could write notes.
  • The group need as many pairs of eyes as it can get. Previously, we were unable to properly document everything that happened.
  • Joshua, Galina, William and Terry should all be there.
  • Galina is going to figure out what is going on with Mitch Weiss. Hopefully, get some exact dates.
5. Discuss what can be done to get group attendance up.
  • Attendance at this last meeting is an improvement over our last one.
  • William did not attend this one, which is of annoyance.
  • Several members are expressing interest and then not showing up.
  • Jerome will hopefully be attending our meetings going forward.
  • Galina is going to continue to contact everyone before our meetings.
6. Discuss situation with Jerome.
  • Jerome is a Targeted Individual from Toronto who required a place to stay, after being evicted.
  • Joshua has agreed to help him by providing him with some shelter/money.
  • Jerome and Joshua are getting along great.
  • Jerome will be of assistance to the group going forward. He participates in the TI telephone meeting from the states and is quite reasonable.
7. Come up with plan for similar situations.
  • The group wants to be able to help people in similar situations.
  • Joshua needs to be informed if someone asks another member for assistance.
  • Despite a group effort, no one else committed to housing someone from the community.
  • Firas offered use of his car should we ever need it for an emergency.
8. Discuss jammers.
  • Jammers block radio signals operating on set frequencies.
  • They allow signals that are not operating on their frequencies to pass, although they do interfere with them.
  • The device implanted in the brains of Targeted Individuals is receiving and sending signals.
  • That implanted device is operating on a frequency that is unknown to us.
  • The jammer that we currently possess blocks frequencies that are used for commercial purposes, such as by wireless routers or cell phones.
  • The jammer we possess does help stop communication to and from the implanted device.
  • Because the jammer is not set to the right frequency, it does not stop all communication to and from the implanted device.
  • In order to find the correct frequency, Firas suggested we use a spectrum analyzer.
  • Since we have no experience using such devices, Joshua wanted to know if there was a device that could block all frequencies that could realistically be used to communicate with the implanted device.
  • Firas suggested a jammer that rapidly changes the frequency it jams, goes through all of them. Such a device would not block all communication all the time, as most often it would be on the wrong frequency.
  • Galina pointed out that we could look at the implanted devices in the medical field and see what frequencies they operate on. This was deemed a good idea as that is likely the effective frequency for similar devices.
  • The group is going to come up with specifications for a custom jammer and then have it constructed by an outside source.
9. Group jammer plan.
  • Jerome loves the jammer.
  • No one in the group expressed much interest in going out and getting a jammer.
  • Firas is going to buy a spectrum analyzer.
  • Joshua is going to look up the frequencies that implanted devices usually operate on.
  • Sherry feels that more people are accepting that implanted devices that effect the brain are being used for mind control.
  • She was quite optimistic and had a number of ideas she wanted help from the group with.
  • Joshua promised to assist, asked her write the details in the group chat on Facebook.
  • Because of the noise at the Cafe the meeting was held at, Sherry couldn’t properly communicate with the group.
  • The group is going to need a new place to meet.
11. Call Manan Paul
  • Manan was busy and promised to call Joshua tomorrow.
12. Misc
  • Terry wants us to contact James Sears who has a TV show, Galina has promised to follow up on that.
  • Galina wants us to participate in the class action lawsuit from BC, everyone is encouraged to do that.
  • The group need to start having more debate on our Facebook conversation, everyone is encouraged to do their part.
Share

ASSOCIATIONS and CULT CONNECTIONS: Church of Scientology New York

Apartment 6B

This individual, Angel Vicioso, lives in the next door apartment where chemicals and nano technology is pushed through the water, where directed energy is felt every time I enter the bathroom, where the water pressure fluctuates constantly, where the temperature of the water goes cold upon enters the bathtub and where the water hardly gets hot even though the kitchen sink is always hot. He was the first one to come out after hearing the “work” crew.

ASSOCIATIONS and CULT CONNECTIONS: This is the mysterious person Angel VIcioso who received this letter from the Church of Scientology New York. The letter with the LOGO on the top reads like this: 18-Jan-17 “Hi Angel, next two lines…. I see you did a lot of the book courses here at the org. That’s great. What did you get out of them? next three lines…. Best, Trevor …. and the very bottom of this stationary is the contact information > 227 West 46th Street New York, New York 10036 . (212) 921-1210 . newyork@scientology.net

Church Of Scientology New York located at: 227 West 46th Street; New York, NY 10036 recently mailed a letter to an Angel Vicioso at Apartment B(address not disclosed to protect privacy) that was accidentally found in my mailbox Apartment A. A video was taken and will be posted after I move from here. In the meantime, I share some photos with the name of Trevor on the letter. I was informed in a general email about the Cult nature of the Church Of Scientology, but this is the first time I can say it is a big possibility. But I’m not going to draw conclusions, because it could be a ploy. But if it is found that Church Of Scientology is involved in my direct assault, it will not remove any government responsibility. Because of how involve these attacks are. Besides they just might be an ARM of the government to carry out certain tasks in various locations.

