Would Remote Mind Control Be Possible With Current Technology?

legal reference

 
Last edited:
That's something the CIA invented in the 60s or 70s. I read and saw a lot about it and it is extreme. A form of Satanism.


Look at YouTube and you will see what I mean. It happens everywhere but noone was really accused of anything - despite that Belgium guy - Marc Dutrout - that held little girls in cages in his house - they got caught - I guess 2 or 3 girls survived. There were a lot of witnesses but ANYHOW they died in a car accident shortly before the court appointment or their house burnt down...... not on purpose of course it were all just coincidences. Like 12 or something. There are also alot of good books from people who could escape this horror...

JJ

EDIT: Very important: look up how multiple personalities were MADE. No human being is born with that.
 
Last edited:
IN THE UNITED STATES DISTRICT COURTS
FOR THE DISTRICT OF COLUMBIA


MIREILLE TORJMAN CASE NO.: 10-1211

Plaintiff

V.

FEDERAL BUREAU OF INVESTIGATIONS, et al.
935 Pennsylvania Avenue Northwest
Washington, DC 20535-0001;

CENTRAL INTELLIGENCE AGENCY
Office of Public Affairs
Washington, D.C. 20505;

NATIONAL SECURITY AGENCY
9800 Savage Road, Suite 6711
Fort Meade, MD 20755-6711;

DEPARTMENT OF JUSTICE
600 E Street, N.W.
Washington, D.C. 20530;

DEPARTMENT OF DEFENSE
1400 Defense Pentagon
Washington, DC 20301-1400;

DEPARTMENT OF ENERGY
1000 Independence Ave
Washington, DC 20585;

UNITED STATES OF AMERICA
Defendants

COMPLAINT

1. Plaintiff, Mireille Torjman hereby brings this action for injunction relief and damages based on personal knowledge and belief, as a victim and expert witness, to the information provided, as to all other matters, as to which allegations Plaintiff, without doubt or delusion, will provide proof, unrefuted evidence, overwhelming evidentiary support, witnesses, substantial facts, research, and investigation that exists as follows:

PRELIMINARY STATEMENT

2. This case is about the wiretapping, civil rights violations, privacy, communications technology, and crimes of humanity, in use by the Intelligence Community. With the advanced technology unknown to most, of shadow network of surveillance and spying under DARPA projects, defendants are, transmitting, intercepting, tampering, and blocking the content of a significant portion of the Plaintiff’s phone calls, emails, instant messaging, text messaging, www, Skype, electronic and wireless communications, and other communications, both internationally and domestic, including Plaintiff’s family and practically every American, for the past 4 years, beginning on or about January 2007.

3. Plaintiff’s records will show communications are intercepted, manipulated, tampered with, stored, (data mining), harassed, and impeded. Plaintiff will provide numerous emails hijacked, fabricated, UNREAD, manipulated, deleted, including facsimile, and internet manipulations, since 2007. Plaintiff’s numerous impeded electronic communications with all her service providers were debilitating to her work and she had no resolve available from providers who were not able to correct or detect the situations. This includes manufactured emails, phone calls, and government employee’s unwitting involvement. In 2008, Plaintiff was also accused legally of false communications during her service with Qwest, by using wiretapped calls and disconnects to create false records with her utilities company, including defamation to her character. (Kay Griggs, Military wife; whistle blow case on tampered communication CHAOS and automobile impediments not to testify).

4. Plaintiff is not delusional and has provided her records to DOJ in early 2009, with documents from many other credible sources and whistle blowers. Plaintiff requests that the Russell Tice case and Articles below § 35 is read with disclosures being made as to her allegations, Injunction relief, various separate counts, and tort damages throughout. Plaintiff has demonstrated courage, risked her reputation, risked her life, and family’s, and has been threatened, prior to receiving an anonymous email of the NSA article (below) in February 2009. Plaintiff tried to blow the whistle to the DA late 2007, and was not aware what NSA was or government corruption, but knew she had to report what was going on. As quoted by Mr. Tice and others; “Statement by NSA, “THE TIP OF THE ICEBERG and WIRETAPPING SURVEILLANCE LOOK LIKE SMALL POTATOES”. Most recently, Plaintiff was able to meet with the FBI in early 2010, and provided some information for investigation by various FBI analysts.

5. The President and other executive officials have described some activities of surveillance and spying which are conducted outside the procedures of the Foreign Intelligence Surveillance Act (“FISA”) and without authorization by the Foreign Intelligence Court, Communities, Committees, Senate, or Congress.

6. As with The Attorney General and the Director of National Intelligence having since publicly admitting that the TSP was only one particular aspect of the surveillance activities authorized by the

Programs, and are being abused. (Jewel v United States, United States v Yahoo)

7. In addition to eavesdropping on or reading specific communications, Defendants have intercepted the communications contents across the United States and overseas, and targeted the Plaintiff with intense sabotage and impediments, Electronic Stalking, Slander, including Internet Communications, and Google’s Access Portals. Plaintiff wrote to Google to let them know what was going on behind the scenes with all the tampering including remote viewing, password access, and covert data-mining in SG3 dating back prior to 911. (EFF v Google and Street View) DOD’s ELF transmitters were already in full scale by 1981 in Australia and Africa, followed by additional covert superior Projects as Combat Zones also under DARPA formerly ARPA)
.....................
JURISDICTION AND VENUE

26. This court has subject matter jurisdiction over the federal claims pursuant to 28 U.S.C. § 1331, 18 U.S.C. § 2712, and 5 U.S.C. § 702.

27. Plaintiffs are informed, believe and thereon allege that Defendants have sufficient contacts with this

district generally and, in particular, with the events herein alleged, that Defendants are subject to the exercise

of jurisdiction of this court over the person of such Defendants and that venue is proper in this judicial district pursuant to 28 U.S.C. § 1391.

28. Plaintiff is informed, believe and thereon allege that a substantial part of the events giving rise to the claims herein alleged occurred in this district jurisdiction, and Defendants and/or agents of Defendants may be found in this district, nationally, and internationally.

PARTIES

29. Plaintiff, Mireille Torjman is an intelligent native French speaking refugee from Marrakesh, Morocco. Plaintiff is a divorced woman of 48 years of age and was an accountant for 25 years. Plaintiff comes from a religious background, disciplined and educated, has spent 25 years in the Philadelphia area, currently in South Florida with her Mother.

