Big Pharma Nanotechnology Encodes Pills With Tracking Data That You

Big Pharma Nanotechnology Encodes Pills With Tracking Data That You

Big Pharma Nanotechnology Encodes Pills With Tracking Data That You Swallow : UPDATE 1

bibliotecapleyades.net | Jul 15th 2010

by Mike Adams

The emerging field of nanotechnology is currently gaining a lot of attention across many industries.

Nanotechnology allows scientists to manipulate individual atoms and molecules to create unique materials and even micro-scale devices, and this is leading to a wide range of applications in clothing, textiles, electronics and even food and medicine.

Sounds great, right?

Except for the fact that, like genetic modification of food crops, nanotechnology tampers with Mother Nature in a way that’s largely untested for safety. And here’s something really bizarre: The pharmaceutical industry may soon begin using nanotechnology to encode drug tablets and capsules with brand and tracking data that you swallow as part of the pill.

To really explain how this works, let me simplify how nanotechnology works so you’ll see why this is so bizarre (and potentially dangerous).

Instead of using materials and elements as they’re found in nature to build and construct things, nanotechnologists are deconstructing the basic building blocks of these materials and elements to make completely new ones. In other words, nanoscientists are reconstructing the molecular building blocks of our world without yet knowing what it will do to humans and to the environment.

The long-term consequences of nanotechnology are still largely unknown because not a single formidable study has ever been conducted on this emerging science that proves it to be safe. In fact, most of the studies that have been conducted on nanotechnology show that it’s actually detrimental to health and to the environment (which I’ll cover further, below).

But that hasn’t stopped Big Pharma from potentially adopting it for use in a new tracking and identification system that could be integrated into the very drug pills and capsules that millions of people swallow every day.
Nano-encrypted barcode in every dose
Now don’t get me wrong.

Big Pharma isn’t the only industry using nanotechnology despite a complete lack of safety evidence.

“Nanoparticles” are present in sunscreens, fabric protectors, plastic food liners, and other products. But what’s different about the nanoparticles soon to be found in a pill near you is that they are capable of storing data about where the drug was made, when it was made, and where it has traveled.

It’s a lot like the barcodes used on parcels to track them along their shipping journeys, except that in the drugs, it’s a molecular barcode that people will be swallowing.

During digestion of the pill, the nano data bits will be distributed throughout your body and can become lodged in your body’s tissues.

A company that’s introducing this system for pharmaceuticals, says it this way on its website:

“In the NanoEncryption process, NanoCodes are incorporated directly onto tablets, capsules and vial caps. These codes may be associated with an unlimited amount of manufacturer-determined data, including product information (strength and expiration date), manufacturing information (location date, batch and lot number) and distribution information (country, distributor, wholesaler and chain).”

So if you take these drugs, you’ll be swallowing nano “hard drives” that can store data – data that will be distributed throughout your body and can be read by medical technicians who could then track what drugs you took in the past.

And what’s the rationale for this? According to the company, it’s to,

“defen[d] against pharmaceutical counterfeiting and illegal diversion”.

It sounds like a good idea, right?

Unfortunately, there’s a whole lot more to this technology than meets the eye.

Editor’s Note:

UPDATE 1 – The company originally mentioned in this story now denies what NaturalNews reported. Their own website text as quoted in this story, was apparently misleading, and they now claim they do not use nano “material” of any kind to achieve their nano encoding. We are temporarily removing the name of this company from this story while we attempts to sort out the truth of the matter. In the past, we’ve had many company rush to change their own website text after we ran a story on them. All quotes published in this story were 100% accurate at the time of publication, and we made a good faith attempt to report this story accurately.
The dangers of nanotechnology
Though you’ll rarely hear about it in the mainstream media, little is known about what nanoparticles really do to people’s bodies and to the environment in the long term.

Studies continue to show that nanoparticles tend to easily build up in the body where they can potentially cause damage. They also behave differently than the materials from which they are derived and constructed, posing unknown hazards.

Researchers from the University of Rochester discovered back in 2006 that nanoparticles are easily absorbed throughout the body via inhalation.

According to the report, nanoparticles travel from the nasal cavity directly to brain tissue where they deposit themselves and cause brain inflammation. In other words, nanoparticles very easily cross the blood-brain barrier, which is the mechanism by which the brain normally protects itself from foreign materials.

The same study, which is part of a five-year, $5.5 million investigation into the safety of nanoparticles, also determined that this artificial micro-matter makes its way to the lungs when inhaled.
Nanoparticles are different from their parent particles
Nanoparticle use is on the rise based on the flawed assumption that if the elements and compounds from which they are derived are considered safe, then the nanoparticles themselves must also be safe. But research reveals that this simply isn’t the case.

A study from 2004 found that low levels of fullerenes, a type of carbon nanoparticle used in electronics and other materials, changed the entire physiology of fish that were exposed to it.

Exposure to just 0.5 parts per million (ppm) over the course of two days literally caused significant brain damage in these fish.

“Given the rapid onset of brain damage, it is important to further test and assess the risks and benefits of this new technology (nanotechnology) before use becomes even more widespread,” emphasized Dr. Eva Oberdorster, author of the study, back in 2004.

Again in 2007, scientists from the University of California, San Diego, discovered that iron nanoparticles are toxic to nerve cells and nerve function. Even though iron is a necessary mineral that benefits the body in its natural form, its nanoparticle is quite dangerous, it turns out.

According to Sungho Jin, senior author of the study which was published in the journal Biomaterials, nanoparticles in general “may not be as safe as we had once thought.”

But none of the nation’s regulatory bodies seem to be paying any attention to these studies, or to the many others I didn’t mention that also highlight the toxicity of nanoparticles. Instead, they’ve allowed nanoparticles to invade our society without so much as a single piece of credible evidence showing that they’re safe.

Based on all the research, we know that nanoparticles cross through the skin, lungs, and blood-brain barrier, where they lodge themselves in body tissues. We also know that their compositional differences cause them to be highly reactive with other chemicals, particularly in the body where they create damaging free radicals.

But there’s more to this story… it gets even worse.
Nanoparticles are safe in food?
It’s amazing to me that altered molecules with no scientific backing of safety are now being deliberately allowed in the food supply. It would seem unacceptable to allow their use in food manufacturing equipment because of the potential for residue contamination, but that’s exactly where they are being used right now.

According to a DiscoveryNews report from 2009, nanoparticles are everywhere in the food supply. Externally, they’re used in the packaging, containers, films, and other storage materials to kill bacteria and increase shelf life. Internally, they’re used to enhance or alter the flavors and textures of food.

Nanoparticles are even being used in some vitamins, supplements and other “nutraceuticals” to allegedly improve nutrient assimilation and delivery.

The report actually encourages the use of nanotechnology in food, citing all the potential benefits (but remaining silent on all the dangers). One section even hawks nanotechnology as a “green” technology.

But the real truth is that using nanoparticles in food is a grant experiment with an unknown outcome.

When it comes to nanotechnology in food, there’s a lot of speculation and pseudo-science being peddled as scientific fact, but there’s truly no scientific backing to support the safe use of man-made nanoparticles in things we consume.
Do the people actually benefit from nanotechnology?
It’s quite common for big industry to persuade the public into accepting new technologies based on promises that they will make their lives better and safer.

And that’s exactly what’s happening with nanotechnology:

We’re all being sold a bill of goods on something that’s entirely unproven.

And getting back to the issue of embedding nanoparticles in drugs, the whole argument for why this is necessary stems from the notion that there’s a lot of drug fraud occurring, and that it could be stopped if only drugs contained proprietary nanocode data that could be read from your body tissues.

  • But does this benefit the consumer in any way?
  • Who really stands to benefit from this?

Protecting their monopolies
Most NaturalNews readers already know this, but when a pharmaceutical company creates a new drug, it patents it so that no other company can sell it until the patent expires.

After acquiring FDA approval for the drug, the company then sells it for thousands of times more than what it costs to produce it. This is the FDA-enforced monopoly known as the modern pharmaceutical industry.

How does this tie into nano protection for drugs?

Since drugs are exclusively owned and protected by 20-year patents here in the U.S., which allows drug companies to charge whatever they want for them with no competition, Big Pharma stands to benefit tremendously from a technology that ensures no one else can “counterfeit” its patented drugs.

Because right now, all those counterfeit imitations (which are actually the same chemicals without the brand name) are sold for far less than the brand name drugs, and some people are buying them because they can’t afford the real thing. By integrating nanotechnology into each and every drug pill, it will be easier for Big Pharma to verify and control the drugs people are taking.

Nano-protected pills can be scanned by a detection device that will verify their authenticity and trace them back to the factories where they were manufactured, the warehouses where they were distributed, the pharmacies where they were stocked and sold, and so on.

But here’s the part where this all turns Big Brother:

The same scanning technology can theoretically be used to scan your body tissues and determine which drugs you’ve been taking, who sold them, where you bought them, where they were made and possibly even how long you’ve been taking them.

By swallowing these nano-protected pills, you are essentially turning your body into a walking Big Pharma hard drive that’s storing all kinds of data on your particular drug habits.

This data could be read by law enforcement or even used against you in a court of law. It’s sort of like swallowing RFID technology that tracks your medication use.
Take your approved meds, or else
A few years ago, a friend of mine showed me a clever device that uses a laser to detect antioxidant levels in the body.

It basically takes a reading based on the molecular signature of antioxidants in your skin. It uses a blue laser to produce a number revealing your antioxidant level. (Mine was very high, something like 90,000 on this machine.)

Theoretically, a similar detection device could be used to scan patients for nano-particles to see whether or not they’ve taken their meds for the day, for the week, or even for the year. You could be scanned by a laser that you don’t even see, and the government or anyone else could “read” your entire history of medication use.

This information could be used against you in many ways:

  • To deny you employment
  • To deny you health insurance coverage
  • To serve as evidence against you in a court of law
  • To take away your children by labeling you mentally unstable
  • To force you to take vaccines that you’ve been avoiding,

… and so on.

This is a “drug enforcement” technology that makes all your private medication habits easily and instantly available to Big Brother and health industry drug enforcers who want you to “take all your meds.”

As such, this technology could further destroy health freedom. The federal government would no doubt attempt to use this technology to control your medication and vaccination intake while enforcing your compliance with random scanning of your hand or other tissues.

Imagine this scenario. Your government-approved doctor says you have a mental disorder because you prefer healthy foods (See my recent article on “orthorexia” if you don’t know what I’m talking about), and he prescribes you a brand name drug to treat it.

You decide that eating healthy is normal and you refuse to take the drug. The next time you go in for a checkup, your doctor scans you to check your nanoparticle count and discovers that you haven’t been taking your meds. Since he ordered you to take them and you didn’t, he assesses you a fine and tells you begin taking them or else face potential arrest and prison time.

This scenario is entirely fictitious at the moment, but with the way things are going with Big Brother and Big Pharma, it’s a very real possibility in the near future. Nano technologies can be used in precisely this way to enforce compliance with things like drug prescriptions and treatment mandates.

Big Brother will have access to your medical records because they’ll have been implanted into your body tissues through nanotechnology, sort of like radio-frequency identification (RFID) for pharmaceuticals.

It’s a way for the drug industry to turn a human body into a compliant profit machine. And it’s being marketed right now.
Real questions that need to be answered about nanotechnology
It’s not my intention to sound alarmist about nanotechnology, but rather to ask some obvious questions that have yet to be answered.

  • Why has nanotechnology essentially been approved for practically any and every use with absolutely no credible backing showing that it’s safe?
  • Why have most of the studies showing its dangers been ignored by most mainstream scientists?
  • Why are nano particles about to start showing up in our pharmaceuticals?

In theory, nanotechnology may sound like a great thing, but as I’ve mentioned in previous articles I’ve written on the subject, we should be wary of its seductive promises.

Not only are nanoparticles potentially dangerous, but many of its uses are completely unnecessary.

Back in 2004, I wrote a piece about the top ten technologies that were around at the time, and nanotechnology wasn’t one of them. My reasoning for this was that nanotechnology, particularly in the field of medicine where it was being promoted the most, was entirely unnecessary because our bodies contain their own built-in “nanoparticles”, so to speak, that cause the body to heal itself naturally.

The best nanotechnology in the world already exists inside you – it’s called your immune system.

But science has decided instead to try to engineer its own imitation of the immune system by constructing artificial nanoparticle “robots” to do the job instead. It’s an example of Man’s arrogance over nature. Instead of supporting the human body’s innate immune system technology, arrogant scientists want to overthrow it with their own micro-mechanical robots that attempt to serve the same role.

And now, with the nano technology mentioned here, Big Pharma could be embedding your body’s tissues with nanoparticle data that turns you into a compliant, monopoly-priced drug consumer whose medication habits can now be scanned right off your skin.

That’s what Big Pharma wants, of course: Total control over your body.

Combined with targeted lobbying of corrupt Washington lawmakers and bureaucrats, Big Pharma could achieve a “mandatory medication requirement” across the entire country, where every citizen is required to dose themselves with

Your compliance will be verified with a nanotech scan that reads the nanodata right off your skin, and if you’re found to be non-compliant, you could be arrested and forcibly medicated on the spot.

Don’t think this is possible? Much of this has already come true with forced vaccinations of children.

See the article I wrote in 2007, Children herded like cattle into Maryland courthouse for forced vaccinations as armed police and attack dogs stand guard.

The conspiracy between Big Government and Big Pharma will always try to find a way to make you take more meds (whether you need them or not). This nano-protection technology could play right into their hands, providing an enforcement and tracking technology that would turn your body into a walking Big Pharma storage device.

It’s just one more reason to avoid taking pharmaceuticals in the first place (as if there weren’t enough already!).

Original Page: http://www.bibliotecapleyades.net/ciencia/ciencia_nanotechnology06.htm

Shared from Read It Later

Elyssa Durant, Ed.M.

United States of America

Related Images:

New GPS satellite begins testing at Peterson

New GPS satellite begins testing at Peterson

By Dan Elliott – The Associated Press
Posted : Tuesday Dec 13, 2011 11:13:32 EST

DENVER — A $5.5 billion upgrade to the GPS moved a step closer to launch this week when a prototype arrived at a Lockheed Martin complex in Colorado to begin months of tests.

It’s the guinea pig for a new generation of GPS satellites, called Block III, that’s expected to make military and civilian receivers more accurate, powerful and reliable.

They’re also part of an international effort to allow civilian receivers to use signals from U.S., European, Russian and perhaps other satellite navigation systems.

GPS has become ubiquitous in American civilian and military life, with hundreds of thousands of receivers in cars, and weapons systems. Financial systems use GPS receivers to get precise time stamps for transactions, relying on the atomic clocks onboard the satellites.

The Air Force Space Command oversees the U.S. GPS satellites and ground control systems from its headquarters at Peterson Air Force Base, Colo.

The Block III satellites are expected to allow military and civilian users to determine their position within 3 feet, compared with 10 feet with current technology, according to the Congressional Budget Office.

Higher-powered signals from Block III satellites are expected to be harder for enemies to jam and easier for receivers to tune in, especially in urban canyons or under thick tree canopies.

The U.S. and other countries have agreed to make a new, common frequency available to civilians. That means civilian receivers could calculate their position from a number of different satellite navigation systems.

The Block III prototype arrived at Lockheed Martin’s Waterton Canyon complex south of Denver on Monday. Workers will do final assembly work on the prototype and then run it through a gantlet of tests, including extreme temperatures to mimic conditions in space and measurements to see whether the satellite’s radio frequencies interfere with each other.

The prototype won’t be launched into space.

The first flight model is expected to arrive at Waterton Canyon next summer and be launched in May 2014.

Lockheed Martin, based in Bethesda, Md., has a $1.5 billion Air Force contract to build and test the GPS III prototype and build the first two satellites for launch. The contract includes an option for two more.

The Pentagon expects to buy and launch a total of 32 Block III satellites. The Air Force says it will cost about $5.5 billion to design, build and launch all the satellites and upgrade the ground control systems.

Related Images:

YOU can Stop Alien & Military Abduction!

YOU can Stop Alien & Military Abduction!

These prayers contain a complete description of the procedure that God gave Michael Relfe to stop the enemy’s abduction process. The initial understanding of these prayers came as a result of his praying for guidance on how to defeat the periodic abductions he was being exposed to (See themarsrecords.com). Some of these prayers may be relevant for you and your situation and some may not. As I learn of more I will post them.

If you are not covered by the power of the blood of Jesus that will put these prayers in action to protect you, then click here salvation prayer Without Salvation these prayers will not work because you will not have the protection and victory only Jesus can provide.

· Although most abductions usually involve U.S. military personnel, a non-human being (Grey Alien and/or Reptilian) might be briefly observed working with them. On several occasions only Grey Aliens or only Reptilians will perform the abduction.

· If you are located near a base or installation, they may attempt to acquire you by visiting your home/apartment/hotel and taking you in person. This can be defeated by using a portable door lock (the kind used by travellers in hotels) on EVERY door in their home. For those who are taken in your sleep, these prayers will help close that access down as well.

These agencies have tools to defeat every type of commercially available lock as well as the various chains and swing latches that allow the door to be “cracked” open. Only the portable door locks are secure.

· The enemy has at their disposal multiple technologies that will allow them to abduct an individual from their bedroom, examine/operate/indoctrinate them and return them to their bedroom without being detected. They can “keep” an individual for weeks and return them to a time a few minutes after they were taken. The names of those technologies that I am aware of are :

Jumpgate Technology
Fractal Jumpgate Technology
Transporter Technology
Fractal Transporter Technology
Time Travel Technology
Fractal Time Travel Technology
Dimensional Travel Technology
Fractal Dimensional Travel Technology
Wormhole Travel Technology
Fractal Wormhole Travel Technology

Other technologies will be developed. They must be added to the list. God will help you to “know” what they are while praying. Change your attack strategy accordingly.

· God will answer your prayers to prevent the above listed technologies from functioning in your home, apartment or hotel.

· When you begin to engage in spiritual warfare against the enemy, they will pull out all the stops in attacking you. They may use witchcraft, black magic, different types of psychic and remote viewing attack and radionics, psychotronics and psionics attacks against you. Sometimes you won’t even know the name of what they are doing.

· Spiritual warfare is the act of engaging in battle against the enemy: breaking curses, spells and psychic prayers, binding the demons and entities that are attacking, loosing the angels of God into battle, praying for angelic protection, among others. Deliverance is the casting out of demons from a person or object. ALL of these ways of warfare require power and authority from God Himself.

· The ONLY known way to obtain the required power and authority to defeat the enemy and to stop the abductions of you and your family is to accept The Lord Jesus Christ as your Lord and saviour. When you take that first step of faith, you immediately leave the jurisdiction of “Satan, the god of this world” and enter into the kingdom of God Almighty. You are drafted into the army of God and are given power and authority over the enemy. From that moment forward you are expected to fight the enemy and to fulfil God’s plan in your life while on earth. You are assured of eternal life when your days are done.

· You absolutely will not defeat this enemy by using your own metaphysical abilities, prayer to anything outside of God Almighty and His son Jesus Christ, machines or devices you make or by any help from any ET, “Spacebrother”, Alien, Witch, Psychic, Occultist or anyone or anything else. I know from personal experience. I was not abducted into their “service”. I volunteered. I was a highly efficient killing machine for these beings. I have a high “horsepower” rating as well as several rare skill sets. My mission profiles were extensive and successful and beyond anything described by the so called remote viewers on the best seller list. And while reading The Mars Records you will see how easily these beings controlled me. They turned me on and off as easily as you would a toaster. I had absolutely ZERO chance of escape. ONLY by the grace of God Himself and the power of The Lord Jesus Christ did I escape to the degree I presently have.

· YOU can do the exact same things as I have if you have a personal relationship with The Lord Jesus Christ and if you have faith and follow the warfare prayers in this document. Prayer does NOT rely on metaphysical abilities or training. I myself do NOTHING. God performs the miracles.

· The following warfare prayers work. Regardless of what your church corporation or untrained pastor may think, spiritual warfare works, is infinitely powerful and the only thing known that will defeat the enemy. While pastors argue over whether a Christian can have a demon or whether or not to lay hands on a member while they are dying, the military alien complex continues to abduct, operate on and indoctrinate many thousands of people worldwide, while the churches stay silent.

· Spiritual Warfare is a daily endeavour. God will show you what to pray for during prayer, while reading what has happened to others or while being told things about other people’s experiences. If you pray against something that is not there or that doesn’t apply to you, nothing happens. It is better to pray than not to pray.

· If you are serious about spiritual warfare and fighting the enemy and are willing to put yourself on the line for others, I would suggest you contact Hegewisch Baptist Church in Highland, IN (www.hbcdelivers.com) for their book and tape catalog. The book series “Battling The Host Of Hell” is an 8 volume set of intensive training in spiritual warfare. In addition you will require many of the taped sermons by Win Worley. The first tape should be “Group Deliverance”. Other valuable subjects are Soul Fragmentation, Breaking Curses, Binding and Loosing, Soul Ties, among others. The videos will convince even the most unbelieving person concerning the reality of the demonic world. Hegewisch Baptist Church is a small, independent church not affiliated with any organization of any kind. You can visit Hegewisch for to receive help at any time.

Warfare Prayers

Protect yourself

Heavenly Father, in the name of the Lord Jesus Christ, I ask you in Jesus’ name to please send hundreds, hundreds, hundreds and hundreds of millions of legions of angels to surround me and encamp around me and setup angelic shields, protective devices, impenetrable force fields and angels to protect me against every attack of the enemy, in Jesus name I pray, amen. Please put upon me the full armour of God. Please put upon me spiritual camouflage to make me invisible to the enemy. Please put upon me the armour light, the breastplate of righteousness, the shield of faith, the helmet of salvation and the sword of the spirit, in Jesus’ name I pray, amen.

Protect your spouse – Repeat above for your spouse.
Protect your children – Repeat above for each of your children

Break curses on yourself

In the name of the Lord Jesus Christ, I break, crush, sever, smash, dissolve and destroy every curse, spell, psychic prayer and attack put upon me by any person, place, thing, witch, occult source, psychic source, machine, reptilian, draconian, grey, insect or any other entity, in Jesus’ name I pray, amen.

(do this 3 or more times)

Break curses on your spouse. Repeat above for your spouse.
Break curses on your children. Repeat above for each of your children

Break energy drains on yourself

Heavenly Father, in the name of the Lord Jesus Christ, I break, crush, dissolve, destroy and smash every energy drain attached to me by any source, in Jesus’ name I pray, amen. In Jesus’ name I command everything that came into me from the energy drain to leave now, in Jesus’ name. In Jesus’ name I break and destroy every soul tie, hook, link, connection and attachment between myself and whatever or whoever put the energy drain into me, in both directions. In Jesus’ name I command everything that came into me from those soul ties, hooks, links, connections and attachments to leave now, in Jesus’ name. Thank You Lord for setting me free.