Related Images:

Share

CAHT Newsletter 1/22/17: Subjects needed for research

From the Citizens Against Harmful Torture Newsletter: http://www.caht.org

Government Sponsored Stalking.info does not endorse the below content. You have been advised.


Subjects needed for research
We have a limited number of prototypes for which we are collecting data to alleviate electromagnetic sensitivity or prove to the government that regulations must be passed to protect a certain population.

In this study we are conducting tests for a double blind study for a particular group which will give us the data we need to proceed with this design.

These are the qualifications that you must meet to participate:

  • You must currently and for the foreseeable future live in a house in the part of the United States that has moist soil. The house is necessary because if it is wired correctly, the third prong of your electrical outlet should be Earth grounded. Trailers and dry soil/sand will not work correctly for this study.
  • You must submit a $200 deposit for borrowing the prototype to ensure that theft does not occur of these prototypes. This is fully refundable – shipping costs within 90 days. We realize that some people may not want to give them back if they work for them.
  • Instructions of use are included with the device. Follow them exactly.
  • Send the survey results back in the pre-paid envelope provided.
  • Important! For this study we need “Targeted Individuals” that fit this profile exactly. The person must have a reasonably good bill of health including mental health other than hearing voices. The voices must say things like “We are giving you cancer. We are going to kill you. We are going to kill your family. You are ugly. Etc.” Typical psychological breakdown techniques. The voices should be somewhat mild to moderate. This is due to the sensitivity of the individual. The dampening algorithm and field cannot fully detune the fully tortured and scrambled individual. We need this data pure so please be honest or you will destroy the truth that we seek for further progress.

If you fit this profile and would like to participate in this study, send your name, email address, physical address, phone #, and a one paragraph description of your symptoms to HigherOrderThinkers@gmail.com. Your information will be recorded so you must feel comfortable with that.

Prick your finger. It is done. The moon has now eclipsed the sun. The angel has spread his wings. The time has come for better things.

 

 

Share

CAHT Newsletter 1/15/17 How to Defeat Remote Neural Monitoring and Mind Control

Edmund Igberase, Targeted Individual
 
If you have a hard time understanding how remote neural monitoring (RNM) works, just think of how a lie detector works.  In theory RNM functions in similar manner to a lie detector: by measuring physiological responses emitted by the body.  In RNM, it is those physiological responses emitted via electromagnetic impulses by the brain.As you learn to defeat the predictive capabilities of the system — quenching, redirection, multi-tasking and spontaneity— their attempts to restrict your reference choices will become increasingly evident and you will begin to perceive what I will describe as ‘functional or focal duality’ within your working memory. The perps system’s prediction error rate will dramatically increase and its attempts to predict your thoughts or intentions will become humorous if not simply annoying.1. Multi-Tasking

Learn how to multi-task as multi tasking causes you to think in multiple threads.  When you are constantly thinking in multiple threads (multiple tasks or thoughts) then there is no coherent pattern for the perps to establish and integrate into RNM data.  In other words, ‘integration completion’ between the RNM system and your brain is hindered and without your response to that specific ‘impulse injection’, the RNM verification process is breaks apart.

The perps are using a  ‘fabricated or falsified stream’ to interfere with your memory and thought process.  Once you become dependent (ie. you believe their impulse injections are your own) on the system’s output (or they believe your responses to it are consistent) they will begin to fabricate ‘subconscious responses’ which they will pretend are indicators of honesty/dishonesty, positive recognition, anxiety, etc, and they will use ‘impulse injection’ to convince you that the fabricated responses are your own.

If you are unaware of this constant mental manipulation the system will begin to shape your thoughts and behavior. They will use this to [attempt to] restrict your thoughts and behavior by blocking [interfering with] your memory and thought process while these suggestions (injected impulses) are being provided – the interference is triggered and can be activated at will by the attackers.