30. Defendant Federal Bureau of Investigations (FBI) is an agency under the direction and control of the Department of Justice and the Pentagon that investigates and protects the Nation with Programs of CointelPro joined by CIA operating on U.S. Soil.

31. Defendant Central Intelligence Agency (CIA) is an agency that protects the Country in first line of Defense and collects information that reveals the plans, intentions and capabilities of our adversaries and provides the basis for decision and action.

32. Defendant NSA Defendant National Security Agency (NSA) is an agency under the direction and control of the Department of Defense that collects, processes, and disseminates foreign signals intelligence. It is responsible for carrying out the Programs challenged herein.

33. Defendant United States is the United States of America, its departments, agencies, and entities. Including DOJ, and Congresswoman Ginny Browne-Waite as the current Florida Congress Representative of the United States, who Plaintiff attempted to warn on numerous occasions since early 2008 and Senator Bill Nelson, currently on Florida’s Intelligence Committee.



Background



The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in the brain continuously. The NSA records and decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In military fighter aircraft, for example.) For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject's verbal thoughts. RNM can send encoded signals to the brain's auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia. Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject's brain and show images from the subject's brain on a video monitor. NSA operatives see what the surveillance subject's eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject's brain while they are in R.E.M. sleep for brain-programming purposes. Individual citizens occasionally targeted for surveillance by independently operating NSA personnel

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA's domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and SABOTAGE OF TENS OF THOUSANDS OF UNWITTING CITIZENS by NSA operatives is likely to happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health. National Security Agency Signals Intelligence Electronic Brain Link Technology NSA SigInt can remotely detect, identify and monitor a person's bioelectric fields. The NSA's Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz,.5 milliwatt electro-magnetic emissions from the brain. Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called "evoked potentials."

Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding "evoked potential" or set of "evoked potentials." The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject's brain.

NSA SigInt uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level).

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain's neural circuits. EMF Brain Stimulation can also change a person's brain-states and affect motor control. Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain). Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community. RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in that specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band.

An example of EMF Brain Stimulation: Brain Area
Bioelectric Resonance Frequency Information Induced Through Modulation
Motor Control Cortex 10 HZ Motor Impulse Co-ordination
Auditory Cortex 15 HZ Sound which bypasses the ears
Visual Cortex 25 HZ Images in the brain, bypassing the eyes
Somatosensory Cortex 09 HZ Phantom Touch Sense
Thought Center 20 HZ Imposed Subconscious Thoughts

This modulated information can be put into the brain at varying intensities from subliminal to perceptible. Each person's brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person's brain at the frequency of another person's auditory cortex would result in that audio information not being perceived. Additionally, A 1994 congressional hearing reported that nearly half a million Americans were subjected to some kind of cold war era tests, often without being informed and without their consent. In addition, experimentation law is well grounded in constitutional and international law. It is an under-reported fact that two major reports on human rights and torture in the U.S. recently listed illegal radiation experiments. Many more facts are documented below. Therefore, human research subject protections should be a high priority and are just as significant as current issues of torture and illegal wiretapping. IT IS TIME FOR AMERICA TO WAKE UP. It is time for America to protect its Whistleblowers who are our last line of defense against dictatorship and despotism. It is time for America to take responsibility for oversight of its tax dollars and elect leaders who will assume such responsibility now. Yes, the war on terrorism is important. It is even more important and fearful if the terrorism is from within and unknowingly funded by hard working American citizens. There is no Special Access Program beyond the oversight of political leaders elected by the people and for the people. If these political leaders jeopardize national security then that shall be handled in a court of law. But to tell America, to tell the American people, to tell the political leaders elected by the American people that America does not deserve to know what happening in the NSA’s dark, black rooms, with billions of dollars, behind closed doors, when we know that privilege has already been abused; that is the true definition of TERRORISM. That is the true definition of Communism and a Police State, no oversight. So fellow Americans, you may hem and haw in the face of truth but know that one day you will realize that your country has been USURPED from the very principles upon which it was founded.

215. Titles 22, 142, 18, 18a, and 50 U.S.C. and International Conventional, provides a civil and criminal action against the United States and its agencies and departments for any person aggrieved by willful violation of 18 U.S.C and 50 U.S.C. Plaintiff seeks from each Counts below Defendants for the Plaintiff’s statutory damages or actual damages and such other and further relief as is proper.

216. Plaintiff, hereby has been aggrieved and violated as the aforementioned allegations under each count below of the US codes, during this process and as a victim of the Intelligence Communities of the United States of America as found below.

Plaintiff seeks relief as permitted by law for each count below separately:

(a) 18 U.S.C. § 793. Gathering, transmitting or losing defense information,
(b) 18 U.S.C. § 241. Conspiracy against rights,
(c) 18 U.S.C. § 373. Solicitation to commit a crime of violence,
(d) 18 U.S.C. § 1091. Genocide,
(e) 18 U.S.C. § 1341. Mail fraud,
(f) 18 U.S.C. § 1512. Tampering with a witness, victim, or an informant,
(g) 18 U.S.C. § 1513. Retaliating against a witness, victim, or an informant,
(h) 18 U.S.C. § 1583 (2). Enticement into slavery,
(i) 18 U.S.C. § 1692. Foreign mail as United States mail,
(j) 18 U.S.C. § 1801. Video voyeurism,
(k) 18 U.S.C. § 1812. Statement of exclusive means by which electronic surveillance and interception of certain communications may be conducted,
(l) 18 U.S.C. § 2242. Sexual abuse,
(m) 18 U.S.C. § 2332 (a) Terrorism, and (h). Use of weapons of mass destruction,
(n) 18 U.S.C. § 2339. Harboring or concealing terrorists,
(o) 18 U.S.C. § 2422. Coercion and enticement, or are currently doing so;
(p) Defendants have subjected the public to electronic surveillance, spying, and mind and body transmissions, in violation of 50 U.S.C. § 1809 and 1810, or are currently doing so;
(q) Defendants are intercepting communications in violation of 18 U.S.C. § 2511;
(r) Defendants have transmitted Plaintiff and the public in violation of 18 U.S.C. § 2703, Required Disclosure of communications records, or are currently doing so;
(s) Defendants have transmitted the public domestically and internationally, in violation of 18 U.S.C. § 2381. Treason, or are currently doing so;
(t) Defendants have harassed and transmitted the Public in violation of 18 U.S.C. § 2261: US Code - 2261A: Stalking
(u) Plaintiff was subjected to electronic surveillance, spying and harassment, violating 18a U.S.C. Rule 41. Search and Seizure
(v) Defendants have violated the Administrative Procedures Act, 5 U.S.C. §§ 701 et seq., or are currently doing so;
(w) Defendants have violated the constitutional principle of separation of powers, or are currently doing so;
(x) Defendants have tortured, and violated, Plaintiff, and the public electronically in violation of 18 U.S.C. § 2340A, or are currently doing so:
(y) Plaintiff are entitled to injunctive, declaratory, and other equitable relief against defendants and freedom from further harm, in violation of tort laws domestically and internationally.
(z) Defendants have tortured Plaintiff, and the public electronically in violation of 18 U.S.C. § 2421, or currently doing so:
(aa) Plaintiff is entitled to Civil Damages 18 U.S.C. § Rule 2520 in violations of her First, Third, Fifth, Thirteenth, and Fourteenth Amendments;
(ab) Plaintiff is entitled to Grants and Health Care Assistance as a victim in accordance to 22 U.S.C. § 2152: US Code - Section 2152: Assistance for victims of torture.
(ac) United Nations Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment, G.A. res. 39/46, annex, 39 U.N. GAOR Supp. (No. 51) at 197, U.N. Doc. A/39/51 (1984), entered into force June 26, 1987; Universal Declaration of Human Rights, G.A. res. 217A (III), U.N. Doc. A/810 at 71 (1948); International Convention on Civil and Political Rights, G.A. res. 2200A (XXI), 21 U.N. GAOR Supp. (No. 16) at 52, U.N. Doc. A/6316 (1966), 9.99 U.N.T.S. 171, entered into force Mar. 23, 1976.
(ad) Defendants have intentionally and with malice premeditated the Tortured of the Plaintiff and is a violation under 142 U.S.C.§ 1985. Conspiracy to interfere with civil rights.
(ae) Defendants have Tortured Plaintiff, is actionable under tort claims of damages found under civil procedures and criminal trials.

