{"id":1081,"date":"2012-01-02T16:11:13","date_gmt":"2012-01-02T20:11:13","guid":{"rendered":"http:\/\/govsponsoredstalking.info\/?p=1081"},"modified":"2012-01-02T16:11:13","modified_gmt":"2012-01-02T20:11:13","slug":"how-the-nsa-harasses-thousands-of-law-abiding-americans-daily-by-the-usage-of-remote-neural-monitoring-rnm","status":"publish","type":"post","link":"https:\/\/govsponsoredstalking.info\/?p=1081","title":{"rendered":"How The NSA Harasses Thousands Of Law Abiding Americans Daily By The Usage Of Remote Neural Monitoring (RNM)"},"content":{"rendered":"<p>How The NSA Harasses Thousands Of<br \/>\nLaw Abiding Americans Daily By The Usage Of<br \/>\nRemote Neural Monitoring (RNM)<\/p>\n<p>John St. Clair Akwei vs. NSA, Ft. Meade, MD, USA<br \/>\nEvidence for the Lawsuit filed at the US courthouse in Washington, D.C.(Civil Action 92-0449)<\/p>\n<p>John St.Clair Akwei vs. NSA Ft George G. Meade, MD<br \/>\nMy knowledge of the National Security Agency&#8217;s structure, national security activities,<br \/>\nproprietary technology,and covert operations to monitor individual citizens.<\/p>\n<p>The NSA&#8217;s mission and the NSA&#8217;s domestic Intelligence operation<\/p>\n<p>Communications Intelligence (COMINT)<br \/>\nBlanket coverage of all electronic communication in the U.S. and  the world to ensure national security. The NSA at Ft. Meade, Maryland  has had the most advanced computers in the world since the early 1960&#8217;s.  NSA technology is developed and implemented in secret from private  corporations, academia, and the general public.<\/p>\n<p>Signals Intelligence (SIGINT)<br \/>\nThe Signals Intelligence mission of the NSA has evolved into a  program of decoding EMF waves in the environment for wirelessly tapping  into computers and tracking persons with the electrical currents in  their bodies. Signals Intelligence is based on the fact that everything  in the environment with an electric current in it has a magnetic flux  around it which gives off EMF waves. The NSA\/DoD has developed  proprietary advanced digital equipment which can remotely analyze all  objects whether man-made or organic that have electrical activity.<\/p>\n<p>Domestic Intelligence (DOMINT)<br \/>\nThe NSA has records on all U.S. citizens. The NSA gathers  information on U.S. citizens who might be of interest to any of the over  50,000 NSA agents (HUMINT). These agents are authorized by executive  order to spy on anyone. The NSA has a permanent National Security  Anti-Terrorist surveillance network in place. This surveillance network  is completely disguised and hidden from the public.<\/p>\n<p>Tracking individuals in the U.S. is easily and cost-effectively  implemented with the NSA&#8217;s electronic surveillance network. This network  (DOMINT) covers the entire U.S., involves tens of thousands of NSA  personnel, and tracks millions of persons simultaneously. Cost effective  implementation of operations is assured by NSA computer technology  designed to minimize operations costs.<\/p>\n<p>NSA personnel serve in Quasi-public positions in their communities  and run cover businesses and legitimate businesses that can inform the  intelligence community of persons they would want to track. N.S.A.  personnel in the community usually have cover identities such as social  workers, lawyers and business owners.<\/p>\n<p>Individual citizens occasionally targeted for surveillance by independently operating NSA personnel<br \/>\nNSA personnel can control the lives of hundreds of thousands of  individuals in the U.S. by using the NSA&#8217;s domestic intelligence network  and cover businesses. The operations independently run by them can  sometimes go beyond the bounds of law. Long-term control and sabotage of  tens of thousands of unwitting citizens by NSA operatives is likely to  happen. NSA Domint has the ability to covertly assassinate U.S. citizens  or run covert psychological control operations to cause subjects to be  diagnosed with ill mental health.<\/p>\n<p>NSA&#8217;s domestic electronic surveillance network<br \/>\nAs of the early 1960&#8217;s the most advanced computers in the world were at the NSA, Ft. Meade. Research<br \/>\nbreakthroughs with these computers were kept for the NSA. At the  present time the NSA has nanotechnology computers that are 15 years  ahead of present computer technology. The NSA obtains blanket coverage  of information in the U.S. by using advanced computers that use  artificial intelligence to screen all communications, irregardless of  medium, for key words that should be brought to the attention of NSA  agents\/cryptologists. These computers monitor all communications at the  transmitting and receiving ends. This blanket coverage of the U.S. is a  result of the NSA&#8217;s Signals Intelligence (SIGINT) mission.