2. Spontaneity

Never follow a set pattern of conduct.  Always change your behavior every day at a moments notice.  Do this when your quickly (not slowly) on the move as it is more difficult for their remote neural system to monitor your thoughts while your in rapid motion.

If you decide to go to the grocery store go to the convenience store instead.  Change it up everyday but don’t do the same things over and over as that establishes a pattern of conduct. Remember they are trying to alter your daily motives and emotional perceptions.

The remote neural monitoring system is designed to provoke you emotionally so they can generate response statistics which the system will use to determine how to interpret and link descriptions with data captured about your memory references.

Once they have consistent statistics the system will use previous ‘references’ and inject them into your subconscious thought during normal activity which is also referred to in ‘impulse injection’ to convince you that the response was your own and influence you to complete or describe the reference by making the appropriate verbalizing or performing a related action. You can fight and/or control this if you learn to defeat these memory attacks.

This same remote neural attack can be used to disrupt your speech if the attackers decide to prevent you from discussing a specific topic or repeating a given word. The system can be configured to disrupt your recollection when formulating a related statement or inject gibberish [triggered substitution] while you are attempting to speak.

The goals of these attacks appear to be Censorship, Memory Management, and Direct Behavior Control.  However these people are not concerned with legal constraints or any particularly acceptable way of life. They simply use anything you enjoy or appreciate to abuse you regardless of your behavior so if they give you a compliment, realize that they are only doing it to see how you will respond when they negate it and torture you nightly.

If you keep a constant handle on your ‘state of activity’ as well as your situational perception you will recognize conflicting impulses and although it is possible for the system to overpower your impulses, if you understand the attacks you will be able to recognize the physical changes resulting from these powerful impulses and this should prompt you to re-evaluate your current state.

Unless you have been tortured to near-incoherency you should be able to fight the system’s influences.  These remote neural attacks are most effective when you are stepping through sequenced tasks so try to avoid ‘zoning’ on your activities. How?  By changing your actions and activities randomly & constantly at the speed of thought.  Don’t always plan out or think out your daily itinerary, if you don’t have to.  ‘Just do it’ !

Remote neural manipulation is accomplished via their system’s ability to interpret your thoughts and is wholely dependant on its ability to predict and influence your ‘reference’ choices or impulse sequencing during thought composition. The system maps patterns with impulses and identifiers (evoked potentials) and uses statistical data about your ‘composition habits’ to predict how you will think or act as you begin to formulate thoughts or prepare to act. The system’s ability to define and map these references intelligibly depends on your cooperation [or ignorance] and the attackers’ ability to make sense of what they see visually or what they can guess based on your past activity.

3. Quenching

They will constantly run you through a ‘verification’ routine where the system probes you for a particular set of responses repeatedly in order to establish a pattern. If you are interacting and countering these probes the operator will vary the routine in an attempt to ‘verify’ via different methods.
Once the system ‘verifies’ the selected responses they will be used in the next wave of harassment routines – the process is endless and you will see the effects clearly if you are consistently defeating the system. If you are not defeating the remote neural system then you will not see or notice the effects. [Annotation: This suggests learning and feedback from the target, who is apparently a sort of “node” in artificial intelligence.]
The way to defeat their remote neural monitoring system is by ‘quenching’.

You ‘quench’ remote neural monitoring by interacting with and countering their tactics.
None of what these people are collecting could ever be used in a case against you. Every piece of information collected by their system can be considered falsified and/or fabricated because the system is designed to continuously provide ‘suggestions’ according to data which has been previously collected about your current activity and the accuracy of the reference descriptions [definitions] is extremely low since the attackers don’t really care about truth and the system will fabricate statements and/or imagery while they are abusing you. The fabrications are generally the result of misinterpretation of references and emotional indicators as well as distortion of ‘injection feedback’ in addition to false entries added manually by the attackers as a result of their inability to understand what they are viewing or their malintent. There is no reliable way for the attackers to determine what is true even if they try to apply their observations to the aforementioned indicators. An attempt to prove guilt with their system would be the equivalent to a cop dropping a gun at a crime scene and claiming it belonged some individual who happened to be passing by – RANDOM and FALSIFIED. There is no legal application for this system or anything generated by it. They will only capture what they want to abuse you with and when they decide to ‘censor’ your thoughts they will force you into an abusive or incoherent thought pattern using the injection and blocking methods mentioned above.

For example when you experience ‘sudden severe aggression and agitation’ its the perps, not you.  They injected those impulses.  Remember they want to keep you constantly thinking about them.
You can limit and counter this effect by learning to read memory while blocking their system however it takes quite a bit of skill and self-awareness.  This is known as ‘Redirection’.