Break energy drains on your spouse. Repeat above for your spouse
Break energy drains on your children. Repeat above for each of your children

Break attacks on yourself

Heavenly Father, in the name of the Lord Jesus Christ, I break, crush, dissolve and destroy every satanic attack, druid witch attack, wicca witch attack, kabalah witch attack, wizard attack, shaman attack, witchdoctor attack, witchcraft attack, vampire attack, werewolf attack, santaria attack, voodoo attack, magical attack, sorcery attack, luciferian attack, demonic attack, satanic attack, psychic attack, telepathic attack, mental attack, remote viewing attack, mind control attack, radionics attack, psychotronic attack, psionic attack, death signal attack, disease signal attack, scalar wave attack, tesla wave attack, laser wave attack, ELF attack, RF attack, microwave attack, magnetic attack, acoustic attack, infrared attack and every kind of attack that I don’t know the name of from :

Every person, place, thing, witch, occult source, psychic source, machine, satanist, druid witch, wicca witch, kabalah witch, wizard, shaman, witchdoctor, vampire, werewolf, santaria practitioner, voodoo practitioner, remote viewing operator, radionics operator, psychotronics operator, psionic operator, pine gap group, MIB group, government group, witches, satanist or masonic group, new world order group, shadow government group, illuminati group, MJ12 group, faction 1 group, faction 2 group, faction 3 group, faction 4 group, NSA group, NRO group, CIA group, FBI group, NIMA Group, DOJ Group, DON group, ACIO group, ASIO group, PSICORPS Group, MJTF Group, military group, intelligence group, Army group, Navy group, Air Force group, Marine Corps group, NIS group, DIA group, OSI group, ONI group, OSS Group, UFOS group, MI5 group, MI6 group, Mars Defence Force group, Mars Intelligence Force group, Mars Project group, reptilian group, draconian group, grey group, insect group and every group I don’t know the name of, in Jesus’ name I pray, amen. In the name of The Lord Jesus Christ, I bind everything that came into me from those attacks. In Jesus’ name I close every door that was opened to you, I take away every legal hold and legal ground that you have on me and I cut you loose from all your assignments, in Jesus’ name I pray, amen. In Jesus’ name I command everything that came into me from those attacks to leave me now, in Jesus’ name. Father, I ask you to send these things back to whoever sent them to me, to bring them to repentance. In Jesus’ name I pray, amen.

Break attacks on your spouse. Repeat above for your spouse

Break attacks on your children. Repeat above for each of your children

Thank the LORD for miracles and what HE is doing

Father, In Jesus’ name I praise you and Thank You for these blessings and for setting me free from these attacks, In Jesus’ name I pray, amen.

Changing The Quantum Matrix

Pray for angelic shields around your house or apartment.

Father, In the name of The Lord Jesus Christ I ask you to please send hundreds, hundreds, hundreds and hundreds of millions of legions of angels to surround and encamp around this house and to set up angelic shields, protective devices, impenetrable force fields and angels and to seal off this house from the world, in Jesus’ name I pray, amen.

Remove any trapped demons

Father, In the name of The Lord Jesus Christ I ask you to please send angels to bind up and remove all demons that were trapped when the shield was closed, in Jesus’ name I pray, amen.

Break any remaining hooks into you

In the name of The Lord Jesus Christ I break, crush, dissolve, smash and destroy every line of remote viewing, energy drain, energy supply, remote influence, surveillance and command & control attached to me in Jesus’ name. In Jesus’ name I bind everything that came into me with these lines and Father, I ask you to send all these things back to whoever send them, to bring them to repentance, in Jesus’ name I pray, amen.

Remove all interference.

Father, In the name of The Lord Jesus Christ I ask you to please remove every thing inside me that would hinder, jam, interfere or prevent me from praying and changing the quantum matrix, in Jesus name I pray, amen.

Note: If you start doing this on a regular basis, the enemy will pour a lot of interference in your direction, trying to discourage you. God will sometimes allow this to make you a better soldier. The following are some of the things that have been sent to interfere with me. This list is not complete.

Shadows Dampening Field

Spiders Force Field

Worm Holes Blackness

Black Holes Darkness

Alien Circuitry Blocks

In the name of The Lord Jesus Christ, I break the power of the Shadows over me. In Jesus’ name I bind the strongman over the Shadows and I toss him off his throne in Jesus’ name. Father I ask you to send angels to bind the strongman inside of boxes, inside of more boxes to 1,000,000 levels deep, with angels singing scripture to him night and day, in Jesus’ name. Father I ask you to send angels to guard that box so the demons cannot free him, in Jesus’ name. In Jesus’ name I bind all demons subordinate to the strongman over the Shadows. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all demons subordinate to the strongman over the Shadows to leave now, in Jesus’ name. In Jesus’ name I bind all other spirits and entities under the command of the strongman over the Shadows. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. In Jesus’ name I loose you from all commands, controls, attachments, mind control, programming, agreements, oaths and bonds to the strongman over the Shadows or the Shadows themselves. I command all demons to go where Jesus’ wants you to go and I command all other entities to go home and never return, in Jesus’ name I pray, amen. (Do this for each thing interfering)

Change The Quantum Matrix in your home

Father in heaven, In the name of The Lord Jesus Christ I ask you to change the quantum matrix in this sealed off house, across all space time continuums, all dimensions, all time lines and all frequency domains in this universe, across all bubbles in the omniverse and across all planes of existence so that:

The enemy’s jump gate technology will not function in this sealed off house.

The enemy’s fractal jump gate technology will not function in this sealed off house.

The enemy’s transporter technology will not function in this sealed off house.

The enemy’s fractal transporter technology will not function in this sealed off house.

The enemy’s time travel technology will not function in this sealed off house.

The enemy’s fractal time travel technology will not function in this sealed off house.

The enemy’s dimensional travel technology will not function in this sealed off house.

The enemy’s fractal dimensional travel technology will not function in this sealed off

house.

The enemy’s wormhole travel technology will not function in this sealed off house.

The enemy’s fractal wormhole travel technology will not function in this sealed off house.

The enemy’s implant technology will not function in this sealed off house.

The enemy’s walk-thru-walls technology will not function in this sealed off house.

The enemy’s sleep ray technology will not function in this sealed off house.

The enemy’s remote viewing capability will not function in this sealed off house.

The enemy’s radionics technology will not function in this sealed off house.

The enemy’s psychotronics technology will not function in this sealed off house.

The enemy’s psionic technology will not function in this sealed off house.

The enemy’s death signal technology will not function in this sealed off house.

The enemy’s disease signal technology will not function in this sealed off house.

Important note: When praying to change the quantum matrix, all members of a family should be holding hands or be in physical contact with one another. The head of the household prays and the other members should pray in agreement.

Change The Quantum Matrix inside yourself

Father in heaven, In the name of The Lord Jesus Christ I ask you to change the quantum matrix inside me, across all space time continuums, all dimensions, all time lines and all frequency domains in this universe, across all bubbles in the omniverse and across all planes of existence so that:

The enemy’s jump gate technology will not function on me.

The enemy’s fractal jump gate technology will not function on me.

The enemy’s transporter technology will not function on me.

The enemy’s fractal transporter technology will not function on me

The enemy’s time travel technology will not function on me.

The enemy’s fractal time travel technology will not function on me.

The enemy’s dimensional travel technology will not function on me.

The enemy’s fractal dimensional travel technology will not function on me.

The enemy’s wormhole travel technology will not function on me.

The enemy’s fractal wormhole travel technology will not function on me.

The enemy’s implant technology will not function on me.

The enemy’s walk-thru-walls technology will not function on me.

The enemy’s sleep ray technology will not function on me.

The enemy’s remote viewing capability will not function on me.

The enemy’s radionics technology will not function on me.

The enemy’s psychotronics technology will not function on me.

The enemy’s psionic technology will not function on me.

The enemy’s death signal technology will not function on me.

The enemy’s disease signal technology will not function on me.

Ask God for an energy shield against the enemy.

Father in heaven, in the name of The Lord Jesus Christ, I ask you to put around me an impenetrable, impregnable multi-layer, multi-phase, multispectral, multi-frequency domain, multi-dimensional, multi-continuum, multi-timeline shield around my physical body, etheric body, astral body and all my other energy bodies and all components that I consist of, across all space time continuums, time lines and dimensions in this universe, across all “bubbles” in the omniverse and across all planes of existence, in Jesus’ name I pray, amen.

SOUL TIES To CHAKRAS

Note: The following refers to the body’s energy centers known as chakras. It doesn’t matter if you believe they exist or not. God created them just like he created your arm or leg. The enemy attacks them and since most don’t believe they exist, the attack goes unchallenged and the damage will accumulate. Always divide the technology from the superstition. And never go looking for things or exploring outside of God’s protection. Just understand they exist and protect them from the enemy. And learn the difference between physical, metaphysical and spiritual.

In the name of the Lord Jesus Christ I break, dissolve, sever, crush & destroy every ungodly soul tie, hook, link and connection attached to my BASE chakra in Jesus’ name. In Jesus’ name I bind every thing that came into me from those connections. In Jesus’ name I close every door that was open to those things, I take away every legal bond and every legal hold they have on me and I cut them loose from all their assignments, in Jesus’ name. In the name of the Lord Jesus Christ I order every thing that came into me to leave now. Father, In Jesus’ name I ask you to send angels to bind up these things and return them to whoever sent them, to bring them to repentance, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I break, dissolve, sever, crush & destroy every ungodly soul tie, hook, link and connection attached to my SEX chakra in Jesus’ name. In Jesus’ name I bind every thing that came into me from those connections. In Jesus’ name I close every door that was open to those things, I take away every legal bond and every legal hold they have on me and I cut them loose from all their assignments, in Jesus’ name. In the name of the Lord Jesus Christ I order every thing that came into me to leave now. Father, In Jesus’ name I ask you to send angels to bind up these things and return them to whoever sent them, to bring them to repentance, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I break, dissolve, sever, crush & destroy every ungodly soul tie, hook, link and connection attached to my SPLEEN chakra in Jesus’ name. In Jesus’ name I bind every thing that came into me from those connections. In Jesus’ name I close every door that was open to those things, I take away every legal bond and every legal hold they have on me and I cut them loose from all their assignments, in Jesus’ name. In the name of the Lord Jesus Christ I order every thing that came into me to leave now. Father, In Jesus’ name I ask you to send angels to bind up these things and return them to whoever sent them, to bring them to repentance, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I break, dissolve, sever, crush & destroy every ungodly soul tie, hook, link and connection attached to my HEART chakra in Jesus’ name. In Jesus’ name I bind every thing that came into me from those connections. In Jesus’ name I close every door that was open to those things, I take away every legal bond and every legal hold they have on me and I cut them loose from all their assignments, in Jesus’ name. In the name of the Lord Jesus Christ I order every thing that came into me to leave now. Father, In Jesus’ name I ask you to send angels to bind up these things and return them to whoever sent them, to bring them to repentance, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I break, dissolve, sever, crush & destroy every ungodly soul tie, hook, link and connection attached to my THROAT chakra in Jesus’ name. In Jesus’ name I bind every thing that came into me from those connections. In Jesus’ name I close every door that was open to those things, I take away every legal bond and every legal hold they have on me and I cut them loose from all their assignments, in Jesus’ name. In the name of the Lord Jesus Christ I order every thing that came into me to leave now. Father, In Jesus’ name I ask you to send angels to bind up these things and return them to whoever sent them, to bring them to repentance, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I break, dissolve, sever, crush & destroy every ungodly soul tie, hook, link and connection attached to my THIRD EYE chakra in Jesus’ name. In Jesus’ name I bind every thing that came into me from those connections. In Jesus’ name I close every door that was open to those things, I take away every legal bond and every legal hold they have on me and I cut them loose from all their assignments, in Jesus’ name. In the name of the Lord Jesus Christ I order every thing that came into me to leave now. Father, In Jesus’ name I ask you to send angels to bind up these things and return them to whoever sent them, to bring them to repentance, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I break, dissolve, sever, crush & destroy every ungodly soul tie, hook, link and connection attached to my CROWN chakra in Jesus’ name. In Jesus’ name I bind every thing that came into me from those connections. In Jesus’ name I close every door that was open to those things, I take away every legal bond and every legal hold they have on me and I cut them loose from all their assignments, in Jesus’ name. In the name of the Lord Jesus Christ I order every thing that came into me to leave now. Father, In Jesus’ name I ask you to send angels to bind up these things and return them to whoever sent them, to bring them to repentance, in Jesus’ name I pray, amen.

BLOCKED CHAKRAS

In the name of the Lord Jesus Christ I bind all Blocks attached to my BASE chakra. In Jesus’ name I bind the strongman over the Blocks attached to my base chakra and I toss him off his throne in Jesus’ name.

In Jesus’ name, Father I ask you to send angels to bind the strong man inside of boxes, inside of boxes, to 1,000,000 levels deep, with angels reading scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all demons controlling these Blocks and I command you to leave now, in Jesus’ name. Father, please send angels to bind these demons and send them where you want them to go, in Jesus’ name. In Jesus’ name I break, deactivate, cut, sever and destroy every interconnect support device between these Blocks. In Jesus’ name I break, deactivate, cut, sever and destroy every hook device that allows attachment to my chakra, in Jesus’ name. In Jesus’ name I bind all Blocks to my authority in the third heaven and I command you to leave me now, in Jesus’ name. Father, please send angels to bind these Blocks and send them to where you want them to go, in Jesus’ name. Father in heaven, please send angels to repair all the damage done to me by these blocks and to change me so that they won’t be able to hook into me again, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I bind all Blocks attached to my SEX chakra. In Jesus’ name I bind the strongman over the Blocks attached to my base chakra and I toss him off his throne in Jesus’ name. In Jesus’ name, Father I ask you to send angels to bind the strong man inside of boxes, inside of boxes, to 1,000,000 levels deep, with angels reading scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all demons controlling these Blocks and I command you to leave now, in Jesus’ name. Father, please send angels to bind these demons and send them where you want them to go, in Jesus’ name. In Jesus’ name I break, deactivate, cut, sever and destroy every interconnect support device between these Blocks. In Jesus’ name I break, deactivate, cut, sever and destroy every hook device that allows attachment to my chakra, in Jesus’ name. In Jesus’ name I bind all Blocks to my authority in the third heaven and I command you to leave me now, in Jesus’ name. Father, please send angels to bind these Blocks and send them to where you want them to go, in Jesus’ name. Father in heaven, please send angels to repair all the damage done to me by these blocks and to change me so that they won’t be able to hook into me again, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I bind all Blocks attached to my SPLEEN chakra. In Jesus’ name I bind the strongman over the Blocks attached to my base chakra and I toss him off his throne in Jesus’ name.

In Jesus’ name, Father I ask you to send angels to bind the strong man inside of boxes, inside of boxes, to 1,000,000 levels deep, with angels reading scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all demons controlling these Blocks and I command you to leave now,

in Jesus’ name. Father, please send angels to bind these demons and send them where you want them to go, in Jesus’ name. In Jesus’ name I break, deactivate, cut, sever and destroy every interconnect support device between these Blocks. In Jesus’ name I break, deactivate, cut, sever and destroy every hook device that allows attachment to my chakra, in Jesus name. In Jesus’ name I bind all Blocks to my authority in the third heaven and I command you to leave me now, in Jesus’ name. Father, please send angels to bind these Blocks and send them to where you want them to go, in Jesus’ name. Father in heaven, please send angels to repair all the damage done to me by these blocks and to change me so that they won’t be able to hook into me again, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I bind all Blocks attached to my HEART chakra. In Jesus’ name I bind the strongman over the Blocks attached to my base chakra and I toss him off his throne in Jesus’ name.

In Jesus’ name, Father I ask you to send angels to bind the strong man inside of boxes, inside of boxes, to 1,000,000 levels deep, with angels reading scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all demons controlling these Blocks and I command you to leave now, in Jesus’ name. Father, please send angels to bind these demons and send them where you want them to go, in Jesus’ name. In Jesus’ name I break, deactivate, cut, sever and destroy every interconnect support device between these Blocks. In Jesus’ name I break, deactivate, cut, sever and destroy every hook device that allows attachment to my chakra, in Jesus’ name. In Jesus’ name I bind all Blocks to my authority in the third heaven and I command you to leave me now, in Jesus’ name. Father, please send angels to bind these Blocks and send them to where you want them to go, in Jesus’ name. Father in heaven, please send angels to repair all the damage done to me by these blocks and to change me so that they won’t be able to hook into me again, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I bind all Blocks attached to my THROAT chakra. In Jesus’ name I bind the strongman over the Blocks attached to my base chakra and I toss him off his throne in Jesus’ name. In Jesus’ name, Father I ask you to send angels to bind the strong man inside of boxes, inside of boxes, to 1,000,000 levels deep, with angels reading scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all demons controlling these Blocks and I command you to leave now, in Jesus’ name. Father, please send angels to bind these demons and send them where you want them to go, in Jesus’ name. In Jesus’ name I break, deactivate, cut, sever and destroy every interconnect support device between these Blocks. In Jesus’ name I break, deactivate, cut, sever and destroy every hook device that allows attachment to my chakra, in Jesus’ name. In Jesus’ name I bind all Blocks to my authority in the third heaven and I command you to leave me now, in Jesus’ name. Father, please send angels to bind these Blocks and send them to where you want them to go, in Jesus’ name. Father in heaven, please send angels to repair all the damage done to me by these blocks and to change me so that they won’t be able to hook into me again, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I bind all Blocks attached to my THIRD EYE chakra. In Jesus’ name I bind the strongman over the Blocks attached to my base chakra and I toss him off his throne in Jesus’ name. In Jesus’ name, Father I ask you to send angels to bind the strong man inside of boxes, inside of boxes, to 1,000,000 levels deep, with angels reading scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all demons controlling these Blocks and I command you to leave now, in Jesus’ name. Father, please send angels to bind these demons and send them where you want them to go, in Jesus’ name. In Jesus’ name I break, deactivate, cut, sever and destroy every interconnect support device between these Blocks.

In Jesus’ name I break, deactivate, cut, sever and destroy every hook device that allows attachment to my chakra, in Jesus’ name. In Jesus’ name I bind all Blocks to my authority in the third heaven and I command you to leave me now, in Jesus’ name. Father, please send angels to bind these Blocks and send them to where you want them to go, in Jesus’ name. Father in heaven, please send angels to repair all the damage done to me by these blocks and to change me so that they won’t be able to hook into me again, in Jesus’ name I pray, amen.

In the name of the Lord Jesus Christ I bind all Blocks attached to my CROWN chakra. In Jesus’ name I bind the strongman over the Blocks attached to my base chakra and I toss him off his throne in Jesus’ name.

In Jesus’ name, Father I ask you to send angels to bind the strong man inside of boxes, inside of boxes, to 1,000,000 levels deep, with angels reading scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all demons controlling these Blocks and I command you to leave now, in Jesus’ name. Father, please send angels to bind these demons and send them where you want them to go, in Jesus’ name. In Jesus name I break, deactivate, cut, sever and destroy every interconnect support device between these Blocks. In Jesus’ name I break, deactivate, cut, sever and destroy every hook device that allows attachment to my chakra, in Jesus’ name. In Jesus’ name I bind all Blocks to my authority in the third heaven and I command you to leave me now, in Jesus’ name. Father, please send angels to bind these Blocks and send them to where you want them to go, in Jesus’ name. Father in heaven, please send angels to repair all the damage done to me by these blocks and to change me so that they won’t be able to hook into me again, in Jesus’ name I pray, amen.

Cancel Satan’s plan in your life

Satan has a plan for everyone’s life, just as GOD has a plan for everyone’s life. That plan has someone in charge of it and a lot of subordinate spirits directing it. It is a very good idea to get rid of Satan’s plan and substitute GOD’s plan.

In the name of The Lord Jesus Christ, I bind the strongman over Satan’s plan for my life and I toss him off his throne in Jesus name. Father I ask you to send angels to bind this strongman inside of boxes, inside of more boxes to 1,000,000 levels deep, with angels singing scripture to him night and day, in Jesus name. Father I ask you to send angels to guard that box so the demons cannot free him, in Jesus name. In Jesus name I bind all demons subordinate to the strongman over Satan’s plan for my life. In Jesus name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus name. I command all demons subordinate to the strongman over Satan’s plan for my life to leave now, in Jesus name. In Jesus name I bind all other spirits and entities under the command of the strongman over Satan’s plan for my life. In Jesus name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus name. In Jesus name I loose you from all commands, controls, attachments, mind control, programming, agreements, oaths and bonds to the strongman over Satan’s plan for my life or any of his subordinates. I command all demons to go where Jesus wants you to go and I command all other entities to go home and never return, in Jesus name I pray, amen.

Akashic Records

While praying one night I was led to believe that the forces of darkness use the Akashic records 13 database against people and that it would in fact be a good idea to remove oneself from it. It is quite possible that Lucifer himself is the owner of such a database. I believe the following prayer accomplished that objective.

Father, in the name of The Lord Jesus Christ I break, crush, destroy and sever every soul tie, hook, link, connection, attachment and device from myself to the Akashic records and from the Akashic records back to myself, in Jesus’ name. Father, I ask you to remove, delete, purge and destroy all my records, images, thoughts, words and actions stored in this system as well as all duplicate copies, backup copies, emergency copies and extra copies stored anywhere in creation, in Jesus’ name. Father, I ask you to totally remove me from every system, database, storage device, archive and library owned or operated by the forces of darkness and to prevent my information from being put back into those systems, in Jesus’ name I pray, amen.

13 Akashic Records: A theosophical term referring to an universal filing system which records every occurring thought, word, and action. The records are impressed on a subtle substance called akasha (or Soniferous Ether). In Hindu mysticism this akasha is thought to be the primary principle of nature from which the other four natural principles, fire, air, earth, and water, are created. These five principles also represent the five senses of the human being. Some indicate the akashic records are similar to a Cosmic or collective consciousness. The records have been referred to by different names including the Cosmic Mind, the Universal Mind, the collective unconscious, or the collective subconscious. Others think the akashic records make clairvoyance and psychic perception possible. From an metaphysical database website www.themystica.com

Defeating Electronic Witchcraft

Ask God to have the angels destroy the hardware, software, systems, networks and

energy supplies of the attacking installation. Spells can be and are transmitted by radionics.

Ask for help

Heavenly Father, In the name of The Lord Jesus Christ I come to you and I praise you and Thank You for the blessings you have given to Stephanie and I. Thank You for keeping us safe and sound against the attacks of the enemy. In Jesus’ name I ask you to please free Stephanie from these attacks and keep her safe from the enemy. In Jesus’ name, please remove all these things attacking Stephanie and send them back to whoever sent them, in Jesus’ name I Pray, Amen.

Ask for tactical information

Father, In The name Of The Lord Jesus Christ, I ask you to please give me discernment to discover where these attacks are coming from and to give me wisdom, knowledge, understanding and determination to defeat the enemy making these attacks, in Jesus name I pray, amen.

Break curses

In the name of The Lord Jesus Christ I break every curse, every spell, every psychic prayer and attack put upon Stephanie by any person, place, thing, witch, occult source, psychic source, Reptilian, Draconian, Grey, Insect or any other entity, in Jesus’ name. In Jesus’ name I bind every thing that came into Stephanie from those curses, spells, psychic prayers and attacks. In Jesus’ name I cut you spirits loose from all your assignments, I take away every legal ground and legal hold you have on Stephanie and I close every door that was opened to you, in Jesus’ name.

In Jesus’ name, I order every thing that came into Stephanie to leave her now. Father, please send these things back to who or whatever sent them, to bring them to repentance, in Jesus’ name I pray, Amen.

Change your frequencies

In the name of The Lord Jesus Christ, Father I ask you to change all of Stephanie’s frequencies so that the radionics machines won’t be able to lock on to her and so that the enemy won’t be able to find her, in Jesus’ name I pray, Amen.