Violation of 18 U.S.C. and 50 U.S.C. Crimes and Criminal Procedures, AND War and National Defense Including Titles 22, 42, 142, 18, 18a, and 50 U.S.C. and International Conventional, DAMAGES AND TORT LAW claims-Intentional Infliction of Emotional Distress-DAMAGES

COUNT XXIII

Violation of the Administrative Procedure Act, 5 U.S.C. § 701 et seq. - Declaratory, Injunctive, and Other Equitable Relief
229. The Programs and all various programs violates the Administrative Procedures Act, 5 U.S.C. § 701 et seq., because Defendants’ actions under the Programs exceed statutory authority and limitations imposed by Congress through FISA, and through Chapters 119, 121 and 206 of Title 18 of the U.S. Code (the Wiretap Act, the Stored Communications Act, and the Pen Register Statute, respectively) and in violation of statutory rights under those laws ; are not otherwise in accordance with law; are contrary to constitutional rights, including the Fourth Amendment, First Amendment, and separation of powers principles; and are taken without observance of procedures required by law.

230. Plaintiff is aggrieved by these violations because, as described previously in this Complaint, Defendants’ actions under “The Program” and various other Programs has resulted in the interception, acquisition, disclosure, divulgence and/or use of the contents of their wire and electronic communications, communications records, and other information in violation of their constitutional and statutory rights.

231. Plaintiffs seek nonmonetary relief against the Count XXIII Defendants, including a declaration that Defendants have violated their rights and the rights of the class; an injunction enjoining the Count XXIII Defendants, their agents, successors, and assigns, and all those in active concert and participation with them from violating the Plaintiffs’ and class members’ rights; and such other and further nonmonetary relief as is proper.

COUNT XXIV

Violation of Separation of Powers - Declaratory, Injunctive, and Other Equitable Relief

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

232. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

233. The Programs violates the principles of separation of powers because it was authorized by the Executive in excess of the Executive’s authority under Article II of the United States Constitution, in excess of statutory authority granted the Executive under FISA and under Chapters 119, 121 and 206 of Title 18 of the U.S. Code (the Wiretap Act, the Stored Communications Act, and the Pen Register Statute, respectively) and exceeds the statutory limits imposed on the Executive by Congress.

234. Plaintiff is aggrieved by these violations because, as described previously in this Complaint, Defendants’ actions under the Programs has resulted in the interception, acquisition, disclosure, divulgence and/or use of the contents of their wire and electronic communications, communications records, and other information aforementioned in violation of their constitutional and statutory rights.

235. Plaintiffs seek nonmonetary relief against the Count XVIII Defendants, including a declaration that Defendants have violated their rights and the rights of the class; an injunction enjoining the Count XVIII Defendants, their agents, successors, and assigns, and all those in active concert and participation with them from violating the Plaintiff’s rights; and for such other and further nonmonetary relief as is proper.

COUNT XXV

Violation of the fifth and eighth amendment prohibitions Other Equitable Relief

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

ALLEGATIONS also included in Plaintiff’s NSA and/or Electronic Communications

44. Pursuant to Federal Rules of Civil Procedure, Title 5, 22, 42, 142, 18, 18a, and 50, Plaintiff Mireille Torjman brings this action on behalf of herself, and to attest to her family and the public’s victimization, unwittingly and/or unrealized:

(a) TITLE 18 PART I CHAPTER 37 § 793. Gathering

defense information,

(b) 18 U.S.C. § 241. Conspiracy against rights,

(c) 18 U.S.C. § 373. Solicitation to commit a crime of violence,

(d) 18 U.S.C. § 1091. Genocide,

(e) 18 U.S.C. § 1341. Mail fraud,

(f) 18 U.S.C. § 1512. Tampering with a witness, victim, or an informant,

(g) 18 U.S.C. § 1513. Retaliating against a witness, victim, or an informant,

(h) 18 U.S.C. § 1583 (2). Enticement into slavery,

(i) 18 U.S.C. § 1692. Foreign mail as United States mail,

(j) 18 U.S.C. § 1801. Video voyeurism,

(k) 18 U.S.C. § 1812. Statement of exclusive means by which electronic surveillance and interception of certain communications may be conducted,

(l) 18 U.S.C. § 2242. Sexual abuse,

(m) 18 U.S.C. § 2332 (a) Terrorism, and (h). Use of weapons of mass destruction,

(n) 18 U.S.C. § 2339. Harboring or concealing terrorists,

(o) 18 U.S.C. § 2422. Coercion and enticement, or are currently doing so;