4. Redirection

Redirection is simple.  When the remote neural attack happens and impulses and thoughts are introduced into your mind (by strong urge [high frequency attack] or slight motivation [low frequency attack]) just change your thread of thought.  This hinders ‘integration completion’  between your brain and the RNM system.  The Bible says “…whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable–if anything is excellent or praiseworthy–think about such things”. (Phillipians 4:8).

You can thwart their RNM attack by establishing a ‘working reference’ each time they attempt to inject impulses and thoughts to your brain.  This is done by recognizing something in life that makes you very happy and then re focusing or ‘redirecting’ back to that happy experience in life each time you are attacked through RNM.

If you can do this each day their attacks will simply be an annoyance to you as you can work around it, but it will still hinder performance tremendously as you will be forced to test and validate memory constantly and the physical sensations of the system radiating your brain will be both irritating and distracting.
Note that these attacks can be performed successfully at lower intensities and you will only notice them if you are frequently being tested at higher intensities: Torture!

Understanding the memory attacks (blocking your real memories and injecting false memories and impulses) are key because if you do not recognize modification of your ‘active memory’ the system will cause you to briefly lose time perception which may be enough procedural [functional] disorientation to influence you to respond to an injected impulse. Forced speech for example.

It is possible for the system to influence you to speak unwillingly or, at the very worst, without you knowing it. For example if you are susceptible to the systems influences you may not realize that it is frequently or constantly influencing you to make minor choices. These motivational impulses can also be used to influence you in a manner that will give you the desire to speak, and I emphasize desire because you need to understand that these impulses will only make you feel the urge [at higher levels set by the attackers] or basic motivation [at baseline levels] to perform the tasks it is influencing you to do.

In combination with this motivation to speak the system uses past references to direct you – for example you personal memory of turning to speak to your wife and the associated impulse – and when you react to this influence the system will block your working memory while streaming the desired output which will result in you making one or more statements under the system’s control. They will test this on you frequently with ‘word substitution’ and if you can learn to control this in thought then you can control it while speaking but you must learn to multitask constantly!

If you do not have a ‘working reference’ to return to after the forced speech attack it is possible that you will have no recollection of making the statement.

Share

CAHT 1/8/17 Newsletter: How Technology Hijacks People’s Minds 

apps, mind control, software, electronic control gadgets

Government Surveillance

Website: CitizensAHT.org

How Technology Hijacks People’s Minds — from a Magician and Google’s Design Ethicist

By Tristan Harris May 18, 2016
Western Culture is built around ideals of individual choice and freedom. Millions of us fiercely defend our right to make “free” choices, while we ignore how those choices are manipulated upstream by menus we didn’t choose in the first place.
The more choices technology gives us in nearly every domain of our lives (information, events, places to go, friends, dating, jobs) — the more we assume that our phone is always the most empowering and useful menu to pick from. Is it?
The “most empowering” menu is different than the menu that has the most choices. But when we blindly surrender to the menus we’re given, it’s easy to lose track of the difference:

  • “Who’s free tonight to hang out?” becomes a menu of most recent people who texted us (who we could ping).
  • “What’s happening in the world?” becomes a menu of news feed stories.
  • “Who’s single to go on a date?” becomes a menu of faces to swipe on Tinder (instead of local events with friends, or urban adventures nearby).
  • “I have to respond to this email.” becomes a menu of keys to type a response (instead of empowering ways to communicate with a person).

When we wake up in the morning and turn our phone over to see a list of notifications — it frames the experience of “waking up in the morning” around a menu of “all the things I’ve missed since yesterday.” (for more examples, see Joe Edelman’s Empowering Design talk)

By shaping the menus we pick from, technology hijacks the way we perceive our choices and replaces them with new ones. But the closer we pay attention to the options we’re given, the more we’ll notice when they don’t actually align with our true needs.

Share

Surveillance Detection for Android Phones

Surveillance Detection for Android Phones

It’s called SnoopSnitch:

SnoopSnitch is an app for Android devices that analyses your mobile radio traffic to tell if someone is listening in on your phone conversations or tracking your location. Unlike standard antivirus apps, which are designed to combat software intrusions or steal personal info, SnoopSnitch picks up on things like fake mobile base stations or SS7 exploits. As such, it’s probably ideally suited to evading surveillance from local government agencies.
The app was written by German outfit Security Research Labs, and is available for free on the Play Store. Unfortunately, you’ll need a rooted Android device running a Qualcomm chipset to take advantage.