Remove energy drains

In the name of The Lord Jesus Christ, I break every energy drain put upon Stephanie and I command everything that came into Stephanie from that energy drain to leave her now, in Jesus’ name, amen.

Deactivate the radionics machine

In the name of the Lord Jesus Christ, I bind the strongman over the radionics machine attacking Stephanie and I throw him off his throne, in Jesus’ name. In Jesus’ name Father I ask you to send angels to bind the strongman over the radionics machine attacking Stephanie. I ask you to bind him inside of boxes, inside of boxes, 1,000,000 levels deep, with angels singing scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all subordinate demons that are directing and controlling the radionics machine attacking Stephanie. I cut you loose from all you assignments, I remove every legal hold and legal ground you have on Stephanie and I close every door that was opened to you, in Jesus’ name. I command you to leave the machine now, in Jesus’ name. In Jesus’ name I command the radionics machine to be dead, deactivated and destroyed permanently, in Jesus’ name.

Deactivate the spell

In the name of the Lord Jesus Christ, I bind the strongman over the spell put upon the object inside the witness well of the radionics machine attacking Stephanie and I throw him off his throne, in Jesus’ name. In Jesus’ name Father I ask you to send angels to bind the strongman over the spell put upon the object inside the witness well of the radionics machine attacking Stephanie. I ask you to bind him inside of boxes, inside of boxes, 1,000,000 levels deep, with angels singing scripture to him night and day, in Jesus’ name. In Jesus’ name, I bind all subordinate demons that are directing and controlling the spell put upon the object inside the witness well of the radionics machine attacking Stephanie. I cut you loose from all you assignments, I remove every legal hold and legal ground you have on Stephanie and I close every door that was opened to you, in Jesus’ name. I command you to leave the object now, in Jesus’ name. In Jesus’ name I command the witness well object to be dead, deactivated and destroyed permanently, in Jesus’ name I pray, amen.

Sever all soul ties

In the name of The Lord Jesus Christ I break, cut, sever, dissolve and destroy every soul tie, hook, link and connection attached to Stephanie from any external source, in Jesus’ name. I command everything that came into Stephanie from those soul ties, hooks, links and connections to leave her NOW in Jesus’ name. Father, I ask you to send all these things back to whoever sent them, to bring them to repentance. in Jesus’ name I pray, Amen.

Praise God for His help

Heavenly Father, In the Name of The Lord Jesus Christ I come to you and I praise you and Thank You for the blessings you have given to me. Thank You for keeping me safe and sound against the attacks of the enemy. In Jesus’ name I ask you to please free me from these attacks and keep me safe from the enemy. In Jesus’ name, please remove all these things attacking me and send them back to whoever sent them, In Jesus’ Name I Pray, Amen.

Ask God for tactical information

Father, In The Name Of The Lord Jesus Christ, I ask you to please give me discernment to discover where these attacks are coming from and to give me wisdom, knowledge, understanding and determination to defeat the enemy making these attacks, in Jesus’ name I pray, amen.

Break general or ordinary attacks on your self (do this a few times)

In the name of The Lord Jesus Christ I break every curse, every spell, every psychic prayer and attack put upon me by any person, place, thing, witch, occult source, psychic source, Reptilian, Draconian, Grey, Insect or any other entity, In Jesus’ name. In Jesus’ name I bind every thing that came into me from those curses, spells, psychic prayers and attacks. In Jesus name I cut all such spirits loose from all your assignments, I take away every legal ground and legal hold you have on me and I close every door that was opened to you, In Jesus’ name. In Jesus’ name, I order every thing that came into me to leave me now. Father, please send these things back to who or whatever sent them, to bring them to repentance, In Jesus’ name, Amen.

Remove any extra soul ties or enemy surprises

In the name of The Lord Jesus Christ I break, cut, sever, dissolve and destroy every soul tie, hook, link, connection, attachment and device of an ungodly type attached to me from any external source, in Jesus’ name. I command everything that came into me from those soul ties, hooks, links, connections, attachments and devices to leave me NOW in Jesus’ name. Father, I ask you to send all these things back to whoever sent them, to bring them to repentance, in Jesus’ name I pray, Amen

Break and remove the energy drain

In the name of The Lord Jesus Christ, I break, crush, dissolve, sever, smash and destroy every energy drain of every type put upon me and I command everything that came into me from those energy drains to leave me now, in Jesus’ name.

Remove all attachments to the energy drain

In the name of The Lord Jesus Christ, I break, crush, dissolve, sever, smash and destroy every soul tie, hook, link, connection and attachment between myself and whoever or whatever put the energy drain in me and I command everything that came into me from those soul ties, hooks, links, connections or attachments to leave now, in Jesus’ name.

Repair the damage

Father, In the name of The Lord Jesus Christ, I ask you to repair all the damage done to me by this attack. I ask you to reverse all the injury done to my physical body, etheric body, astral body and all my energy bodies, in Jesus’ name I pray, amen.

Remove all relationships to photographs (*** VERY IMPORTANT ***)

Father, In the name of The Lord Jesus Christ, I ask you break every soul tie, hook, link, connection, attachment and relationship between myself and every photograph or image that has ever been created of me, in Jesus’ name I pray, amen.

Change your bio frequencies

In the name of The Lord Jesus Christ, Father I ask you to change all of my frequencies so that the metaphysical science technology won’t be able to lock on to me, in Jesus’ name, Amen.

Attack and destroy the source of the problem

In the name of The Lord Jesus Christ, Father I ask you to send millions and millions of legions of angels to directly attack the place from which this attack originated. Father, please direct the angels to destroy the hardware, software, systems, files, backup files, networks, routers and energy supplies of the attacking installation, in Jesus’ name I pray, amen.

Destroying a Coven

Disclaimer: The following information is made available to assist believers to resist the attacks of those individuals that have chosen the “left hand” path of the occult (black magic). You know who you are. This article is not an attack upon any group or individual that does not harm others. The response to this article by those that serve the dark side is predictable. I am not responsible for any consequences to anyone as the result of any attack directed against my family or myself. (The real book of shadows declares that you shall not cast upon a child of the living God. You should obey your own religion)

The following procedure has proven useful when being attacked by witchcraft from multiple targets (a coven, triad or other group). When dealing with occultists I have found two main ways to counter their attacks.

· Hard way: Whatever was sent to me would be returned to them

multiplied by a factor of 1000, 100,000 or a million. After much

experience I would now only do this in an emergency if the attacks

were very damaging. The problem with this type of countermeasure is

that the resources of the enemy are large and that they can attack you

in a “swarm” and escalate the battle beyond what you may be able to

take. Another problem is that the enemy still exists and the attacks just

get bigger. It would be better if the enemy was eliminated and so the

source of the attack would vanish.

· Soft Way: I believe that this is the more effective type of

countermeasure. In this procedure we use spiritual warfare techniques

to “disassemble” the attacking group and eliminate each component

individually. This takes more prayer, discernment and time, however

the end result is more effective and longer lasting. There are five main

targets in this counter attack:

1. The strongman over the attack

2. Whoever ordered the attack

3. Whoever executed the attack

4. Any machines or devices involved in the attack

5. The curse, spell or psychic attack itself

When you are being attacked by those trapped in the occult, remember that they are not your enemy. These are human beings, with families, that also have wants and needs and that love, just like you do. They are trapped and ensnared in things that they never knew existed and by the time they learned, it was too late. Many of these people were born into families where they have been abused and/or subjected to mind control since early childhood. All practitioners of the occult suffer from soul fragmentation. After participation in their first initiation, their soul is fragmented and they aren’t quite the same person as they were before that procedure. After each ritual less and less of the original soul remains and more and more of the enemy takes hold upon them.

God wants these people to be freed, just like He is freeing you. Your enemies are the entities that influence and control these occultists, whether grey alien, reptilian, draconian, demon, power, principality, world ruler or any other demon or life form. Occultists are a dime a dozen. Satanist, Wicca witch, Druid witch, Freemason or any member of any secret society or secret church, it doesn’t matter. The demonic hierarchy is constantly recruiting new members and burning out and sacrificing old ones. Do not worry about their numbers. Just pray for whomever God puts in your path.

Occultists never win You should be encouraged to remember that those who practice the occult arts to kill, hurt, influence or control others can never be victorious. Occult power comes from the demonic world and is limited in strength. An individual practitioner derives power and influence from the number and rank of demonic spirits that have come into them by way of casting spells, performing rituals and direct conjuring of demons. During this learning period soul fragmentation gets worse and as time goes on very little of the original human being remains. This is true whether a person is born into an occult surrounding or whether they are trained by occult books and the demons contained within them.

An individual human body can only be subject to a certain amount of this abuse before it begins to break down and various diseases appear. By the time the practitioner realizes what is happening, it is too late. As time goes on they require more and more life force energy to keep the demons at bay. They are forced to steal this energy from other beings (animal and human) by the use of ritual and sacrifice. High-level initiates frequently utilize the techniques related to tantra yoga to steal energy from children during ritual. Eventually the practitioner is unable to obtain enough energy and they are taken over completely or destroyed.

The occultist has only two choices. They can attack you and they will be defeated and probably damaged in the fight. Or they can ignore you and search for easier prey. Also remember that you are soldier and it is your job to do whatever God tells you, nothing else. It is not your job to save the world by yourself or to compare yourself with any other person. Learn and study and God will put you to work. In contrast to this, the life of the believer in The Lord Jesus Christ has no such limitations or problems. Because of the shed blood of Jesus, the believer is spiritually at the same level as the creator of the universe Himself! No enemy of any kind can ever defeat the believer. Every enemy of Jesus Christ was defeated when Jesus was resurrected over 2000 years ago. These enemies of Jesus Christ are just living on borrowed time.

It is clear to me that God gives his children complete victory over the enemy’s attacks even so far as changing the very structure of space-time itself so that the enemy’s devices will be brought to nothing. All we have to do is put the world behind us, stand forward, have faith in our Lord and determination in ourselves. Always remember that by praying for the enemy and helping turn them away from the dark side, you do massive damage to the kingdom of Satan. The results echo throughout the kingdom of darkness and do much to undermine Satan’s authority and power.

Soft Way

Eliminate the strong man over the attack

In the name of The Lord Jesus Christ, I break the power of this attack over me. In Jesus’ name I bind the strong man over this attack and I toss him off his throne in Jesus’ name. Father I ask you to send angels to bind this strong man inside of boxes, inside of more boxes to 1,000,000 levels deep, with angels singing scripture to him night and day, in Jesus’ name. Father I ask you to send angels to guard that box so the demons cannot free him, in Jesus’ name.

Eliminate subordinates of the strong man over the attack

In Jesus’ name I bind all demons subordinate to the strong man over this attack upon me. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all demons subordinate to the strong man over this attack upon me to leave now, in Jesus’ name.

**The “strong man” is a demon that has delegated authority over a certain thing.

No man can enter into a strong man’s house, and spoil his goods, except he will first bind the strong man; and then he will spoil his house. Mark 3:27 KJV

Eliminate slaves of the strong man over the attack

In Jesus’ name I bind all other spirits and entities under the command of the strong man over this attack upon me and in Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal bond that you have on me, in Jesus’ name. In Jesus’ name I loose you from all commands, controls, attachments, mind control, programming, agreements, oaths and bonds to the strongman over this attack upon me or the subordinates of the strong man and I command all demons to go where Jesus’ wants you to go and I command all other entities to go home and never return, in Jesus’ name I pray, amen.

Eliminate demonic infrastructure of the strong man over the attack

In Jesus’ name I break, crush, sever, dissolve, smash and destroy all the demonic infrastructure of this strong man. Father, I ask you to please send hundreds, hundreds, hundreds and hundreds of millions of legions of angels to attack and destroy this strong man’s computers, networks, programs, storage devices, data files, backup data files, communication lines and power sources and every other component of his infrastructure that I do not know about, in Jesus’ name I pray, amen.

Break ties with originator of the attack

In the name of the Lord Jesus Christ I break, dissolve, sever, crush & destroy every ungodly soul tie, hook, link, attachment and connection between myself and the originator of this attack and between the originator of this attack and myself in Jesus’ name. In Jesus’ name I bind every thing that came into me from those connections. In Jesus’ name I close every door that was open to those things, I take away every legal bond and every legal hold they have on me and I cut them loose from all their assignments, in Jesus’ name. In the name of the Lord Jesus Christ I order every thing that came into me to leave now. Father, In Jesus’ name I ask you to send angels to bind up these things and return them to whoever sent them, to bring them to repentance, in Jesus’ name I pray, amen.

Eliminate the strong man over the originator of the attack

In Jesus’ name I bind the strong man over the originator of this attack and I toss him off his throne in Jesus’ name. Father I ask you to send angels to bind this strong man inside of boxes, inside of more boxes to 1,000,000 levels deep, with angels singing scripture to him night and day, in Jesus’ name. Father I ask you to send angels to guard that box so the demons cannot free him, in Jesus’ name.

Eliminate subordinates of the strong man over the originator of the attack

In Jesus’ name I bind all demons subordinate to the strong man over the originator of this attack upon me. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all demons subordinate to the strong man over the originator of this attack upon me to leave now, in Jesus’ name.

Eliminate slaves of the strong man over the originator of the attack

In Jesus’ name I bind all spirits, entities, slaves and prisoners under the command of the strong man over the originator of this attack upon me and in Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. In Jesus’ name I loose you from all commands, controls, attachments, mind control, programming, agreements, oaths and bonds to the strong man over the originator of this attack upon me or the subordinates of the strong man and I command all demons to go where Jesus’ wants you to go and I command all other entities to go home and never return, in Jesus’ name I pray, amen.

Eliminate demonic infrastructure of the strong man over the originator of the attack

In Jesus’ name I break, crush, sever, dissolve, smash and destroy all the demonic infrastructure of this strong man. Father, I ask you to please send hundreds, hundreds, hundreds and hundreds of millions of legions of angels to attack and destroy this strong man’s computers, networks, programs, storage devices, data files, backup data files, communication lines and power sources and every other component of his infrastructure that I do not know about, in Jesus’ name I pray, amen.

Eliminate originator of the attack

Heavenly Father, in the name of the Lord Jesus Christ, I break, crush, sever, smash, dissolve and destroy every curse, spell, psychic prayer and attack put upon me by the originator of this attack in Jesus’ name I pray, amen. In Jesus’ name I break every soul tie, hook, link, attachment, connection and device between myself and the originator of this attack and between the originator of this attack and myself, in Jesus’ name. In Jesus’ name I bind everything that came into me from these soul ties, hooks, links and connections and I cut you loose from all your assignments, I close all doors open to you and I take away every legal hold and legal ground you have to attack me, in Jesus’ name. In the name of The Lord Jesus Christ, I break every curse, spell and psychic prayer that made the originator of this attack the way they are. In Jesus’ name, Father I ask you to send as many legions of angels as necessary to bind all demons in the originator of this attack, that give them their power, rank, prestige, wealth, metaphysical abilities and position and I ask you to remove those demons and send them far away, in Jesus’ name. In Jesus’ name I break, crush and destroy all bonds of mind control and coercion this entity is under and I cancel and void all oaths, contracts and agreements this entity is under, in Jesus’ name. Father, I ask you to free the mind of originator of this attack and allow them choose their destiny without influence of any kind, in Jesus’ name I pray, amen.

Eliminate subordinates of the originator of the attack

In Jesus’ name I bind all demons and entities subordinate to the originator of this attack upon me. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all subordinates to the originator of this attack upon me to leave now, in Jesus’ name. In Jesus’ name I break, crush and destroy all bonds of mind control and coercion these subordinates are under and I cancel and void all oaths, contracts and agreements that control them, in Jesus’ name. Father, I ask you to free the mind of these subordinates and allow them choose their destiny without influence of any kind, in Jesus’ name I pray, amen.

Eliminate slaves of the originator of the attack

In Jesus’ name I bind all slaves, prisoners and remaining entities of the originator of this attack upon me. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all slaves and prisoners of the originator of this attack upon me to leave now, in Jesus’ name. In Jesus’ name I break, crush and destroy all bonds of mind control and coercion these slaves and prisoners are under and I cancel and void all oaths, contracts and agreements that control them, in Jesus’ name. Father, I ask you to free the mind of these slaves and prisoners and allow them choose their destiny without influence of any kind, in Jesus’ name I pray, amen

Eliminate infrastructure of the originator of the attack

Father, I ask you to please send hundreds, hundreds, hundreds and hundreds of millions of legions of angels to attack and destroy the computers, networks, programs, storage devices, data files, backup data files, communication lines and power sources and every other component of the infrastructure of the originator of this attack, in Jesus’ name I pray, amen.

Eliminate the strong man over the attacker(s)

In Jesus’ name I bind the strong man over the attacker executing this attack and I toss him off his throne in Jesus’ name. Father I ask you to send angels to bind this strongman inside of boxes, inside of more boxes to 1,000,000 levels deep, with angels singing scripture to him night and day, in Jesus’ name. Father I ask you to send angels to guard that box so the demons cannot free him, in Jesus’ name.

Eliminate subordinates of the strong man over the attacker(s)

In Jesus’ name I bind all demons subordinate to the strong man over the attacker executing this attack upon me. In Jesus’ name I cut you loose from all your assignments, I close every door that was opened to you and I cancel every legal hold and every legal ground that you have on me, in Jesus’ name. I command all demons subordinate to the strong man over the attacker to leave now, in Jesus’ name. In Jesus’ name I loose you from all commands, controls, attachments, mind control, programming, agreements, oaths and bonds to the strong man over the attacker and I command all demons to go where Jesus’ wants you to go and I command all other entities to go home and never return, in Jesus’ name I pray, amen.

Eliminate slaves of the strong man over the attacker(s)

In Jesus’ name I bind all other spirits, entities, slaves and prisoners under the command of t…

Related Images:

NSA transmissions ELF mind control Cancer corruptions (July 1, 2010)

Description

IN THE UNITED STATES DISTRICT COURTS

FOR THE DISTRICT OF COLUMBIA

MIREILLE TORJMAN CASE NO.:

Plaintiff

V.

FEDERAL BUREAU OF INVESTIGATIONS, et al.

935 Pennsylvania Avenue Northwest

Washington, DC 20535-0001;

CENTRAL INTELLIGENCE AGENCY

Office of Public Affairs

Washington, D.C. 20505;

NATIONAL SECURITY AGENCY

9800 Savage Road, Suite 6711

Fort Meade, MD 20755-6711;

DEPARTMENT OF JUSTICE

600 E Street, N.W.

Washington, D.C. 20530;

DEPARTMENT OF DEFENSE

1400 Defense Pentagon

Washington, DC 20301-1400;

DEPARTMENT OF ENERGY

1000 Independence Ave

Washington, DC 20585;

UNITED STATES OF AMERICA

Defendants

COMPLAINT

1. Plaintiff, Mireille Torjman hereby brings this action for injunction relief and damages based on personal knowledge and belief, as a victim and expert witness, to the information provided, as to all other matters, as to which allegations Plaintiff, without doubt or delusion, will provide proof, unrefuted evidence, overwhelming evidentiary support, witnesses, substantial facts, research, and investigation that exists as follows:

PRELIMINARY STATEMENT

2. This case is about the wiretapping, civil rights violations, privacy, communications technology, and crimes of humanity, in use by the Intelligence Community. With the advanced technology unknown to most, of shadow network of surveillance and spying under DARPA projects, defendants are, transmitting, intercepting, tampering, and blocking the content of a significant portion of the Plaintiff’s phone calls, emails, instant messaging, text messaging, www, Skype, electronic and wireless communications, and other communications, both internationally and domestic, including Plaintiff’s family and practically every American, for the past 4 years, beginning on or about January 2007.

3. Plaintiff’s records will show communications are intercepted, manipulated, tampered with, stored, (data mining), harassed, and impeded. Plaintiff will provide numerous emails hijacked, fabricated, UNREAD, manipulated, deleted, including facsimile, and internet manipulations, since 2007. Plaintiff’s numerous impeded electronic communications with all her service providers were debilitating to her work and she had no resolve available from providers who were not able to correct or detect the situations. This includes manufactured emails, phone calls, and government employee’s unwitting involvement. In 2008, Plaintiff was also accused legally of false communications during her service with Qwest, by using wiretapped calls and disconnects to create false records with her utilities company, including defamation to her character. (Kay Griggs, Military wife; whistle blow case on tampered communication CHAOS and automobile impediments not to testify).

4. Plaintiff is not delusional and has provided her records to DOJ in early 2009, with documents from many other credible sources and whistle blowers. Plaintiff requests that the Russell Tice case and Articles below § 35 is read with disclosures being made as to her allegations, Injunction relief, various separate counts, and tort damages throughout. Plaintiff has demonstrated courage, risked her reputation, risked her life, and family’s, and has been threatened, prior to receiving an anonymous email of the NSA article (below) in February 2009. Plaintiff tried to blow the whistle to the DA late 2007, and was not aware what NSA was or government corruption, but knew she had to report what was going on. As quoted by Mr. Tice and others; “Statement by NSA, “THE TIP OF THE ICEBERG and WIRETAPPING SURVEILLANCE LOOK LIKE SMALL POTATOES”. Most recently, Plaintiff was able to meet with the FBI in early 2010, and provided some information for investigation by various FBI analysts.

5. The President and other executive officials have described some activities of surveillance and spying which are conducted outside the procedures of the Foreign Intelligence Surveillance Act (“FISA”) and without authorization by the Foreign Intelligence Court, Communities, Committees, Senate, or Congress.

6. As with The Attorney General and the Director of National Intelligence having since publicly admitting that the TSP was only one particular aspect of the surveillance activities authorized by the

Programs, and are being abused. (Jewel v United States, United States v Yahoo)

7. In addition to eavesdropping on or reading specific communications, Defendants have intercepted the communications contents across the United States and overseas, and targeted the Plaintiff with intense sabotage and impediments, Electronic Stalking, Slander, including Internet Communications, and Google’s Access Portals. Plaintiff wrote to Google to let them know what was going on behind the scenes with all the tampering including remote viewing, password access, and covert data-mining in SG3 dating back prior to 911. (EFF v Google and Street View) DOD’s ELF transmitters were already in full scale by 1981 in Australia and Africa, followed by additional covert superior Projects as Combat Zones also under DARPA formerly ARPA)

ALLEGATIONS AND FACTUAL ALLEGATIONS RELATED TO ALL COUNTS

8. With suspicious FBI allegations and $122 Million Virtual Case File Project gone wrong in 2001, prior Board Members and Government Officials’, the new Parent Company SAIC’s (C I A Spacestar) servers and the (“Occult Connections”). Chief of Staff Jack E Thomas Air Force Intelligence, 1997 ties with DOD, NSA, CIA, and former Executives, Directors, Secretaries, Army Generals, all had knowledge of REMOTE VIEWING experiments spy biz, SPAWAR at the Naval Electronics System Command in San Diego and Los Alamos National Labs for Medical Oversight to American Intelligence Agencies (1996). A surge of Federal Spending raised Multi-Billion dollar Defense concerns with SAIC and Titan (moon) in 2004 (San Diego) and the mid 90’s on technology projects that REQUIRE HUMAN EXPERIMENTING as well. These BLACK BUDGETS are corruption hiding behind SSP.