(p) Defendants have subjected the public to electronic surveillance, in violation of 50 U.S.C. § 1809 and 1810, or are currently doing so;

(q) Defendants are intercepting communications in violation of 18 U.S.C. § 2510 and 18 U.S.C. § 2511;

(r) Defendants have transmitted Plaintiff and the public in violation of 18 U.S.C. § 2703, Required Disclosure of communications records, or are currently doing so;

(s) Defendants have transmitted civilians, and non civilians, in violation of 18 U.S.C. § 2381. Treason, or are currently doing so;

(t) Defendants have harassed and transmitted the public to stalk and harass the Plaintiff inclusive of electronically and tangibly, in violation of 18 U.S.C. § 2261: US Code - 2261A: Stalking

(u) Plaintiff was falsely detained and sabotaged with the use of mind control transmissions violating 18a U.S.C. Rule 41. Search and Seizure

(v) Defendants have violated the Administrative Procedures Act, 5 U.S.C. §§ 701 et seq., or are currently doing so;

(w) Defendants have violated the constitutional principle of separation of powers, or are currently doing so;

(x) Defendants have Tortured Plaintiff, her family, and the public electronically in violation of 18 U.S.C. § 2340A, or currently doing so:

(y) Plaintiff is entitled to injunctive, declaratory, and other equitable relief against defendants and freedom from further threats, family, accidents, psychological and physical harm, illnesses, sabotage, bribes, and blackmail;

(z) Defendants have Tortured Plaintiff, her family and the public electronically in violation of 18 U.S.C. § 2422, or currently doing so:

(aa) Plaintiff is entitled to Civil Damages 18 U.S.C. § Rule 2520 in violations of her First, Third, Fifth, and Thirteenth Amendments; 18 U.S.C. § 2510, 18 U.S.C. § 2511, and 18 U.S.C. § 2512.

(ab) Plaintiff is entitled to Grants and Health Care Assistance as a victim in accordance to 22 U.S.C. § 2152: US Code - Section 2152: Assistance for victims of torture.

(ac) United Nations Convention Against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment, G.A. res. 39/46, annex, 39 U.N. GAOR Supp. (No. 51) at 197, U.N. Doc. A/39/51 (1984), entered into force June 26, 1987; Universal Declaration of Human Rights, G.A. res. 217A (III), U.N. Doc. A/810 at 71 (1948); International Convention on Civil and Political Rights, G.A. res. 2200A (XXI), 21 U.N. GAOR Supp. (No. 16) at 52, U.N. Doc. A/6316 (1966), 9.99 U.N.T.S. 171, entered into force Mar. 23, 1976.

(ad) Defendants have Tortured Plaintiff, her family and the public and the prohibitions against torture and other cruel, inhuman, or degrading treatment and the conspiracy to oppress, torture, rape, suppress, is a violation under 142 U.S.C.§ 1985. Conspiracy to interfere with United States Civil Rights.

(ae) Defendants have Tortured Plaintiff, her family and the public and the prohibitions against malicious intent to torture, rape privacy rights, brainwash, and enslave with severe psychological in-humane damages to one’s spirit, and libel is actionable under Tort Claims of damages found under civil and criminal trials.

(af) Plaintiff has made at least 2 requests to the FOIA and both dossiers were denied under the violation of 5 U.S.C. § 552; claims under and 18 U.S.C. § 2707 and 5 U.S.C. § 702

42. Adequacy: Plaintiff and family members are suffering great harm arising from Defendants’ violations of law, as alleged herein. Plaintiff intends to prosecute this action vigorously. Plaintiff hereby demands injunctive relief and damages.

COUNT I

Violation of 18 U.S.C. and 50 U.S.C. Crimes and Criminal Procedures AND War and National Defense Including Titles 5, 22, 42, 142, 18, 18a, and 50 U.S.C. and International Conventional

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

43. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

44. Plaintiff is seeking protection for her and for all family members under the law TITLE 18 U.S.C. § 3521. Witness relocation and protection.

COUNT II

Violation of First and Fourth Amendments, 42 U.S.C and 18 U.S.C. and 50 U.S.C. Crimes and Criminal Procedures AND War and National Defense Including Titles 22, 42, 142, 18, 18a, and 50 U.S.C. and International Conventional

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

45. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

46. Plaintiff motions the COURTS and Defendants to cease and desist and/or injunction for relief, immediately from grave dangerous damaging electronic harassments and that of a religious and personal nature, all other allegations of surveillance, spying, manipulations, torture, censorships, daily sabotage, and blocks electronically and otherwise, retaliations, death threats, thereby violating the constitution and privacy acts, (US code 22, 42, 142, 18, 18a, and 50) at the hands of, the direction of, or with the knowledge of, any and all government and affiliations. Plaintiff seeks declaratory relief against all allegations and all counts. Defendant’s actions described herein violated Plaintiff’s rights under the Free Exercise and Free Speech Clauses of the United States Constitution, the Religious Freedom Restoration Act of 1993, 42 U.S.C. § 2000bb et seq., the Privacy Act, 5 U.S.C. § 552a, and Air Force Instruction 37-132; and all other freedoms and rights under the Law.

COUNT III

Violation of 18 U.S.C. and 50 U.S.C. Crimes and Criminal Procedures AND War and National Defense Including Titles 5, 22, 42, 142, 18, 18a, and 50 U.S.C. and International Conventional

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

47. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

48. Plaintiff numerous attempts sabotaged, hereby requests to compel the court for Defendants to conduct proper and thorough investigations (not failing to include fundamental steps of interviews and psyops techniques on U.S. Soil) even when seemingly undetectable and/or prior to 2008, with all accusations and agencies with full cooperation, including Sports, Cloning, ENGINEERED Poverty-Bankruptcies with individuals with Cancer, also to sabotage economies, under the Law.

COUNT IV

Violation of First Amendment—Declaratory, Injunctive, and Other Equitable Relief

Violation of 18 U.S.C. and 50 U.S.C. Crimes and Criminal Procedures AND War and National Defense Including Titles 22, 42, 142, 18, 18a, and 50 U.S.C. and International Conventional

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

49. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

50. Plaintiff has been sabotaged with proper coverage to expose and warn the public. Plaintiff requests to compel the court for Defendants to provide the Constituents “WE THE PEOPLE” with un-tampered accurate news, APPROPRIATE WARNINGS with Main Stream Media: to heed caution, and be AWARE with knowledge, and choice of action or recourse, under the law of Constituents rights and United States Constitution.