<\/p>\n<p>The NSA&#8217;s electronic surveillance network is based on a cellular  arrangement of devices that can monitor the entire EMF spectrum. This  equipment was developed, implemented, and kept secret in the same manner  as other electronic warfare programs. With this technology NSA  personnel can non-obtrusively tap into any communication device in  existence. This includes computers, telephones, radio and video-based  devices, printers, car electronics, and even the minute electrical  fields in humans (for tracking individuals).<\/p>\n<p>Signals Intelligence Remote Computer Tampering<br \/>\nThe NSA keeps track of all PCs and other computers sold in the  U.S. This is an integral part of the Domestic Intelligence network. The  NSA&#8217;s EMF equipment can tune in RF emissions from personal computer  circuit boards (while filtering out emissions from monitors and power  supplies). The RF emission from PC circuit boards contains digital  information in the PC. Coded RF waves from the NSA&#8217;s equipment can  resonate PC circuits and change data in the PC&#8217;s. Thus the NSA can gain  wireless modem-style entry into any computer in the country for  surveillance or anti-terrorist electronic warfare.<\/p>\n<p>Radio and Television signals can be substituted at the receiving  end with special EMF equipment. Replacing signals in Radios and  Televisions is another outgrowth of the NSA&#8217;s Signals Intelligence  (SIGINT) mission.<\/p>\n<p>Detecting EMF Fields in Humans for Surveillance<br \/>\nA subject&#8217;s bioelectric field can be remotely detected, so  subjects can be monitored anywhere they are. With special EMF equipment  NSA cryptologists can remotely read evoked potentials (from EEGs). These  can be decoded into a person&#8217;s brain-states and thoughts. The subject  is then perfectly monitored from a distance.<br \/>\nNSA personnel can dial up any individual in the country on the  Signals lntelligence EMF scanning network and the NSA&#8217;s computers will  then pinpoint and track that person 24 hours-a-day. The NSA can pick out  and track anyone in the U.S. NSA Signals Intelligence Use of EMF Brain  Stimulation NSA Signals Intelligence uses EMF Brain Stimulation for  Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF  Brain Stimulation has been in development since the MKUltra program of  the early 1950&#8217;s, which included neurological research into &#8220;radiation&#8221;  (non-ionizing EMF) and bioelectric research and development. The  resulting secret technology is categorized at the National Security  Archives as &#8220;Radiation Intelligence,&#8221; defined as &#8220;information from  unintentionally emanated electromagnetic waves in the environment, not  including radioactivity or nuclear detonation.&#8221; Signals Intelligence  implemented and kept this technology secret in the same manner as other  electronic warfare programs of the U.S. government. The NSA monitors  available information about this technology and withholds scientific  research from the public. There are also international<br \/>\nintelligence agency agreements to keep this technology secret.<\/p>\n<p>The NSA has proprietary electronic equipment that analyzes  electrical activity in humans from a distance. NSA computer-generated  brain mapping can continuously monitor all the electrical activity in  the brain continuously. The NSA records and decodes individual brain  maps (of hundreds of thousands of persons) for national security  purposes. EMF Brain Stimulation is also secretly used by the military  for Brain-to-computer link. (In military fighter aircraft, for example.)<\/p>\n<p>For electronic surveillance purposes electrical activity in the  speech center of the brain can be translated into the subject&#8217;s verbal  thoughts. RNM can send encoded signals to the brain&#8217;s auditory cortex  thus allowing audio communication direct to the brain (bypassing the  ears). NSA operatives can use this to covertly debilitate subjects by  simulating auditory hallucinations characteristic of paranoid  schizophrenia. Without any contact with the subject, Remote Neural  Monitoring can map out electrical activity from the visual cortex of a  subject&#8217;s brain and show images from the subject&#8217;s brain on a video  monitor. NSA operatives see what the surveillance subject&#8217;s eyes are  seeing. Visual memory can also be seen. RNM can send images direct to  the visual cortex. bypassing the eyes and optic nerves. NSA operatives  can use this to surreptitiously put images in a surveillance subject&#8217;s  brain while they are in R.E.M. sleep for brain-programming purposes.