9. Joseph McMoneagle, eventually revealed as such, but for the purposes of the Army’s psychic intelligence unit, he was simply Remote Viewer No. 1.” In his Memoirs of a Psychic Spy is a look at the most remarkable exploits in a most astonishing career of military service. Remote Viewer 001 in Army’s Stargate Project reports this as still classified. The top secret intelligence gathering initiative launched at height of Cold War- David Morehouse 1998. This project was first used to retrieve intentions in a criminal or terrorist’s mind. (The Lucid View, Investigations in Occultism, 2004 and included in MK ULTRA is Project “VOICE of GOD”) This is used for unexplained phenomenon and to manipulate religion and/or to compel a crime, command or order. It is undeniable that government agencies have tested citizens without permission as The Manchurian Candidates in the United States and the IRS. Cognitive Sciences Laboratories CIA research 24 years ago when Tom Beardon warned about these weapons and activities as serious dangers.

10. The core component of these Programs is Defendants’ nationwide network of sophisticated communications surveillance and spy devices installed overtly. NSA transmissions and NASA Remote Viewing have been in place and are being connected to the key facilities of telecommunications with advanced technologies like that of HAARP stations and Satellites for many years prior and covertly. As Quantum Physics (sound and/or radio WAVES) and subliminal are being used for Spying and breaching contracts with other Countries and Embassies, HAARP is used for Earth and human manipulations. (Jerry Smith, Jim Keith; Politician and Dr. Nick Begich, Alaska; “HAARP; THE ULTIMATE CONSPIRACY” 1998) The “Method of Inducing Mental Emotional and Physical States in Human Beings” was patented for the CIA in Virginia in 1993.

11. These projects of CointelPro, Psyops experiments for drones, and Surveillance/spying have continued covertly to develop weapons that were first patented by Russia and China. Since the 1950’s, first revealed to the public were the Alien UFO Projects, and the subliminal cravings of coca cola, movies and pop corn. Shortly thereafter as technology advanced, mass control continued to this day nefariously against all Americans, called NSA transmissions today. Since 1974 under the Pentagon, DOD funded the ELF radio broadcasting in conjunction with hypnotic control and prior to that Doctors Bill Nelson and Tom Beardon had their own patents at NASA on Medicinal Energy and Biofeedback, already in use in other Countries with the same remote scalar waves and frequencies. (Apollo and Whistleblowers Second craft 11, shadowing Apollo 13 and no witnesses returned after the Shuttle)

12. In early 2008, after 25 years of being an accountant, and raised in the Mediterranean, Plaintiff purchased the Non FDA device from a NASA physicist at $21,000.00 with Scalar waves, (Russian Woodpecker frequencies), and Military Patents. Plaintiff became a certified practitioner to protect herself and attempt to deprogram. Plaintiff was intercepted by this HAARP and NSA’s SIG-INT Satellites, thus became a certified hypnotist trained in NLP (Neuro-Linguistic Programming; CIA taught techniques, (Bandler and Grinder 1976) and (Project Paperclip; Dr. Strughold Space Medicine 1963)

13. In her travels, Plaintiff witnessed these transmissions used in Israel, Australia, England, European Countries, and was further impeded when attempting to whistle blow the nefarious uses and crimes of humanity, to the embassies. Plaintiff will show documents or connections to MAFIOSO, KGB, and AL Qaeda, within the CIA, as with Donald Rumsfeld and his banking ties. World Banks (1910) JP Morgan, Black Budgets, and Nikola Tesla 1940)

14. Some aspects of the Programs of MKULTRA were publicly acknowledged by President Clinton with partial apologies on October 3, 1995 as past tense and not being done currently to down play their uses. The Pentagon has new buzz words SYNTHETIC TELEPATHY-Psychotronics. However, Plaintiff spoke with many other victims today, and the latest FT Hood Mind Control soldier. Psychotronics also has a non-profit organization of former scientists and whistleblowers of same. (Lynn Surgella-Cancer; Central Nervous System diseases and Immune System-FDA drug corruptions) Furthermore, under DOD, Combat Zones That See, or CTS, project of the United States Defense Advanced Research Projects Agency (DARPA-1957) whose goal was to “track everything that moves” in a city by linking up a massive network of surveillance cameras to a centralized computer system. (Russell Tice called Spy Apparatus.) Artificial intelligence software will then identify and track all movement throughout the city. In 1958, immediately after Sputnick, DARPA began to secure our space and airways with these Directed Energy Weapons. (Project AGILE-1966 Pentagon). Plaintiff has knowledge that after this project was field-tested with experiments on Vietnam VETERANS disguised as Agent Orange. Plaintiff spoke with many suffering from ELF induced nervous central system attacks and complain of mind control. One of many victims is suing the Bar due to the VA computer systems uses. In an undisclosed report dated March 9, 2005, 8 more projects with strategic thrusts included Bio-Revolution, DIRECTED ENERGY, and Urban Operation of sensors on the existing Airborne Video Surveillance, all under the Iraq theory, also data mining all information from the Human. CTS is described by DARPA as intended for use in combat zones, to deter enemy attacks on American troops and to identify and track enemy combatants who launch attacks against American soldiers, under Martial Law for a Police State and legalize Fascism.

DARPA’s current Projects, XG, Robotic assured Military communication, CALO; Cognitive Impairment (ADDHD and Optical), and Silent Talk; A planned program attempting to identify EEG patterns for words and transmit these for covert communications. Telepathy were part of the tests the Plaintiff was sent for, including warming her blood without the Doctor’s consent and her eyes physically taken over by an MRI, data mining the Plaintiff’s optic pattern, DNA, and more. This computer-mediated telepathy allows user-to-user communication through analysis of neural signals. The research aims to detect and analyze the word-specific neural signals, using EEG, which occur before speech is vocalized, and to see if the patterns are generalizable. As of 2009 the research is focused on military uses. Plaintiff, an unwitting guinea pig of these programs went for tests, as her hair has not grown since 1996, with induced rapid loss, a skin condition from the blood unknown to the doctors. In addition, since 1962, ARPA initiated the Office of Information Processing Technique and Behavior Sciences for Artificial Intelligence, Command and Control, known today as Behavior Modification or BRAINWASH.

15. Julianne McKinney, 1994 former Military Intelligence Officer and Director of these very PROJECTS is still battling with it today, demanding oversight and cease and desist of Microwave Harassment. (“The Classic Mind Control Operation Revealed” June 2003, surveillance and ‘neurocybernetics’ systems, which DOD refers to as ‘psychotechnologies’. (Former Pentagon Reporter, Sharon Weinberger (misfits scientists, remote viewing; internal emails, 1996)

16. John Herschel Glenn Jr., 1974-1999, former astronaut and U.S. politician who Introduced a Bill and Joint Resolutions (Page S645) Human Research Subject Protection Act, stated “In fact, our own Constitution says, ‘The right of the people to be secure in their persons . . . shall not be violated.’“, and compared it to the Nuremberg Code. His own experience and knowledge of unwitting civilians with Radiation experiments has already been proven that Directed Energy Weapons increased CANCER rates DRAMATICALLY in this COUNTRY thus far. Furthermore, patients have discovered leaving the Country for natural cures worked without further Chemotherapy. During Plaintiff’s brief work at the ACLU, Plaintiff learned that calls were made from patients complaining of being electrocuted while in Hospitals. the reason knowledgeable professionals warn against this Technology in the wrong hands; OUR CIA’s Cointelpro division of Terrorists within, and keeping their enemies close, unfortunately. Plaintiff met with FBI and Congress on two occasions and warned them of her discoveries, and the Gulf’s Red Tide in Florida before the spill as corruptions at the hands of our Shadow Government, and did same with Documentary “Un-Covered” as Marionettes. ELF Waves used in getting a war by Congress not reading full documents to invade Iraq. (Judicial Watch various lawsuits, FBI 2008 spinning their wheels)

17. Plaintiff also has knowledge of the manipulations to the media and miscommunications for the use of quashing, suppressions and propaganda to block exposing the government’s advertising corruptions with misuses in the 21st Century technology. (Operation Mockingbird Media, beginning in the 1950’s). The HAARP and HIPPA stations were set up reaching Woodpecker waves with Russia about the time space activities began 1970 when “Big Brother was watching” today known as “Big Brother gets a Brain”. Whereas Russia was in fact only deployed with these Weapons on the U.S. or on its own people. Paranoid, our Intelligence, DIA launched against its own people in 1983. Astronomical Defense budgets developed as black budgets, and SPYING nefariously went covert from media and public’s knowledge. (Jerry Smith, CARABAS Coherent All Radio Band Sensing, HAARP printed in Canada 1998)

18. Plaintiff and Plaintiff’s family members are ordinary Americans who were initially picked up in the “Big Brother radar” unwittingly in 1971, whereas Plaintiff was informed others who have ties with Military, Minorities, Government employees and buildings, all being picked up in radar with data mining human information for world domination powers. “Dumbed Down and red tape bureaucratic culture induced”

19. Plaintiff was informed that Pilots were mind controlled in advance in the U.S. and San Diego, and that 911 was created to lose our FREEDOMS and the commission investigation was sabotaged. (Naomi Wolf (Yale Journalist)-10 Steps-Freedom to Fascism, 2007- also harassed by and on no fly zone list)

“Death Ray” for planes was Tesla’s invention in 1940 and a $2,000,000,00 device to zap and melt an airplane motor 250 miles away and an Invisible Chinese Wall of defense was built around the Country, no matter how large an attack, (Teleforce, manifests energy and creates rays; zapping beams, the new invisible war). Today, this Wardencliff Tower is in full action in Long Island NY, along with 36 other stations or sites as GWEN, Globally and beam massive volume of Free Energy. (The New York Times, Sunday September 22, 1940-Science and Patents, Education News) One energy zapping causes confusion, mistakes, body temp-freeze, heat, miscommunication, fatigue, radio-sleep (Kucinich), and stalling engines.

On or about January 3, 2009, upon contacting the United Nation’s African Human Rights; provided her information of these weapons in use for mind control overseas and found Alison Des Forges, senior Africa adviser for Human Rights Watch was deceased in the Buffalo NY crash in February 2009. On or about May 2008, the same occurred after contacting Ted Kennedy for assistance and suddenly became unavailable with Cancer. Plaintiff was scheduled to testify in NY senate hearing with the help of Senator Eric Adams which was delayed with a busy nation in transition, until his second home caught fire and the hearing never occurred. Plaintiff had numerous impediments of busy delays from everyone she contacted daily to block her and has more disclosures not included in this complaint.

On or about January 2007, Plaintiff witnessed people and companies pointing the finger at each other, and creating a doubt to sabotaged lives and the LEGAL SYSTEM further. “What the courts should also know.” Today, Society’s Chief complaints are demanding OVERSIGHT and TRANSPANCY. Plaintiff has knowledge that it is the CORRUPTION and the bigger Agenda to change the Constitution, that’s HIDING behind SSP. Furthermore, testimonies made in 1977 to U.S. Courts and Congress by whistleblowers Cathy O’brien and Mark Phillips were blocked for reasons of National Security. This SSP has unwittingly allowed the crimes to continue. Today we are finally seeing the same has continued to bigger Government crimes and corruption with technology and war. Step #9 closer to legalizing Fascism, eyes wide shut: (Access Denied, Trance-formation of America 2003). The Judicial System has not connected the dots yet, on prior crimes from these technology weapons that blighted the Courts 40 years ago to bring us to this point and a corrupted culture. Plaintiff will show that smokescreens are created through propaganda to cover up what is going on in this Country from “We the People”, collectively since “Big Brother Technology” that outsiders already noticed or realize. (See § 34)

20. Plaintiff is also suing Defendants to enjoin their unlawful ABUSES of communications, records, and intrusions. Plaintiff makes demand for the inventory of records since 1971 when Defendant’s family applied to come to America. Plaintiff motions the court to compel the safety of “WE THE PEOPLE” by dismantling these Weapon Stations, and the CIA, which were born with the National Security’s Act in 1947, with criminal and punitive damages.

21. Plaintiff is also suing Defendants for treason, crimes, violations, and threats attempted on her and her family, when disseminating the information and ARTICLE, and reporting it to the Authorities.

22. Plaintiff was pre-empted with these Serious Accusations to whitewash history, brainwash the public, and keep Washington in their bubble, as being too late. (CIA techniques; Jacketing- against each other or one against the other, and changing minds, Past Presidents-Dr. Walter Bowart, False Memory Syndrome Foundation 1992, and Alzheimer’s disease-like memory loss, 1996)

23. These are unconstitutional programs under Cointelpro divisions (Operation Mind Control and DIA Remote Viewing experiments and NSA transmissions) as described to include Monarch-The New Phoenix Program, MKULTRA (Constantine-Virtual Government, CIA Mind Control Operations in America, 1997), Project Philadelphia, Echelon, Clear eyes, Mockingbird media), and Military Pandora’s Box, Voice of GOD, Operation Northwoods (creating wars), Project Stargate and Spacestar, (CIA Psychic Remote Viewing and FBI Virtual Project, 1996 respectively), Project Paperclip (Space Medicine), along with many others), and include corruption crimes of abusive powers.

24. Plaintiff is suffering from the violations of her constitutional rights, and privacy acts, (US code 5 and 18) at the hands of, the direction of or with the knowledge of, the Defendants. Defendants in concert with other Intelligence agencies and/or service providers and means are set forth in paragraphs below).

25. Plaintiff, was comatosed for 72 hours in her home and recruited for experimental remote mind control ESPIONAGE, SEXUAL SLAVERY, AND BEHAVIOR MODIFICATION, (brainwash) The Cult of Intelligence (1974) but censored in the U.S. During her research and travels, Plaintiff made acquaintance with retired government employees and other spies, using remote viewing on their target and countless victims. Plaintiff also interviewed others and found millions of victims complaining of the same tactics and tortures from electricity and Energy. Plaintiff called Lt. Col. Tom Beardon in 2007, and spoke to his wife as he was on a respirator, Kathleen Sullivan (Mind Controlled CIA child whistleblower) who was frantic about nursing her husband with CANCER. Plaintiff has many other murders to report with Automobile accidents, suicide, and offered to testify to Congress. With the use of surveillance technology, spying, and NSA Transmission conducted by top secret, Q clearance, Defendants and DIA, Plaintiff hereby makes these serious accusations against the United States Secret Government for the past 50 years on U.S. Soil.

JURISDICTION AND VENUE

26. This court has subject matter jurisdiction over the federal claims pursuant to 28 U.S.C. § 1331, 18 U.S.C. § 2712, and 5 U.S.C. § 702.

27. Plaintiffs are informed, believe and thereon allege that Defendants have sufficient contacts with this

district generally and, in particular, with the events herein alleged, that Defendants are subject to the exercise

of jurisdiction of this court over the person of such Defendants and that venue is proper in this judicial district pursuant to 28 U.S.C. § 1391.

28. Plaintiff is informed, believe and thereon allege that a substantial part of the events giving rise to the claims herein alleged occurred in this district jurisdiction, and Defendants and/or agents of Defendants may be found in this district, nationally, and internationally.

PARTIES

29. Plaintiff, Mireille Torjman is an intelligent native French speaking refugee from Marrakesh, Morocco. Plaintiff is a divorced woman of 48 years of age and was an accountant for 25 years. Plaintiff comes from a religious background, disciplined and educated, has spent 25 years in the Philadelphia area, currently in South Florida with her Mother.

30. Defendant Federal Bureau of Investigations (FBI) is an agency under the direction and control of the Department of Justice and the Pentagon that investigates and protects the Nation with Programs of CointelPro joined by CIA operating on U.S. Soil.

31. Defendant Central Intelligence Agency (CIA) is an agency that protects the Country in first line of Defense and collects information that reveals the plans, intentions and capabilities of our adversaries and provides the basis for decision and action.

32. Defendant NSA Defendant National Security Agency (NSA) is an agency under the direction and control of the Department of Defense that collects, processes, and disseminates foreign signals intelligence. It is responsible for carrying out the Programs challenged herein.

33. Defendant United States is the United States of America, its departments, agencies, and entities. Including DOJ, and Congresswoman Ginny Browne-Waite as the current Florida Congress Representative of the United States, who Plaintiff attempted to warn on numerous occasions since early 2008 and Senator Bill Nelson, currently on Florida’s Intelligence Committee.

BACKGROUND

34. Counter Intelligence Program was a series of covert, and often illegal, projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at investigating and disrupting dissident political organizations within the United States. The FBI used covert operations from its inception; however formal COINTELPRO operations took place between 1956 and 1971. The FBI’s stated motivation at the time was “protecting national security, preventing violence, and maintaining the existing social and political order.” According to FBI records, 85% of COINTELPRO resources were expended on infiltrating, disrupting, marginalizing, and/or subverting groups suspected of being subversive, such as communist and socialist organizations; the women’s rights movement; militant black nationalist groups, and the non-violent civil rights movement, including individuals such as Martin Luther King, Jr. and others associated with the Southern Christian Leadership Conference, the National Association for the Advancement of Colored People, the Congress of Racial Equality, the American Indian Movement, and other civil rights groups; a broad range of organizations labeled “New Left”, including Students for a Democratic Society, the National Lawyers Guild, the Weathermen, almost all groups protesting the Vietnam War, and even individual student demonstrators with no group affiliation; and nationalist groups such as those “seeking independence for Puerto Rico.” The other 15% of COINTELPRO resources were expended to marginalize and subvert “white hate groups,” including the Ku Klux Klan and National States’ Rights Party. The directives governing COINTELPRO were issued by FBI Director J. Edgar Hoover, who ordered FBI agents to “expose, disrupt, misdirect, discredit, or otherwise neutralize” the activities of these movements and their leaders. Hoover disclosed how horrific these weapons were thus, hard to believe. MKULTRA mind control experiments began at the end of WWII and then became public in the 1970’s, however imperfectly, and went ‘black” again because of Senate hearings, but these experiments have continued to this day. The only reason that MKULTRA was ever brought into the light of day was that a dissident group stole government documents and released them to the press, which initially refused to publish them. The MKULTRA archive was destroyed because of the seriousness of the crimes perpetrated by the intelligence communities. If it became public knowledge that the intelligence agencies had allowed Nazi war criminals to experiment upon American citizens, including children, and then replicated these techniques themselves, the damage to their reputation could never be undone. The only aspects of CIA criminal activity in general, or MKULTRA in particular, that the intelligence community ever admitted to were the ones that were already public, or details that had very little to do with the current capabilities of mind control weapons and techniques. Microwave weapons and remote influence of the Human Central Nervous System are the crown jewels of the intelligence community. The DEFENDER and AGILE Programs formed the foundation of DARPA sensor, surveillance, spying, and directed energy R&D, particularly in the study of radar, infrared sensing, and x-ray/gamma ray detection. During the late 1960s, with the transfer of these mature programs to the Services, ARPA redefined its role and concentrated on a diverse set of relatively small, essentially exploratory research programs. The Agency was renamed the Defense Advanced Research Projects Agency (DARPA) in 1972, and during the early 1970s, it emphasized direct energy programs, information processing, and tactical technologies.

Today we know we have had the Technology as warfare and/or medicine, coupled with the Conspiracy theories of HAARP, (Dr. Hubertus Strughold, space medicine-project paperclip-The Jewish Telegraphic Agency 1995; “Dark Moon; Apollo and Whistleblowers Second craft 11, shadowing Apollo 13” and technical difficulties with no witnesses returned. Issues of Mind Control reported by Dr. Rauni-Leena Luukanen Kilde – Nyhetsspeilet.no with 50 year old technology from our government being disclosed as new, have consistently been deceiving the public, while mapping out a grid across the Country. DUPLICITOUS and INDUCED manipulations of grave mass control escalations have been documented and quashed over the decades. Experiments under MK ULTRA for Behavior Modification also became corrupted for tax gains with massive funding to LEAA Law Enforcements while Crimes were induced in major cities in 1968 by 50% (Newsweek, FBI reports) Unwitting citizens blighted the courts with lawsuits, prisons and Hospitals in this Country with complaints of mind control that the Media refused to cover. This erupted suddenly and massively over one year. Today this continues tenfold and is still uncovered by media. Forty years later the COURTS are now being blighted with cases of privacy rights, War, and Technology combined. Thus we have an agenda of larger government and agencies, created for more tax dollars and controls. CONGRESS spinning their wheels instead of meeting once a year, as intended in the Constitution. A Country is being usurped since the 1910 secret meeting on Jekyll Island and a blank check to create “The Federal Reserve”.

35. Is the NSA Conducting Electronic Warfare On Americans?

Jonas Holmes May 19, 2006 CHRONICLE ARTICLE

Russ Tice, former NSA intelligence officer and current Whistleblower, was to testify before the Senate Armed Services Committee this week. Apparently the testimony, Mr. Tice wanted to give, makes General Hayden’s phone surveillance program look like very small potatoes. Mr. Tice’s testimony is expected to reveal further illegal activity overseen by General Michael Hayden which even loyal and patriotic NSA employees view as unlawful. I think the people I talk to next week are going to be shocked when I tell them what I have to tell them. IT’S PRETTY HARD TO BELIEVE, Tice said. I hope that they’ll clean up the abuses and have some oversight into these programs, which doesn’t exist right now. According to Mr. Tice, what has been disclosed so far is only the tip of the iceberg. What in the world could Russ Tice be talking about! To figure it out let us take a look at Russ Tice’s work at the NSA.

According to the Washington Times and numerous other sources, Mr. Tice worked on special access programs related to electronic intelligence gathering while working for the NSA and DIA, where he took part in space systems communications, non-communications signals, electronic warfare, satellite control, telemetry, sensors, and special capability systems. Special Access Programs or SAPs refer to Black Budgets or Black Operations. Black means that they are covert and hidden from everyone except the participants. Feasibly there would be no arena with a greater potential for abuse and misuse than Special Access Programs. Even now Congress and the Justice Department are being denied the ability to investigate these programs because they don’t have clearance. To put it in CNN’s Jack Cafferty’s words a top secret government agency, the NSA, the largest of its kind in the world, is denying oversight or investigation by the American people because investigators lack clearance. To add a layer of irony to the Black Ops cake this travesty is occurring in America, the supposed bastion of Freedom and Democracy, which we are currently trying to export to Iraq.

It just gets scarier. The Black Ops that Mr. Tice was involved in related to electronic intelligence gathering via space systems communications, non-communications signals, electronic warfare, satellite control, telemetry, sensors, and special capability systems. For greater insight as to the impact of these programs readers should review decades old FOIA authenticated programs such as MKULTRA, BLUEBIRD, COINTELPRO and ARTICHOKE. Radar based Telemetry involves the ability to see through walls without thermal imaging. Electronic Warfare is even scarier if we take a look at the science. NSA Signals Intelligence Use of EMF Brain Stimulation. NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra program of the early 1950’s, which included neurological research into “radiation” (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as “Radiation Intelligence,” defined as “information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation.” Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in the brain continuously. The NSA records and decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In military fighter aircraft, for example.) For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia. Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain-programming purposes. Individual citizens occasionally targeted for surveillance by independently operating NSA personnel

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA’s domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and SABOTAGE OF TENS OF THOUSANDS OF UNWITTING CITIZENS by NSA operatives is likely to happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health. National Security Agency Signals Intelligence Electronic Brain Link Technology NSA SigInt can remotely detect, identify and monitor a person’s bioelectric fields. The NSA’s Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz,.5 milliwatt electro-magnetic emissions from the brain. Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called “evoked potentials.”

Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials.” The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain.

NSA SigInt uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level).