COUNT V

Violation of Fourth Amendment—Declaratory, Injunctive, and Equitable Relief 108.

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

51. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law and aforementioned Amendments of the Constitution, as stated above.
COUNT IX

Violation of Foreign Intelligence Surveillance Act—Declaratory, Injunctive and Other Equitable Relief

(Plaintiff vs. Defendants) and parties, inclusive of all affiliations

88. Plaintiff repeats and incorporates herein by reference the allegations in the preceding paragraphs of this complaint, as if set forth fully herein; and all allegations under the law, as stated above.

89. In relevant part, 50 U.S.C. § 1809 provides that:

(a) Prohibited activities—A person is guilty of an offense if he intentionally—(1) engages in electronic surveillance under color of law except as authorized by this chapter, chapter 119, 121, or 206 of Title 18 or any express statutory authorization that is an additional exclusive means for conducting electronic surveillance under section 1812 of this title; or (2) discloses or uses information obtained under color of law by electronic surveillance, knowing or having reason to know that the information was obtained through electronic surveillance not authorized by this chapter, chapter 119, 121, or 206 of Title 18 or any express statutory authorization that is an additional exclusive means for conducting electronic surveillance under section 1812 of this title.



90. In relevant part 50 U.S.C. § 1801 provides that:



(f) “Electronic surveillance” means – (1) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire or radio communication sent by or intended to be received by a particular, known United States person who is in the United States, if the contents are acquired by intentionally targeting that United States person, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes; (2) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire communication to or from a person in the United States, without the consent of any party thereto, if such acquisition occurs in the United States, but does not include the acquisition of those communications of computer trespassers that would be permissible under section 2511(2)(i) of Title 18; (3) the intentional acquisition by an electronic, mechanical, or other surveillance device of the contents of any radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, and if both the sender and all intended recipients are located within the United States; or (4) the installation or use of an electronic, mechanical, or other surveillance device in the United States for monitoring to acquire information, other than from a wire or radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes.



91. 18 U.S.C. § 2511(2)(f) further provides in relevant part that “procedures in this chapter or chapter 121 and the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in section 101 [50 U.S.C. § 1801] of such Act, and the interception of domestic wire, oral, and electronic communications may be conducted.” (Emphasis added.)

92. 50 U.S.C. § 1812 further provides in relevant part that:

(a) Except as provided in subsection (b), the procedures of chapters 119, 121, and 206 of Title 18 and this chapter shall be the exclusive means by which electronic surveillance and the interception of domestic wire, oral, or electronic communications may be conducted.

(b) Only an express statutory authorization for electronic surveillance or the interception of domestic wire, oral, or electronic communications, other than as an amendment to this chapter or chapters 119, 121, or 206 of Title 18 shall constitute an additional exclusive means for the purpose of subsection (a)
(Emphasis added.)

How many felonies is that? You need to repent or be deplaneted. Everyone knows your doing this by now.

So repulsive, revolting and disgusting. Thinking of you, I just threw up in my mouth.

It's a shame that the shame, of their lower than dogshit existence, can not be experienced by these low order, brain stunted antisocial perpetrators. Anybody have a pooper scooper I can borrow.
 
Last edited:
I read most of this today. Its disturbing and I can't remember anything positive in it at all.
There is allot of correlation in the techniques used in "mind control" crimes and the tortures employed in CIA's enhanced Interrogation methods.
Sleep deprivation, constant sensory stimulus, hypnoses induced delusion, heavy use of fear with threats of violence and rape of family and loved ones are just a few they share.


"The CIA did, however, have historical experience using coercive forms of interrogation. In 1963, the CIA produced the KUBARK Counterintelligence Interrogation Manual, intended as a manual for Cold War interrogations, which included the "principal coercive techniques of interrogation: arrest, detention, deprivation of sensory stimuli through solitary confinement or similar methods, threats and fear, debility, pain, heightened suggestibility and hypnosis, narcosis and induced regression."40 Tn 1978, DCI Stansfield Turner asked former CIA officer John Limond Hart to investigate the CIA interrogation of Soviet KGB officer Yuri Nosenko41 using the KUBARK methods—to include sensory deprivation techniques and forced standing.42 In Hart's testimony before the House Sclcct Committee on Assassinations on September 15, 1978, he noted that in his 31 years of government service: "It has never fallen to my lot to be involved with any experience as unpleasant in every possible way as, first, the investigation of this case, and, second, the necessity of lecturing upon it and testifying. To me it is an abomination"
REPORT of the SENATE SELECT COMMITTEE ON INTELLIGENCE COMMITTEE STUDY of the CENTRAL INTELLIGENCE AGENCY’S DETENTION AND INTERROGATION PROGRAM


......

Listened to this bullshit for months and months. Its a mind trap. It can distract and hold your conscious mind. Finally figured out the proper name.


I identified a few crucial roots to critical parts of this process in my personal exploration of this and can finally present a couple accurate and graspable explanations.

I made some recent findings that other victims and researchers looking into this have concluded already. Victims of this are subject to constant audio harassment. The content of the harassment and torture varies. Its very difficult for victims, non victims and authority figures to understand, communicate or even believe.

As has been stated, by myself and thousands of other victims. we are bombarded with almost unavoidable constant prolonged audio stimulation. During this process
we are subjected periods of simple looped phrases that are repeated over and over. During many phases of this, the content is meaningless nonsense that is loaded with victim specific verbal triggers that stimulate the victims conscious attention. Names, events, dates and other victim specific information are used because they are easily recognized personal sensory triggers. By endlessly repeating them, in an ever changing meaningless loop of word variables, they create an endless loop of indecipherable nonsense that hacks the human brain into examining every meaningless statement. During periods the looped dialogue constantly changes tone, rhythm, speed, inflection and is presented in many characters voices to constantly trigger attention. This brain hack repeatedly triggers, forces analysis and attempts to hold and capture the conscious mind and render it helpless to perform its crucial duties.
These include complex problem solving, analysis, rational decision making. Its the clearing house that holds and analyzes working/short term memory and guards our long term memory from bullshit input. When the conscious mind is subject to this, its functions are hampered or prevented. This can cause severe life dysfunction and leaves the areas of the brain they protect vulnerable. Delusion is a very common symptom.




"Alice in Wonderland
The aim of the Alice in Wonderland or confusion technique is to confound the expectations and conditioned reactions of the interrogatee. He is accustomed to a world that makes some sense, at least to him: a world of continuity and logic, a predictable world. He clings to this world to reinforce his identity and powers of resistance.