Download it here.For everyone who doesn’t like to use the Play Store, the APK can be downloaded from the SR Lab’s homepage: https://opensource.srlabs.de/projects/snoopsnitch

Share

CAHT Newsletter: The Benefits Of Lemons

Note: Nano Technology strive in a non acidic and non acid  and non alkaline environment.

By thefitnesswebzine
Posted Friday, December 16, 2016 at 02:49pm EST

Lemon water is perhaps one of the oldest beverages ever. All of us have fond memories of relishing the flavor of this uncomplicated drink as children. Even as adults, we wouldn’t mind sipping on this sweet and tangy drink. While lemon water makes for an absolute thirst quencher, did you know that it offers a large number of health benefits too? Here are 10 amazing benefits of drinking lemon juice or lemon water.

1.  Resistance towards Colds and Flu.
Lemons contain a lot of vitamin C (53mg per 100g), that’s slightly more than 50% of a lemon itself! It is generally realized that the utilization of sustenances high in vitamin C helps the body create resistance against contaminations, furthermore expelling destructive free radicals from the blood due to its antioxidant nature.

2.  Toxin Removal
Drinking lemon juice first thing in the morning has diuretic properties. It stimulates the kidneys and by doing so, flushes toxins out of your system during the process of detoxification.

3.  Aids with Digestion
Lemons contain citric acid that stimulates the secretion of gastric juices. This can help to get rid of queasiness and indigestion. The liver expels toxins from the circulatory system, and relieves symptoms such as heartburn and bloating which are also signs of indigestion. Although acidic in nature, it becomes alkaline when digested in our bodies.

4.  Battles Malignancy
The vitamin C in lemons also works as an intense cancer-preventing agent that kills free radicals. It invigorates the liver to deliver more bile, boosting energy levels while destroying unwanted organisms. Lemons also contain limonoids, which are phytochemicals that are present in citrus fruits. These have been appeared to stop cell division in malignant cells, with studies showing they have the ability to fight cancers of the lungs, skin, colon and breast.

5.  Alleviates Rheumatoid Arthritis
Diminishes the agony of inflammation and swelling, as it contains anti-inflammatory effects that help to reduce painful sensations experienced.

6.  Lowers Blood Sugar Levels in Diabetes
Lemons contain a flavonoid called hesperidin, which brings down glucose by expanding the movement of the protein glucokinase, hence metabolizing glucose from the circulatory system.

7.  Prevention of Coronary Illness
Studies have demonstrated that lemon juice lessens the aggregate serum cholesterol and LDL (awful) cholesterol.

8.  Treating Stones
The citrus extract in lemon juice breaks down gallstones, calcium stones, kidney stones, and pancreatic stones.

9. Mitigates Sore Throat
Lemon juice can be very effective when it comes to treating tonsil inflammation and sore throats, due to its anti-inflammatory nature.

10. Metabolism and Weight Loss
Lemons are great for weight loss as it boosts your metabolism. It should be mixed with warm water and drank in the morning on an empty stomach to be effective.

http://www.naturalnews.com/lemon_juice.html
http://wellnessmama.com/35192/benefits-of-lemon-water

Related Images:

Share

CAHT Newsletter Misuse of Medical Technology

This is one of the most egregious forms of misuse of medical technology. Many people have written emails testifying to the fact that they are being heated inside and outside with some form of radiation. While radiation can cause skin burns, the type of remote stimulation being used to activate implants is used in cancer therapy. The necessary ingestion of nanoparticles are part of the covert program injection Targeted Individuals with nanoparticles without their knowledge or consent. The particles are activated remotely using frequencies.

One type is Photothermal therapy (PTT) which refers to efforts to use electromagnetic radiation (most often in infrared wavelengths) for the treatment of various medical conditions, including cancer. This approach is an extension of photodynamic therapy, in which a photosensitizer is excited with specific band light. This activation brings the sensitizer to an excited state where it then releases vibrational energy (heat), which is what kills the targeted cells. Unlike photodynamic therapy, photothermal therapy does not require oxygen to interact with the target cells or tissues. Current studies also show that photothermal therapy is able to use longer wavelength light, which is less energetic and therefore less harmful to other cells and tissues.

Most materials of interest currently being investigated for photothermal therapy are on the nanoscale. One of the key reasons behind this is the enhanced permeability and retention effect observed with particles in a certain size range (typically 20 – 300 nm).