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control. Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain). Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community. RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in that specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band.

An example of EMF Brain Stimulation: Brain Area

Bioelectric Resonance Frequency Information Induced Through Modulation

Motor Control Cortex 10 HZ Motor Impulse Co-ordination

Auditory Cortex 15 HZ Sound which bypasses the ears

Visual Cortex 25 HZ Images in the brain, bypassing the eyes

Somatosensory Cortex 09 HZ Phantom Touch Sense

Thought Center 20 HZ Imposed Subconscious Thoughts

This modulated information can be put into the brain at varying intensities from subliminal to perceptible. Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived. Additionally, A 1994 congressional hearing reported that nearly half a million Americans were subjected to some kind of cold war era tests, often without being informed and without their consent. In addition, experimentation law is well grounded in constitutional and international law. It is an under-reported fact that two major reports on human rights and torture in the U.S. recently listed illegal radiation experiments. Many more facts are documented below. Therefore, human research subject protections should be a high priority and are just as significant as current issues of torture and illegal wiretapping. IT IS TIME FOR AMERICA TO WAKE UP. It is time for America to protect its Whistleblowers who are our last line of defense against dictatorship and despotism. It is time for America to take responsibility for oversight of its tax dollars and elect leaders who will assume such responsibility now. Yes, the war on terrorism is important. It is even more important and fearful if the terrorism is from within and unknowingly funded by hard working American citizens. There is no Special Access Program beyond the oversight of political leaders elected by the people and for the people. If these political leaders jeopardize national security then that shall be handled in a court of law. But to tell America, to tell the American people, to tell the political leaders elected by the American people that America does not deserve to know what happening in the NSA’s dark, black rooms, with billions of dollars, behind closed doors, when we know that privilege has already been abused; that is the true definition of TERRORISM. That is the true definition of Communism and a Police State, no oversight. So fellow Americans, you may hem and haw in the face of truth but know that one day you will realize that your country has been USURPED from the very principles upon which it was founded.

Godspeed, Russ Tice, the Patriots are with you.

Why hasn’t the press–aside from MSNBC–covered Russell Tice’s revelations on the government’s massive spy apparatus that according to Tice illegally survey’s every US citizens’ purchasing records, emails, phone calls, bank transactions, etc. and maintains the information in massive databases for nefarious uses?

In the Interview of January 03, 2006 the following was revealed:

AMY GOODMAN: That was Sibel Edmonds. Russell Tice, you are a member of her group, the National Security Whistleblowers Coalition.

AMY GOODMAN: What do you think of the Justice Department launching an investigation into the leak, who leaked the fact that President Bush was spying on American citizens?

RUSSELL TICE: Well, I think this is an attempt to make sure that no intelligence officer ever considers doing this. What was done to me was basically an attempt to tell other intelligence officers, ‘HEY, IF YOU DO SOMETHING LIKE THIS, IF YOU DO SOMETHING TO TICK US OFF, WE’RE GOING TO TAKE YOUR JOB FROM YOU, WE’RE GONNA DO SOME UNPLEASANT THINGS TO YOU.’

So, right now, the atmosphere at N.S.A. and D.I.A., for that matter, is fear. The security services basically rule over the employees with fear, and people are afraid to come forward. People know if they come forward even in the legal means, like coming to Congress with a concern, your career is over. And that’s just the best scenario. There’s all sorts of other unfortunate things like, perhaps, if someone gets thrown in jail for either a witch-hunt or something trumping up charges or, you know, this guy who is basically reporting a crime.

AMY GOODMAN: Were you ever asked to engage in this?

RUSSELL TICE: No, no, and if I did so, I did so unwittingly, which I have a feeling would be the case for many of the people involved in this. More than likely this was very closely held at the upper echelons at N.S.A., and mainly because these people knew—General Hayden, Bill Black, and probably the new one, Keith Alexander, they all knew this was illegal. So, you know, they kept it from the populace of N.S.A., because every N.S.A. officer certainly knows this is illegal.

AMY GOODMAN: What do you mean if you did so, you did so unwittingly?

RUSSELL TICE: Well, there are certain elements of the aspects of what is done where there are functionaries or technicians or analysts that are given information, and you just process that information. You don’t necessarily know the nitty gritty as to where the information came from or the—it’s called compartmentalization. It’s ironic, but you could be working on programs, and the very person sitting next to you is not cleared for the programs you’re working on, and they’re working on their own programs, and each person knows to keep their nose out of the other person’s business, because everything’s compartmentalized, and you’re only allowed to work on what you have a need to know to work on.

AMY GOODMAN: What about the telecoms, the telecommunications corporations working with the Bush administration to open up a back door to eavesdropping, to wiretapping?

RUSSELL TICE: If that was done and, you know, I USE A BIG “IF” HERE, AND, REMEMBER, I CAN’T TELL YOU WHAT I KNOW of how N.S.A. does its business, but I can use the wiggle words like “if” and scenarios that don’t incorporate specifics, but nonetheless, if U.S. gateways and junction points in the United States were used to siphon off information, I would think that the corporate executives of these companies need to be held accountable, as well, because they would certainly also know that what they’re doing is wrong and illegal. And if they have some sort of court order or some sort of paper or something signed from some government official, Congress needs to look at those papers and look at the bottom line and see whose signature is there. And these corporations know that this is illegal, as well. So everyone needs to be held accountable in this mess.

AMY GOODMAN: When you come on board at these intelligence agencies, as at the National Security Agency, what are you told? I mean, were you aware of the Church hearings in the 1970s that went into the illegal spying on monitoring, of surveilling, of wiretapping of American citizens?

RUSSELL TICE: Well, that’s something that’s really not drummed in your head. That’s more of a history lesson, I think. And the reasoning, ultimately, for the FISA laws and for what’s called USSID 18, which is sort of the SIGINTer’s bible of how they conduct their business, but the law itself is drilled into your head, as well as the tenets of USSID 18, of which the number one commandment is ‘Thou shalt not spy on Americans.’

But ultimately, when we’re using that on—if we’re using that with U.S. databases, then ultimately, once again, the American people are—their civil rights are being violated.

AMY GOODMAN: Do you expect you are being monitored, surveilled, wiretapped right now?

RUSSELL TICE: Yes, I do. As a matter of fact,

AMY GOODMAN: You’re saying in the leadership of your own agency, the National Security Agency?

RUSSELL TICE: That’s correct, yeah, because certainly General Alexander and General Hayden and Bill Black knew that this was illegal.

AMY GOODMAN: But they clearly had to have authorization from above, and Bush is not contending that he did not know.

RUSSELL TICE: Well, that’s true. But the question has to be asked: What did the President know? What was the President told about this? It’s just—there’s just too many variables out there that we don’t know yet. And, ultimately, I think Congress needs to find out those answers. If the President was fed a bill of goods in this matter, then that’s something that has to be addressed. Or if the President himself knew every aspect of what’s going on, if this was some sort of vacuum cleaner deal, then it is ultimately, I would think, the President himself that needs to be held responsible for what’s going on here.

AMY GOODMAN: This investigation that the Justice Department has launched—it’s interesting that Alberto Gonzales is now Attorney General of the United States—the latest story of The New York Times: Gonzales, when he was White House Counsel, when Andrew Card, chief of staff, went to Ashcroft at his hospital bedside to get authorization for this. Can he be a disinterested party in investigating this now, as Attorney General himself?

RUSSELL TICE: Yeah, I think that for anyone to say that the Attorney General is going to be totally unbiased about something like this, I think that’s silly. Of course, the answer is “No.” He can’t be unbiased in this. I think that a special prosecutor or something like that may have to be involved in something like this, otherwise we’re just liable to have a whitewash.

AMY GOODMAN: What do you think of the term “police state”?

RUSSELL TICE: Well, anytime where you have a situation where U.S. citizens are being arrested and thrown in jail with the key being thrown away, you know, potentially being sent overseas to be tortured, U.S. citizens being spied on, you know, and it doesn’t even go to the court that deals with these secret things, you know, I mean, think about it, you could have potentially somebody getting the wrong phone call from a terrorist and having him spirited away to some back-alley country to get the rubber hose treatment and who knows what else. I think that would kind of qualify as a police state, in my judgment. I certainly hope that Congress or somebody sort of does something about this, because, you know, for Americans just to say, ‘Oh, well, we have to do this because, you know, because of terrorism,’ you know, it’s the same argument that we used with communism years ago: take away your civil liberties, but use some threat that’s, you know, been out there for a long time.

Terrorism has been there for—certainly before 9/11 we had terrorism problems, and I have a feeling it’s going to be around for quite some time after whatever we deem is a victory in what we’re doing now in the Middle East. But, you know, it’s just something that has to be addressed. We just can’t continue to see our civil liberties degraded. Ultimately, as Ben Franklin, I think, had said, you know, those who would give up their essential liberties for a little freedom deserve neither liberty or freedom, and I tend to agree with Ben Franklin.

AMY GOODMAN: And your colleagues at the N.S.A. right now, their feelings, the National Security Agency?

RUSSELL TICE: Boy, I think most folks at N.S.A. right now are just running scared. They have the security office hanging over their head, which has always been a bunch of vicious folks, and now they’ve got, you know, this potential witch hunt going on with the Attorney General. People in the intelligence community are afraid. They know that you can’t come forward. You have no protections as a whistleblower. These things need to be addressed.

AMY GOODMAN: What do you mean you have no protection?

RUSSELL TICE: No. No, I do not. As far as—of course, I’m not witting of anyone that was told they will spy on an American. So, ultimately, when this was going on, I have a feeling it was closely held at some of the upper echelon levels. And you’ve got to understand, I was a worker bee. I was a guy that wrote the reports and did the analysis work and—you know, the detail guy. At some point, your reports have to get sent up up the line and then, you know, the management takes action at some point or another, but at my level, no, I was not involved in this.

RUSSELL TICE: I sent it to the chairs of the Senate Intelligence Committee and the House Intelligence Committee, the SSCI and the HPSCI.

The CIA and the cult of intelligence (1974) Reviewed by JamesRMacLean on 2007-04-09. Incompetence leads to Monstrosity Marchetti’s expose of the CIA was published on the eve of the Church Commission, at a moment when domestic outrage at the culture of duplicity and domestic interference had reached its peak. Since that time, successful public relations have greatly enhanced the image of intelligence services. Marchetti’s thesis is that, contrary to widespread public belief, the USA was not locked in an existential struggle with Soviet or Chinese subversion, and never really was. Soviet intelligence utterly surpassed the CIA in effectiveness, initiative, and recruitment of allied agents abroad. In fact, the CIA was effective only against 3rd world intelligence organizations, and there, spectacularly so. This extreme Soviet edge in espionage was more than offset by the superior resources of the conventional Western militaries and the impossibility of waging a direct confrontation owing to the nuclear stalemate. Worse, this advantage was not seriously mitigated by the abundance of high-tech gadgets, such as satellites; such tools merely facilitated the collection of large amounts of raw data, with virtually no practical usefulness.

Far from rendering the US intelligence community harmless, however, it made the agency focus on a campaign against 3rd world allies, and ultimately, against the US population. The CIA tried its hand at waging secret wars in Latin America, Southeast Asia, and Africa; it developed a vast group of businesses to serve as cover for illicit shipping and arms supplies; and it became utterly habituated to corrupting legislators in the Free World. The CIA became an eager tool for an unaccountable executive branch, provided that the executive had a flair for covert action; and it tended to create an echo chamber of self-deception that threatened the entire national security establishment. At the very top of its list of priorities was the urgent need to defend its mission publicly, and validate its immense budget. Marchetti spends a modest amount of time discussing the inability of the CIA to confront the Soviet KGB. When he mentions it, he avers the KGB and its allied bureaux are indeed odious, but also defensive–by necessity. He dwells in somewhat greater detail on the CIA’s structure and specialized fields of performance. He includes a broad-brush description of the overall US intelligence community, before turning to an analysis of the separate divisions and their respective behavior. This included covert operations (such as the Bay of Pigs invasion), proprietaries (such as Interarmco and Air America), propaganda and disinformation, and espionage/counterespionage. In all of these enterprises, the same motivation prevails: the CIA seeks self-perpetuation and influence WITHIN the Western world, but lacks will or ability to seriously combat the Soviets. Towards the end, he discusses the increasing tendency of the CIA to interfere in regular US politics, chiefly to ingratiate itself with the president.

Marchetti’s criticisms of the intelligence community were surprisingly mild. I should mention in passing that his book had about 170 or so passages deleted by court order; the CIA had earlier demanded well in excess of 300, and the court awarded it half of what it demanded. Some of the deletions are downright silly (as where it refers to a base in [DELETED] granted by Haile Selassie!), and elsewhere I was amused to observe the most numerous deletions in the part dealing with funding appropriations. The extreme secrecy of the intelligence community with respect to funding has greatly intensified since this book was published, and usually the motivation is quite obviously to conceal how much money these agencies actually waste. However, Marchetti concludes that the CIA is essentially past reform, useless, and so incompetent at its mission as to have become narrowly focused on extorting billions from the nation.

PSYCHOTRONIC WEAPONS

Former United States Government Physicist! 1981-Lt Col. US Army Retired, Pentagon analyst

(McRae, Ronald, Mind Wars, St. Martin’s Press, 1984, p 127)

In a slide Bearden illustrates how a Scalar War would involve a psychoenergetics attack on the operators of the enemy scalar installation, entraining their minds into hypnogogic trance and getting them to shut down their systems. And ultimately psychoenergetic warfare goes to the very heart of human identity itself. For if my thoughts might no longer be “mine,” then who and what am I? Can my very sense of being “me” be hijacked by some nefarious psychoenergetic scheme? One paper to begin with is “Mind Control and EM Wave Polarization Transductions” This is such serious stuff that Bearden includes a strong warning about misuse of this knowledge. Psychoenergetics weapons can MENTALLY MAIM AND PHYSICALLY KILL. “UNAWARE FORCED SPEECH by- passing memory, Channelled DREAMS, Split personalities etc.

SPACE PRESERVATION ACT-House Resolution (bill 2977)

Brain manipulation from a distance-2001-2002

Last year, in October, the Congressman Dennis J. Kucinich introduced in the American Congress a bill, obliging the American president to get engaged in the negotiations aimed at the ban of space based weapons. In this bill the definition of a weapon system includes: any other unacknowledged or as yet undeveloped means inflicting death or injury on, or damaging or destroying, a person (or the biological life, bodily health, mental health, or physical and economic well-being of a person) through the use of land-based, sea-based, or space-based systems using radiation, electromagnetic, psychotronic, sonic, laser, or other energies directed at individual persons or targeted populations or the purpose of information war, mood management, or mind control of such persons or populations” (12). As in all legislative acts quoted in this article the bill counts with sound, light or electromagnetic stimulation of human brain. Psychotronic weapons remain, at least for a layman uninformed of secret military research, in the sphere of science fiction, since so far none of the published scientific experiments was presented in the way which would allow for its replication. That it is feasible to manipulate human behavior with the use of subliminal, either sound or visual, messages is now generally known. This is why in most of the countries the use of such technologies, without consent of the user, is banned. Devices using light for the stimulation of the brain show another way how the light flashing in certain frequencies could be used for the manipulation of human psychic life. As for the sound, a report on the device transmitting a beam of sound waves, which can hear only persons at whom the beam of sound waves is targeted, appeared last year in the world newspapers. The beam is formed by a combination of sound and ultrasound waves which causes that a person targeted by this beam hears the sound inside of his head. Such a perception could easily convince the human being that it is mentally ill. The acts presented in this article suggest that with the development of technology and knowledge of the functioning of human brain new ways of manipulation of human mind keep emerging. One of them seems to be the electromagnetic energy.

Though in the open scientific literature only some 30 experiments were published, supporting this assumption (1),(2), already in 1974, in the USSR, after successful testing with military unit in Novosibirsk, the installation Radioson (Radiosleep) was registered with the Government Committee on the Matters of Inventions and Discoveries of the USSR, described as a method of induction of sleep by means of radio waves (3), (4), (5)…

Dear Senator-Attorney Letter included:

We seek your office’s assistance in initiating hearings and a fact-finding congressional inquiry into the government agencies and/or private companies that are targeting citizens. Many citizens are desperate to be freed from the disturbing, intrusive and oppressive targeting.

Evidence supports the conclusion that weapons exist that could be used against individuals, based on U.S. Patent and Trademark Office filings, public releases by agencies, and other technologies that indicate the level of technological sophistication. The weapons are believed to be based on electromagnetism, microwaves, sonic waves, lasers and other types of directed energy, and were characterized as “psychotronic” in Rep. Dennis Kucinich’s draft of House Resolution 2977, the Space Preservation Act of 2001. Furthermore, it is undeniable that government agencies have tested citizens without permission in the past; for example, the CIA’s human experimentation discussed in Orlikow v. U.S., 682 F.Supp. 77 (D.D.C. 1988), secretly administered lysergic acid diethylamide discussed in United States v. Stanley, 483 U.S. 669 (1987), and military chemical experimentation as discussed in Congressional Committee Report 103-97, 103d Congress, 2d Session, S. Prt. 103-97 (Dec. 8, 1994). Lastly, the sheer numbers of people complaining of being targeted, including people with post-graduate degrees and a lifetime of achievements, and the similarities in symptoms tend to outweigh a dismissive response based on charges of anecdotal evidence or group paranoia.

there is a certain risk of sounding too conspiratorial, however, common denominators such as physical symptoms and medical reports, surveillance scenarios, harassment techniques, and more can be readily established.

Very truly yours,

36. Around January 2003, the NSA designed and implemented a program “THE DRAGNET” in collaboration with AT&T to build a surveillance operation at AT&T’s Folsom Street Facility, inside a secret room known as the “SG3 Secure Room”. In February 2003, the “Splitter Cabinet” split diverting to and from Qwest, XO, PAIX, Allegiance, and many more Service Providers at the SG3 Location.

37. As some “X or zero” files kept covertly in Silicon Valley and NSA and “Data Mining” with SIG-INT Satellites used as the scapegoat of illegal covert spying of 50 years. Plaintiff received communication through Qwest and T-Mobile, and many other carriers that were tampered with, Plaintiff found her computer files wiped out for over one year (2007-2008 of all her Government research and email communications to the public, since she began attempts for help, and notified Qwest of the activities behind the scenes as they had found them undetectable. Plaintiff’s communications verbally and electronically, including facsimiles, muting one party in conversation to sabotage meaning, emails were intercepted and manipulated, as destroyed documents, videos, and photographs, preventing the reporting her story and the torture and abuse to non-conspiring authorities and individuals.

38. Defendant’s daily tortures are being done without judicial, statutory, or other lawful authorization, in violation of statutory and constitutional limitations, and in excess of statutory and constitutional authority.

39. Defendants’ daily tortures are being done without probable cause or reasonable suspicion to believe that Plaintiff has committed or are about to commit any crime or engage in any terrorist activity.

40. Defendants’ daily tortures are being done without probable cause or reasonable suspicion to believe that Plaintiff is of foreign powers or agents thereof and these activities are crimes of humanity.

41. Defendants’ daily tortures are being done without any reason to believe that the information is relevant to an authorized criminal investigation or to an authorized investigation to protect against international terrorism or clandestine intelligence activities.

42. Plaintiff was targeted in 1996 for 5 years of her life, unwittingly after calling the FBI from her work place and was told “They were already on it”. On another experiment for war allies, Plaintiff, UNREALIZED, was told she was free and arrived in San Diego 5 days later on 9/11/01. Plaintiff flew to Atlanta wondering why she was invited to sit in a co-pilot’s chair on the runway, while waiting to take off from snow on the ground, in the height of the new steel door installation climate and high security. This information was sent to the U.N. BEFORE the Buffalo crash. In her Florida home, early 2007, naive and without knowledge of corruptions, wars, or weapons, Plaintiff was comatosed for 72 hours and her memory began to be wiped out each night and corrupted with transmissions in each day. Plaintiff ran away TERRORIZED after being transmitted to start “THE PROCESS”, which today she knows was to brainwash her into the cult of intelligence and experiments. Plaintiff left her home terrorized and traveled around the world programmed to keep copious notes. Plaintiff was attacked for no reason on the streets, by UNREALIZED doctors, by kids, dogs, on planes (International Airways), and was held hostage in a food establishment in Nice when on her way to whistle blow the information to other embassies. Plaintiff had her house contents hijacked from AZ, leaving her homeless numerous times to sabotage her life and work and was falsely detained upon each attempt to whistle blow. Plaintiff was transmitted to send a letter to FBI Director Mueller, demanding to cease and invert her family, when she returned from AZ in February of 2008. Plaintiff was informed that it was too late as they had already “gotten to him” and she would never be believed. Not until one year later in February 2009, someone sent Plaintiff an email of the Russell Tice article and Plaintiff IMMEDIATELY came to DC in April 2009 to talk with DOJ Officials and their Attorneys. Plaintiff’s many computers and car batteries, etc were zapped the same day again while en route. Plaintiff’s communication chaos with NSA transmissions sabotaged her life, and others with unwitting false memories. In January 2010 Plaintiff was told her surveillance/spying recordings could be sold overseas and that the FBI had joined forces with the Shadow Government to suppress her further from whistle blowing. Plaintiff’s behavior was modified and resembled what she found on u-tube in the 911 brainwashing process to the public for Weapons of Mass Destruction (the opposite of most news reports). Plaintiff was jacketed (against each other) and isolated during the 4 years Defendants’ daily tortures against her will and religion is directly performed, and/or aided, abetted, counseled, commanded, induced or procured, by Defendants. On information and belief, Defendants will continue to directly target the Plaintiff and the Public and /or will continue to aid, abet, counsel, command, induce or procure that conduct. (Mind Control and the American Government; “Prevailing Winds” 1994) On information and belief, since Tesla’s Directed Energy Weapons were invented and launched or picked up by DOD covert ops, The United States unlike the rest of the Globe, rapidly began down a culture of Cancer, corruptions, crimes (another experiment in 1968 on crimes in major cities hidden behind LSD like aliens) paranoia, immoral behaviors, AIDS, ANTHRAX, obesity, division, Trash TV, paranormal phenomenon, and a greater necessity of guinea pigs for TECHNOLOGY experimentation and corruptions.

“When even one American -who has done nothing wrong- is forced by fear to shut his mind and close his mouth, then all Americans are in peril.” Harry S. Truman

43. Plaintiff seeks costs, legal fees, and damages applicable by law with protective measures for all COUNTS. Plaintiff was represented under a class suit, before transmissions sabotaged the attorney and his contact information has been disconnected and tampered with. On information and belief, the former attorney may have had brain surgery from Migraines while preparing the Complaint funded by and San Francisco University, after my visit with him to Denver and may be overseas at this time.