The confusion technique is designed not only to obliterate the familiar but to replace it with the weird.

Although this method can be employed by a single interro¬ gator, it is better adapted to use by two or three. When the subject enters the room, the first interrogator asks a double- talk question -- one which seems straightforward but is essentially nonsensical. Whether the interrogatee tries to answer or not, the second interrogator follows up (interrup¬ ting any attempted response) with a wholly unrelated and equally illogical query. Sometimes two or more questions are asked simultaneously. Pitch, tone, and volume of the interrogators 1 voices are unrelated to the import of the questions. No pattern of questions and answers is permitted to develop, nor do the questions themselves relate logically to each other. In this strange atmosphere the subject finds that the pattern of speech and thought which he has learned to consider normal have been replaced by an eerie meaninglessness. The interrogatee may start laughing or refuse to take the: situation seriously. But as the process continues, day after day if necessary, the subject begins to try to make sense of the situation, which becomes mentally intolerable. Now he is likely to make significant admissions, or even to pour out his story, just to stop the flow of babble which assails him. This technique may be especially effective with the orderly, obstinate type."

This is the interrogation manual the CIA based their enhanced interrogation off as reported by the US Senate Select Committee . Its also the foundation of the tech torture I deal with. Very happy to find this. Hey Melvin ya remedial mind controller.. that all you got child?


They also now use it to try and preinforce targeted thought, by endless repetition of Alice in Wonderland nonsense that slowly transforms into the target thought.
 
Last edited:
Almost everyone who is a victims of this experiences induced tinnitus. Its a loud ringing type sound it the ears and it severely hampers or prevents conversation, socialization, hinders work performance, ruins recreation and disrupts or prevents sleep. Not to mention drives you nuts. But you hear the audio harassments clear.

I believe mine was caused by infrasound stimulation of the outer ear canal hairs and was finally able to fully treat it by regularly shaving these with a normal ear electric shaver. You will know when its time to shave again when you faintly start to hear that wretched sound. Your welcome sleep well.


I know initially they were always driving at me to "sit around in a darkened room and listen," and "talk" (interact with the interface), to "eat only bread and drink only water," and no longer "talk with anyone" or cut communication with all friends and relatives. They disrupted communication, hacked my phone and took my accounts hostage. Attempted and succeeded in some cases to disrupt all my important relationships through spoof texting and calling. They also attempted and succeeded to disrupt and control a bit of my social, professional and family life through their hypnotic delusional implant and hacking etc.

All these things are designed at one end goal. To indoctrinate and enslave , through technology, another human victim. So fight and do the opposite of all that shit if you get attacked.

Deprivation of Sensory Stimuli
The chief effect of arrest and detention, and particularly of solitary confinement, is to deprive the subject of many or most of the sights, sounds, tastes, smells, and tactile sensations to which he has grown accustomed. John C. Lilly examined eighteen auto¬ biographical accounts written by polar explorers and solitary sea¬ farers. He found ". . . that isolation per se acts on most persona as a powerful stress .... In all cases of survivors of isolation at sea or in the polar night, it was the first exposure which caused

the greatest fears and hence the greatest danger of giving way to symptoms; previous experience is a powerful aid in going ahead, despite the symptoms, "The symptoms most commonly- produced by isolation are superstition, intense love of any other living thing, perceiving inanimate objects as alive, hallucinations, and delus ions. " (26)
The apparent reason for these effects is that a person cut off from external stimuli turns his awareness inward, upon him¬ self, and then projects the contents of his own tineonscious outwards, so that he endows his faceless environment with his own attributes, fears, and forgotten memories. Lilly notes, "It is obvious that inner factors in the mind tend to be projected outward, that some of the mind’s activity which is usually reality- bound now becomes free to turn to phantasy and ultimately to hallucination and delusion. "
A number of experiments conducted at McGill University, the National Institute of Mental Health, and other sites have at¬ tempted to come as close as possible to the elimination of sensory stimuli, or to masking remaining stimuli, chiefly sounds, by a stronger but wholly monotonous overlay. The results of these experiments have little applicability to interrogation because the circumstances are dissimilar. Some of the findings point toward hypotheses that seem relevant to interrogation, but conditions like those of detention for purposes of counterintelligence interro¬ gation have not been duplicated for experimentation

 
Last edited:
Neuroscientists Reprogram Brain’s GPS Using Laser Beams



Neuroscience.gif


Neuroscientists at University College London (UCL) have used laser beams to “switch on” neurons in mice, providing new insight into the hidden workings of memory and showing how memories underpin the brain’s inner GPS system.

The study, published in the journal Cell, explains how researchers harnessed an ‘all-optical’ approach using twin lasers to simultaneously read and write the activity of ‘place cells’ (a type of neuron) in mice, as they navigated a virtual reality environment.

Remarkably, by stimulating the place cells, scientists were able to reactivate (or retrieve) the memory of a location where the mice obtained a reward, which in turn “mentally teleported” the mice, causing them to act as if they were in the rewarded place.

This new research builds on the groundbreaking work of Professor John O’Keefe (UCL Cell & Developmental Biology), who won the Nobel Prize in 2014 for discovering place cells. These cells are found in a brain region called the hippocampus, and only become active when an animal enters a specific location in the environment.

Place cells are thought to represent a cognitive map of the environment — like an inner GPS — and retain location memory. The new UCL study is the first to show directly that place cell activity underlies the brain’s ability to navigate.

The results provide a deeper understanding of how memories are stored, and the UCL scientists believe the findings could eventually help us develop new therapies for conditions such as dementia and Alzheimer’s disease, which affect memory.

First author Dr. Nick Robinson (UCL Wolfson Institute for Biomedical Research) said: “These results provide direct causal evidence that mice use the information represented by place cell activity to guide their behavior. In other words, place cells really do tell the mouse where it is, and mice actually ‘listen’ to their place cells when they make decisions. This provides new insights about how memories are stored in the brain, as well as new tools for manipulating these memories to influence behavior.”

He added: “Disorders of memory — such as in dementia and Alzheimer’s — represent a huge cost to society. This work may eventually lead to a better understanding of these diseases, as well as new targets for therapeutic intervention.”

Senior author Professor Michael Hausser (UCL Wolfson Institute for Biomedical Research) said: “This study is a game-changer as it shows that we can use optical reading and writing of activity in specific neurons to manipulate memories, allowing us to better understand — and potentially improve — how neural circuit activity helps us to make decisions.”