Gold nanoparticles

One of the most promising directions in photothermal therapy is the use of gold nanoparticles. Initial efforts with gold nanoparticles, however, were not very effective in vivo because the spherical particles used had peak absorptions limited to 520 to 580 nm for particles ranging from 10 to 100 nm in diameter, respectively. These wavelengths were not effective in vivo because skin, tissues, and hemoglobin have a transmission window from 650 to 900 nm, with peak transmission at approximately 800 nm (known as the Near-Infrared Window).

Hollow Gold Nanospheres (HGNs)

A novel metal nanostructure, namely hollow gold nanospheres (HGNs or AuNSs), has been recently developed and successfully used for photothermal ablation therapy (PTA) in vitro and in vivo. The HGNs have a unique combination of small size (30-50 nm in outer diameter and 3-6 nm shell thickness), spherical shape, highly uniform shell, and strong, narrow, and tunable near IR absorption. The high optical quality of the HGNs is mainly due to the high uniformity of the Au shell, which is generated using highly uniform Co nanoparticles as a template.

Gold NanoRods (AuNR)

When AuNP are exposed to NIR light, the oscillating electromagnetic field of the light causes the free electrons of the AuNP to collectively coherently oscillate. Changing the size and shape of AuNP, changes the wavelength that gets absorbed. A desired wavelength would be between 700-1000 nm because biological tissue is optically transparent at these wavelengths. While all AuNP properties are sensitive to change in their shape and size, Au nanorods properties are extremely sensitive to any change in any of their dimensions regarding their length and wide or their aspect ratio. When light is shown on a metal NP, the NP forms a dipole oscillation along the direction of the electric field. When the oscillation reaches its maximum, this frequency is called the surface plasmon resonance (SPR). AuNR have two SPR spectrum bands: one in the NIR region caused by its longitudinal oscillation which tends to be stronger with a longer wavelength and one in the visible region caused by the transverse electronic oscillation which tends to be weaker with a shorter wavelength. The SPR characteristics account for the increase in light absorption for the particle. As the AuNR aspect ratio increases, the absorption wavelength is redshifted and light scattering efficiency is increased. The electrons excited by the NIR lose energy quickly after absorption via electron-electron collisions, and as these electrons relax back down, the energy is released as a phonon that then heats the environment of the AuNP which in cancer treatments would be the cancerous cells. This process is observed when a laser has a continuous wave onto the AuNP. Pulsed laser light beams generally results in the AuNP melting or ablation of the particle. Continues wave lasers take minutes rather than a single pulse time for a pulsed laser, continues wave lasers are able to heat larger areas at once.

Gold Nanoshells

Loo et al. investigated gold nanoshells, coating silica nanoparticles with a thin layer of gold. The authors conjugated antibodies (anti-HER2 or anti-IgG) to these nanoshells via PEG linkers. After incubation of SKBr3 cancer cells with the gold nanoshells, an 820 nm laser was used to irradiate the cells. Only the cells incubated with the gold nanoshells conjugated with the specific antibody (anti-HER2) were damaged by the laser.

Graphene and graphene oxide

Yang et al. demonstrated the viability of graphene for photothermal therapy in 2010 with in vivo mice models. An 808 nm laser at a power density of 2 W/cm2 was used to irradiate the tumor sites on mice for 5 minutes. As noted by the authors, the power densities of lasers used to heat gold nanorods range from 2 to 4 W/cm2. Thus, these nanoscale graphene sheets require a laser power on the lower end of the range used with gold nanoparticles to photothermally ablate tumors.

In 2012, Yang et al. incorporated the promising results regarding nanoscale reduced graphene oxide reported by Robinson et al. into another in vivo mice study. The therapeutic treatment used in this study involved the use of nanoscale reduced graphene oxide sheets, nearly identical to the ones used by Robinson et al. (but without any active targeting sequences attached). Nanoscale reduced graphene oxide sheets were successfully irradiated in order to completely destroy the targeted tumors. Most notably, the required power density of the 808 nm laser was reduced to 0.15 W/cm2, an order of magnitude lower than previously required power densities. This study demonstrates the higher efficacy of nanoscale reduced graphene oxide sheets as compared to both nanoscale graphene sheets and gold nanorods.

Future directions

Some research has indicated problems with aggregation of the photosensitizers, local shock waves, hyperthermic effects, but otherwise little phototoxicity. Many potential side effects and complications, as well as other potential applications of photothermal therapy, are yet to be discovered.
See Wiki Photothermal and Hyperthermic Therapy which use Nanoparticles to cause heating

Share