ALLEGATIONS also included in Plaintiff’s NSA and/or Electronic Communications

44. Pursuant to Federal Rules of Civil Procedure, Title 5, 22, 42, 142, 18, 18a, and 50, Plaintiff Mireille Torjman brings this action on behalf of herself, and to attest to her family and the public’s victimization, unwittingly and/or unrealized:

(a) TITLE 18 PART I CHAPTER 37 § 793. Gathering, transmitting or losing defense information,

(b) 18 U.S.C. § 241. Conspiracy against rights,

(c) 18 U.S.C. § 373. Solicitation to commit a crime of violence,

(d) 18 U.S.C. § 1091. Genocide,

(e) 18 U.S.C. § 1341. Mail fraud,

(f) 18 U.S.C. § 1512. Tampering with a witness, victim, or an informant,

(g) 18 U.S.C. § 1513. Retaliating against a witness, victim, or an informant,

(h) 18 U.S.C. § 1583 (2). Enticement into slavery,

(i) 18 U.S.C. § 1692. Foreign mail as United States mail,

(j) 18 U.S.C. § 1801. Video voyeurism,

(k) 18 U.S.C. § 1812. Statement of exclusive means by which electronic surveillance and interception of certain communications may be conducted,

(l) 18 U.S.C. § 2242. Sexual abuse,

(m) 18 U.S.C. § 2332 (a) Terrorism, and (h). Use of weapons of mass destruction,

(n) 18 U.S.C. § 2339. Harboring or concealing terrorists,

(o) 18 U.S.C. § 2422. Coercion and enticement, or are currently doing so;

(p) Defendants have subjected the public to electronic surveillance, in violation of 50 U.S.C. § 1809 and 1810, or are currently doing so;

(q) Defendants are intercepting communications in violation of 18 U.S.C. § 2510 and 18 U.S.C. § 2511;

(r) Defendants have transmitted Plaintiff and the public in violation of 18 U.S.C. § 2703, Required Disclosure of communications records, or are currently doing so;

(s) Defendants have transmitted civilians, and non civilians, in violation of 18 U.S.C. § 2381. Treason, or are currently doing so;

(t) Defendants have harassed and transmitted the public to stalk and harass the Plaintiff inclusive of electronically and tangibly, in violation of 18 U.S.C. § 2261: US Code – 2261A: Stalking

(u) Plaintiff was falsely detained and sabotaged with the use of mind control transmissions violating 18a U.S.C. Rule 41. Search and Seizure

(v) Defendants have violated the Administrative Procedures Act, 5 U.S.C. §§ 701 et seq., or are currently doing so;

(w) Defendants have violated the constitutional principle of separation of powers, or are currently doing so;

(x) Defendants have Tortured Plaintiff, her family, and the public electronically in violation of 18 U.S.C. § 2340A, or currently doing so:

(y) Plaintiff is entitled to injunctive, declaratory, and other equitable relief against defendants and freedom from further threats, family, accidents, psychological and physical harm, illnesses, sabotage, bribes, and blackmail;

(z) Defendants have Tortured Plaintiff, her family and the public electronically in violation of 18 U.S.C. § 2422, or currently doing so:

(aa) Plaintiff is entitled to Civil Damages 18 U.S.C. § Rule 2520 in violations of her First, Third, Fifth, and Thirteenth Amendments; 18 U.S.C. § 2510, 18 U.S.C. § 2511, and 18 U.S.C. § 2512.

(ab) Plaintiff is entitled to Grants and Health Care Assistance as a victim in accordance to 22 U.S.C. § 2152: US Code – Section 2152: Assistance for victims of torture.

(ac) United Nations Convention Against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment, G.A. res. 39/46, annex, 39 U.N. GAOR Supp. (No. 51) at 197, U.N. Doc. A/39/51 (1984), entered into force June 26, 1987; Universal Declaration of Human Rights, G.A. res. 217A (III), U.N. Doc. A/810 at 71 (1948); International Convention on Civil and Political Rights, G.A. res. 2200A (XXI), 21 U.N. GAOR Supp. (No. 16) at 52, U.N. Doc. A/6316 (1966), 9.99 U.N.T.S. 171, entered into force Mar. 23, 1976.

(ad) Defendants have Tortured Plaintiff, her family and the public and the prohibitions against torture and other cruel, inhuman, or degrading treatment and the conspiracy to oppress, torture, rape, suppress, is a violation under 142 U.S.C.§ 1985. Conspiracy to interfere with United States Civil Rights.

(ae) Defendants have Tortured Plaintiff, her family and the public and the prohibitions against malicious intent to torture, rape privacy rights, brainwash, and enslave with severe psychological in-humane damages to one’s spirit, and libel is actionable under Tort Claims of damages found under civil and criminal trials.

(af) Plaintiff has made at least 2 requests to the FOIA and both dossiers were denied under the violation of 5 U.S.C. § 552; claims under and 18 U.S.C. § 2707 and 5 U.S.C. § 702

42. Adequacy: Plaintiff and family members are suffering great harm arising from Defendants’ violations of law, as alleged herein. Plaintiff intends to prosecute this action vigorously. Plaintiff hereby demands injunctive relief and damages.

COUNT I

Violation of 18 U.S.C. and 50 U.S.C. Crimes and Criminal Procedures AND War and National Defense Including Titles 5, 22, 42, 142, 18, 18a, and 50 U.S.C. and International Conventional

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

43. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

44. Plaintiff is seeking protection for her and for all family members under the law TITLE 18 U.S.C. § 3521. Witness relocation and protection.

COUNT II

Violation of First and Fourth Amendments, 42 U.S.C and 18 U.S.C. and 50 U.S.C. Crimes and Criminal Procedures AND War and National Defense Including Titles 22, 42, 142, 18, 18a, and 50 U.S.C. and International Conventional

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

45. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

46. Plaintiff motions the COURTS and Defendants to cease and desist and/or injunction for relief, immediately from grave dangerous damaging electronic harassments and that of a religious and personal nature, all other allegations of surveillance, spying, manipulations, torture, censorships, daily sabotage, and blocks electronically and otherwise, retaliations, death threats, thereby violating the constitution and privacy acts, (US code 22, 42, 142, 18, 18a, and 50) at the hands of, the direction of, or with the knowledge of, any and all government and affiliations. Plaintiff seeks declaratory relief against all allegations and all counts. Defendant’s actions described herein violated Plaintiff’s rights under the Free Exercise and Free Speech Clauses of the United States Constitution, the Religious Freedom Restoration Act of 1993, 42 U.S.C. § 2000bb et seq., the Privacy Act, 5 U.S.C. § 552a, and Air Force Instruction 37-132; and all other freedoms and rights under the Law.

COUNT III

Violation of 18 U.S.C. and 50 U.S.C. Crimes and Criminal Procedures AND War and National Defense Including Titles 5, 22, 42, 142, 18, 18a, and 50 U.S.C. and International Conventional

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

47. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

48. Plaintiff numerous attempts sabotaged, hereby requests to compel the court for Defendants to conduct proper and thorough investigations (not failing to include fundamental steps of interviews and psyops techniques on U.S. Soil) even when seemingly undetectable and/or prior to 2008, with all accusations and agencies with full cooperation, including Sports, Cloning, ENGINEERED Poverty-Bankruptcies with individuals with Cancer, also to sabotage economies, under the Law.

COUNT IV

Violation of First Amendment—Declaratory, Injunctive, and Other Equitable Relief

Violation of 18 U.S.C. and 50 U.S.C. Crimes and Criminal Procedures AND War and National Defense Including Titles 22, 42, 142, 18, 18a, and 50 U.S.C. and International Conventional

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

49. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

50. Plaintiff has been sabotaged with proper coverage to expose and warn the public. Plaintiff requests to compel the court for Defendants to provide the Constituents “WE THE PEOPLE” with un-tampered accurate news, APPROPRIATE WARNINGS with Main Stream Media: to heed caution, and be AWARE with knowledge, and choice of action or recourse, under the law of Constituents rights and United States Constitution.

COUNT V

Violation of Fourth Amendment—Declaratory, Injunctive, and Equitable Relief 108.

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

51. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law and aforementioned Amendments of the Constitution, as stated above.

52. Plaintiff is seeking protection for her and for all family members under the law.

53. Plaintiff and have a reasonable expectation of privacy in their communications and/or records, mail communications, as forementioned above, DNA, brain waves, brain activities, brain manipulations, brain recordings, data mining, collected, and/or stored by these activities.

54. Plaintiff have expectations of complete privacy to the intrusions of their minds and bodies, threats and fears, blackmail and choice, thus freedom of thought, emotion, will, and destiny.

55. Defendants have directly performed, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, facilitated, directed, controlled, assisted in, or conspired in the commission of the above-described acts of spying, torture, interception, and/or use of Plaintiff and her activities, by Intelligence, covertly without judicial or other lawful authorization, probable cause, and/or individualized suspicion, in violation of statutory and constitutional limitations, and in excess of statutory and constitutional authority.

56. At all relevant times, Defendants committed, knew of and/or acquiesced in all of the above-described acts, and failed to respect the Constitutional rights of the Plaintiff by obtaining judicial or other lawful authorization and by conforming their conduct to the requirements of the respective Amendments, under the Law of the United States Constitution.

57. By the acts alleged herein, Defendants have violated Plaintiffs’ reasonable expectations of privacy and denied Plaintiff her right to be free from unreasonable searches and seizures as guaranteed by the Fourth Amendment to the Constitution of the United States. By the acts alleged herein, as a victim of the Programs, Defendants violated Plaintiff’s rights of the Fourth Amendment to be free from unreasonable searches and seizures, as guaranteed by the Fourth Amendment of the United States Constitution.

58. By the acts alleged herein, Defendants’ conduct has caused harm to Plaintiff and her family.

59. Defendants’ conduct was done intentionally, with malice and deliberate indifference, against her will and religion, and/or with reckless disregard of, negligent, forceful, trickery, pleasure, premediated conspiracy, in gross violations of Plaintiff constitutional rights.

60. On information and belief, the Count V and all other pertaining Counts Defendants are now engaging in and will continue to engage in the above-described violations of Plaintiffs’ constitutional rights, and are thereby irreparably harming Plaintiff. Plaintiff have no adequate remedy at law for the Count V and all other pertaining Counts to Defendants’ continuing unlawful conduct, and the Count V and all other pertaining Counts Defendants will continue to violate Plaintiffs’ legal rights unless enjoined and restrained by this Court.

61. Plaintiff seeks that this Court declare that Defendants have violated their rights and the rights of the public; enjoin the Count V Defendants, their agents, successors, and assigns, and all those in active concert and participation with them from violating the Plaintiffs’ rights under the Fourth Amendment and respective Amendments, to the United States Constitution; and award such other and further equitable relief as is proper.

COUNT VI

Violation of Fourth Amendment—Damages

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

62. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

63. Plaintiff have a reasonable expectation of privacy in their communications and/or records, mail, communications, Transmissions, intrusions, spying, by all means including electronics and waves as forementioned by Defendants.

64. Plaintiff have expectations of privacy to the atrocious intrusions and gross negligence.

65. Defendants have directly performed, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, facilitated, directed, controlled, assisted in, or conspired in the commission of the above-described acts of acquisition, interception, disclosure, divulgence and/or use of communications, contents of communications, and records pertaining to their communications transmitted, collected, DNA and brain waves from Data Mining and remote transmissions, and/or stored, spying, torture, by Defendants without judicial or other lawful judicial or other lawful authorization, probable cause, and/or individualized suspicion, in violation of statutory and constitutional limitations, and in excess of statutory and constitutional authority.

66. Defendants, and/or the use of electronic communication services acted as the agent in performing, participating in, enabling, contributing to, negligently contributing to, facilitating, at the hands of, direction of, or knowledge of, or assisting in the commission of the above-described acts of interceptions, disclosure and/or use of Plaintiff mind and body, DNA and brain waves from Data Mining and remote transmissions, communications, contents of communications, and records pertaining to their transmissions, collected, and/or stored without judicial or other lawful authorization, probable cause, and/or individualized suspicion of Plaintiff’s records or other information.

67. At all relevant times, Defendants committed, knew of and/or acquiesced, enjoyed all of the above-described acts, and failed to respect the Fourth Amendment rights of Plaintiffs by obtaining judicial or other lawful authorization, and by conforming their conduct to the requirements of the requirements of the respective Amendments.

68. By the acts alleged herein, Defendants have violated Plaintiffs’ reasonable expectations of privacy and denied Plaintiffs their right to be free from unreasonable searches and seizures as guaranteed by the Fourth Amendment to the Constitution of the United States.

69. By the acts alleged herein, Defendants’ conduct has caused harm to Plaintiff.

70. Defendants’ conduct is being done intentionally and with malice, with deliberate indifference, or with reckless disregard of, Plaintiffs’ constitutional rights.

71. Plaintiff seeks an award of her actual damages and punitive damages against the Counts III and V Defendants, and such other or further relief as is proper.

COUNT VII

Violation of First Amendment—Declaratory, Injunctive, and Other Equitable Relief

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

72. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

73. Plaintiff use of communications anonymously and to associate privately and securely with freedoms as their Constitution Rights.

74. Defendants have directly performed, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to negligently contributed to, facilitated, directed, controlled, assisted in, or conspired in the commission of the above-described acts of acquisition, interception, disclosure, divulgence and/or use of Plaintiff and Plaintiff’s communications, contents of communications, and records pertaining to their communications transmitted, collected, DNA and brain waves from any Data Mining and remote transmissions, and/or stored, spying, torture, by Defendants without judicial or other lawful judicial or other lawful authorization, probable cause, and/or individualized suspicion, in violation of statutory and constitutional limitations, and in excess of statutory and constitutional authority.

75. Defendants, and/or the use of electronic communication services acted as the agent in performing, participating in, enabling, contributing to, negligently contributing to, facilitating, at the hands of, direction of, or knowledge of, or assisting in the commission of the above-described acts of acquisition interception, disclosure, divulgence, and/or use of Plaintiff and communications, mind and body, DNA and brain waves, Data Mining and remote transmissions, contents of communications, and records pertaining to their communications transmissions, collected, and/or stored without judicial or other lawful authorization, probable cause, and/or individualized suspicion of Plaintiff’s records or other information without judicial or other lawful authorization, probable cause, and/or individualized suspicion.

76. By the acts alleged herein, Defendants’ violated Plaintiff’s rights to speak and receive speech anonymously and associate privately under the First Amendment.

77. By the acts alleged herein, Defendants’ conduct proximately caused harm to Plaintiff.

78. Defendants’ conduct was done intentionally, with malice and intent, with deliberate indifference, with reckless disregard, and negligence, Plaintiff constitutional rights were grossly violated.

79. On information and belief, the Count VII Defendants are now engaging in and will continue to engage in the above-described violations of Plaintiff’s constitutional rights, and are thereby irreparably harming Plaintiff. Plaintiff has no adequate remedy at law for the Count VII Defendants’ continuing unlawful conduct, and the Count VII Defendants will continue to violate Plaintiff legal rights unless enjoined and restrained by this Court.

80. Plaintiffs seek that this Court declare that Defendants have violated their rights; enjoin the Count VII Defendants, their agents, successors, and assigns, and all those in active concert and participation with them from violating the Plaintiff rights under the First Amendment to the United States Constitution; and award such other and further equitable relief as is proper.

COUNT VIII

Violation of First Amendment—Damages

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

81. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

82. Plaintiff use of communication with privacy to speak or receive speech anonymously and to associate privately.

83. Defendants have directly performed, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to negligently contributed to, facilitated, directed, controlled, assisted in, or conspired in the commission of the above-described acts of acquisition, interception, spying, disclosure, divulgence and/or use of Plaintiff and Plaintiff’s communications, contents of communications, and records pertaining to their communications transmitted, collected, DNA and brain waves from any Data Mining and remote transmissions, and/or stored, spying, torture, by Defendants without judicial or other lawful judicial or other lawful authorization, probable cause, and/or individualized suspicion, in violation of statutory and constitutional limitations, and in excess of statutory and constitutional authority.

84. By the acts alleged herein, Defendants violated Plaintiffs’ rights to speak and receive speech anonymously and associate privately under the First Amendment.

85. By the acts alleged herein, Defendants’ conduct proximately caused harm to Plaintiff.

86. Defendants’ conduct was done intentionally, with malice and sadistic pleasure, with deliberate indifference, or with reckless disregard of, Plaintiff constitutional rights.

87. Plaintiff seeks an award of her actual damages and punitive damages against the Counts IV and VIII Defendants, and for such other or further relief as is proper.

COUNT IX

Violation of Foreign Intelligence Surveillance Act—Declaratory, Injunctive and Other Equitable Relief

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

88. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

89. In relevant part, 50 U.S.C. § 1809 provides that:

(a) Prohibited activities—A person is guilty of an offense if he intentionally—(1) engages in electronic surveillance under color of law except as authorized by this chapter, chapter 119, 121, or 206 of Title 18 or any express statutory authorization that is an additional exclusive means for conducting electronic surveillance under section 1812 of this title; or (2) discloses or uses information obtained under color of law by electronic surveillance, knowing or having reason to know that the information was obtained through electronic surveillance not authorized by this chapter, chapter 119, 121, or 206 of Title 18 or any express statutory authorization that is an additional exclusive means for conducting electronic surveillance under section 1812 of this title.

90. In relevant part 50 U.S.C. § 1801 provides that:

(f) “Electronic surveillance” means – (1) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire or radio communication sent by or intended to be received by a particular, known United States person who is in the United States, if the contents are acquired by intentionally targeting that United States person, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes; (2) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire communication to or from a person in the United States, without the consent of any party thereto, if such acquisition occurs in the United States, but does not include the acquisition of those communications of computer trespassers that would be permissible under section 2511(2)(i) of Title 18; (3) the intentional acquisition by an electronic, mechanical, or other surveillance device of the contents of any radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, and if both the sender and all intended recipients are located within the United States; or (4) the installation or use of an electronic, mechanical, or other surveillance device in the United States for monitoring to acquire information, other than from a wire or radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes.

91. 18 U.S.C. § 2511(2)(f) further provides in relevant part that “procedures in this chapter or chapter 121 and the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in section 101 [50 U.S.C. § 1801] of such Act, and the interception of domestic wire, oral, and electronic communications may be conducted.” (Emphasis added.)

92. 50 U.S.C. § 1812 further provides in relevant part that:

(a) Except as provided in subsection (b), the procedures of chapters 119, 121, and 206 of Title 18 and this chapter shall be the exclusive means by which electronic surveillance and the interception of domestic wire, oral, or electronic communications may be conducted.

(b) Only an express statutory authorization for electronic surveillance or the interception of domestic wire, oral, or electronic communications, other than as an amendment to this chapter or chapters 119, 121, or 206 of Title 18 shall constitute an additional exclusive means for the purpose of subsection (a).

(Emphasis added.)

93. Defendants intentionally acquired, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, negligently contributed to, facilitated, directed, controlled, assisted in, or conspired in the commission of such acquisition, by means of a surveillance and spying devices, the contents of one or more wire and wireless communications to or from Plaintiff or other information in which Plaintiff has a reasonable expectation of privacy, without the consent of any party thereto, and such acquisition occurred in the United States and overseas.

94. Defendants, and/or other electronic communication services acted as the agent in performing, participating in, enabling, contributing to, negligently contributing to, facilitating, at the hands of, direction of, or knowledge of, or assisting in the commission of the above-described acts of acquisition of Plaintiffs’ communications, interceptions, disclosure and/or use of Plaintiff mind and body, DNA and brain waves from Data Mining, remote transmissions, communications records, and contents of communications, pertaining to their transmissions, collected, and/or stored without judicial or other lawful authorization, probable cause, and individualized suspicion of Plaintiff’s records and information.

95. By the acts alleged herein, Defendants acting in excess of their statutory authority and in violation of statutory limitations have intentionally engaged in, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, negligently contributed to, facilitated, directed, controlled, assisted in, or conspired in the commission of, electronic surveillance (as defined by 50 U.S.C. § 1801(f)) under color of law, not authorized by any statute, to which Plaintiff were subjected in violation of 50 U.S.C. § 1809.

96. Additionally or in the alternative, by the acts alleged herein, Defendants acting in excess of their statutory authority and in violation of statutory limitations have intentionally disclosed or used information obtained under color of law by electronic surveillance, knowing or having reason to know that the information was obtained through electronic surveillance and spying not authorized by statute, including information pertaining to Plaintiff, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, facilitated, directed, controlled, assisted in, or conspired in the commission of such acts.

97. Defendants did not notify Plaintiff of the above-described electronic surveillance, disclosure, and/or use, nor did Plaintiffs or class members consent to such.

98. Plaintiff have been and are aggrieved by Defendants’ electronic surveillance, and spying , disclosure, and/or use of their wire communications.

99. On information and belief, the Count IX Defendants are now engaging in and will continue to engage in the above-described acts resulting in the electronic surveillance, spying, disclosure, and/or use of Plaintiff wire communications, acting in excess of the Count IX Defendants’ statutory authority and in violation of statutory limitations, including 50 U.S.C. § 1809 and 18 U.S.C. § 2511(2)(f), and are thereby irreparably harming Plaintiff and Plaintiff’s family. Plaintiffs has no adequate remedy at law for the Count IX Defendants’ continuing unlawful conduct, and the Count IX Defendants will continue to violate Plaintiff legal rights unless enjoined and restrained by this Court.

100. Pursuant to Larson v. United States, 337 U.S. 682 (1949) and to 5 U.S.C. § 702,

Plaintiff seeks that this Court declare that Defendants have violated their rights and the rights of the class; enjoin the Count IX Defendants, their agents, successors, and assigns, and all those in active concert and participation with them from violating the Plaintiff’s statutory rights, including their rights under 50 U.S.C. §§ 1801 et seq.; and award such other and further equitable relief as is proper.

COUNT X

Violation of 50 U.S.C. § 1809, actionable under 50 U.S.C. § 1810—Damages

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

101. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

102. In relevant part, 50 U.S.C. § 1809 provides that:

(a) Prohibited activities—A person is guilty of an offense if he intentionally—(1) engages in electronic surveillance under color of law except as authorized by this chapter, chapter 119, 121, or 206 of Title 18 or any express statutory authorization that is an additional exclusive means for conducting electronic surveillance under section 1812 of this title; or (2) discloses or uses information obtained under color of law by electronic surveillance, knowing or having reason to know that the information was obtained through electronic surveillance not authorized by this chapter, chapter 119, 121, or 206 of Title 18 or any express statutory authorization that is an additional exclusive means for conducting electronic surveillance under section 1812 of this title.

103. In relevant part 50 U.S.C. § 1801 provides that:

(f) “Electronic surveillance” means – (1) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire or radio communication sent by or intended to be received by a particular, known United States person who is in the United States, if the contents are acquired by intentionally targeting that United States person, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes; (2) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire communication to or from a person in the United States, without the consent of any party thereto, if such acquisition occurs in the United States, but does not include the acquisition of those communications of computer trespassers that would be permissible under section 2511(2)(i) of Title 18; (3) the intentional acquisition by an electronic, mechanical, or other surveillance device of the contents of any radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, and if both the sender and all intended recipients are located within the United States; or (4) the installation or use of an electronic, mechanical, or other surveillance device in the United States for monitoring to acquire information, other than from a wire or radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes.

104. 18 U.S.C. § 2511(2)(f) further provides in relevant part that “procedures in this chapter or chapter 121 and the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in section 101 [50 U.S.C. § 1801] of such Act, and the interception of domestic wire, oral, and electronic communications may be conducted.” (Emphasis added.)

105. 50 U.S.C. § 1812 further provides in relevant part that:

(a) Except as provided in subsection (b), the procedures of chapters 119, 121, and 206 of Title 18 and this chapter shall be the exclusive means by which electronic surveillance and the interception of domestic wire, oral, or electronic communications may be conducted.

(b) Only an express statutory authorization for electronic surveillance or the interception of domestic wire, oral, or electronic communications, other than as an amendment to this chapter or chapters 119, 121, or 206 of Title 18 shall constitute an additional exclusive means for the purpose of subsection (a). (Emphasis added.)