The experimental study explained
Researchers at UCL Wolfson Institute for Biomedical Research leveraged a powerful approach that combines two revolutionary technologies for using light to read and write electrical activity in the brain.

First, they engineered neurons to express genetically encoded calcium sensors, which allow cells to light up when they are active. Second, they expressed light-sensitive ‘optogenetic’ proteins in the same neurons, allowing them to activate specific cells with beams of laser light, targeted using digital holography (the same technology as used in a laser light show).

By combining these two techniques, the team could both record and manipulate activity in the same neurons in the brain of a mouse navigating in virtual reality.

The UCL scientists used this approach to perform targeted activation of place cells in the hippocampus in mice navigating to a specific location within the virtual world to collect a sugar water reward. They first optically recorded the activity of large numbers of hippocampal place cells, identifying those which were active specifically at the rewarded location and which could therefore form the basis of the memory for that location. They then used holographically targeted laser beams to activate these specific place cells in a different location in the virtual world.

Remarkably, place cell stimulation was sufficient to retrieve the memory of the rewarded location, leading the mouse to seek the reward at the new location. In other words, the stimulation of the neurons with light “mentally teleports” the animal, causing them to act as if they were in the rewarded place. This is the first demonstration of how the activation of place cells enables us to retrieve memories of our environment and helps us to navigate.

Reference: “Targeted Activation of Hippocampal Place Cells Drives Memory-Guided Spatial Behavior” by Nick T.M. Robinson, Lucie A.L. Descamps, Lloyd E. Russell, Moritz O. Buchholz, Brendan A. Bicknell, Georgy K. Antonov, Joanna Y.N. Lau, Rebecca Nutbrown, Christoph Schmidt-Hieber and Michael Häusser, 6 November 2020, Cell.
DOI: 10.1016/j.cell.2020.09.061

Funding for this study was provided by Wellcome, the Gatsby Charitable Foundation, the European Commission, the European Molecular Biology Organization, the Medical Research Council and the European Research Council.
 
PICATINNY ARSENAL, N.J. – A team that includes Picatinny employees has developed the Improved Acoustic Hailing Device, or IAHD, to provide warfighters with an additional escalation-of-force option to minimize casualties and collateral damage. The IAHD is a developmental non-lethal, counterpersonnel, long-range hailing and warning device. It is capable of producing highly directional sound beams, allowing users to project warning tones and intelligible voice commands beyond small-arms engagement range. Members from Picatinny include employees from the Armament Research, Development and Engineering Center and the Program Manager Close Combat Systems’ Product Manager for Improvise Explosive Device/Protect Force. IAHDs can operate from a variety of platforms, such as tripods, ships and other vessels, Humvees, trucks and stationary platforms, such as guard towers. The IAHD is nearing a Milestone C decision, which will move the program into the production and deployment stage of the Department of Defense acquisition process. The Department of Defense defines non-lethal weapons as ―weapons, devices and munitions that are explicitly designed and primarily employed to incapacitate targeted personnel or materiel immediately, while minimizing fatalities, permanent injury to personnel and undesired damage to property in the target area or environment. Non-lethal weapons are intended to have reversible effects on personnel and materiel.‖ Non-lethal weapons provide warfighters with escalation-of-force options when lethal force is not the best first response. These capabilities assist warfighters in discerning intent, delaying and deterring individuals, and discriminating targets in a variety of missions ranging from full-scale combat to humanitarian relief—all while minimizing casualties and damage to property. As part of the Improved Acoustic Hailing Device logistics demonstration, Staff Sgt. Derrick Byrd of the Army Combined Arms Command attempts to operate the IAHD with instructions from only the device’s manual.(U.S. Army Photo by Katherine Mahan) Specifically, IAHD capabilities will enable U.S. forces to more effectively communicate with and determine the intent of a person, crowd, vessel or vehicle at a safe distance and potentially deter them prior to escalating to lethal force. ―First and foremost, the IAHD is a communication system,‖ said Jim Reinhold, IAHD Project Officer with the Army’s IAHD product team here. ―The IAHD’s greatest overall benefit to the warfighter is that the device improves communication between the troops and the people they might encounter during a mission.‖ U.S. troops can use the IAHD for force protection, peacekeeping, humanitarian missions and other situations where they need to either communicate at long range or determine intent. ―The IAHD can be used to communicate with potential hostiles and innocent civilians and aid in determining intent,‖ said Jeff Drobik, Acoustic Hailing Device Lead Project Engineer with the Army’s AHD Product Team here. ―If an oncoming individual is asked to stop and they keep coming, then the warfighter can increase the escalation of force according to local standard operating procedures and rules of engagement.‖ Since the bombing of the Marine compound in Beirut in 1983, communicating with and determining the intent of an individual, crowd or approaching vessel or vehicle at long range has become a priority for U.S. forces. After the U.S.S. Cole attack in 2000, operational units began directly purchasing and utilizing several commercial-off-the-shelf AHD products. Over the past few years, the Joint Non-lethal Weapons Program has sponsored AHD research and development that has led to the current IAHD program. In fiscal year 2006, the JNLWP began sponsoring an extensive evaluation of COTS AHD products to assess their capabilities and compare those results to the current operational needs of U.S. forces. As a result of this evaluation, the program identified deficiencies among available COTS AHDs. This led to the fiscal year 2007 start of the current IAHD acquisition program. The Army is the lead Service for the IAHD program, with the Navy and the Coast Guard also involved in the effort. The IAHD incorporates improvements to COTS AHDs based on service needs. Improvements include changes to the device’s power source, as well as an increase in the device’s voice intelligibility and projection range. ―The IAHD will allow for better communication, helping warfighters determine intent and separate the combatants from the noncombatants,‖ said Reinhold. Most recently, the JNLWP sponsored an IAHD logistics demonstration at the Army’s Aberdeen Test Center at Garrison Aberdeen Proving Ground, Md., on July 22. Performing a logistics demonstration is among the many tasks required to reach a Milestone C decision. The goals of the demonstration were to ensure that the device’s instructional manuals are correct and complete and that operators can use the device correctly and effectively in the field with only a manual for assistance. To this end, IAHD program managers observed two Army Combined Arms Command Soldiers install, operate, troubleshoot and dismantle the IAHD with the assistance of only the device’s manual. According to program managers, the IAHD logistics demonstration went well and accomplished its goals. The demonstration validated the IAHD manual and revealed the need for just a few minor changes. ―We were pleased with the demonstration’s execution and results and even more pleased with the IAHD’s progression through the acquisition process,‖ said demonstration attendee Frank Hubbard, who monitors the IAHD program for the Joint Non-Lethal Weapons Directorate. ―Reaching a Milestone C decision and fielding a device that meets requirements is something that is worth all the effort, and the IAHD is almost there,‖ Hubbard said. Representatives from the Army’s IAHD product team attended the IAHD logistics demonstration. The team, based here, is managed by the Program Executive Office Ammunition, Project Manager for Close Combat Systems, Product Manager Improvised Explosive Device Defeat/Protect Force. ARDEC’s Munitions Engineering and Technology Center executes the IAHD program for PM IEDD/PF. ARDEC’s Integrated Logistics Support Team executed the demonstration. Representatives from the Army Research Laboratory’s Manpower and Personnel Integration Program attended the demonstration to assess and evaluate the impact of the IAHD’s material design on U.S. troops. Representatives from the Army Evaluation Center came to gather results for their independent evaluation of the IAHD’s ability to meet program requirements.