<\/p>\n<p>Capabilities of NSA operatives using RNM<br \/>\nThere has been a Signals Intelligence network in the U.S. since  the 1940&#8217;s. The NSA, Ft. Meade has in place a vast two-way wireless RNM  system which is used to track subjects and non-invasively monitor  audio-visual information in their brain. This is all done with no  physical contact with the subject. RNM is the ultimate method of  surveillance and domestic intelligence. Speech and 3D sound, and  subliminal audio can be sent to the auditory cortex of the subject&#8217;s  brain (bypassing the ears) and images can be sent into the visual  cortex.<\/p>\n<p>RNM can alter a subject&#8217;s perceptions, moods, and motor control.<br \/>\nSpeech cortex\/auditory cortex link has become the ultimate  communications system for the intelligence community. RNM allows for a  complete audio-visual brain-to-brain link or brain-to-computer link.<\/p>\n<p>National Security Agency Signals Intelligence: Electronic Brain Link Technology<\/p>\n<p>NSA SigInt can remotely detect, identify and monitor a person&#8217;s bioelectric fields.<\/p>\n<p>The NSA&#8217;s Signals Intelligence has the proprietary ability to  remotely and non-invasively monitor information in the human brain by  digitally decoding the evoked potentials in the 30-50 hz, .5 milliwatt  electro-magnetic emissions from the brain. Neuronal activity in the  brain creates a shifting electrical pattern that has a shifting magnetic  flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt  electromagnetic (EMF) wave. Contained in the electromagnetic emission  from the brain are spikes and patterns called &#8220;evoked potentials.&#8221;<br \/>\nEvery thought, reaction, motor command, auditory event, and visual  image in the brain has a corresponding &#8220;evoked potential&#8221; or set of  &#8220;evoked potentials.&#8221; The EMF emission from the brain can be decoded into  the current thoughts, images and sounds in the subject&#8217;s brain. NSA  SigInt uses EMF-transmitted Brain Stimulation as a communications system  to transmit information (as well as nervous system messages) to  intelligence agents and also to transmit to the brains of covert  operations subjects (on a non-perceptible level).<br \/>\nEMF Brain Stimulation works by sending a complexly coded and  pulsed electromagnetic signal to trigger evoked potentials (events) in  the brain, thereby forming sound and visual images in the brain&#8217;s neural  circuits.<\/p>\n<p>EMF Brain Stimulation can also change a person&#8217;s brain-states and affect motor control.<br \/>\nTwo-way Electronic Brain-Link is done by remotely monitoring  neural audio-visual information while transmitting sound to the auditory  cortex (bypassing the ears) and transmitting faint images to the visual  cortex (bypassing the optic nerves and eyes, the images appear as  floating 2-D screens in the brain).<\/p>\n<p>Two-Way Electronic Brain Link has become the ultimate communications system for CIA\/NSA personnel.<br \/>\nRemote Neural Monitoring (RNM, remotely monitoring bioelectric  information in the human brain) has become the ultimate surveillance  system. It is used by a limited number of agents in the U.S.  Intelligence Community. RNM requires decoding the resonance frequency of  each specific brain area. That frequency is then modulated in order to  impose information in That specific brain area. The f requency to which  the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA  Signals Intelligence modulates signals in this frequency band.<\/p>\n<p>Each person&#8217;s brain has a unique set of bioelectric resonance\/entrainment frequencies. Sending audio<br \/>\ninformation to a person&#8217;s brain at the frequency of another person&#8217;s auditory cortex would result in that<br \/>\naudio information not being perceived.<\/p>\n<p>The Plaintiff learned of RNM by being in two-way RNM contact with  the Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct  to the brain to harass the Plaintiff from 10\/90 to 5\/91. As of 5\/91  they have had two-way RNM communications with the Plaintiff and have  used RNM to attempt to incapacitate the Plaintiff and hinder the  Plaintiff from going to authorities about their activities against the  Plaintiff in the last twelve years. The Kinnecome group has about 100  persons working 24-hours-a-day at Ft Meade. They have also brain-tapped  persons the Plaintiff is in contact with to keep the Plaintiff isolated.  This is the first time ever that a private citizen has been harassed  with RNM and has been able to bring a lawsuit against NSA personnel  misusing this intelligence operations method.<\/p>\n<p>NSA Techniques and Resources<br \/>\nRemote monitoring\/tracking of individuals in any location. inside any building, continuously, anywhere<br \/>\nin the country. A system for inexpensive implementation of these  operations allows for thousands of persons in every community to be  spied on constantly by the NSA.<\/p>\n<p>Remote RNM Devices<br \/>\na) NSA&#8217;s RNM equipment remotely reads the evoked potentials (EEGs)  of the human brain for tracking individuals and can send messages  through the nervous system to affect their performance.<br \/>\nb) [Information missing from original]<br \/>\nc) RNM can electronically identify individuals and track then  anywhere in the U.S. This equipment is on a network and is used for  domestic intelligence operations, government security, and military base  security, and in case of bioelectric warfare.<\/p>\n<p>Spotters and Walk-Bys in Metropolitan Areas<br \/>\na) Tens of thousands of persons in each area are working as  spotters in neighborhood\/business place spies (sometimes unwittingly)  following and checking on subjects who have been identified for covert  control by NSA personnel.<br \/>\nb) Agents working out of offices can be in constant communication  with Spotters who are keeping track of the NSA&#8217;s thousands of subjects  in public.<br \/>\nc) NSA Agents in remote offices can instantly identify (using RNM)  any individual spotted in public whom is in contact with surveillance  subject.<\/p>\n<p>Chemicals and Drugs into Residential Buildings with hidden NSA-lnstalled and maintained plastic plumbing lines.<br \/>\na) The NSA has kits for running lines into residential tap water  and air ducts of subjects for the delivery of drugs (such as sleeping  gas or brainwashing aiding drugs). This is an outgrowth of CIA  pharmapsychology.<br \/>\nBrief Overview of Proprietary U.S. Intelligence\/Anti-Terrorist Equipment Mentioned.<\/p>\n<p>Fixed network of special EMF equipment that can read EEGs in human  brains and identify\/track individuals by using digital computers.<\/p>\n<p>ESB (Electrical Stimulation to the Brain) via EMF signal from the  NSA Signals Intelligence is used to control subjects. EMF equipment that  gathers information from PC circuit boards by deciphering RF emissions  thereby gaining wireless modem-style entry into any personal computer in  the country. All equipment hidden, all technology secret, all  scientific research unreported (as in electronic warfare research). Not  known to the public at all, yet complete and thorough implementation of  this method of domestic intelligence has been in place since the early  1980&#8217;s.<\/p>\n<p>Resources<br \/>\nThese publications have only been discovered since December 1991,  after Plaintiff had already notified authorities (Dept. of Justice,  etc.) of Public Corruption by named NSA employees. When no action was<br \/>\ntaken against the NSA employees I researched the Intelligence  Community electronic surveillance technology involved and discovered the  following publications: The Body Electric Electromagnetism and the  Foundrrtion of Life, by Robert Becker, M.D. p. 265\/313\/318.  Monitoringeuroelectric information in the brain. E-M wave E.S.B. Cross  Currents, by Robert Becker, M.D.<br \/>\np. 70, p. 78, p. 105\/210\/216\/220\/242\/299\/303 E-M ESB. Simulating auditory hallucinations. p. 274,<br \/>\n&#8220;Remote computer tampering using the RF emissions from the logic board.&#8221;<br \/>\nCurrents of Death by Paul Brodeur<br \/>\np. 27\/93. Driving brain electrical activity with external E-M, Magnetophosphenes, Delgado.<br \/>\nThe Zapping of America by Paul Brodeur<br \/>\nDoD E-M ESB Research, simulating auditory hallucinations.<br \/>\nOf Mice, Men and Molecules, by John H. Heller. 1963.<br \/>\np. 110, Bioelectricity. probing the brain with E-M waves.<br \/>\nThe 3-Pound Universe, by Judith Hooper<br \/>\np. 29\/132\/137. CIA EEG research. EEG&#8217;s for surveillance.<br \/>\nIn the Palaces or Memory, by George Johnson<br \/>\nE-M emissions from the brain,the brain as an open electromagnetic circuit.<br \/>\nThe Puzzle Palace, by James Bamford<br \/>\nSignals intelligence, most advanced computers in the early Sixties<br \/>\nThe U.S. Intelligence Community &#8211; Glossary terms at National Security Archives:<br \/>\nRadiation intelligence &#8211; information from unintentionally emanated electromagnetic energy,<br \/>\nexcluding radioactive sources.<br \/>\nThe Search for the &#8220;Manchurian Candidate,&#8221; by John Marks<br \/>\np. 327. Electrical or radio stimulation to the brain, CIA R&amp;D in bioelectrics.<br \/>\nSecret Agenda, by Jim Hougan<br \/>\nNational Security cult groups.<br \/>\nCrines of the Intelligence Commununity. by Morton Halperin<br \/>\nSurreptitious entries; intelligence agents running operations against government workers<br \/>\nWar in the Age of Intelligent Machines<br \/>\nNSA computer supremacy, complete control of information<br \/>\nAlternate Computers, by Time-Life Books<br \/>\nMolecule Computers<br \/>\nThe Mind, by Richard Restak, M.D.<br \/>\np. 258, EEG Systems Inc., decoding brain E-M emanations, tracking thoughts on a computer.<br \/>\nMedTech, by Lawrence Gallon<br \/>\nTriggering events in the brain&#8221; direct to auditory cortex signals.<br \/>\nCyborg, by D.S. Halacy, Jr. (1965)<br \/>\nBrain-to-computer link research contracts given out by the U.S. Govemment<br \/>\nPsychiatry and the C.I.A.: Victims of Mind Control by Harvey M. Weinstein. M.D.<br \/>\nDr. Cameron, psychic driving. ultraconceptual communications.<br \/>\nJourney Into Madness: Ihe True Story of Secret CIA Mind Control and Medical Abuse, by Gordon<br \/>\nThomas<br \/>\np. 127\/276\/116, 168-69. Intelligence R &amp; D. Delgado. Psychic driving with radio telemetry.<br \/>\nMind Manipulators, by Alan Scheflin and Edward M. Opton<br \/>\nMKULTRA brain research for information gathering<br \/>\nThe Brain Changers, by Maya Pines.<br \/>\np. 19. Listening to brain E-M emissions.<\/p>\n<h3>Related Images:<\/h3><div class=\"ngg-related-gallery\">\r\n            <a href=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0126.avi.png\"\r\n           title=\"Not a single vehicle in this parking lot when I sat down next to the building. And within a few minutes time, burgundy vehicle comes in.\"\r\n           class=\"shutterset_68670e871c24aeb97762dc110b718a5f\" data-image-id=\"789\" data-src=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0126.avi.png\" data-thumbnail=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0126.avi.png\" data-title=\"Vehicle enters parking lot\" data-description=\"Not a single vehicle in this parking lot when I sat down next to the building. And within a few minutes time, burgundy vehicle comes in.\">\r\n            <img decoding=\"async\" title=\"Vehicle enters parking lot\"\r\n                 alt=\"Vehicle enters parking lot\"\r\n                 data-image-id=\"789\"\r\n                 src=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0126.avi.png\"\/>\r\n        <\/a>\r\n            <a href=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0126.avi-1.png\"\r\n           title=\"This is a full view of vehicle that is now parked in the parking lot.\"\r\n           class=\"shutterset_68670e871c24aeb97762dc110b718a5f\" data-image-id=\"790\" data-src=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0126.avi-1.png\" data-thumbnail=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0126.avi-1.png\" data-title=\"Vehicle Now In Parking Lot\" data-description=\"This is a full view of vehicle that is now parked in the parking lot.\">\r\n            <img decoding=\"async\" title=\"Vehicle Now In Parking Lot\"\r\n                 alt=\"Vehicle Now In Parking Lot\"\r\n                 data-image-id=\"790\"\r\n                 src=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0126.avi-1.png\"\/>\r\n        <\/a>\r\n            <a href=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0126.avi-2.png\"\r\n           title=\"This man is now leaving vehicle after it was parked. Vehicles that are parked always are transmitting electro-magnetic waves.\"\r\n           class=\"shutterset_68670e871c24aeb97762dc110b718a5f\" data-image-id=\"791\" data-src=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0126.avi-2.png\" data-thumbnail=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0126.avi-2.png\" data-title=\"Man Leaves Vehicle\" data-description=\"This man is now leaving vehicle after it was parked. Vehicles that are parked always are transmitting electro-magnetic waves.\">\r\n            <img decoding=\"async\" title=\"Man Leaves Vehicle\"\r\n                 alt=\"Man Leaves Vehicle\"\r\n                 data-image-id=\"791\"\r\n                 src=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0126.avi-2.png\"\/>\r\n        <\/a>\r\n            <a href=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0126.avi-3.png\"\r\n           title=\"This is the same guy who drove into an empty parking lot after only a few minutes of sitting down.\"\r\n           class=\"shutterset_68670e871c24aeb97762dc110b718a5f\" data-image-id=\"792\" data-src=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0126.avi-3.png\" data-thumbnail=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0126.avi-3.png\" data-title=\"Burgundy Vehicle Perpetrator\" data-description=\"This is the same guy who drove into an empty parking lot after only a few minutes of sitting down.\">\r\n            <img decoding=\"async\" title=\"Burgundy Vehicle Perpetrator\"\r\n                 alt=\"Burgundy Vehicle Perpetrator\"\r\n                 data-image-id=\"792\"\r\n                 src=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0126.avi-3.png\"\/>\r\n        <\/a>\r\n            <a href=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0127.avi.png\"\r\n           title=\"This shows how they were rushing to get the recondition items on the shelves.\"\r\n           class=\"shutterset_68670e871c24aeb97762dc110b718a5f\" data-image-id=\"793\" data-src=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0127.avi.png\" data-thumbnail=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0127.avi.png\" data-title=\"Empty Boxes In Shopping Cart\" data-description=\"This shows how they were rushing to get the recondition items on the shelves.\">\r\n            <img decoding=\"async\" title=\"Empty Boxes In Shopping Cart\"\r\n                 alt=\"Empty Boxes In Shopping Cart\"\r\n                 data-image-id=\"793\"\r\n                 src=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0127.avi.png\"\/>\r\n        <\/a>\r\n            <a href=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0128.avi.png\"\r\n           title=\"Is seen shopping in this section of the store.\"\r\n           class=\"shutterset_68670e871c24aeb97762dc110b718a5f\" data-image-id=\"794\" data-src=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0128.avi.png\" data-thumbnail=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0128.avi.png\" data-title=\"Burgundy Vehicle Perpetrator\" data-description=\"Is seen shopping in this section of the store.\">\r\n            <img decoding=\"async\" title=\"Burgundy Vehicle Perpetrator\"\r\n                 alt=\"Burgundy Vehicle Perpetrator\"\r\n                 data-image-id=\"794\"\r\n                 src=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0128.avi.png\"\/>\r\n        <\/a>\r\n            <a href=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0130.avi-1.png\"\r\n           title=\"I have seen this match up of both white and black perpetrator before.\"\r\n           class=\"shutterset_68670e871c24aeb97762dc110b718a5f\" data-image-id=\"795\" data-src=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/Screenshot-from-MOVI0130.avi-1.png\" data-thumbnail=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0130.avi-1.png\" data-title=\"Random Interacial Perpetators\" data-description=\"I have seen this match up of both white and black perpetrator before.\">\r\n            <img decoding=\"async\" title=\"Random Interacial Perpetators\"\r\n                 alt=\"Random Interacial Perpetators\"\r\n                 data-image-id=\"795\"\r\n                 src=\"https:\/\/govsponsoredstalking.info\/wp-content\/gallery\/save-a-lot-10282017\/thumbs\/thumbs_Screenshot-from-MOVI0130.avi-1.png\"\/>\r\n        <\/a>\r\n    <\/div>","protected":false},"excerpt":{"rendered":"<p>How The NSA Harasses Thousands Of Law Abiding Americans Daily By The Usage Of Remote Neural Monitoring (RNM) John St. Clair Akwei vs. NSA, Ft. Meade, MD, USA Evidence for the Lawsuit filed at the US courthouse in Washington, D.C.(Civil &hellip; <a href=\"https:\/\/govsponsoredstalking.info\/?p=1081\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[94],"class_list":["post-1081","post","type-post","status-publish","format-standard","hentry","category-detailing-cimes-against-humanity","tag-north-carolina"],"_links":{"self":[{"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=\/wp\/v2\/posts\/1081","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1081"}],"version-history":[{"count":0,"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=\/wp\/v2\/posts\/1081\/revisions"}],"wp:attachment":[{"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1081"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1081"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/govsponsoredstalking.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1081"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}