106. Defendants intentionally acquired, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, (negligent), facilitated, directed, controlled, assisted in, or conspired in the commission of such acquisition, by means of a surveillance and spying devices, the contents of one or more wire and wireless communications to or from Plaintiff or other information in which Plaintiff has a reasonable expectation of privacy, without the consent of any party thereto, and such acquisition occurred in the United States.

107. Defendants, and/or other electronic communication services acted as the agent in performing, participating in, enabling, contributing to, negligently contributing to, facilitating, at the hands of, direction of, or knowledge of, or assisting in the commission of the above-described acts of acquisition of Plaintiffs’ communications, interceptions, disclosure and/or use of Plaintiff mind and body, DNA and brain waves from Data Mining and remote transmissions, communications, contents, and records pertaining to their transmissions, collected, and/or stored without judicial or other lawful authorization, probable cause, and/or individualized suspicion of Plaintiff’s records or other information.

108. By the acts alleged herein, Defendants have intentionally engaged in, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, (negligent), facilitated, directed, controlled, assisted in, or conspired in the commission of, electronic surveillance (as defined by 50 U.S.C. § 1801(f)) under color of law, not authorized by any statute, to which Plaintiffs were subjected in violation of 50 U.S.C. § 1809.

109. Additionally or in the alternative, by the acts alleged herein, Defendants have intentionally disclosed

or used information obtained under color of law by electronic surveillance, knowing or having reason to know that the information was obtained through electronic surveillance and spying not authorized by statute, including information pertaining to Plaintiffs, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, willfully caused, participated in, enabled, contributed to, facilitated, directed, controlled, assisted in, or conspired in the commission of such acts.

110. Defendants did not notify Plaintiff of the above-described electronic surveillance, spying, disclosure, and/or use, nor did Plaintiffs consent to such.

111. Plaintiffs have been and are aggrieved by Defendants’ electronic surveillance, spying, disclosure, and/or use of their wire communications.

112. Pursuant to 50 U.S.C. § 1810, which provides a civil action for any person who has been subjected to an electronic surveillance and spying or about whom information obtained by electronic surveillance of such person has been disclosed or used in violation of 50 U.S.C. § 1809, Plaintiff seeks from the Count X Defendants for each Plaintiff their statutory damages or actual damages; punitive damages as appropriate; and such other and further relief as is proper.

COUNT XI

Violation of 18 U.S.C. § 2510, 18 U.S.C. § 2511, and 18 U.S.C. § 2512—Declaratory, Injunctive, and Other Equitable Relief

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

113. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

114. In relevant part, 18 U.S.C. § 2510, 18 U.S.C. § 2511, and 18 U.S.C. § 2510 provides that:

(1) Except as otherwise specifically provided in this chapter any person who – (a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication . . . (c) intentionally discloses, or endeavors to disclose, to any other person the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection . . . [or](d) intentionally uses, or endeavors to use, the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection . . . shall be punished as provided in subsection (4) or shall be subject to suit as provided in subsection (5).

115. 18 U.S.C. § 2511 further provides that:

(3)(a) Except as provided in paragraph (b) of this subsection, a person or entity providing an electronic communication service to the public shall not intentionally divulge the contents of any communication (other than one to such person or entity, or an agent thereof) while in transmission on that service to any person or entity other than an addressee or intended recipient of such communication or an agent of such addressee or intended recipient.

116. 18 U.S.C. § 2511(2)(f) further provides in relevant part that “procedures in this chapter or chapter 121 and the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in section 101 [50 U.S.C. § 1801] of such Act, and the interception of domestic wire, oral, and electronic communications may be conducted.” (Emphasis added.)

117. 50 U.S.C. § 1812 further provides in relevant part that:

(a) Except as provided in subsection (b), the procedures of chapters 119, 121, and 206 of Title 18 and this chapter shall be the exclusive means by which electronic surveillance and the interception of domestic wire, oral, or electronic communications may be conducted.

(b) Only an express statutory authorization for electronic surveillance or the interception of domestic wire, oral, or electronic communications, other than as an amendment to this chapter or chapters 119, 121, or 206 of Title 18 shall constitute an additional exclusive means for the purpose of subsection (a). (Emphasis added.)

118. By the acts alleged herein, Defendants have intentionally and willfully intercepted, endeavored to intercept, or procured another person to intercept or endeavor to intercept, Plaintiff’s wire or electronic communications in violation of 18 U.S.C. § 2511(1)(a); and/or

119. By the acts alleged herein, Defendants have intentionally and willfully disclosed, or endeavored to disclose, to another person the contents of Plaintiff wire or electronic communications, knowing or having reason to know that the information was obtained through the interception of wire or electronic communications in violation of 18 U.S.C. § 2511(1)(c); and/or

120. By the acts alleged herein, Defendants have intentionally and willfully used, or endeavored to use, the contents of Plaintiff wire or electronic communications, while knowing or having reason to know that the information was obtained through the interception of wire or electronic communications and spying in violation of 18 U.S.C. § 2511(1)(d).

121. By the acts alleged herein, Defendants have intentionally and willfully caused, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, participated in, contributed to, negligently contributed to, facilitated, directed, controlled, assisted in, or conspired to cause unwitting subjects, Plaintiff, and the public, divulgence of Plaintiff wire or electronic communications to Defendants while in transmission by various service providers, and there of tampering with, in violation of 18 U.S.C. § 2511(2)(3)(4)(5).

122. Defendants have committed these acts of interception, disclosure, divulgence and/or use of Plaintiff communications directly or by aiding, abetting, counseling, commanding, inducing, procuring, encouraging, promoting, instigating, advising, willfully causing, participating in, enabling, contributing to, facilitating, directing, controlling, assisting in, or conspiring in their commission. In doing so, Defendants have acted in excess of their statutory authority and in violation of statutory limitations.

123. Defendants, and/or other electronic communication services acted as the agent in performing, participating in, enabling, contributing to, negligently contributing to, facilitating, at the hands of, direction of, or knowledge of, or assisting in the commission of the above-described acts of interceptions, disclosure and/or use of Plaintiff’s mind and body, DNA and brain waves from Data Mining and remote transmissions, communications, contents of communications, and records pertaining to their transmissions, collected, and/or stored without judicial or other lawful authorization, probable cause, and/or individualized suspicion of Plaintiff’s records or other information.

124. Defendants did not notify Plaintiff of the above-described intentional interception, disclosure, divulgence and/or use of their wire or electronic communications, nor did Plaintiff consent to such.

125. Plaintiff have been and are aggrieved by Defendants’ intentional and willful interception, disclosure, divulgence and/or use of their wire or electronic communications.

126. On information and belief, the Count XI Defendants are now engaging in and will continue to engage in the above-described acts resulting in the intentional and willful interception, disclosure, divulgence and/or use of Plaintiff’s wire or electronic communications, acting in excess of the Count XI Defendants’ statutory authority and in violation of statutory limitations, including 18 U.S.C. § 2511, and are thereby irreparably harming Plaintiff. Plaintiffs have no adequate remedy at law for the Count XI Defendants’ continuing unlawful conduct, and the Count XI Defendants will continue to violate Plaintiff’s legal rights unless enjoined and restrained by this Court.

127. Pursuant to 18 U.S.C. § 2520, which provides a civil action for any person whose wire or electronic communications have been intercepted, disclosed, divulged or intentionally used in violation of 18 U.S.C. § 2511, to Larson v. United States, 337 U.S. 682 (1949), and to 5 U.S.C. § 702, Plaintiff seek equitable and declaratory relief against the Count XI Defendants.

128. Plaintiffs seek that this Court declare that Defendants have violated their rights and the rights of the class; enjoin the Count XI Defendants, their agents, successors, and assigns, and all those in active concert and participation with them from violating the Plaintiff statutory rights, including their rights under 18 U.S.C. § 2511; and award such other and further equitable relief as is proper.

COUNT XII

Violation of 18 U.S.C. § 2510, 18 U.S.C. § 2511, and 18 U.S.C. § 2512 actionable under 18 U.S.C. § 2520—Damages

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

129. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

130. In relevant part, 18 U.S.C. § 2510, 18 U.S.C. § 2511, and 18 U.S.C. § 2510 provides that:

(1) Except as otherwise specifically provided in this chapter any person who – (a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication . . . (c) intentionally discloses, or endeavors to disclose, to

any other person the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection . . . [or](d) intentionally uses, or endeavors to use, the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection . . . shall be punished as provided in subsection (4) or shall be subject to suit as provided in subsection (5).

131. 18 U.S.C. § 2511 further provides that:

(3)(a) Except as provided in paragraph (b) of this subsection, a person or entity providing an electronic communication service to the public shall not intentionally divulge the contents of any communication (other than one to such person or entity, or an agent thereof) while in transmission on that service to any person or entity other than an addressee or intended recipient of such communication or an agent of such addressee or intended recipient.

132. 18 U.S.C. § 2511(2)(f) further provides in relevant part that “procedures in this chapter or chapter 121 and the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in section 101 [50 U.S.C. § 1801] of such Act, and the interception of domestic wire, oral, and electronic communications may be conducted.” (Emphasis added.)

133. 50 U.S.C. § 1812 further provides in relevant part that:

(a) Except as provided in subsection (b), the procedures of chapters 119, 121, and 206 of Title 18 and this chapter shall be the exclusive means by which electronic surveillance and the interception of domestic wire, oral, or electronic communications may be conducted.

(b) Only an express statutory authorization for electronic surveillance or the interception of domestic wire, oral, or electronic communications, other than as an amendment to this chapter or chapters 119, 121, or 206 of Title 18 shall constitute an additional exclusive means for the purpose of subsection (a). (Emphasis added.)

134. By the acts alleged herein, Defendants have intentionally and willfully intercepted, endeavored to intercept, or procured another person to intercept or endeavor to intercept, Plaintiff’s and Plaintiff’s family members’ wire or electronic communications in violation of 18 U.S.C. § 2511(1)(a); and/or

135. By the acts alleged herein, Defendants have intentionally and willfully disclosed, or endeavored to disclose, to another person the contents of Plaintiff’s wire or electronic communications, knowing or having reason to know that the information was obtained through the interception of wire or electronic communications in violation of 18 U.S.C. § 2511(1)(c); and/or

136. By the acts alleged herein, Defendants have intentionally and willfully used, or endeavored to use, the contents of Plaintiff’s wire or electronic communications, while knowing or having reason to know that the information was obtained through the interception of wire or electronic communications in violation of 18 U.S.C. § 2511(1)(d).

137. By the acts alleged herein, Defendants have intentionally and willfully caused, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, participated in, contributed to, facilitated, directed, controlled, assisted in, or conspired to cause divulgence of Plaintiff’s and Plaintiff’s family members wire or electronic communications to Defendants while in transmission by various service providers, and there of tampering with, in violation of 18 U.S.C. § 2511(2)(3)(4)(5).

138. Defendants have committed these acts of interception, disclosure, divulgence and/or use of Plaintiff’s communications directly or by aiding, abetting, counseling, commanding, inducing, procuring, encouraging, promoting, instigating, advising, willfully causing, participating in, enabling, contributing to, facilitating, directing, controlling, assisting in, or conspiring in their commission.

139. Defendants, and/or other electronic communication services acted as the agent in performing, participating in, enabling, contributing to, negligently contributing to, facilitating, at the hands of, direction of, or knowledge of, or assisting in the commission of the above-described acts of interceptions, disclosure and/or use of Plaintiff mind and body, DNA and brain waves from Data Mining and remote transmissions, communications, contents of communications, and records pertaining to their transmissions, collected, and/or stored without judicial or other lawful authorization, probable cause, and/or individualized suspicion of Plaintiff’s records or other information.

140. Defendants did not notify Plaintiff of the above-described intentional interception, disclosure, divulgence and/or use of their wire or electronic communications, nor did Plaintiff consent to such.

141. Plaintiff have been and are aggrieved by Defendants’ intentional and willful interception, disclosure, divulgence and/or use of their wire or electronic communications.

142. Pursuant to 18 U.S.C. § 2520, which provides a civil action for any person whose wire or electronic communications have been intercepted, disclosed, divulged or intentionally used in violation of 18 U.S.C. § 2511, Plaintiff seeks from the Count XII Defendants for Plaintiff’s statutory damages or actual damages; punitive damages as appropriate; and such other and further relief as is proper.

COUNT XIII

Violation of 18 U.S.C. § 2511, actionable under 18 U.S.C. § 2712—Damages

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

143. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

144. In relevant part, 18 U.S.C. § 2511 provides that:

(1) Except as otherwise specifically provided in this chapter any person who – (a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication . . . (c) intentionally discloses, or endeavors to disclose, to any other person the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection . . . [or](d) intentionally uses, or endeavors to use, the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection . . . shall be punished as provided in subsection (4) or shall be subject to suit as provided in subsection (5).

145. 18 U.S.C. § 2511 further provides that:

(3)(a) Except as provided in paragraph (b) of this subsection, a person or entity providing an electronic communication service to the public shall not intentionally divulge the contents of any communication (other than one to such person or entity, or an agent thereof) while in transmission on that service to any person or entity other than an addressee or intended recipient of such communication or an agent of such addressee or intended recipient.

146. 18 U.S.C. § 2511(2)(f) further provides in relevant part that “procedures in this chapter or chapter 121 and the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in section 101 [50 U.S.C. § 1801] of such Act, and the interception of domestic wire, oral, and electronic communications may be conducted.”(Emphasis added.)

147. 50 U.S.C. § 1812 further provides in relevant part that:

(a) Except as provided in subsection (b), the procedures of chapters 119, 121, and 206 of Title 18 and this chapter shall be the exclusive means by which electronic surveillance and the interception of domestic wire, oral, or electronic communications may be conducted.

(b) Only an express statutory authorization for electronic surveillance or the interception of domestic wire, oral, or electronic communications, other than as an amendment to this chapter or chapters 119, 121, or 206 of Title 18 shall constitute an additional exclusive means for the purpose of subsection (a).

(Emphasis added.)

148. By the acts alleged herein, Defendants have intentionally and willfully intercepted, endeavored to intercept, or procured another person to intercept or endeavor to intercept, spy, Plaintiff wire or electronic communications in violation of 18 U.S.C. § 2511(1)(a); and/or

149. By the acts alleged herein, Defendants have intentionally and willfully disclosed, or endeavored to disclose, to another person the contents of Plaintiff wire or electronic communications, knowing or having reason to know that the information was obtained through the interception of wire or electronic communications in violation of 18 U.S.C. § 2511(1)(c); and/or

150. By the acts alleged herein, Defendants have intentionally and willfully used, or endeavored to use, the contents of Plaintiff wire or electronic communications, while knowing or having reason to know that the information was obtained through the interception of wire or electronic communications in violation of 18 U.S.C. § 2511(1)(d).

151. By the acts alleged herein, Defendants have intentionally and willfully caused, or aided, abetted, counseled, commanded, induced, procured, encouraged, promoted, instigated, advised, participated in, contributed to, facilitated, spied, directed, controlled, assisted in, or conspired to, negligently conspired to, cause unwitting subjects, Plaintiff, and the public, divulgence of Plaintiff’s wire or electronic communications to Defendants while in transmission by various service providers, and there of tampering with, in violation of 18 U.S.C. § 2511(2)(3)(4)(5).

152. Defendants have committed these acts of interception, disclosure, divulgence and/or use of Plaintiff’s communications directly or by aiding, abetting, counseling, commanding, inducing, procuring, encouraging, promoting, instigating, advising, willfully causing, participating in, enabling, contributing to, facilitating, directing, controlling, assisting in, or conspiring in their commission.

153. Defendants, and/or other electronic communication services acted as the agent in performing, participating in, enabling, contributing to, negligently contributing to, facilitating, at the hands of, direction of, or knowledge of, or assisting in the commission of the above-described acts of interceptions, disclosure and/or use of Plaintiff mind and body, DNA and brain waves from Data Mining and remote transmissions, communications, contents of communications, and records pertaining to their transmissions, collected, and/or stored without judicial or other lawful authorization, probable cause, and/or individualized suspicion of Plaintiff’s records or other information.

154. Defendants did not notify Plaintiffs of the above-described intentional interception, disclosure, divulgence and/or use of their wire or electronic communications, nor did Plaintiff consent to such.

155. Plaintiff have been and are aggrieved by Defendants’ intentional and willful interception, disclosure, divulgence and/or use of their wire or electronic communications.

156. Title 18 U.S.C. § 2712 provides a civil action against the United States and its agencies and departments for any person whose wire or electronic communications have been intercepted, disclosed, divulged or intentionally used in willful violation of 18 U.S.C. § 2511. Plaintiff has complied fully with the claim presentment procedure of 18 U.S.C. § 2712. Pursuant to 18 U.S.C. § 2712, Plaintiff seeks from the Count XIII Defendants for Plaintiff’s statutory damages or actual damages, and such other and further relief as is proper.

COUNT XIV

Violation of 18 U.S.C. § 2703(a) & (b)—Declaratory, Injunctive, and Other Equitable Relief

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

157. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

158. In relevant part, 18 U.S.C. § 2703 provides that:

(a) Contents of Wire or Electronic Communications in Electronic Storage.— A governmental entity may require the disclosure by a provider of electronic communication service of the contents of a wire or electronic communication, that is in electronic storage in an electronic communications system for one hundred and eighty days or less, only pursuant to a warrant issued using the procedures described in the Federal Rules of Criminal Procedure by a court with jurisdiction over the offense under investigation or equivalent State warrant. A governmental entity may require the disclosure by a provider of electronic communications services of the contents of a wire or electronic communication that has been in electronic storage in an electronic communications system for more than one hundred and eighty days by the means available under subsection (b) of this section.

(b) Contents of Wire or Electronic Communications in a Remote Computing Service.—

(1) A governmental entity may require a provider of remote computing service to disclose the contents of any wire or electronic communication to which this paragraph is made applicable by paragraph (2) of this subsection—

more:

Related Images:

DHS wants to read your brain

The US DHS wants to know what's on your insides.

The US DHS wants to know what’s on your insides.

They know where you live and know where you work. Now the government is considering a plan to monitor Americans’ speech rhythms, blinking rate and breathing patterns. This, they say, could help identify and eliminate threats to the nation

.

The CIA doesn’t necessarily want to put a microchip in your brain but what they are trying out isn’t all that far off. Under a project put together by the Department of Homeland Security, the government has been trying out space-age (and pretty damn creepy) techniques to get into the minds of Americans in hopes of figuring out who will cause concern for the country before they can even get out of bed.

It’s called the FAST project and it stands for the Future Attribute Screening Technology Mobile Module. If this technology is implemented quickly on the public, however, it could be an invasion of privacy made for the silver screen.

The website CNET has uncovered evidence of the FAST project through Freedom of Information Act requests sent out by the Electronic Privacy Information Center (EPIC) and has now revealed to the public that they could eventually be in danger of a massive initiative that has already been tested in America.

DHS employees have already served as test subjects in FAST trial runs in which sensors collected “video images, audio recordings and psychophysiological measurements,” among other unidentified evaluations, in order to get into the minds of potential terrorists.

To CNET, DHS Deputy Press Secretary Peter Boogaard says FAST is designed to track and monitor body movements, voice pitch changes, fluctuations in rhythm and intonation, eye movement, body heat changes and breathing patterns in order to gather research that could help pin-point the inner workings of wrong-doers. Boogard says that preliminary research has already been conducted and that the DHS has used technological sensors and observational techniques to signal out signs of stress “associated with intent to do harm.”

The DHS says that they do not intend on deploying FAST program on the public anytime soon, but should they chose to, that means that your every move — inside and out — could be recorded to keep America safe . . . one blink at a time.

Among the materials collected in the FOIA request sent out by EPIC is one document that accounts for every cent of the “ore-crime” system that was contracted out to a Cambridge, Massachusetts laboratory. Amounts, however, were redacted in the documents. EPIC writes that they are pursuing an administrative appeal to challenge those blackened out portions of the files.

Though research has apparently only been conducted on DHS volunteer so far, the documents suggest that a trial will be carried out soon on volunteering public at a large invent where body actions will be used to help researcher’s pin-point “the bad guy.” Should this technology make it outside of the DHS’ trial testing, it wouldn’t be that big surprise if it becomes implemented alongside the already invasive scanners that the DHS has at their many airports across America.

Upon CNET’s initial report on the FAST program, the DHS was quick to fire back that the program really isn’t as invasive as some might think — even if, yes, they have been collecting data on breathing patterns to learn how to kick crime to the curb. They add that data is not kept on participants, which is collected anonymously, after the process is complete.