I would not click on this US military source
 
14 May 2015
Demonstration of novel high-power acoustic through-the-wall sensor

Abstract
A high-power acoustic sensor, capable of detecting and tracking persons through steel walls of cargo containers, trailer truck bodies, and train cars, has been developed and demonstrated. The sensor is based on a new concept for narrowband mechanical-impact acoustic transmitters and matched resonant receivers. The lightweight, compact, and low-cost transmitters produce high-power acoustic pulses at one or more discrete frequencies with little input power. The energy for each pulse is accumulated over long times at low powers, like a mousetrap, and therefore can be operated with ordinary batteries and no power conditioning. A breadboard impact-transmitter and matched-receiver system that detected human motion through thick walls with only rudimentary signal processing is described, and results are presented. A conceptual design is presented of an acoustic through-the-wall sensor, costing about $10,000 per unit and capable of remotely and non-intrusively scanning steel cargo containers for stowaways at a rate of two containers per minute. Advantages of acoustic through-the-wall sensors over radar are: Sound penetrates metal walls; and acoustic sensors are sensitive to small and slow motions, and so can detect stationary persons by breathing motion alone. Other attractive features include: high-resolution locating and tracking; portability; low cost; quick and easy preparation and deployment; and near-real-time data processing and display. These features provide a robust stand-alone through-the-wall surveillance capability or an excellent complement to a radar sensor.
© (2015) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Citation Download Citation
Franklin Felber "Demonstration of novel high-power acoustic through-the-wall sensor", Proc. SPIE 9456, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security, Defense, and Law Enforcement XIV, 945603 (14 May 2015); https://doi.org/10.1117/12.2084056


Well doesn't that just fit the bill , cheap, very low power requirements, goes through anything, locates and tracks, near real time processing and with a little software should certainly accomplish what your system does as far as remote viewing.

"Melvin can not believe you just said that" inside joke

i think there are only a couple things left on the board Melvin. You can't be very happy at this point... tic toc Melvin, tic toc.
 
Last edited:
Well, if your saying torture couldn't happen in America.. your absolutely right, because torture doesn't exist anymore in America as torture is absolutely unacceptable illegal inhumane disgraceful behavior that goes against everything we stand for. So from now on, as torture is banned, please refer to this behavior as counterintelligence interrogational love.

Mausfeld, R. (2009). Psychologie, ,weiße Folter‘ und die Verantwortlichkeit von Wissenschaftlern,
Psychologische Rundschau, 60, 229–240.

Psychology, 'white torture' and the responsibility of scientists
Rainer Mausfeld

Great article on no touch torture.. sorry. sorry no touch interrogation.
 
Last edited:
Im just answering the question directly so i dont speak of the other posts here but the answer is Absolutely.

Less than a year ago two very high ranking CIA personal were the victims of a microwave attack from Russian FSB operatives while staying in Australia.

The suspected microwave attack first mentioned by the CIA was soon confirmed by ASIO who used phone data that placed 3 known FSB personnel in the same building at the dates the CIA guys where attacked.

So yes this technology is well and truely real. No conspiracy theory.

 
Regarding weapons I've seen a gamma ray gun, like a hand gun that disarms people with laser frequencies. It also has a setting that allows you to hurt people with heat waves. I didn't think it was a real thing till I looked it up and the FBI wrote a paper on it

I don't think outsiders can interfere with one's mind unless you allow them to
 
No, since we don't have any musical device that you can attach to your head and like make music with ur thoughts I don't see this happening even in 70yrs from now. It requires fuck me requires a lotta shit that we don't have and will not have maybe and I said before this is one of the reason why Reddit should be banned or at least be censored in some form. Many disagree with Facebook because it adopted this behaviour but to me it's really nice to see this being apply in the real world.
 
Linked as its completely related

 
Victims of this report having specific organs targeted. Well I wonder why?

It looks like prolonged Infrasound can have severe effects including on fibrous connective tissue, leading to significant fibrosis. When severe enough this can cause severe health issues that debilitate and can kill.




Having your ventral cavity or other organs regularly resonated is intended to cause severe fear, induce helplessness, compound stress and discomfort and cause heath conditions. Health conditions reduce life quality, hamper or prevent work and can financially destroy someone in the United States and utterly ruin quality of life. When they do this you can touch your sternum and it feels somewhat like a sonic toothbrush, produces an unpleasant tightness and minor pain in your chest and reminds you for the time being your harassment, by who ever the coward chicken shit in the rain pussy, is something temporarily out of your control. Humbling but certainly not devastating. Its not magic, its just tech and subject to physics like everything else. Thinking about your system Melvin and its reliance on infrasound, well now that's quite the akiles heal isn't it. Its just a little bit before one of us cracks this. Been thinking about that old movie predator Mel. The correct microphone array and open source software will indicate the infrasound sources even if hidden or buried.. yes, been thinking about that movie lately Mel.

NSFW:



Continuous inflammation is painful, debilitating and demoralizing.

The torture is always kept random. Unless its attempting operant conditioning , you never know when or what combination you will face.

Its designed right off the directives of The Kubrick interrogation manual.
 
Last edited:

Year five.. unbreakable. You broke the minute you undertook, participated in or turned a blind eye to any level of this.

Places where this is/has happened should list The United States, including children and innocent citizens. Claiming that this is not torture is an unjust determination made by those that wish to torture and it’s only been given a new name in hopes of evading legal consequences.
 
Last edited:
Top