Related Images:

Can interpret behavior and identify potential threats

Can interpret behavior and identify potential threats – “…The Visual Intelligence Grounded in Learning (VIGIL) project is part of the larger DARPA program known as Mind’s Eye, which is to develop a smart camera system that needs minimal human supervision, can be deployed rapidly and cost effectively in unmanned vehicles (UVs) stationed in areas under automatic surveillance, and can interpret behavior and identify potential threats from video data. “Surveillance in dangerous areas is currently performed by remote reconnaissance teams and advanced scouting patrols, who are often risking their lives,” said Hung Bui, SRI’s senior computer scientist. “While their efforts can be supplemented through the use of cameras on unmanned vehicles, such devices still require constant human monitoring to analyze ongoing activities. SRI’s VIGIL system combines automatic reasoning and machine perception to automatically analyze areas of interest while keeping members of the armed forces out of harm’s way…” (DARPA Picks Visual Intelligence System’s Design Leader)

Advanced human-computer Interaction – “…Lockheed said that analysts go through volumes of disparate ISR data from sea, air, and land assets to produce an integrated view of critical information for the warfighter. It is difficult for analysts to easily share and integrate that data. The creation of the new InsightOS will enable automated combining of sensor and intelligence data from multiple assets, dynamically re-tasking assets as necessary, and incorporating analysts into the process via advanced Human-Computer Interaction tools. As a result, the fidelity and speed of battlefield analyses will improve, increasing mission success and warfighter safety. Based in Bethesda, Maryland, Lockheed Martin is a global security company that is principally engaged in the research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services…” (Lockheed to Help Analyze Data)

Neuro-optical system – “…Awarded by the Defense Advanced Research Projects Agency (DARPA), the Cognitive Technology Threat Warning System program, or CT2WS, is part of the U.S. Department of Defense’s effort to address a key mission need and represents a significant leap forward in technology from that available today. The goal of the CT2WS program is to drive a breakthrough in soldier-portable visual threat warning devices. Once successfully developed, the intelligent neuro-optical system will provide the warfighter with an unprecedented capability to detect targets of interest at an extremely long range over a wide field of view. In Phase One of the program, the Northrop Grumman team plans to demonstrate the concept by building a breadboard system and complete a preliminary design for the company’s Human-aided Optical Recognition/Notification of Elusive Threats (HORNET) system. HORNET will utilize a custom helmet equipped with electro-encephalogram electrodes placed on the scalp to record the user’s continuous electrical brain activity. The operator’s neural responses to the presence or absence of potential threats will train the system’s algorithms, which will continue to be refined over time so that the warfighter is always presented with items of relevance to his mission. “Northrop Grumman’s HORNET system leverages the latest advances in real-time coupling of human brain activity with automated cognitive neural processing to provide superior target detection,” says Michael House, Northrop Grumman’s CT2WS program manager. “The system will maintain persistent surveillance in order to defeat an enemy’s attempts to surprise through evasive move-stop-move tactics, giving the U.S. warfighter as much as a 20-minute advantage over his adversaries…” (Northrop Grumman-Led Team Awarded Contract to Develop Electronic Bi…)

Microchip in the brain – “…The arm, which was developed at a cost of over $100 million by DARPA and Johns Hopkins University over the past five years, is controlled by a microchip in the brain. The microchip records neuron activity and decodes the signals to activate motor neurons that control the prosthetic. DARPA’s prosthetic works much like a regular arm, with the ability to bend, rotate, and twist in 27 different ways. It is designed to restore almost complete hand and finger function to patients dealing with spinal cord injury, stroke, or amputation. Now that the arm has been expedited through the FDA’s program, Johns Hopkins will implant its microchips in five patients and monitor them for a year. There are few safety concerns, but the university anticipates issues with maintaining chip quality over time, according to the a href=”http://articles.latimes.com/2011/feb/09/nation/la-na-prosthetic-arm…″ target=”_blank”>Los Angeles Times. If all goes well, the arm could be on the market in just four to five years…” (DARPA’s Mind-Controlled Prosthetic Arm Could Be on the Market in Fo…)

Electrical current to the brain – “…Applying electricity to the brain has a long and at times dark history. Doctors, psychiatrists and other researchers have known for hundreds of years that applying electrical current to the brain can cause changes; some good, some not so much. Electrical stimulation has been used to keep executed prisoners from twitching after death, to “help” patients overcome depression and more recently to help people with injuries or brain impairments to regain functionality. This history now colors any new research as fear and skepticism tend to get in the way of serious work. This is likely the reason that this new research is being done by DARPA, rather than an independent organization; it doesn’t have to answer to anyone except the DoD. Because the amount of current is so small, volunteers report no pain, just a slight tingling sensation during the procedure, and afterwards can offer no real explanations as to why they performed better than they might have otherwise. This research, and other studies like it, have set off both alarms and intrigue in certain quarters. Some worry people, such as college students will jump on the procedure as a means to help cram for exams, others wonder if electronic devices such as blue-tooth phones are emitting electricity that might help them learn; while others yet point out, very soberly, that no one really knows just yet what long-term effects people might have from exposure to something as simple as tCDS…” (DARPA takes new look at electrical brain stimulation to aid in lear…)

The Defense Advanced Research Projects Agency (DARPA) is an agency of the United States Department of Defense responsible for the development of new technology for use by the military. DARPA has been responsible for funding the development of many technologies which have had a major effect on the world, including computer networking, as well as NLS, which was both the first hypertext system, and an important precursor to the contemporary ubiquitous graphical user interface. Its original name was simply Advanced Research Projects Agency (ARPA), but it was renamed to “DARPA” (for Defense) in March 1972, then renamed “ARPA” again in February 1993, and then renamed “DARPA” again in March 1996. DARPA was established during 1958 (as ARPA) in response to the Soviet launching of Sputnik during 1957, with the mission of keeping U.S. military technology more sophisticated than that of the nation’s potential enemies. From DARPA’s own introduction, DARPA’s original mission, established in 1958, was to prevent technological surprise like the launch of Sputnik, which signaled that the Soviets had beaten the U.S. into space. The mission statement has evolved over time. Today, DARPA’s mission is still to prevent technological surprise to the US, but also to create technological surprise for its enemies. DARPA is independent from other more conventional military R&D and reports directly to senior Department of Defense management. DARPA has around 240 personnel (about 140 technical) directly managing a $3.2 billion budget. These figures are “on average” since DARPA focuses on short-term (two to four-year) projects run by small, purpose-built teams. (Wikepedia)

YouTube videos link:

Project GreenVax

http://youtu.be/T0nukOKUiCo

DARPA Nano Air Vehicle (NAV) program

http://youtu.be/NuD1WKHsggs

The DARPA Autonomous Robotic Manipulation (ARM) program

http://youtu.be/d4rCvoX34Ew

DARPA Video and Image Retrieval and Analysis Tool (VIRAT)

http://youtu.be/LkueCrzzRrk

HAARP

http://youtu.be/MnRPZOUVhJ4

RELATED READING:

Related Images:

Thought Reading and Control

Artificial Intelligence and European project FACETS (the fast analog computer)
Artificial Intelligence and European project FACETS (the analog computer) provides new medical imaging technique for the brain and the possibility of “reverse engineering the brain”

The government lacks a regulator who can ensure that the laws for ethical review and informed consent for research on humans with brain implants followed. The shortage means that the Government neither can satisfy the requirements of the conventions on human rights and bioethics incumbent government, a precarious situation for European citizens.Graduate Abuse can happen completely without insight with brain-machine interface and e-science.
When science produces results that are changing the neurobiological description of human consciousness, what is left of the notions that humans have free will and personal responsibility for their actions? New knowledge about the neural basis of morality is blowing also renewed debate about the existence of a universal morality. These questions are discussed within the field of neuroethics, a subject that deals with the philosophical and ethical issues raised by neuroscience and cognitive research. (Centre for Research Ethics & Bioethics )

Scientists have the knowledge of the fMRI and PET cameras, among other things learned where in the brain electrodes must be placed to the E-science visualization of human perception.

In recent decades meetings between nanotechnology, information technology, biotechnology and neuroscience have produced a new research area, which is developing new, unknown products and services. We are facing a new revolution, which is already running with the launch of mind characterized universal computer. A unique perceptual tool, not only raise awareness for our minds but also imitate them: sight, hearing, taste, smell and touch.

CNN UN stands for Cellular Neural / Non-linear Network – Universal Machine. And there are three innovators Tamás Rosk, Leon Chua, and Angel Rodriguez Vazques, who are the pioneers behind the “revolution of the senses”. They have introduced a new computer policy, which differs from the digital model magazine sparkling, lower standards.

We’ve said ‘yes’ without any major protests to the electronic age “first wave”. When we are referring to the cheap chip that made ​​the PC to every man’s tools.
“The second wave” came creeping – also without objection. A series of inexpensive electronic means such as lasers, the Internet was built for broadband and mobile phone, which is now self-evident part of our everyday lives.
In the “third wave”, it also applies connections to the brain, called brain-computer integration (brain-Macine interface) and related network-based human-machine language. This means both huge benefits but also disadvantages to humans. The disadvantages include complex legal implications, concerning the identity and integrity.

Info-Bionic challenging society. In the biological field, we first familiarize ourselves with “smart” devices and tools, which stimulates and motivates the human central nervous system. But it also outlines smart prostheses implanted in the living organism. The direct contact between these “smart” nano-implants and our central nervous system, pointing towards a symbiosis (living together), between brain and computer. This new realm, which is named for info-bionic, challenge course, the traditional values ​​of society and its ethical standards.

Computer scientists also predicts that within the next few years neural interfaces will be designed so that it will not only increase the dynamic range of the senses, but will also enhance memory and enable “cyberthink” that invisible communication built on ideas.

Direct connection to the brain: It is without doubt the most complicated task. Here are dangers as great as the opportunities. This is also bioethics responsibility far greater than in those areas, which so far we have touched. But really, all mined areas and the limitation of the commercial profit hunger is therefore highly desirable.

Future Technologies, Future and Emerging Technologies – FET. The basis for this strategy is the focus on the future of Information and Communication Technology – ICT

Here are some quotes from the EU’s 7th Framework Programme.
“Can one example understand and exploit the ways in which social and biological systems organize themselves and evolve, will pave the way for the development of new opportunities for next-generation software and network technologies. “
“The understanding of how the human brain works not only leads to innovations in medicine, but it also creates new models for energy, fault-tolerant and adaptive computer technology.”
“FET support example, been crucial for research in quantum information technology in Europe. This technique promises an enormous computing power far beyond the capacity of ordinary computers, and also completely secure communications. By early investments have FET program made ​​a decisive contribution to Europe now is a world leader in the field. “
“In the FET area carries, in addition, pioneering work on new ideas as artificial living cells, synthetic biology, chemical communication, collective intelligence and two-way interface between brain and machine.”

Research Council has published a booklet packed facts pocket “where gold glitters blue” on the new nanoscience. This new technology opens up tremendous opportunities, but also contains a number of ethical issues. Sweden currently lacks clear ethical guidelines.

Here are quotes from the book written by Ulf Görman, professor of ethics and religious studies at Lund University.
Nanoelectronics! A number of ethical declarations have been introduced to prevent abuse of people, including the Declaration of Helsinki. In 1997, also signed the EU Member States’ Convention on Human Rights and Biomedicine “in the Spanish city of Oviedo.
-These declarations have been added in response to the abuse of people who were in World War II. Oviedo Convention and other European rules have resulted in new legislation in Sweden. For example, the Privacy Act, which came into force in 1998, and the Act on Ethical Review of Research Involving Humans, which came into force in 2004. Ulf Görman believe that when we do a retrospective, it is easy for us to distinguish between unethical and ethical good research.

Now we open the doors to an unknown area where we do not know how to apply ethics.What should it be and what should not be allowed when you can make the electrode implant that can both influence and learn of the brain? He takes up the example of studying learning and memory. ”Micro Implants can provide unprecedented opportunities to understand how we learn and remember things, and hence why we forget and find it difficult to learn. While it may be perceived as a form of abuse that like that look in our most private mental world “.

Thought Control – a new ethical problem. Being able to connect the human brain to a computer via electrodes open, of course, frightening possibilities. Will it be feasible to control a person’s thoughts?
There are important ethical aspects of this. One could of course theoretically able to control brain functions and modify people’s personality. For example, making them more or less prone to aggression or to increase learning ability by adding the chronic stimulation. It’s like with everything else, in that the knowledge is there, you can use it in many ways. Ulf Görman

Swedish and EU researchers possess, in secret, a privilege of the commercial profit hunger to develop these advanced technologies. Researchers may, without obtaining the informed consent and without the approval of an ethics board inject nanotechnology and research on humans, completely “Top Secret”. This is the way to the products, software and network technology is approaching patent application and a commercial launch of the research results, is on its way.

Research where informed consent could not be obtained and an approval of an ethics board would not be due to the physical and psychological risks for the individual is totally unknown, will not stop Swedish an EU researchers.

Withholding research reports on the development of new technologies means that the existing diagnosis in psychiatry and the judicial system disposes of the victims of abuse research, which makes these instances of “missing traders” for the illegal research. In this way, researchers will escape detection, and no responsibility. In nanotechnology and human-machine integration is the market and the power that controls, not ethics.

Because of that situation, people are slaughtered with impunity as research objects with the new technologies. When the legislative and diagnostics are missing, the computer-brain integration, it follows that attempts objects during research time exposed to serious torture.Graduate abuses have naturally resulted in the subjects in pure frustration committed ensanity acts and ended up in prison or in psychiatric care. Had the law existed and functioned, this research instead to point out that scientists are forced to drive people “across the border” and charged to the judiciary and mental health.

Although concrete evidence because of evaded research reports are currently lacking, so will future research and patents, of course, be able to uncover this hidden aggravated criminal research.

When the government knowingly or unknowingly withholds itself from scientific information will result in a right wrecked Sweden.
People can during the long development of the computer brains of the Internet-based human-machine language is not heard. This leads to pure execution is under development to cover up the criminal teknologys rampage.

How much longer must people illegally injected at the Swedish hospital?
How much longer must people’s brains are allowed to “cut” for the enslavement of the scientists’ services without compensation?
How much longer must people assaulted, death and / or misdiagnosed before the government makes sure to meet the conventions on human rights and bioethics?
Who takes responsibility for the children that are left homeless when the researchers injected and linked up attempts of people who have family, social welfare and labor?
How many people have died earlier in scientific experiments because of lack of transparency in the Swedish neuroscience hunt for power and money?
How many ensanity acts, traffic accidents, deaths in maternity hospitals, and even political murder has been diagnosed, but no account is taken of nanotechnology and the many years of development of technologies for computer-brain integration and the study of human behavior?

Five years of direct connectivity of the brain, the pattern recognition of brain neurons to cognitive behavior (perception), designed with artificial intelligence in a multimedia connection between brain implant and computers.

Related Images:

Tinier microchips easier to secretly implant you

Rogue stalkers entering homes in the middle of the night, dentists, and doctors, each abusing human rights by covertly implanting microchips into the brains of unwitting children and adults may soon find their job easier since École Polytechnique Fédérale de Lausanne (EPFL) Laboratory of Nanoscale Electronics and Structures (LANES) scientists have made the first molybdenite microchip, using smaller and more energy efficient transistors. Kurzweil Accelerating Intelligence News reports Molybdenite can surpass silicon in terms of miniaturization, electricity consumption, and mechanical flexibility, scientists say.

“We have built an initial prototype, putting from two to six serial transistors in place, and shown that basic binary logic operations were possible, which proves that we can make a larger chip,” said LANES director Andras Kis.

“The main advantage of MoS2 is that it allows us to reduce the size of transistors, and thus to further miniaturize them,” explained Kis.

“They can be turned on and off much more quickly, and can be put into a more complete standby mode.”

These could be used for the new roll-up type computers or devices “affixed to the skin.”

On December 6, 2000, Rauni-Leena Luukanen-Kilde, MD, Former Chief Medical Officer of Finland, published an article, “Microchip Implants, Mind Control, and Cybernetics,” one of the first concise papers on the history of secretly forced brain implants.

In August, IBM announced it had developed silicon microchips that mimic the brain and “rewire” themselves in response to new information according to The Telegraph. “The technology has been hailed as a move towards ‘cognitive computing’, allowing machines to perform human-like functions such as recognition and learning.”

An untold number of self-identified innocent Targeted Individuals allege having been unwittingly micro-chipped, without their knowledge or consent, a claim private investigator William Taylor says is not far-fetched.

Taylor’s investigations evidence that at least ten percent of his Targeted Individual cases have been covertly implanted with microchips that remotely work two ways: to emit and receive at the whim of the controller.

Although few American doctors, psychologists and psychiatrists will admit high-tech electronic abuse some of their patients report, the history of secretly forced brain implants plus existing mounting evidence of an increasing numbers of innocent citizens are being secretly brain implanted with U.S. RFID chips without their knowledge or consent.

While most brain implant reports only highlight the a positive side of the devices, implanted subjects are then vulnerable to remotelt applied no-touch torture, mind control plus non-consensual human experimentation.

Suggested by the author:

Secretly forced brain implants: A brief history
Secretly forced brain implants Pt 1: Explosive court case
Secretly forced brain implant Pt II: MRI scan image and reports of Target, James Walbert
Part III Secretly forced brain implants: Ex-SS FBI agent defends chipped targets
Secretly forced brain implants Pt IV: Intel expert on the doctors, children, military research

Related Images:

Spiral Waves

Spiral Waves – Most targeted individuals will discover the visible spiral waves particles while being attack by directed energy weapons. These electromagnetic radiations attacks the body specifically the head, eyes, nose, ears, mouth, chest, legs, stomach and genital areas. A scientific explanations of these phenomena are confirmed in an article from globalsecurity.org and it also explained the attacks are being done wherever the targets are located whether he or she is anywhere on land, inside an airplane, or on board in seaship. The article read: “…Radar tracking and imaging systems use dedicated transmitters to generate electromagnetic radiation to form non-literal images of satellites. Since the system is an active sensor and thus provides its own source of illumination, it is useful at any time of the day and under almost all weather conditions to provide high-volume means of tracking space objects. Because of these facts, radar systems are, in general, more frequently available than visible systems. However, they are most commonly used to provide highly accurate tracking information on spacecraft in low Earth orbit (LEO), typically at an altitude less than 3,000 km, and, due to high cost for the necessary power, are not used to track geosynchronous satellites…Signals Intelligence (SIGINT) tracking and identification involves the collection and analysis of electronic signals for intelligence purposes. Typical targets for SIGINT collection include space system components that emit electromagnetic waves; either uplink, downlink, or crosslink transmitters. The basic capability to collect communications signals from satellites requires little more equipment than what is used by many home satellite television subscribers. Passive RF tracking involves the use of antennas on the ground to gather tracking information to precisely locate the source of a satellite’s signal. Because electromagnetic waves from a satellite’s transmitter travel in a straight line, the direction of arrival of the signal is the direction of the transmitter. Directional bearing information on a particular radiator can determine the location of that radiator. Data, from one of the sources discussed in the previous sections, on the location of a satellite can be used as a source for the initial satellite tracking information….” (Threats to United States Space Capabilities)

COIL lasers with power outputs – In this site, targeting weapons, COIL Lasers, are briefly described and commercially available: “DEW research has been carried out in the Russian Federation since the early 1960s, particularly with lasers. Both nuclear and solid propellant generators have developed several MW power levels, and there were several joint programmes with the US in the 1990s using Russian power generation systems. A major test facility was located at Sary Shagan in Kazakhstan. Russian programmes have been reported for ground-based, airborne and space-based laser weapons. It has been reported that a tracked and armoured vehicle with a ground-based laser was developed in the mid-1980s for use against aircraft and missile targets, but these have not been displayed. It has also been reported that the Russians conducted tests using a ground-based laser to disable sensors carried on satellites in low earth orbit. Several Russian companies have reported developing COIL lasers with power outputs in the 15 kW range, and in December 2005 there was a proposal for a truck mounted ground-based laser weapon system with a power of 30 kW and a 5 km range. It is believed that the Russians have allocated more funding to DEW research and development programmes in 2008, following the US destruction of a satellite with a SM-3 interceptor in February 2008. A Russian report stated that an airborne laser has been fitted to an Il-76 aircraft, and was tested in 2010. This was tested against ground and airborne sensors, and could be tested against satellites in low earth orbit in the future…” (Directed Energy Weapons (DEW) (Russian Federation), Defensive weapons)

Directed Energy Weapons – In the Foreign Affairs and International Trade Canada web-site, targeting weapons are briefly discussed:”…These are weapons that can destroy electronic circuitry by the creation or emission of electromagnetic pulse (EMP) or radiation. A nuclear explosion creates both and can effectively neutralize satellites, which have not been hardened against such effects. EMP lasts for a small fraction of a second but causes damage to unprotected circuitry within several hundred miles radius of the blast. Following a nuclear explosion, the resulting beta particles and gamma rays can also create havoc in space assets affecting both radio waves and radar waves. According to General Kenneth Hagemann, director of the Defence Nuclear Agency, a 50-kiloton nuclear weapon exploded at 62 miles above the earth would pump up the Van Allen radiation belt to the extent that increased exposure “would cause satellites to die in hours, days, or weeks”76. General Hagemann also points out that miniaturized electronics which make satellites lighter and smaller increases the vulnerability of satellites since they require less power and are consequently susceptible to smaller disruptions…Directed Energy Weapons “include laser, radio frequency” weapons. A laser weapon produces a concentrated beam, which can be projected from earth towards space assets. An example of such a system is the Mid-Infrared Advanced Chemical Laser (MIRACL). On October 17, 1997, the MIRACL laser successfully illuminated a satellite. Another program is the airborne laser (ABL) onboard a Boeing 747 aircraft. Laser weapons can be used to either physically harm the satellite or simply to” blind” the satellite sensors. Satellites in LEO are easier to target with earth-based lasers than those in geostationary orbit, which are much farther away…” (LOAC and the Neutralization of Satellites or IUS in Bello Satellitis)

Raytheon acquired key business assets of Ktech – “…Ktech’s expertise in directed energy and pulsed power make it a natural fit with Raytheon’s Advanced Security and Directed Energy Systems product line,” said Dr. Taylor W. Lawrence, Raytheon Missile Systems president. “Ktech brings world-class people, technology and strong relationships with the U.S. Air Force Research Laboratory and Sandia National Laboratories to Raytheon and its customers.” Ktech is a leader in pulsed power systems engineering. The company’s compact pulsed power systems, combined with its high efficiency magnetron technology, will enable increased integration of directed energy weapons on combat platforms. Ktech is also a leader in development of linear accelerator technology for government and commercial applications. The company brings its high power microwave, compact pulsed power system design, and RF and particle code simulation capabilities to Raytheon, as well as extensive experience in explosive pulsed power, diagnostics and effects testing…” (Raytheon Acquires Directed Energy Capabilities of Ktech Corporation)

The Strategic Defense Initiative (SDI) was proposed by U.S. President Ronald Reagan on March 23, 1983 to use ground and space-based systems to protect the United States from attack by strategic nuclear ballistic missiles. The initiative focused on strategic defense rather than the prior strategic offense doctrine of mutual assured destruction (MAD). The Strategic Defense Initiative Organization (SDIO) was set up in 1984 within the United States Department of Defense to oversee the Strategic Defense Initiative. The ambitious initiative was “widely criticized as being unrealistic, even unscientific” as well as for threatening to destabilize MAD and re-ignite “an offensive arms race”. It was soon derided as Star Wars, after the popular 1977 film by George Lucas. In 1987, the American Physical Society concluded that a global shield such as “Star Wars” was not only impossible with existing technology, but that ten more years of research was needed to learn whether it might ever be feasible. Under the administration of President Bill Clinton in 1993, its name was changed to the Ballistic Missile Defense Organization (BMDO) and its emphasis was shifted from national missile defense to theater missile defense; and its scope from global to more regional coverage. It was never truly developed or deployed, though certain aspects of SDI research and technologies paved the way for some anti-ballistic missile systems of today. BMDO was renamed to the Missile Defense Agency in 2002. This article covers defense efforts under the SDIO. Space-related defense research and testing remains heavily-budgeted to this day, irrespective of the program names, operative/reporting organizations, politics, or reports to the contrary in the press. Although it is difficult to compile actual spending totals across the complete spectrum of space-based defense programs (including classified “off-budget” “black projects”), the U.S. has certainly invested well over $100 billion on “SDI” and follow-on programs, and holds a commanding lead over all current or potential future adversaries in the realm of space technology/warfare. Under the SDIO’s Innovative Sciences and Technology Office, headed by physicist and engineer James A. Ionson, PhD, the investment was predominantly made in basic research at national laboratories, universities, and in industry, and these programs have continued to be key sources of funding for top research scientists in the fields of high-energy physics, supercomputing/computation, advanced materials, and many other critical science and engineering disciplines: funding which indirectly supports other research work by top scientists, and which would be largely unavailable outside of the defense budget environment (Wikepedia).

Anti-satellite weapons (ASAT) are designed to incapacitate or destroy satellites for strategic military purposes. Currently, only the United States, the former USSR (now Russia) and the People’s Republic of China are known to have developed these weapons. On September 13, 1985, the United States destroyed US satellite P78-1 using an ASM-135 ASAT anti-satellite missile. On January 11, 2007, China destroyed an old Chinese orbiting weather satellite. A year and a month later, USA destroyed a malfunctioning US spy satellite USA-193 using a RIM-161 Standard Missile 3 on February 21, 2008 (Wikipedia).

YouTube videos link:

Satellite Lasers as Direct Energy Weapons

http://youtu.be/VB_bLJSRZ9A

Electronic Harassment by Directed Energy Weapons

http://youtu.be/I2HVhQYTRDE

Attacked by Directed-Energy Weapons (DEW)

http://youtu.be/z_g9KgIukC4

Directed Energy Weapons 3

http://youtu.be/NYo54V3h8Hw

35folternachts32min(0108)teil2

http://youtu.be/3L6W6ajT6Lc

RELATED READING:

Related Images: