Video report and links | Ramola D | March 17, 2022
Report and commentary, in light of recent ADS (Active Denial System) use in Canberra, on a few declassified US/NATO documents and words from whistleblowers testifying to the use of Spectrum Weapons–anti-personnel Directed Energy Weapons–and Neuroweapons on people worldwide, at protests and in their homes, as partially-disclosed Crowd Control Technologies running sinister “Peace Enforcement Operations” by a coterie of factions in Intelligence, Security, Law Enforcement, and Military–without proper and full public disclosure, debate, nor consent.
These documents have been reported in the body of my journalism on Surveillance and Military activities over the past 8 years, while my reports have been disappeared from public view by a number of factors–including deliberate mainstream-media denial, COINTELPRO attacks to bury the journalism and the journalist, and the prominence of false support groups deflecting from the findings and disclosures of real journalism.
These documents and reports have been spotlighted recently in a few articles at my site and at Substack, all links below:
Declassified Documents from DOD, DOJ, US Airforce, Army, Navy, NATO Reported Here:
The three major reports disappeared by Smear Campaigns and False Support Groups, courtesy NSA-CIA-FBI COINTELPRO, while the writer was under severe Spectrum Weapon attack by Hidden Hand criminals-with-govt-jobs throughout:
3. Public Disclosure of Anti-Personnel DEWs and Neuroweapons (Non-Lethal/Limited Effect Wpns, EMF Spectrum Wpns) Being Used, Covertly but Definitively, Illegitimately, and Inhumanely, by US, UK, All Govts Worldwide on People/Published May 2021:
Other US/European documents of note (some linked in above reports):
1. The NATO document discussed in the video:
NATO Non-Lethal Weapons and Future Peace Enforcement Operations Technical Report, 2004:
2. US Air Force Research Labs document on Active Denial System 5G Tech of the kind used in Canberra/provided to Ramola D on FOIA request for all RFPs/Statements of Work on Non Lethal Weapons Testing:
Thermal and Behavioral Effects of Exposure to Moving Small-Diameter 95-GHz Millimeter Wave Energy Spots (Active Denial System) Report | Air Force Research Laboratory Contract with General Dynamics, 2014:
3. US Air Force Research Lab document on DEBR research during the 7 years planes, helicopters, drones, satellites constantly flew over the writer’s house and yard while she was under severe Spectrum Attack from same as well as from neighboring houses and zooming-in cars, pickups, trucks, necessitating several FOIA requests to govts and military:
Directed-Energy Bio Behavioral Research Statement of Work, 2013 | Air Force Research Laboratory Contract 2013-2020 with General Dynamics:
4. US Army document disclosing much on Non Lethal Weapons in use by military:
Bioeffects of Selected Non Lethal Weapons, Addendum to the Non-lethal Technologies Worldwide Study (NEGIC-11 47-101-98)/US Army, 2006/Provided to Donald Friedman on FOIA request:
5. US Navy Office of Naval Research document revealing ADS weapons and “pulsed energy projectiles” using plasma:
The extreme hubris, aggression, and atrocity of using deadly electromagnetic weapons and neuroweapons on select members of the populace–now a global travesty–and literally pulverizing people to death in their own homes–while weapon-wielders are paid by Governments and Militaries to enact these profound bio-hacking crimes on people guilty of no crime–no whiff of Due Process in sight– was also discussed in these articles:
Now, I know you guys aren’t lawyers or judges and so, you aren’t thinking like lawyers or judges, but in the current situation, you need to do so.
Both you journalists and your sources need to start thinking in terms of collecting court admissible evidence.
We are now in the process of putting together one of the most damning criminal court proceedings in the history of the world and it grinds my teeth that so many great opportunities to nail down evidence and testimony are slipping through the cracks simply because people aren’t thinking.
It only takes a few seconds to turn a news story into a credible evidentiary video deposition and you can all contribute to actual court action — immediately and up front — by taking the time to do this little “extra” thing when you are making your videos.
You can self-declare a video deposition. Here’s how you do it if you are all alone and need to get your information in a form that a court can use.
Do your usual Selfie thing with you speaking directly into the camera. Speak clearly and run through this little Self-Declaration:
“My name is . I live in . I am an American (British, French, etc.) National.
I am providing my witness and testimony freely and voluntarily without duress and without any hidden purpose. In this presentation, I am telling the truth and the whole truth to the best of my ability to know the truth, in order to create and provide a video deposition for the use of courts and prosecutors worldwide.”
Do your video, create your link or copy, then send it directly to me, at firstname.lastname@example.org, along with a scan of your picture ID or passport, which the court will use to validate your identity. You don’t ever show your ID as part of the video — only as an attached jpeg photo.
If you are a news source doing an in-studio interview, you can make it a much more formal deposition, by administering the declaration and having members of your team witness it.
Say that you are, for example, Del Bigtree, and you are interviewing a scientist with blockbuster information about vaccine adverse events — you just lead into the video deposition like this:
“This morning we are talking to Dr. Alan Christian Daley, a Senior Medical Doctor and head of the Microbiology Research Center at UCLA. Doctor Daley has more than thirty years of experience interpreting advanced electron microscopy and is a Histologist specializing in blood diseases and abnormalities. Doctor Daley is bringing us amazing and disturbing news about what he is seeing in the blood of people who have received Covid 19 vaccines.
Doctor Daley agreed moments ago to turn this interview into an official video deposition, giving his expert testimony in a form that can be used by prosecutors and courts.
So, without further ado, do you Doctor Alan Christian Daley, of Riverside, California, an American National, freely and voluntarily and without any fear or coercion or hidden purpose offer your expert witness and testimony regarding the facts and observations you are about to share, and affirm that you are telling us the truth, the whole truth throughout, to the best of your knowledge and ability?” He or she says, “I do, and it is my firm intention that this video testimony and the photos I am about to share should be used by prosecutors, courts, sheriffs, and law enforcement officials to investigate and prosecute crimes against humanity.” From that moment on, the testimony is “live” and available as evidence in a court of law any court of law.
Once the interview is wrapped up, send me a copy and a jpeg of the witness’s ID to: email@example.com Label it something like “Expert Witness Testimony” or “Self-Deposition” as the case may be.
Help me to help you, and help everyone else, too, by making the words and photos count.
Right now, we are collecting video depositions and evidence related to Covid 19 vaccines, related scientific evidence, and injuries and deaths following vaccination.
This is a way for you to not only be heard, but to make being heard count toward prosecution.
Make it more than a story or an interview make it a deposition.
Right now, we are dealing with the genocide. Right after that, we deal with targeted individuals and the use of directed energy weapons. Right after that, we deal with Chem Trails and weaponized geoengineering.
Everyone got the picture?
Thousands of people are now dying as a result of trustingly taking these undisclosed injections. We can’t possibly interview them or even their families within the time parameters we have, but if you do what I am suggesting, you can contribute your deposition and help us bring these criminals and their corporations to justice.
Recently a posting on Twitter led to Alex Crosbie, an Irish whistleblower of extrajudicial targeting crimes and participant in the historic Online Press Conference of 15 October, 2021 reporting these global fusion-center crimes, alerting this writer about a certain FBI Houston bulletin, titled a Liaison Information Report, unearthed by the Blueleaks fusion-center hacking leaks by DDosSecrets, a Wikileaks-like organization, last June (posted in PDF below).
As reported by various media, Blueleaks leaked data from 200 police departments and fusion centers:
“Hundreds of thousands of potentially sensitive files from police departments across the United States were leaked online last week. The collection, dubbed “BlueLeaks” and made searchable online, stems from a security breach at a Texas web design and hosting company that maintains a number of state law enforcement data-sharing portals.
The collection — nearly 270 gigabytes in total — is the latest release from Distributed Denial of Secrets (DDoSecrets), an alternative to Wikileaks that publishes caches of previously secret data.
A partial screenshot of the BlueLeaks data cache.
In a post on Twitter, DDoSecrets said the BlueLeaks archive indexes “ten years of data from over 200 police departments, fusion centers and other law enforcement training and support resources,” and that “among the hundreds of thousands of documents are police and FBI reports, bulletins, guides and more.”
This document therefore–a PDF pieced together from graphics posted on Twitter by a cover user id posting questionable opinions about “Targeted Individuals”–has not been verified via examining the Blueleaks document cache by this writer–since she does not have the IT skills, tools, or freedom from cyberhacking on computers currently to attempt a torrents download. However, previous documents (PDFs posted below) published by the FBI–with similar language–seem to indicate that this FBI bulletin is indeed a FBI-originating one, and readers are invited to verify this for themselves.
Several news media outlets reported on the Blueleaks documents last year–and it appears a very large part of their disclosure is the unearthing of the very extrajudicial targeting program and its carefully concealed construct which has been continually exposed at this site since 2013, when this writer was unlawfully, illegally, and extrajudicially targeted herself, while running children’s creativity workshops in art, natural science, and creative writing in Quincy, Massachusetts, as described extensively in articles and video interviews posted here and here.
This writer will therefore be publishing more intensively on these Blueleaks documents–as well as other FBI/DHS documents published by the Intercept and others over the last few years–to bring greater attention to the great crimes of Mafiosi-style unlawful targeting of hundreds of thousands of people in the US by the rogue FBI, DHS, and NSA under cover of crime-prevention, domestic-terrorism, and countering-violent-extremism programs which has led to the opening of a Pandora’s-Box of ruthless and illegal CIA and DOD weapons-testing, neuro-experimentation, behavior-modification experimentation, and the military subjugation of US communities.
Illegal FBI Targeting and Illegal, Unlawful, Unethical CIA/DOD Targeting and Human Subject Research Operations Revealed by Whistleblowers
This article will focus however primarily on this FBI Houston LIR on the subjects of doxing, stalking, threats to law enforcement, and “Targeted Individuals,” because what it reveals is profound.
Earlier FBI/DHS Documents on Doxing from 2015
Earlier FBI/DHS documents on the subject of doxing available online from previous FOIA requests and in the public domain are posted below. Fusion Centers and their operators, long engaged in extrajudicial targeting practices as described above, seem, ironically, to have had an inordinate interest in urgently casting Law Enforcement and state, local, tribal, territorial government officials as putative and imminent victims of “targeting” by “malicious actors.”
January2015 Document: Cyber Intel Advisory | January 6, 2015, IA2015-0101 | Doxing Leads to Future Targeting/Center for Internet Security/from ARIC, 2015
The Blueleaks February 2020 FBI Houston Liaison Information Report on Doxing
Blueleaks February 2020 Document: Dept of Justice/FBI | Office of Private Sector | Liaison Information Report | Cross Sector | 14 February 2020 | LIR 200214003 | Online Doxing and In Person Harassment of Private Sector and United States Government Individuals
The following is clear from this LIR:
This LIR was issued by Houston Police and FBI Houston along with the local Houston fusion center—Houston Regional Intelligence Center—and Infragard, a FBI-Private-Sector organization—specifically to alert Private Sector members and govt officials of possible impending cyberstalking from an incident of what they called “in-person and online doxing.”
This incident of online doxing they refer to they say is posted publicly, includes residential address and employer information of “victims” located in several US cities.
The in-person harassment they refer to they say includes Cease and Desist letters to “victims” whom they further describe as “private stakeholders associated with InfraGard, Office of Emergence Management personnel, and federal government executives” at their homes or worksites and include flyers handed to neighbors accusing “victims” of involvement in “gangstalking.”
Offering no explanation for what—of police, FBI, Infragard, fusion-center, private-sector information-gathering and policing activities (legal or illegal) including illegal COINTELPRO– could be construed as “gangstalking,” and offering no awareness of what “gangstalking” may be, they cite what the website in question states is gangstalking as “the practice of attacking civilians with psychological torture techniques, including stalking, harassment, and intimidation.”
Similarly, offering no explanation, awareness, or factual notice for what “Targeted Individuals” —well-known by all informed readers and viewers of true-media to be people targeted wrongfully aggressively, and militarily by FBI, Fusion Centers, Infragard, DHS–may refer to, they say the website in question “lists over 100 ‘targeted individual’ websites in the US and foreign countries.”
They reiterate that public databases and social media sites were mined for personal information. They reiterate that online doxing was conducted against “individuals associated with the FBI, DHS Fusion Centers and Infragard and followed up in one city with what they say is “in-person physical targeting and harassment of public-private individuals.”
They go on to advise use of “good cyber hygiene” and explain what this may be.
They then go on to focus on “targeted individuals” and “Targeted Justice” and present a narrative for what “targeted individuals” are, do, or may be recognized as doxers for, and advise: “If you encounter such an individual, and you feel threatened call 911.” They also advise sending notice of all Cease and Desist letters received by email or mail or in-person delivery to “your local security office, local law enforcement and/or the FBI.”
In appendices—one of which is posted here—they include copies of Cease and Desist letters and flyers sent to “private residences and neighbors of victims.”
Very clearly, the elaborate and duplicitous narrative constructed here of “targeted individuals” – which coincides exactly with the false-narrative constructed by mainsream media of “targeted individuals” – supports, extends, and seeks to solidify the public, mainstream-media narrative constructed to disappear all reporting victims of police, fusion center, military, and intelligence agency crimes, using the label “targeted individuals,” and equating it with “mentally-ill group with delusions of electronic and neurotech surveillance,” reported often here earlier, including here. The FBI/DHS and Mainstream Media (run by the CIA’s Operation Mockingbird?) are therefore clearly in collusion in creation and maintenance of this false-narrative.
Very clearly also, this LIR casts “targeted individuals” as delusional and threatening, and FBI, private-sector, Infragard, fusion-center, and government officials—laughably–as “victims.”
This LIR also collates “doxer” with “targeted individual” twice and suggests that people self-identify as “doxer/’targeted individual’” and suggest they can be identified as “’online doxers’ identified as ‘targeted individuals’.”
Doxing LIR as FBI Containment Operation to Cement False-Narrative on Illegally FBI-Targeted, Conceal FBI-DHS Crimes
Given that there is ample documented evidence of hundreds of thousands of people being wrongfully—indeed most facilely, opportunistically, illegally, unlawfully—watchlisted and then subjected to overt community monitoring and policing activities, activities in fact engineered by the FBI and DHS and executed by members of Infragard, Neighborwood Watch, and fusion center contractors working with full knowledge of the DHS on classified military and intelligence projects involving the use of limited-effects weapons, non-lethal weapons, and neurotechnology, as cohesively described here, what is also clear from this LIR is that: 1) While it seeks to perpetuate the false-narrative of “targeted individuals” as delusional, 2) it is operating as an intelligence Containment Operation to protect the false-narrative of “targeted individuals” as delusional and indeed to link all “targeted individuals” with being “doxers,” which, 3) clarifies that it is also operating to protect, fortress, and conceal the actual perpetrators of targeted military and intelligence crimes of privacy-intrusion, bio-hacking spectrum-weapon-use, neuro-hacking, character-assassination, neuro linguistic programming, trauma-based PTSD-creation, social and psychological gaslighting, community-monitoring, and COINTELPRO harassment conducted by the private-sector, security, University, Infragard, FBI/DHS fusion-center contractors mentioned in this LIR and widely reported by the real victims of these crimes; 4) In addition, it seeks to paint police, government, military, and private-sector aggressors-and-criminals as victims of the very victims and targets of their targeted, unlawful, criminal aggression with weaponry, COINTELPRO, and socio/psychological terrorizing and traumatizing: a profound inversion of reality and clear evidence of high-level criminality seeking to fortress itself; 5) Finally, a deflective document of this nature also seeks to conceal the Smart Grid—of weaponized cell towers, antennas, emitters, radiolocators, implants, microtech, nanotech, portable microwave weapons, SUVs/pickups/sedans outfitted with spectrum weapons, sonic emitters, spectrum weapons being used on the populace in a targeted way, to effect military subjugation of communities—by simply calling all reporting victims of EMF, neurotech crime “delusional” and removing focus or notice of the physically installed and operational weaponry, which also uses the cover of “Surveillance”.
It is entirely possible therefore that this LIR—as possibly all Blueleaks documents—was leaked on purpose, with specific intent to publish this false-narrative—offering mainstream media a chance to report on it, cementing the “word from FBI”-media reportage connection to establish “targeted individuals” as doxers and “targeted individuals/doxers” as delusional, precedent for which mainstream media has already established.
Targeted Justice, Doxing, “Gangstalking,” FBI Doxing LIR, and COINTELPRO
Notably, the LIR cites Targeted Justice, a well-known organization purporting to represent “targeted individuals,” citing documents posted on its website. The Cease and Desist posted in the Appendix can be found here on the Targeted Justice website.
The terms “targeted individuals” and “gangstalking” are both highly problematic terms—and apparent police constructs–addressed in previous analyses by this writer which have been used to dismiss the very real reports of military, police, and intelligence crimes by numerous people, most being well-educated, informed, aware, and in no way delusional.
The publication of names and addresses as well as advice to confront Government perpetrators of crimes at their homes published by Targeted Justice—what, essentially, this LIR terms “doxing”–is not an action promoted by this writer or this site—The Everyday Concerned Citizen–in any way whatsoever, actions in fact discussed and deplored in a recent interview (video link posted below) with John Christiana, former Legal Director of Targeted Justice, who also protested these actions and was thence asked to resign, while being subjected since to public defamation online by Targeted Justice, in particular by Winter Owen Calvert who has long used the name Richard Lighthouse—under which name this writer has once interviewed him. (Midge Mathis and Karen Melton Stewart, founder and Board member at Targeted Justice, have also been previously interviewed. All past interviews can be found at Odysee/Lbry post Youtube’s deplatforming of Ramola D Reports.)
Targeted Justice has published the name of this site The Everyday Concerned Citizen as one of the top sites for publication of information concerning “targeted individuals,” which this LIR makes mention of as Targeted Justice publishing the names of over 100 “targeted individual” sites in the US and abroad. Clearly, this LIR seeks to incriminate all sites associated with or mentioned by Targeted Justice, and is grasping at straws to condemn all sites reporting the crimes conducted against “targeted individuals.”
The fact that Targeted Justice has embraced the questionable practices of publishing personal address information of Government officials putatively involved in extrajudicial and watchlisting crimes against people—being named “doxing” by the FBI, and offering the FBI an opportunity to further target people it has targeted and watchlisted in the first place and accuse them of unlawful behavior—does raise the question of COINTELPRO, a major aspect of which has been, historically, to infiltrate activist groups and deflect peaceful activism toward violence, criminality, and unlawful action with intent to get activists arrested, indicted, incarcerated, and discredited: Is Targeted Justice one half of a contrived COINTELPRO operation, to set up “targeted individual” illegally-targeted people to “dox” officials, which then permits the FBI to further target “targeted individuals” as “doxers” breaking the law and posing a “threat” to Govt officials—and their private-sector partners and contractors?
John Christiana examines this possibility here: BlueLeaks Appears To Expose CointelPro Type Link Between FBI and Targeted Justice, where he reports having written to the FBI in 2019, a year before this FBI LIR of February 2020, and receiving no response. The FBI meanwhile never publicly questioned Richard Lighthouse or Targeted Justice on this subject, by his report, and re-posting personal address information publicly available from public records online, Lighthouse states, is free speech.
The FBI Lies Freely in Neighborhoods About People Illegally and Wrongfully Targeted Being Threats
It must be highlighted that when the FBI wrongfully targets people—as it frequently does—it sets abroad the false-narrative that the person under scrutiny is a threat to society, to the Government, to maintaining the peace, to the neighborhood, and so on, naming the person a domestic terrorist, a violent extremist, a radical subversive, an anti-Government anarchist, a mentally unstable, a suspect, or a subject in an ongoing investigation. This is defamation and slander built on lies, which the FBI disseminates criminally in neighborhoods: to permit open harassment of the target and obtain neighborhood buy-in of military weapon-use, increased surveillance with drones and helicopters, and negotiate community-monitoring & behavior-modification NLP harassment on the target.
Naming illegally-targeted people doxers and threats for sending Cease and Desists and posting flyers therefore is added targeting, aimed at building a profile of the target as a menace and a threat, and also aimed, it seems, at criminalizing the sending of Cease and Desists and flyers to anyone—protected speech under the First Amendment.
The FBI and fusion centers have essentially declared a war on humanity, and since 9/11 have unleashed a War on Terror on American communities—and communities worldwide, abusing their police powers to wrongfully target millions of innocent people, subject them to 24/7 harassment, and traffick them into DOD/CIA programs of electronic weapons-operation and neurotechnology experimentation.
Thousands of those targeted are people who question corruption, crime, waste and abuse–whistleblowers, and people of higher consciousness who advocate for animals, prisoners, refugees, the unborn, the wilderness, Nature, health freedom, the environment–activists. The FBI, a police organization, has not in any way focused on criminals—actual criminals, who commit crimes of murder and theft—but on activists, and has sought to cast activists as criminals and terrorists; it appears to spend a vast fortune on surveillance of activists, lie-dissemination and character-assassination of activists, community-policing and 24/7 harassment of activists.
The FBI has also, by opening its watchlists to the DOD/CIA and permitting military/Intelligence use and abuse of watchlistees—exploitative predation on the bodies and brains of people—become an accessory to Military and Intelligence crime of the worst sort: barbaric, unethical, inhumane acts of torture which are against all international and US human rights law, a matter frequently reported at this site, including in a Memorandum to President Trump in 2017 and in a second Memorandum in 2019.
These matters must be publicly known.
Doxing LIR Seeks to Criminalize and Disempower the Already Illegally-FBI-Targeted
This writer repudiates all attempts by the FBI—a fallen organization–to associate the term “targeted individuals” with “delusional, mentally-ill, threat to national security, threat to peace” labels, to associate this site The Everyday Concerned Citizen with the site and organization Targeted Justice, its Board Members and founders, its stated mission and its misbegotten advice to members—which sure reads as COINTELPRO, and also to further criminalize and disempower the already illegally-targeted as “threats” who could possibly victimize Government and private-sector “officials”.
What is noted in the latter part of this LIR therefore, in FBI efforts to stop wrongfully-targeted people from sending Cease and Desists or posting flyers is fully repudiated and must be challenged by all thinking people.
To be very clear: This writer does not in any way recommend posting home addresses of officials found online or using the misleading and ill-written documents posted at Targeted Justice fixated on inaccurate labels such as “gangstalking,” nor engaging in in-person visits to homes of known Government officials to hand such shoddy documents to.
However, engaging in public education in any neighborhood by posting informational flyers is certainly not a crime—and in fact, alerting all to what the FBI has become, not to mention the CIA and DOD, all engaging in crimes on people, sounds like an excellent thing to do.
Further, when people who are being illegally FBI-targeted and thence trafficked to the DOD/CIA for use in terminal, unethical experiments in their homes, in their neighborhoods, they are being seriously and extremely victimized by the FBI and DHS first, being stripped of their human rights and civil rights, and being treated in the most subhuman way by clearly subhuman aggressors: many who identify their own neighbors (using EMF meters, directive shields, observation, and other means) as weapon-wielders and trackers, community-monitors, noise-harassers are well within their rights in sending Cease and Desists to their neighbors, and posting flyers around the neighborhood.
Whether their neighbors occupy positions in Infragard, Neighborhood Watch, the local fusion center, or are contractors to same is hardly the issue–because such mercenaries do not identify themselves as such; for the illegally-targeted to sit back and permit their own assault-unto-death by amoral, unethical neighbors engaging in mercenary practices against them is neither believable nor advisable.
This writer recommends in fact that all illegally-targeted people who identify their neighbors as being involved in DEW/Neurotech Targeting assault-and-battery on them send them Cease and Desists and hand out informational flyers to them and to others: these are civilized, lawful ways to express dissent to stealth slow-kill and silent-spectrum-weapon-torture programs being run by a whole slew of alphabet agencies today on Americans and others worldwide, with the full budgeted blessings of a very rogue FBI, DHS, and NSA.
Contrary to what this smoke-and-mirrors LIR suggests, sending a Cease and Desist to a barbarian using military weapons on you – protected by the FBI – is not an act of threat but an act of assertion of one’s right to bodily autonomy, God-given, and protected by the Constitution, Bill of Rights, and all human rights law.
Americans who have long believed the US Government is their government and not a British-installed profit-oriented corporation in Admiralty/Maritime Jurisdiction—as also every alphabet agency under US Inc.–may also wish to explore returning to the land as state citizens and nationals, true Americans, and step out of the law-of-the-sea jurisdiction we have all been wrongfully entrapped in; please see Judge Anna von Reitz’s work and the website American State Assemblies and the Youtube channel State Nationals United for more information.
Keeping silent is not the answer. This LIR reminds us that story-upon-story (be a major threat to peace when you target someone, then call anything he does—even speak or write–to protest his deathly targeting a threat) will be built by the agency criminals—we have to put a stop to it.
Speaking out continuously and informing the world of the crimes of abusive agencies and governments—and their paid minions—while demanding termination of these abuses is most definitely the right way forward.
On this day, Martin Luther King Jr. Day, Jan 17, 2022–designated a National Day of Service, here commemorated, interestingly, by the Department of Defense–gratitude to MLK for transcending COINTELPRO and holding that dream for the future we now hold: which “malicious actors” at places like the FBI sadly ensure can only still be a dream.MLK’s historic I have a Dream speech posted below.
No-one needs to be reminded we are currently living in a massively dystopian version of someone’s dark future — and have been for a while — but to many in the world suffering through COVID indignities at the hands of grasping and reckless globalists, the question of “Targeted Individuals” and stories of in-home torture with heat and pulse-microwave weapons, stealth neurotechnology with Voice to Skull harassment, and AI-takeover of human social interaction in collusion with Law Enforcement, fusion centers, military neuroscientists is simply too too dark to take in at all.
However, some of us know tragically too well how real this scenario is, beyond-dystopian as it is–and for how long it’s been going on, and what absolute facets of bio-hacking, neuro-hacking, remote-access physical assault, remote-access brain assault, 24/7 torture–yes, most definitely torture, deliberate trauma-and-stress-creation, deliberate social and psychological terrorism it entails.
And how the New York Times, Washington Post, Wired and all the complicit and grossly unethical psychiatrists/psychologists working with the coven of terrorists in the FBI/CIA/NSA/DOD/DHS (NATO & 5-Eyes/15-Eyes too) and lying mainstream-media-complex have ensured that the regular American, the everyday human stays completely oblivious of this most Nazi of all atrocities, occurring in plain sight, in our midst: by simply dismissing all reporting targets of DEW and Neurotech Torture as Schizoid, Delusional, Paranoid, Mentally Ill–a handy ploy used by the KGB in political persecution, and adopted by the MK ULTRA specialists today to create a large pool of available victims they can keep preying on, predating, and harvesting at will.
These were the subjects of the recent historic Online Press Conference on Worldwide DEW Targeting, Trafficking and Torture held Oct 15, 2021 at Ramola D Reports and posted at Bitchute (thwarted from posting elsewhere–I’ll keep trying), to be reported on shortly–and of course the subject of much coverage here including this article I read from at the conference which spells it all out:
Celeste Solum, former FEMA employee, whistleblower, broadcaster, watchman on the wall, caring Christian, who is unafraid to face down the dark topics of today’s dementia, was gracious enough to host this writer on a follow-up show to last year’s interview on Neuro/DEW Surveillance where we spoke about what “Targeted Individuals” — label and reality both– are, what they are reporting, and how the program of slow-kill extermination via military/Intelligence experimentation and unlawful FBI watchlisting & mislabeling is destroying lives, families, and communities today.
Celeste also shared her research on Post-Humans, Synthetic Humans, Virtual Twins and much else as we spoke candidly across a range of subjects from how this writer was wrongfully targeted, back in 2013, how the US Airforce (and General Dynamics) spent seven years flying drones, planes, helicopters nonstop over the house in which she lived while covert, non-consensual implants, nonstop assault with microwave weapons, energy assaults of several exotic kinds involving Pulsed Energy Projectiles, Vibration Weapons with Extremely Low Frequencies and Millimeter Weapons made havoc of her life (reported here recently to a few people, none of whom have acted to stop these continuing assaults), and how many of these assaults continue, with a current, medieval focus of assault on her writing arm.
Speaking about my story made me recollect the few previous interviews I have given detailing my story and I link most of them below the video. (Not all.) The story I detail was also printed by Washington’s Blog in 2016–PDF posted here. We also shared notes on shielding from invasive energy and quantum tunneling/scalar weapons it is impossible to shield from, and took questions from viewers–it was a live webinar.
As with all disclosure of targeting atrocities, this conversation aims to raise public awareness, inform all viewers, and advise all that the Smart City AI-Run Mind-Hiving Bio-Hacking Neuro and Always-On Surveillance & Punishment regime envisioned by the Great Resetters is already here (retaliatory hits for posting podcasts and articles and revealing these Mil/Intel/Homeland Security crimes have been aimed my way for years now), and has been for a while: it is up to every single viewer and reader to take action to bring these atrocities (intended for all) to an end.
Please be aware what I am reporting is the experience of countless others as well; in the 8 years of my reporting on this issue I have spoken, emailed and corresponded with hundreds of others, in USA and internationally, reporting very similar crimes. Those executing these crimes frequently indicate that they believe they are entitled and justified in harming others: just take a look at Amy Gutmann’s book title. (Amy Gutmann famously chaired Obama’s Whitewash Commission for Bioethics in 2011 where 600 American victims of extrajudicial targeting/military-Intelligence experimentation crimes showed up to testify, and later stated duplicitously on CNN that she had not found abuse in research experiments in the US–which over 40 of them who were permitted to speak, and 300 permitted to register, had clearly testified to.)
From where I sit, it appears clear that this system they have set in place they are wedded to, and they believe they can continue these crimes in secret forever: it’s only caring and awakened humanity who can come together to prove them wrong.
Aftermath: Yes, I was hit immediately afterward with microwave migraine hits and upper arm hits, heart hits, cyber hacking, and massive swarming and brighting this afternoon on a drive out with the kind of demented COINTELPRO driving intending to cause accidents–motorcycles and cars, pickups and sedans zooming past me and toward me on a usually unpeopled nature-reserve road (with one woman catching me mid-cross with my dog across the road, grinding her brakes to a screeching halt while we ran across–no qualms here in Quincy and Milton, Massachusetts obviously about Rule of Law, traffic awareness, or keeping the speed limit)–helicopter and small-plane harassment, focused hits on eyes and upper arms all evening, and, curiously enough, not one but three fire trucks pounding past and toward me in some kind of frantic signalling that all their dreams of assault-in-secrecy are on fire with my candor, probably. (EMS and Fire Station personnel work with Police, FBI, CIA, DHS to harass targets on roadways and neighborhoods, constantly–perhaps the Freemasonic component therein, but they are definitely involved; most I have interviewed and who have spoken with me about their targeting report Fire/EMS harassment.)
The alternative to engaging in candid Disclosure is of course Silence–and this is what these retaliatory hits are intended to convey, they are silencing, retaliation, and intimidation hits–but Silence never served anyone, and it’s not going to serve anyone today, as we see the entire panorama of human life as we knew it once being smashed by megalomanic billionaires today: We need to speak, and never stop speaking, to take their power away.
This video conversation is a Celestial Report production and is re-posted with permission at Bitchute. Please watch and share widely.
Report by Ville Hellberg | Posted by Ramola D | 31.05.2021
Note: This is a major report from a European policy analyst exposing the horrors of counter-terrorism and mass surveillance torture programs being run worldwide since 9/11 by US, Five-Eyes, Fifteen-Eyes, EU member nations under agreement with US intelligence and security agencies, self-labeled as surveillance and counter-terrorism, self-permissive of bio-hacking and neuro-hacking, using invasive anti-personnel Electronic Warfare neuroweaponry, self-permissive of “No-Touch Torture” and remote-access physical and neurological abuse, shrouded in secrecy and propaganda, deeply invasive of human privacy, and unleashing Stasi, Nazi, Mengele-style programs of atrocity, torture, physical, and psychological abuse in concentric circles of control on millions of innocent civilians, wrongfully labeled “suspects” and “terrorists” for purposes of competitive development worldwide of supercomputing AI, cybernetics, robotics, neuroprosthetics, Brain Nets, Mind Hives, Cerebral Internets, and brain-degrading Neuroweaponry all at the cost of massive human suffering and human lives, revealing a complete breakdown of ethics and consideration for human rights among governments, militaries, security, and Intelligence agencies, seen through the eyes of European policy analysis and human rights convictions examining US Foreign Policy just as much as state of the art Surveillance Technology and Neurotechnology.
While these programs of political persecution and hidden torture are the same ones American human rights campaigners and others worldwide have been discussing widely in articles and books (see Targeting is Real), this report is groundbreaking and unique in its close examination of the US “War on Terror” declared by George Bush in 2001, which has influenced US Foreign Policy and coerced European submission to a worldwide fixation on counter-terrorism and mass surveillance inducive of clampdowns and removals of civil rights and liberties, and destroyed the concepts, principles, and protections of democracy worldwide, including European concepts of human dignity and rights completely at odds with American imperialism. “Europeans do not wish to bring the War on Terror to European soil,” writes Ville Hellberg from Finland.
What few people know–thanks to mainstream media propaganda and long-term occlusion of human rights reportage with deprecating, discrediting cover, intended to obfuscate, of “Targeted Individuals” who have been reporting extreme torture and abuse now for over three decades–is that American counter-terrorism and surveillance programs and laws have gone well beyond the revelations of Edward Snowden and permitted egregious torture, abuse, and removal of rights on American soil, as reported by this writer and others to President Trump in 2017 and 2019:
What Ville Hellberg brings to this disclosure is keen insight into the structure of global security agreements, the excessive role played by US “War on Terror” foreign policy demands, the rise of new technologies permitting extreme invasion of human, bio and neuro privacy, the false legalizing of “sources and methods” of interrogation and investigation granted to Intelligence and Security agencies, and the crying need to address and end the silent suffering of thousands of innocent citizens, wrongfully targeted, blacklisted, ostracized, tortured, maimed, disfigured, continually abused, destroyed, and yes, also murdered–in a complete breakdown of recognition of human rights–worldwide. Many thanks to Ville Hellberg for this powerful and deeply thoughtful analysis and report, which is surely going to pave the path to positive change, going forward.
RENDITION FLIGHTS, ANYONE? INTER- AND CROSS-GOVERNMENTAL TORTURE PROGRAMS MANIFESTED UNDER THE NEW SURVEILLANCE AND COUNTER-TERRORISM LAWS WITHHOLD LEGAL PROTECTION, HUMAN RIGHTS, AND CONSTITUTIONAL RIGHTS FROM CIVILIANS, THEIR TARGETS
Ville Hellberg | May 31, 2021
WE ARE WITNESSING GLOBAL ELECTRONIC WARFARE BY SUPERPOWERS WHERE INDIVIDUALS, POPULATIONS, AND INFRASTRUCTURE ARE TARGETED. DUE TO THE WAR CIRCUMSTANCE, GOVERNMENTS HAVE PERMITTED THEMSELVES TO DIVERT FROM LAWS AND DEMOCRATIC PRINCIPLES.
”Torture is a horrific topic and most minds will turn away from it because it can’t be comprehended that humans can be motivated, or computer programs can be run to do this to other sentient beings. Just when we believed we were becoming more civilized as a culture, the technology for torture has advanced more than a hundred fold in recent decades.” – Robert Duncan, ‘Neuropsychological and electronic “no-touch torture”. The spectrum of “interrogation” and torture techniques used by the US and its allies’. 
Electronic Warfare (EW) anti-personnel applications such as DEW (directed energy weapons) and AW (acoustic weapons), as well as their distant cousins neuropsychological electronic (neurotech) applications RNM (remote neural monitoring)/RMI (remote mental imaging) /EEG (electroencephalogram), and the product of these, V2K (microwave hearing), among other techniques, are being directed to civilians globally. With the exception of capital-intensive neurotech applications or other mass operations, the tech can be operated by private sector agencies and corporates, whilst the operations are in general run by military and law enforcement agencies from multifunctional radar and antenna platforms globally. Even though the applications are used in connection with psychological operations, they have the fatal capacity and produce pain, suffering and psychological trauma, even fatalities in their targets; civilians. Thus, the utilisation supports the definition of torture. Under governments’ execution, the operations are run by the military whose clientele the national security, law enforcement, intelligence societies are. Whether the implementation and targeting of this technology on civilians constitute a war crime should be evaluated. The technology ’consumes’ the human body, especially the neurological system, as directed to its targets for over inhumanly prolonged periods. Other scientists say the neurotech mass surveillance AI applications should be considered as a WMD. It is imperative indeed to acknowledge that the vast increase in numbers of targeted civilians indicates a widespread attack on human rights.
Due to its stealth nature, the technology has attracted military budgets globally. Other governments have developed sophisticated global operations and are well advanced in the utilisation of this technology. However, due to the low cost of operations most governments have utilised their own version of the technology. This also involves increased non-consented human testing and yet another armament. Human testing on dissidents, activists and whistleblowers, even their descendants, seems common. Whilst the effects of resonance spectrum frequencies on the human body and nervous system were discovered to their full potential by the midst of the 1970s , it still needed an agenda and strategy for implementation. The new millennium has brought us “the War on Terror” in which counter-terrorism and mass surveillance laws introduced legal instruments to allow the use of “mass surveillance neurotechnology” under which the resonance technologies are operated. The use of anti-terrorism as an agenda is an unconstitutional plan of the Western coalition that has significantly strengthened sovereign national power at the expense of human rights and democratic systems through surveillance laws.
The new dynamics of global geopolitics have also impacted the global power balance and foreign and security policies. We may have to accept that there are several superpowers capable of globally utilising this technology against the citizens of other countries. International laws should regulate the imperialistic execution of these technologies by regime and purpose e.g. automatized targeting, target selection, technology and intergovernmental co-operation should be regulated and watched carefully. There are some parallel operations and agendas that further increase the number of targeted people and populations. When the operations are global it is likely the resonances are directed through OTHRs (over-the-horizon-radar) and satellites which in turn facilitates the discovery of the source radar. For the sake of clarity, it is sensible to acknowledge that cellular phones have a key role in locating targets and delivering biometrics. The MSM is full of cover articles when one government is caught using the technology and blaming the others. Recently, we have seen evidence of purposely leaked material in MSM regarding global Electronic Warfare, in attacks where resonance technologies have been used, such as the attacks to White House officials  and Cuban embassy staff  by assumed DEW microwave technologies. These operations have been leaked not only to inform the public and other governments of the ongoing global Electronic Warfare but also to blame the other governments. It is reasonable however, to recognise that these attacks really are lightweight samples of the use of the WMDs. People should be suspicious in view of the recent bushfires also. In other words, it is the infrastructure, populations and individuals that are being targeted in this global war and not discussed in the MSM. We are indeed viewing the evidence of a global war.
The technology is poorly understood by lawmakers, practioners and politicians it is presented by military and law enforcement lobbyist and therefore, become approved and utilised globally. Human rights activists are in search of political co-operation whereas the political or administrative powers will not touch the topic. There is a significant number of similarities in details of this “play” to the events of WWII where the messengers of the Holocaust had not been taken seriously either.
Brain invasive neurotechnology applications (RNM/RMI/EEG) are claimed to have been used in mass surveillance operations. The applications are commonly called “cybernetics” although finding common global terminology for the EW applications seems problematic. We suggest the use of military terminology since the technology is based on military design. Each technology presented in this paper should be defined as Electronic Warfare anti-personnel applications, including the mass surveillance neurotechnology applications.
The mass surveillance operations target civilians and their neural systems. The operation is automated and run by supercomputers through multifunctional radar or antenna systems which means robotic elements are involved. In the investigations of the neural systems of the targeted civilians, the cortex is being stimulated by a spectrum of electromagnetic pulses for years in order to clone the entire neural system. The methodology is called synthetic telepathy since it may investigate and implant thoughts and mind patterns into the targeted brains. The term “mind control” implies the domination of the conscious nervous system. The process is not painless, hence the term “no-touch torture”. A group of brains can be linked together as “brain network” which in turn assists supercomputers to develop a competitive advantage in the field of AI. In “neuropsychological electronic torture” painful stimulants help to cause a reaction in the targets’ cortex that is measured and biometrics collected. Synthetic telepathy refers to reading and replacing one’s thoughts with “synthetic thoughts” or even by another mind replacement. The recent development where mobile devices, phones, can be used to collect and introduce these emissions i.e., ICT and 5G networks are in use. Scientists have developed systems to take nanotech to the brains which then receive the resonances. It has been presented that the mass delivery of this nanotech would occur through public vaccinations. The nanotech operates using the body energy (piezoenergetics) or by energy delivered resonances. Thus, the resonances deliver both the energy and the informantion in form of commands. The delivery of these resonances can be arranged from any platform, even by mobile device emissions. The mass surveillance utilises satellites and OTHRs. This allows continued mass observations of the feelings, senses, thoughts, and actions of the target. The fact is that individual’s free will and degree of autonomy are hugely affected.
As a result of the recent breakthrough of technological development different forms of applications are being utilized in many areas in the society, such as police, customs office, border control, prosecutor, judicial system, and intelligence community but also in the private sector. The technology remains unregulated and lacks sufficient measures of supervision, monitoring, and control due to the covert nature of the operations. In Europe, the situation is being recognized  by lawmakers to a certain extent. Whilst the EU has been speculated to push through a reform  on the laws of AI mass surveillance to ban the use of AI for mass surveillance (from the private sector alone) and some other uses this has not been ratified. There has been a good progress made to impose further regulation on automated weapons systems  and interrogation methodologies . In addition, the consistency of surveillance laws is being evaluated in the EU by the ECHR . It seems lawmakers do not understand the technology since they only have the military introduction to it. In the absence of ethical aspects, international laws, regulation, and compassion, solidarity the torture-like execution continues to be conducted, hence the phenomenon of targeted individuals.
Too little is spoken in public about white-collar law enforcement and intelligence community operations’ military tactics that produce pain, suffering, and psychological problems to civilians. Resonance technologies are at the core of the Western intelligence community and law enforcement operations today, executed by the military among others. Yet it is unclear which government agencies and how many countries are abusing neurotech methodologies. The military technologies have been introduced to politicians under anti-terrorism agenda by a Western intelligence coup as surveillance methodologies with a major detail left ignored, that the technology causes significant pain, suffering, physical and psychological trauma, even fatalities. The technologies are also being widely misused in operations lacking supervision in an unregulated industry in the absence of ethical aspects.
Such tactics as DEW (directed energy weaponry; laser, maser, high power microwave and radio frequencies as well as particle beams), AW (acoustic weaponry), RNM (remote neural monitoring), reverse EEG (electroencephalogram), and V2K (microwave hearing) to mention a few are somewhat creatively executed from multifunction radars and a series of antennas and directed to their living targets from a diversity of platforms with satellite assistance. Despite the fact that these are military tactics, and a crucial part of Electronic Warfare anti-personnel operations, they are being directed towards civilians to cause pain and suffering when misused and therefore, must be considered as torture. Should that not constitute a war crime? In addition to a law (Finland: Rikoslaki luku 11 pykälä 9a) that defines torture as a crime, most of these nations have signed on the UN Convention on Torture.
”Anyone can be put into these programs. Justice and rule of law does not exist at the highest levels of government. Treaties are worthless because the #1 agreement in the rules of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead by example.”  This is the explanation of the “War on Terror”. It seems the police, prosecutor, in particular, border control, customs, judicial system, intelligence community and military operations are all in favor of this type of implementation, the citizens themselves being bypassed. Probably, the entire clientele favours this technology which allows direct participation in the activation of the targeted suspects’ sensors. This is the end of privacy as we know it, the film ‘Minority Report’ in steroids.
Coercive Measures and the Use of “No-Touch Torture”
In Finland, military intelligence confirmed on 06.05.2021  that some of their coercive measures are similar to the ones used in the local law enforcement. More interestingly, the article confirms that the district court (of Helsinki) regulates the use of coercive measures which in turn may be interpreted that the judicial system in Finland allows the use of military tactics that are sometimes referred to as “no-touch torture” (torture caused without visible connection to the targeted) to be used to target the Finnish citizens. In view of the fact that law treats any torture or intentionally caused pain as a crime (Rikoslaki Ch 11 §9a among the UN Convention against Torture) in Finland, the arrangement is somewhat disputable. Another trick to hold back the argument on war crime?
In Finland, the chiefs of military and law enforcement select the technologies used under coercive measures and self-supervise the utilisation of these. It is indeed wishful thinking that the lawmakers, law practitioners and politicians approving the use of the technologies would also understand them. Some targets have been targeted for decades even though the permitted period is supposed to be 6 months each time before renewal. The renewal process would not stand any closer evaluation. The law enforcement officers manufacture the evidence to present the suspect in a negative frame. There is no alternative explanation on why the same targets are under the execution for decades unless, they are the targets of military exercise. The former ptotocol is called target manufacturing. It surely seems the technologies have become a punitive instrument for the political and administrative cultures.
One acknowledged problem seems to be the new surveillance law that allows the use of resonance technologies together with counter-terrorism laws which in turn allows the removal of civil rights. Finnish Defence Forces (FDF) are investing in cyberwar in the future  and confirms that AI is involved in order to handle significant amounts of data. The terminology appear to cause problems with interpretation since the term “cyberwar” has been used in the media to cover resonance methodologies also. Bear in mind the ICT sector is a part of the mass surveillance structure and 5G infra based on resonance technologies. Since 10bn Euros is being invested in the new fighter jet fleet which in turn supports cybertechnologies by multifunctional radar systems it is clear the technology is in use. Kivinen, the Chief of Defence, states that in developing a cyber defence programme the Finnish Defence Forces co-operate with other members of the EU cyber defence projects . It was brought to the knowledge of Finnish Prime Minister Antti Rinne in 2019 that what mistakenly is called cyber weaponry instead of anti-personnel EW technologies were being used to target civilians and even children. Rinne publicly aimed a reminder to the Chief of Defence who in turn publicly mentioned the technology related to an international war exercise . As it has been brought to the discussion earlier the EU seems to have security policies that conflict with human rights and indeed, with the EU policies for human rights. Since the EU does not possess an organised military compartment or co-ordination for the common defence the EU member nations practice with who they will. Human rights are left under the observation of the military in this war exercise, a light operation if any.
Since the views of targets have not been heard in preparation of the surveillance and counter-terrorism laws in the EU, the understanding of the technology is based on military reviews. This is an excellent reason why targeted should be heard by lawmakers, law practitioners, and politicians instead of copying military methodologies from other societies supported by massive lobbying. If not legal risks, at least political and reputational risks will acknowledged by the Governments of the EU [17, 20, 26]. The use of these weapons should be regulated more aggressively and indeed, take into account that the same targeted civilians, shockingly, remain the targets of international war exercises for years, as long as their physiology can withstand for the attacks of the energy weapons.
The Intelligence Ombudsman in Finland supervises the legality of civil and military intelligence and the realisation of basic and human rights in intelligence activities (The Act on the Oversight of Intelligence Gathering entered into force in February 2019) states the website of the Intelligence Ombudsman. The Ombudsman has produced recently (05.05.2021) a second opinion on the operations of military intelligence and intelligent services in Finland according to which he approves the operations. The Intelligence Ombudsman is aware of the use of the technologies brought to discussion in this report in Finland. He has been presented with 26 accounts of personal reports of targeted civilians on Finnish soil. These technologies have been used on the targeted well before the surveillance law came into force. An independent external review is suggested on the surveillance laws in the EU as there is no consistency among them. Similarly, the coercive measures used and the principles on what basis they are being used on civilians in the EU [20, 23, 26] should be put under review.
The Rights of the Targeted
”Governments may mistake their citizens as enemies in the same way that an immune system may lose its ability to distinguish between the body’s own cells and pathogens. ” 
The above is a very polite articulation of the fact that human targets are required to develop military technologies. The targets are approved through a judicial system that operates law approved by politicians and lawmakers. By practice, we know that most of the targeted individuals are manufactured targets and presented in a frame that has very little to do with reality in order to allow the use of counter-terrorism and mass surveillance laws.
“If an intelligence law is not well-conceived and rational, it could easily become a formidable weapon of repression. An intelligence law should not only protect citizens against terrorism, but also against the State… There is a total absence of control in this law.” M Trevidic 
The EU security strategy has been impacted by the Western agenda for anti-terrorism and allows such resonance technologies to be utilised under the law enforcement and intelligence operations of its member countries against the earlier knowledge of the topic (art. 30 Resolution on the Environment, Security and Foreign Policy from January 28, 1999, Nr.A4-005/99) to civilians. No human rights, no rights of the accused nor legal protection is respected in the process to which civilians are exposed. Constitutional rights are removed by these counter-terrorism acts. The counter-terrorism laws and mass surveillance laws both are used against democracy and human rights. The suspects do not have rights nor legal protection against coercive measures. In fact, the suspects have been stripped of their rights during the implementation of this protocol. The accused supposedly have rights (ignored), the rights of the accused, however, only a very few ever are being accused. The unconditional nature of implementation indicates it is not about seeking the truth under district court approval but the aim is to degrade the individual. It takes time for civilian targets to recognise their life is over as they used to know it. Dramatically enough no instance informs targets of their amended status in society. Even members of families with small children are placed under the torture scheme in which situation everyone is affected physically and psychologically (an acknowledgement based on empirical observation).
“As Lord Hoffmann noted in a concurring opinion in A Secretary of State for the Home Department, ”The real threat . . . comes not from terrorism but from [practices] such as these.”” referring to the impact of counter-terroristic measures in the society.
”Why torture? The CIA claims it works. The assumption is that it works to gain actionable intelligence. Torture is often used for revenge, punishment, interrogation, and behavior modification. In other terms torture is used to remove the continuity of thought to confuse the target to reveal information, erase brain patterns such as values and beliefs, or to break down the human spirit to make them submit and obey their handlers.” 
– Robert Duncan – “Neuropsychological and electronic “no-touch torture”. The spectrum of “interrogation” and torture techniques used by the US and its allies”
Neuropsychological and electronic “no-touch torture” [7, 9] is used as the spectrum of “interrogation” and torture techniques by the US and its allies says Robert Duncan, a former CIA analyst and engineer, who has been developing such methodologies as a CIA, DoD engineer. Robert has an opinion the neurotech mass surveillance technology is indeed a WMD.
”The intelligence agents can also use low level microwaves to cause mental and physical confusion that leads to illness. Beaming microwaves at victims makes them fatigued, damages their immune system, causes neurological damage that affects their thinking and ability to carry out tasks, induces premature aging, cancer, and cataracts. ” T Rifat. 
The mass surveillance neurotechnological weaponry causes a spectrum of effects depending on the computer program, the technology chosen, and the team running the execution. It may be sensible to make a note that we are indeed talking about piezoelectric mechanisms  (NB. Figure 15. Piezoelectric energy harvesting from the human body) within the human body (biochemical balance within the body e.g. various proteins electrically reacting towards each other). Antioxidants alleviate the potential risks of EMF exposures . The following effects are reported among others : Synthetic telepathy (reading and broadcasting of thoughts), microwave hearing, forced visions some synched with body motion, forced memory blanking, controlled dreams, forced waking visions, artificial tinnitus, wildly racing heart at rest, forced muscle quaking, the sensation of tapping, intense general pain or hot-needles-pushed-deep-into-flesh sensations, sensations of electrical shocks, burning sensations, intense pain in a larger area of body e.g. face or chest (technical capability to amend the spread of the beam as well as the spectrum), special attention to the genital area; itching, forced orgasms, intense pain, forced thoughts and feelings and sleep deprivation (sleep being constantly disturbed with the above).
In Finland, a survey of a population of nearly 100 victims of Electronic Warfare anti-personnel applications was taken in 2020-21. The research involved questionnaires and interviews and produced very consistent information on the symptoms and observations of the victims. Reported health damages and symptoms appeared to be far more serious than what was expected. There also seems to be an apparent division of symptoms and observations by different executions of DEW and neuropsychological resonances. The findings of this research will be published in another context; however, it can be noted here that the following psychological disorders or physical symptoms were reported among others: Memory lapse, PTSD, long-term stress, panic attack, state of fear, severe depression, suicidal thoughts, paranoia, schizophrenia, anxiety, lack of concentration, ADHD, sleep deprivation, desire for sex /food etc, cardiac arrhythmia, headache, hearing voices, sensation of disturbance in cognitive processes, orgasms, erections, sensation of pressure in brains, pain in eyes, chest pain, difficulty to breathe, stomack pain, digestive problems, temporary paralysis, pain in genitals, twitches, sudden increase in blood pressure, brain fog, neurological symptoms, strokes, tinnitus, sensations of burns, temporary feelings of blood clots and numbness anywhere in the body, cosmetic injuries such as burnt skin and physical and psychological exhaustion among other. The targets reported that their head, heart or genital area was attacked the most. In addition, some Electronic Warfare anti-animal attacks have been conducted to their pets and anti-material attacks were reported in which mobile devices or computers were either used remotely or entirely damaged their hard discs. In connection to preparing this documentation many methods were conducted to potentially prevent the submission of this material. Many targeted people have reportedly been targets of an attempted murder also. The dilemma here is that potential injury cannot be connected to the resonance technologies. Another argument being used by the supporters of the neuropsychological technologies is that whenever there is pain, no injury has necessarily taken place. The definition of torture is based on the concept of experiencing pain. Therefore, whether the pain is physically caused or ‘only’ the idea of pain being delivered to the brains, the pain is still being experienced.
The long-term effects are not well published expept for long-term sleep deprivation which is a major catalyst to changes in the human body causing, for instance, high blood sugar and other signs of exceptions leading to long-term diseases. The radiation may impose a threat on internal organs, especially the liver and heart. An exposure to radiation in the long-term is very likely to cause heart diseases such as cardiac muscle inflammation which in turn may cause the failure of the heart muscle. Exhaustion seems to be one of the common symptoms that also was shown in the results of the Finnish research.
If anyone was to argue that the aforementioned symptoms were based on civil applications, such as the 5G or electricity grid, they are not entirely wrong. The ICT (information communications technology) infrastructure is being utilised within these operations; together with electricity, radar, and satellite technologies they create a strong electromagnetic field that enables the surveillance and introduction of “brainwaves” and what not. It is however, the effect of the radar that amplifies within the strong electromagnetic field and causes the symptoms by signals delivered via satellites and ICT network. Due to the nature of the scientific research, the findings are kept secret and the health concerns remain unpublished to cover the economic model within the industry. The business model is a cash cow and supports also related industries and business models. The symptoms reported in the Finnish research are consistent, the experiences are similar and indicate a clear correlation of the presence of strong electromagnetic fields. Such an electromagnetic field requires radar or antenna series for targeting. Also the observations on the use of OTHR (over-the-horizon-radar) and satellite delivery correlate with the symptoms. The impacts of long-lasting combined microwave exposure on the human body may not have been adequately investigated and approved by the medical scientific society. It seems it is the currently targeted population which produces this critical empirical knowledge since the biometrics are available for reading at all times. The Military/ Intelligence/ Private sector execution seems more interested in the development of their projects, in the development of AI and in spying on civilian targets as well as the profits produced, than in the health and wellbeing of the targeted people. The cortex is being stimulated by overlapping applications and new “products” are constantly being developed. By now the audience should acknowledge that the radar technology eanbles 360-degree imaging of the target.
”Neurological research found the brain to have specific frequencies for each voluntary movement called preparatory sets. By firing at your chest with a microwave beam containing the ELF signals given off by the heart, this organ can be put into a chaotic state, the so-called heart attack.” – T. Rifat 
The aforementioned effects reconcile well with the methods of interrogation and behavior modification illustrated by R Duncan in his report on torture  where Duncan introduces 18 tactics of torture that can be implemented via physical or “no-touch torture”. ”Coercing and torturing people to suicide is very common. Both tactics in physical or no-touch torture involves plausible deniability.”
The Target Selection
The problem is persistent since there is a vastly growing number of operations that aim to benefit neuro-invasive technologies. There are private AI developers in the sector and many of them are known for entirely another type of consumer products. As a result of long-running operations their resources have developed a pattern of excellence and now are looking to gain a technological advantage in neuroscience and supercomputing. Some corporations or countries may own satellites which in turn allow a significant access to the field of research. These companies consider their employees as a resource by clauses in their contract of employment that allow the use of “brain data” in form of any inventions made by the employees.
A significant amount of States are utilizing the technology and having a “brainrace” causing perhaps overlapping execution on international individuals since there are also a number of individual government agencies whose operations may be run from their independent facilities. This explains the vast increase in the headcount of targeted individuals. The law enforcement body involving the prosecution and judicial system is becoming dependent on the technology which is likely used during trials and pre-trial examinations already.
The resonance methodologies have their roots in military technologies. Recently, the security sector and law enforcement agencies have owned the technology and the defense industry has developed new applications . Also, international white-collar organizations such as the NSA under the national Foreign Ministries’ military wing, the DSA, execute the operations . The technology is operated by the military using multifunctional radar signal intelligence for law enforcement and intelligence community (DSA) white-collar agencies acting as their ”clientele”. NSA officers can globally flag any individual and set them up under the execution without hearing the person. The justice systems and law enforcement agencies are used actively to get hold of the citizen to manufacture them a target . The targeted are not informed of their amended status as a suspect which in turn prevents the target to kick-start legal action. Supervising instances are claiming to use legal protection and reminder of remedies the society may offer. It is difficult to get a message across that no tricks are left, no authority takes responsibility. Taking the matter into the court which has just approved the use of the methodologies sounds illogical. Usually, terrorism, national threat, or serious crime are being used as the excuse to approve the use of the technologies under the coercive measures . In doing so, it seems the EU acting as an ally also is unaware it backs the implementation of the anti-democratic measure that ignores citizens’ human rights, the international rights of the accused, and leaves the targets without legal protection and due process. No questions being asked from the individual themselves.
Since the manufacturing of the targets seems relatively careless and no oversight committee or set of regulations or auditable institution is monitoring how targets are being selected, the protocol may be used for an extension of personal and political, even economical interests. Picking and setting up random targets, no legal groundings necessary. Certainly, dissidents, activists, or whistleblowers are not there by accident. Random people, people who have been in the wrong place at the wrong time are selected to reach the critical mass, the amount of targets to allow for technological breakthrough. The execution does not seem to have a deadline. Anyone could become the future’s target; the extrajudicial implementation does not recognize social statuses, unless social scoring is involved. The targeted people will experience their life being demolished in all areas, holistically, and therefore, their profile is on the downhill. The execution of such a program requires inter-and cross-governmental implementation, hence the “international torture program”. The targeting is inhumane, unjust, unreasoned, and unaccountable .
It may well be that the private sector acts as the developer of the product and runs the experiment whereas the governments are backing the research and delivering the resources, the brains in the execution of neurological mass surveillance.
The Human Rights Issues
”Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it. No-touch torture is much more complex than physical torture. Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary to test on innocent targets.” 
The usage of resonance technologies is observed to be at times politically orientated, or not adequately justified, and is always questionable, strongly subjugating human rights or constitutional rights let alone moral aspects. This is because i) the technology produces a spectrum of pain in the target (and injuries of which some fatal), ii) sleep deprivation in long term preventing full participation in society, iii) the technology is being directed towards civilians (against the Geneva Convention), iv) the technology is being utilized without the permission or consent of the targeted person (against the Nuremberg Treaty), v) the operations lean on self-supervision and monitoring to the extent the human rights aspects are not being considered appropriately (no measures on corruption), vi) the technology is being directed to people inhumanly while asleep and vii) towards bystanders (especially children while also asleep disturbing their sleep and causing them pain), viii) the technology is being directed to homes of the targeted citizens (against constitutional rights for privacy, domestic peace, etc), ix) the period the technologies are being implemented to targets is matter-of-factly inhuman, reportedly from less than a decade up to 30 years (in which time most of the targets are forced outside of their societies and health, social structure, career, and families have all been destroyed), x) the technology may cause fatal injuries that are impossible to trace back to the usage of this technology and xi) torture, definition, of which the use of this methodology fulfills, hardly is an argumentative solution. Finally, xii) targets do not possess constitutional rights, nor legal protection from the practitioner or executor of this torture on them since it is with significant likelihood the local or other government. In addition, xiii) law enforcement and healthcare have been instructed to deny the matter. Local regulators, political power, legislators, and courts approving the use are not understanding and aware of these aspects due to the fact that the military traditionally has been the only institution with this knowledge. Yet this technology has lobbied its way into our societies. The substantial list of shortcomings above leads us to conclude the technologies have not been adequately investigated. The lawmakers, practioners, politicians have only listened to the military and law enforcement arguments as the marketer of these technologies .
Under the anti-terrorism agenda, the constitution and human rights can be occluded, it seems, by the declaration of War on Terror which yet allows derogation of the civil rights on a temporary basis only . When a civilian is targeted by goverment and presented as a terrorist they can be exposed, it seems, to methods of interrogation (e.g. coercive measures neurotech mass surveillance). This derogation should be however a temporary measure. How is it explained that some individuals have been targeted for a decade and more? Indeed, the neurotech mass surveillance is a “no-touch torture” protocol that causes long periods of serious pain, suffering, and even fatalities. By now we should agree that the execution is conducted as a counter-terrorism measure.
“The European Convention on Human Rights requires that a member state availing itself of the derogation clause inform the Secretary-General of the Council of Europe of the measures the state has taken and the reasons for them.” 
“Although the idea of temporality is not expressed in the derogation provisions of the ICCPR or the European Human Rights Convention, it has been understood to have been implied by the notion of emergency. According to the U.N. Human Rights Committee, article four of the ICCPR requires that “measures derogating from the provisions of the Covenant . . . be of an exceptional and temporary nature.“ and ““Derogations from human rights obligations are permitted in order to deal with emergencies. They are intended to be temporary.’” Thus, the suspension of ordinary processes must end when the emergency that required the suspension ceases to exist.“ The targeted under counter-terrorism law could argue that the temporary state has been maintained for purpose since no evidence of terrorism has been found for those accused. In a case where implementation has taken 10 years, the government should be prosecuted for inefficiency in dealing with the matter and thus, violating human rights. This is hardly a temporary measure in the aspect of human life.
Currently, there are no specific laws protecting humans or animals, neither any medical support for them, during cybernetic torture. “The situation is created by the fact that scientists do not leave any information about the illegal mind reading technologies.” How should “we protect people that by utilitarian grounds, without informed consent, are used for brain studies with brain-computer-interfaces in Cyber Psychological Systems, illegal stealing of brain data” ?
In view of the above intellectual rights are important but the human rights violations probably the core of concern. It seems governments have agreed with a single-minded informal agreement that they have the right to remove legal protections from the citizens. They have interpreted that in certain circumstances (that have been artificially created by themselves) they have the right to degrade the human rights, constitutional rights and strip the citizens of legal protection. The torture and inhumane, unjust, unreasoned, and unaccountable targeting  may lead to significant compensation requests from the victims for the use of WMD mass surveillance protocols once they become organized. The UN should support this idea. The periods under execution seem to be unlimited which demonstrates the enslaving nature of the implementation.
There is simply no privacy at all when the privacy of thoughts, feelings, senses, and life overall is demolished. The targets’ households are trespassed physically and technologically, and subjected to domestic disturbance from outside by the resonances (some evidence on this will be published in connection with the field examination). No government is capable of replacing what has been taken away from these people. The terror in their life has been unspeakable. What about the immaterial rights such as the stolen brain data?
“Article 1 of the Charter of Fundamental Rights of the EU (2000) states that “Human dignity is inviolable. It must be respected and protected”.”
The Psychic Driving/System Programming
States have used the same tactics for centuries to put away activists and dissidents who do not buy into the explanations of the power elite and publicly challenge the administration. The targeted people are many times activists, whistleblowers, or dissidents in addition to random people. During the execution of the “no-touch torture program ”, targeted individuals are being treated as mentally ill by the government. The police and healthcare, who are the emergency services, the first point of contacts, have been programmed to handle these patients with a certain presumption. The programming, or inadequate education/ omission of the education, is a part of the design of the torture program . States have a national manual of diseases where identical symptoms the targeted experience have been added indicating alleged neurosis / mental illnesses that correlate with medication designed to worsen the condition of the targeted and strengthening the impact of the resonance. Doctors do find themselves in a helpless position with neurotechnology victims since the illnesses could be induced into the patient . Linking specific medicines with microbiological structured molecules a desired impact can be delivered on the purposed area of the brain. Also, nanotechnologies can be used to deliver nanotechnological engineering into the brains . These are used in combination with EMF resonances to activate certain viruses, bacteria, even cells, synapses to deliver their function. Dr. J. Giordano also specifies neurotoxins that can be used to gain a certain effect. This technology can force the human brain to think certain thoughts, feel certain emotions, and can theoretically override motor control functions. This knowledge must have been obtained by investigating human bio-effects and experiences.
”By specialising on the pulse frequency you could induce psychiatric ilnesses to the point where a psychatrist could not tell if it is a genuine psychiatric illness or an induced psychiatric illness.” – Barry Trower – Microwave Warfare.
”The body is an electromagnetic chemical reaction. Yes, chemicals like drugs can help the body and be used as countermeasures to electromagnetically induced problems. Drugs can be used to affect the body’s electrical-chemical processes.” – R. Duncan, How to Tame a Demon – A Short Practical Guide to Organized Imtimidation Stalking, Electronic Torture, and Mind Control
Many States maintain laws under which the patients can be forced to receive medication and mental help when deemed necessary (by labels of neurosis, imminent threat of violence, self-harm, etc). Due to the inter-and cross-governmental nature of the implementation, the treatment is being coordinated from a co-ordinative structure above the staff treating the patient. The entire process can be evaluated by the supervisory co-ordinative team and depending on the content that the patient discloses as well as his/her behavior the team makes the decision on the most practical plan for him/her. Medication can be used to assist neurotechnological implementation. In some societies, implantable devices are injected into the targeted civilians to assist the chemical balance or observation of the biometrics. These military developed devices are not painless either whilst nowadays merely replaced by nanotechnological materials that may be only inconveniencing to digestion.
The biological and socio-psychological aspects of the targeted’s lives are heavily influenced. Many are pushed outside of their societies and the social networks that are crucial for well-being. A target that intends to disclose the program may experience imminent measures of discrediting or a form of punitive measures that strips social status from the target. Informal reporting and social scoring by the administration is impacted immediately which also derogates the rights of the targeted. They become outlawed. The accused have rights, the rights of the accused but the suspects do not have any. The term “suspect” refers to the removal of civil rights and being made a target. They are profiled internationally and presented as a terrorist, serious criminal, or national threat. The torture that has many faces and sides may go on for decades, in which time the target has lost his social status, fellows, health, financial sustainability, earning model, and credibility.
When the target intends to approach separate parts of the administration to deliver information on potential consipiracy and illegal government activity it is imperative the target has a well argumented, well-written and comprehensible statement to deliver intended content since their profile will be attacked severely by those in the administration who lobby on behalf of the implementation of mass surveillance. Measures will also be taken to prevent any electronic submissions or hard copies delivery to authorities. The informal nature of the execution and coercive measures ensure that the targeted cannot defend themselves against implementation that does not officially exist.
Indeed, an annulment is a common practice. It has become visible and reported that some implementations of systematic programming of discrimination are directed towards the same bloodline or family over the generations. Genetic information hardly provides us a decent explanation for this type of execution.
There are governments with a significant number of totalitarian attributes that have disguised themselves as a democracy. It goes without saying the social sector of administration supports the governmental agenda and is in a position to set up any individual with a variety of methods. Similarly, the judicial system that not only regulates the use of coercive measures but also operates a governmental agenda as the steering mechanism in relation to these individuals. A target cannot possibly receive objective and equal treatment in court. The judicial system reflects the will of the Government.
The method by which the CIA and intelligence community control masses and MSM is to publish fiction that involves similar elements that are involved in the news they want to deny or shut down. They create stories and mix them with the original report (in this case my analysis) and because the topic is complicated the masses are unable to separate the two, only a marginal audience understands what is going on.
There are countless tactics to discredit individual revelations made in media. A common tactic is to descredit the author/content of a revelation that is harmful to government. Another trick is to confuse the original message to an imaginary content that has similar elements. Perhaps involving aliens or conspiracy models that ridicule or make fun of the actual revelation.
Controlling the public is a game of capturing the opinion of masses by using MSM (main stream media). Governments are participating in the information war (between governments) and propaganda (inside the nation) either by direct or indirect ownership of the media. “Regulation, legislation, physical attacks, and threats against journalists or media owners are effective methods used to capture the media. But funding is arguably the most effective method of all. By financing media and journalists willing to toe the government line and by not funding independent, critical media, authorities manage to suppress large parts of the media sector.” [10, 36]”
Resonance methodologies are at the core of Electronic Warfare (EW) operations. DEW, AW, RNM/RMI/EEG, and V2K are tactics being used on targets under anti-personnel execution. DEW and AW are purposed to cause physical injuries whereas the neurotechnological applications used under AI mass surveillance programs such as NRM/RMI/EEG cause psychological effects and pain. RNM Remote Neural Monitoring is used along with the EEG for cloning the neurostructures of the target. A heterodyne is a signal frequency that is generated by combining or mixing two other frequencies using a signal processing technique called heterodyning. Heterodyning is utilised to shift one frequency range into another, new frequency range, and is also involved in the processes of modulation and demodulation. Heterodyning and technology based on TMS (Transcranial Magnetic Stimulation) can be used for the synthetic telepathy. Neurotechnological implementation can be fatal in multiple ways it can drive the targeted to suicidal thoughts but it also has physical health effects that may weaken the body and immune system of the targeted in the long term fatally. V2K can also be produced in a multiple ways but one of the most sophisticated ones is as an AI computer software, developed to learn, which can communicate with the target in real-time and read their memory, thoughts and is able to manipulate targets psychologically and emotionally . The V2K can be used for behavior modification when the technology is based on a psychiatric medical technology called Neurofeedback – EEG Biofeedback. The software acts as an alternative roadmap for the brain (an AI software accesses brain waves emitted by the brain ie ELF waves) by harvesting brainwaves when the brain reacts negatively and the cloning this type of brain wave (ELF waves). V2K technology can be used to clone or mime different medical pathologies, including psychiatric ones. This is why many targets are diagnosed with Schizophrenia or other mental illness. When the use of mobile device emissions is introduced to affect a targeted brain we are in uncontrolable territory.
The operational implementation does not differ. The resonances are delivered from multifunctional radars (active electronically scanned array [AESA]) or antennas on any platform, also by using satellite targeting. Similar radar antennas are used in fighter jets. Networks similar to GWEN (Ground Wave Emergency Network) can be used to create EMPs. In DEW implementation the effect is based on transmitted high amplified energy pulses that cause pain or injuries, even fatalities. Physical obstacles may be overcome by maser technology. In the neurotechnological implementation, the impact is based on heterodyne which combines by intermodulation (two alternating signals, eg radio signals) to produce two or more signals having frequencies corresponding to the sum and the difference of the original frequencies that cause pain or the wanted effect in the target. Depending on the purpose there are custom-designed handheld platforms to be used inside buildings also. An electromagnetic field is created around the target to read the target’s biometrics and run them in a computer simulation in real-time that aims to clone and link the targeted brains. The computer program executes a chosen torture method for interrogation and behavior modification and to the targeted, the execution naturally appears entirely ruthless and cruel. This means the entire process is being automated [7, 9]. Also entire thought patterns, feelings, and images can be induced to the target . The concern in view of the future is whether the transmitting technology will be integrated with our handheld ICT technology and its infrastructure. The handheld mobile devices may already emit resonances below 100Hz that are closely linked to our biology.
DEW (directed energy weapons) can be broadly defined as systems that produce “a beam of concentrated electromagnetic energy or atomic or subatomic particles” which is used as a direct means to incapacitate, injure or kill people, or to incapacitate, degrade, damage or destroy objects . Execution by microwaves, lasers, masers and particles.
AW (acoustic weapons) Acoustic weapons aim to use the propagation of sound – a variation in pressure that travels through a fluid medium (such as air) to affect a target. Most of the acoustic weapons that have been speculated upon are based on either ultrasound (above 20 kilohertz, kHz),
low frequencies (below 100 hertz, Hz) or infrasound (below 20 Hz) deployed at high levels. The human range of hearing is commonly given as between 20 Hz and 20 kHz. In reality, the upper hearing-threshold frequency decreases significantly with age, whereas sounds with lower frequencies can be heard and otherwise perceived if the level is high enough.
We should not forget the ionosphere radar or over the horizon radar (“OTHR”) of which the most famous is the HAARP (The High-Frequency Active Auroral Research Program) which is capable of producing a very high amount of energy in beams and wanted resonance to exact locations at any time. Other nations have revealed their concern with regard to this. HAARP is located in Gakona, Alaska, and was developed by DARPA (Defense Advanced Research Projects Agency). Another OTHR is EISCAT in Longyearbyen, Norway which was originally designed by France, Germany, and the three Nordic countries (Norway, Sweden, and Finland). The Targets in Finland have seen evidence of weather modification as well as traces in the clouds as a marker of the use of OTHR and satellite co-ordination beaming. In view of the European Parliament Resolution on the Environment, Security and Foreign Policy from January 28, 1999, Nr.A4-005/99 art 30 states “Calls in particular for an international convention for a global ban on all research and development, whether military or civilian, which seeks to apply knowledge of the chemical, electrical, sound vibration or other functioning of the human brain to the development of weapons which might enable any form of manipulation of human beings, including a ban on any actual or possible deployment of such systems.” Is it a coincidence that the commonly operated facility has been set into a country that locates in Europe but is not a member of the EU?
When delivering resonances that imitate body functions a satellite becomes a very operative assistance and used seamlessly with the execution of OTHR. Especially for these radar systems, living human targets are a necessity to develop the operating systems, their accuracy, amount of energy directed, and before anything the psychological impact on the individual. A spontaneous EKG can potentially discover the operation whereas a planned scrutiny for healthcheck results in a pause in the execution of the beaming.
The entire multilayer strategy of implementation involves remote execution with satellites and OTHR, local operation by field operatives with a gangstalking element from ordinary local people hired from social media, as well as the utilisation of the ICT infrastructure via mobile devices and the mobile antenna infrastructure. The latter is controlled by software applications that are run within the network. A huge step forward in synthetic telepathy has been the introduction of nanotechnology which has greatly assisted the transportation of AI technology to human brains but also facilitated the access to brains from AI frameworks [34, 35].
“You’re either with us or against us in the fight against terror.”
– George W Bush on 6.11.2001
It is breathtaking how few politicians have understood the larger picture. The anti-terrorism movement by states is an agenda that allows the rights of citizens to be removed for the greater “good of the State” and therefore, a very unconstitutional movement. The strategy, however, was at first implemented by the Western coalition ’Five-Eyes’ to hijack the foreign and security policies of targeted nations, including the allies in the EU. The Western coalition finger-pointed allies saying there is a terroristic activity spotted within the population of the EU countries defining who is a terrorist and what is a terroristic act. Something the European leaders should quickly accomplish is figure out whether they have been treated as allies or subservients by Western Five Eyes coalition manufacturing targets and addressing to the EU member nations that they have citizens with terroristic tendencies (naturally artificial and false accusations) which in turn may be used to force the foreign and security policy of the EU member nations to remove reputational risk and potential risk of conflict. We quote a journalist from RT Neil Clark’s article on 25 Feb, 2021: ”The ‘War on Terror’ was based on a fundamental deceit. It was a deep state/neocon con trick. Not only was it a war that could never be won, it was never meant to be won. It was meant to be permanent.” Indeed, the idea of the anti-terrorism agenda is the declaration of war on those who beg to differ by opinion. There should be only one interpretation of the world events and no exception to the “Western” one is tolerated. The bully-tempered narrow-mindedness quite often leads to a point where sensible analysis is not conducted. There is no need to disagree to juxtapose.
The agenda is an imperialistic tool to force governments to operate similar foreign policies and line up with the West. To make the EU a participant in the War on Terror and bring the conflict onto the European soil. Originally terrorism has been an inconvenience of those nations practicing imperialistic and clumsy foreign policies intervening in the internal politics of other nations. Now, the EU is taking moral responsibility for this against better understanding.
We do not need conflict in the EU and our younger generations should be psychologically free of this type of liability.
There are several pillars to this operation. Strategies are linked to the technological advantage of the Western technology. Signing up as a user a nation agrees with certain conditions and integrates the operations. This happens for the sake of maintenance alone. For instance, for fighter jet fleets, which carry multifunctional radars, their maintenance and updating require a common technological strategy. States which purchase fighter jet fleets will be committed to one strategy due to the maintenance and development of the system. It is a deep integration of defense strategies.
Terrorism, serious crime, a national threat is used as the rationale to justify the manufacturing of the targets to European allies. Must say the manufacturing of the consent has been a bit careless not to forget the implementation. The Western military-intelligence complex coup has won the intelligence communities over by their advanced technology. An average American taxpayer supports the military industry to the extent that equals the cost of free healthcare. By creating suspects in each nation the Western coalition has been enabled to a) force the State to take care of the terrorism and b) offer the Government technology to be used in connection with this which in turn means more dollars for the military complex. Manufacturing targets is a trillion-dollar plan since their resources can be linked to develop AI. “The more brains you have collected in your pool the better AI you will be able to develop”.
Terrorism is indeed a very gloomy and poisonous projection to deliver to our next generation which has already been psychologically affected by the speech of terrorism constantly present in the MSM. We may not be able to estimate the damage caused but we could do something to stop building horrible scenarios. It is indeed recommended that this bellicose agenda is abandoned since the rest of the world, especially our new generation, do not wish to live under such a narrow-minded scenario. A return to international democracy is recommended.
What will the Governments do next to defend their position? It is apparent that so far some of the terroristic attacks in Western societies have been provoked if not financially and operationally supported by Western intelligence itself. We would not expect to see this level of governmental radicalism anymore. The strategy of governments will be to temporarily rate higher the threat of terrorism so that any criticism would not question their undertakings. The Western governments will put the curriculum vitae of their funded researchers (eg Magnus Ranstorp) against those who have been forced to independently investigate the field. This is to the benefit of the researchers since they strengthen their position and ego in supporting the idea of War on Terror. They market the war on behalf of terrorism. It is better to have war to cover the agenda than admit the imperialistic effort to control global population. This is a fight between David and Goliath and the Goliath owns the MSM (mainstream media). Also. the MSM is turned selectively towards other areas of interest.
War on Terror? Not exactly. The methodologies used to harness innocent individuals for something so evil as WMD targeting them are a crime against humanity. We must re-think the role of Western surveillance within society not alone the supervision and monitoring aspects. The execution appears as Robert Duncan (CIA officer and engineer) illustrates: ’It was a clever tactic used by the Germans in WWII to take people away slowly so no revolt occurred. As one CIA agent says, “The Nazis didn’t lose the war they just had to move.” It is not about the Jews now. It is something much more complex and evil’. One should hope the Covid-19 pandemic is not an agenda to enhance governmental control over individuals . Oh no, it is not. There is a chance that it is indeed a part of the very same operation to deliver access to brains of the population.
A senior officer J. Karsikas responsible for digitalisation in the Finnish Defence Forces states that considering super powers it is unlikely they would commit themselves in any regulation and ratify any international agreements in the development of AI . This is due to the fact that AI technologies may constitute the next strategic advantage.
What is the most disappointing aspect of the Electronic Warfare between superpowers, in which populations and individuals are constantly targeted by military technologies is that for these living targets who have become the instruments of global war, no government seems to have a social sector strategy? No civil defence strategy. Societies have created multimillion Euro plans to cover the infrastructure, but the civilian targets are left to die, not being overly dramatic. A meritocratic society is programmed to think there is something seriously wrong with these individuals which leads to isolation of the targeted individuals. That is as intimidating as is the implementation of WMDs. The lack of will to improve the lives and circumstances of the victims speaks thousands of words.
“Wanton killing of innocent civilians is terrorism, not a war against terrorism.” – Noam Chomsky
Electronic Warfare (EW) anti-personnel resonance-based applications that cause pain, suffering, even fatalities are being directed to civilians globally by means of energy- and psychological effects. The governments responsible for the implementation, under which the execution is operated, are utilizing at diversity of military platforms to conduct these operations based on the resonance spectrum. The “Torture Program” is based on the idea of using pain and suffering as a stimulant, an instrument of interrogation to cause a reaction in the targets. The operation is to intentionally cause pain and suffering in its targets for a prolonged period of time. Scientists are in opinion the technological implementation should be reviewed as a weapon of mass destruction. It is a technical legal aspect of international laws of human rights whether the operation should be viewed as a war crime. Execution of a technology that causes pain and suffering, even fatalities, in innocent civilians and bystanders, even children, is now left to supercomputers to run? We are seeing the evidencing of a phenomenon that reminds me in detail of the human experiments during the WWII conducted by Nazis. Even the public demonstrates similar ignorance and prejudice. It seems this psychological cycle repeats itself in human history when a part of the society comes to think of itself as “too invincible”. A result of meritocracy. It is imperative to acknowledge the vast increase in numbers of targeted civilians indicates a widespread attack on human rights.
The resonance spectrum-based technology that now abuses human targets had been developed to its full potential in the midst of the 1970s. The knowledge was kept tight in the military instead of considering civil applications. The War on Terror offered a suitable basis for an imperialistic global agenda and strategy of implementation. The mass surveillance neurotechnology is operated under the agenda of the Western coalition to force new order among states. Anti-terrorism as an agenda is an unconstitutional plan of the Western coalition not only to strengthen sovereign state power at the expense of human rights and democratic systems through surveillance and counter-terrorism laws but also to hijack the foreign and security policies of other nations. War naturally speeds military spending. And speaking of an entirely new niche of technologies the War on Terror is a blessing to the defense industries. The concept of war has been creatively introduced to legally eclipse human rights and democratic decision-making. The erosion of the Constitution is significant.
As for private citizens in terms of pain and suffering caused also their rights have been removed under the counter-terrorism and mass surveillance acts. Suspects do not have the rights of the accused since they will never be accused instead, they have been stripped of their civil rights complete families affected at once. Measures that were purposed as an exceptional and temporary tool to deal with emergencies are now used on an unlimited basis under surveillance laws. It is clear the aforementioned laws are abused to target innocent people. A significant majority of the targeted are not brought to courts of justice and officially accused due to the fact that they are not guilty. These people and their human rights are degraded once abandoned under technology-driven human experiments that remove entirely their privacy and domestic peace. The fact is that individuals’ free will and degree of autonomy are hugely affected. It is the question of a plan with multilayer agenda. It seems that the counter-terrorism and mass surveillance laws are used to manufacture candidates for the human experiment. The selection protocol is inhumane, unjust, unreasoned, and unaccountable. What a convenient tool for governments to root out and yet benefit from the physical existence of political opponents, whistleblowers, activists, or dissidents. At the same time, a significant element of opponents to the political power is being created.
The execution was based on the idea that the targeted would not organize themselves and see through the plan. Now the life cycle of this agenda is different. It is indeed imperative to increase public awareness on the ongoing torture to impact on the life cycle. No totalitarian method can tolerate public awareness as European history points out.
The War on Terror has been successfully used as an extension of the imperialistic foreign policy of foreign nations to destabilize the peace in Europe and the seed of war has been implanted in the soil of the EU. We European citizens do not approve of the War or Terror on European soil. Citizens do find it difficult to believe that European leaders who were supposed to look after the civil rights and peace in Europe are taking a role in such an imperialistic agenda. We expect the EU to be built upon the idea of democracy that guarantees equal rights to everyone. It has been a result of ignorance, shortsightedness, and poor judgment that this sort of plan has gone past our due diligence processes impacting greatly on the future beliefs of young generations who are at the core of well being of any nation.
Making Torture legal is a very questionable agenda. We suggest an urgent review of surveillance laws as well as counter-terrorism laws. The laws have now been used as a punitive measure allowing unequal and inhumane treatment and abuse of civilians by the governments and an underpinning of sovereign state power. The laws have become a formidable weapon of repression. An intelligence law should not only protect citizens against terrorism but also against the State. The modern holocaust has revealed significant weaknesses in our societies. Lawmakers, law practitioners, and politicians, even human rights activists poorly understand the technologies being approved for use on citizens for a prolonged period of time. The role and the strategies of intelligence function in societies European wide should be revisited and some consistency introduced. Military and intelligence functions in eroded society are meant to represent a marginal mechanism, but not the role of the decision-maker. It seems there is a psychological cycle in the collective consciousness of humanity, the need to repeat the pattern of pain and suffering. Perhaps the revised agenda could take a sustainable look to raise the standards of performance we all need to evidence and take part in for the mental growth of the human society. We would choose “trust” among people instead of synthetic telepathy that indeed demonstrates the opposite.
The new generation is experiencing the world as a threatful place today. Continuous airtime on news of terrorism by MSM creates psychological expectations that will last decades. The citizen’s belief in the future is constantly heavily impacted. There are so many areas in society that require improvement that the civilization hardly has time to handle them if crises similar to the War on Terror are intentionally created. I think there might be confusion on where the civilization is going from here. It seems politicians are lost on their way. It is known that beliefs in the future is directly correlated with the well-being and prosperity of national economies. Should the beliefs be a little more positive than they are? One should think the War on Terror hardly is an agenda for a nation looking for well-being to follow. Europeans do not wish to bring the War on Terror to European soil. Therefore, the message for the politicians goes accordingly in terms of foreign and security policies.
The EU should develop its independent defense, especially in terms of technologies, to reduce its dependence on NATO and the Western military-intelligence complex. Therefore the military spending and exercises internally should be coordinated. The EU should seriously review its relation to Western allies, to determine whether the role of European allies is viewed as subservient. The abuse of intelligence operations and aggression in foreign politics that do not respect sovereign EU member nation decision-making as well as the dynamics of ongoing confrontation among powers have taken so many years.
It is apparent the EU has chosen a homeland security strategy that confronts its human rights agenda. Mass surveillance and counter-terrorism laws should be reviewed from the European perspective alone and not as an ally to someone with an imperialistic agenda. The security strategy and following surveillance laws are a result of a poor understanding of Electronic Warfare and its technologies. It would be to the benefit of European democracy to drop the ignorance and bring to the table the representatives of the targeted so that all aspects are indeed understood.
SOME SUGGESTED ELEMENTS FOR A PLAN TO MAKE PROGRESS:
What should be done to prevent the abuse of innocent victims:
1. Increasing awareness of the public of the cybernetic abuse and means of Electronic Warfare being tested on civilians is at the core of tackling the crime against humanity.
2. Breaking the ignorance. It is imperative that the viewpoint and experiences of the targeted must not be ignored or bypassed since understanding the perspective of victims allows for democratic decision making. The victims should be permitted to offer consultation and expertise, the perspective of the targeted to law- and decision-makers for the creation of appropriate EU legislation to protect civil citizens from covert cybernetic crimes and other Electronic Warfare applications.
3. Organisation of the resources. In order to defend the civil rights of the targeted and support the targeted, a global organization should be created which would set up a representation globally for human rights and could enhance “best practices for the establishment of clear ethical boundaries to strictly regulate the use of cyber systems enabling the manipulation and control of human beings” .
To be clear, a), no torture should be tolerated, and both torture and “no-touch torture” protocols should NOT be allowed as an interrogation tactic even though “neuro-surveillance” for purposes of safeguarding national security may be intended; b), Surveillance permission- granting process should be adequately and closely monitored. Mass surveillance of innocent citizens should not be allowed; c) The intel gathered in any possible surveillance method should not be misused and only used in the form it has been approved by court. We may need to allow surveillance but no method of neuro-surveillance or bio-surveillance should use targeted pain or pain at all as a catalyst. Also, the surveillance, of whatever kind, should be limited to a 6-month period with renewal permissions significantly tightened to say only 15% of the applications for renewals, firmly overseen, and with detailed, documented reports delineating reasons for applied renewals, which can be audited, overseen, and withdrawn at any time; d) Human rights auditors from outside Intelligence and Security agencies need to be involved in the continuous monitoring and auditing process, to prevent abuse and torture of targets, as we have now; e) No covered experimentation using pain and torture techniques as “sources and methods” of gathering information, as for instance, the US intelligence community , and other intelligence agencies and militaries are currently doing, under classified cover, to prevent scrutiny of their torture for neural network mapping and neuro behavior modification. What should be allowed instead are strict protocols, regulation, and monitoring of the intelligence community in place as well as surveillance laws that are consistent globally, and the intelligence community held responsible for potential misconduct.
Global consistence in surveillance laws, country-specific regulations, supervision, and monitoring as well as civil channels for reporting potential misconduct is a good start. What is the problem in the US as K Shipp and W Binney [10, 11] indicate, is that the intelligence community may not observe the law, i.e., there is a constitutional conflict since secrecy and classification are currently being used to classify and conceal extreme crime against humanity and actual torture and assassination of human beings.
The message to the governments is to support democracy and avoid planting foreign agendas against democracy to the European audiences. The concern relates to the younger generation which have been entirely forgotten with the anti-terrorism . There is no excuse for bullying civilians and taxpayers since it seems that the EU has increasingly plans for common taxation. No threat exists on this planet that justifies harming and torturing civilians.No collective rationale would speak for the torture without the consent and permission for the implementation. What has been done to civilians on the watch of governments is unforgivable.It is apparent that the administrations involved, have had a need to identify from a worst-case scenario, even though they could afford to see democracy and citizens as a positive reserve and potential, not as a threat.
The targeted individuals are put through a spectrum of social, medical, legal, financial and professional discrimination in their societies. Since the victims or their relatives do not receive the redress, reparation, and rehabilitation they are entitled to under international law (A/73/207) there are some important measures the UN could take to reduce that ’accountability gap’ and to improve the position of the targeted civilians. Perhaps one of the most important measures is to implement pressure on the local governments by holding them responsible to 1) investigate the reported torture and other cruel, inhuman, or degrading treatment or punishment by the law enforcement. Currently, the police systematically ignores the reports of these crimes and in an unprofessional manner suggest mental health problems for those reporting their findings to the police. Also, healthcare should be put responsible to 2) guarantee access to healthcare to receive the redress, reparation, and rehabilitation of victims. 3) Compensations on the targeted civilians should be paid to ensure they are able to return to normal life. The first step, however, would be to request the governments to recognise the issue of targeted individuals. The governments should be requested to prepare a statement in view of this matter. These people should be made to once more become socially accepted and full members of the societies. There should be a program available for the rehabilitation of these individuals where consultation and support would be available for each of them. When a government fails to implement basic standards of living for these individuals, they should be submitted a candidate for the Universal Periodic Review protocol (UPR) for the following decade to follow up their progress. The UPR mechanism should be started by each government to reach a common view and statement on the recognition of the issue. The status of each government should be reported annually and compared to the quality of issues and the number of reports received from targeted individuals. Reputational risk should be made obvious to steer some of the governments. Where no progress had been visible the governments could be made legally responsible for the violation of civil rights in the Court of Human Rights globally and the targets should be entitled to compensations. Indeed, a creation of political, legal, financial, and reputational risks to balance the enthusiasm to participate in the aggressive military resonance programs would be advisable.
(1) TARGETING PEOPLE – ARTICLE36.ORG – Key issues in the regulation of autonomous weapons systems, Convention on Conventional Weapons (CCW) Geneva, November 2019
(2) ACOUSTIC WEAPONS – ARTICLE36.ORG – Discussion paper for the Convention on Certain Conventional Weapons (CCW) Geneva, November 2018
(3) DIRECTED ENERGY WEAPONS – ARTICLE36.ORG – Discussion paper for the Convention on Certain Conventional Weapons (CCW) Geneva, November 2017
(4) TARGETED USE OF DEW MILITARY TECHNOLOGY APPLICATIONS (THAT CAUSE FATAL OR SERIOUS INJURIES AS WELL AS SERIOUS PAIN AND SUFFERING FOR INHUMANLY EXTENSIVE PERIODS OF TIME) TO CIVILIANS IN FINLAND – OHCHR SUBMISSION 08.2020 – V. Hellberg
(5) INTERNATIONAL TORTURE PROGRAM MANIFESTED UNDER ANTI-TERRORISM LAWS WITHHOLDS LEGAL PROTECTION AND CONSTITUTIONAL RIGHTS FROM ITS
TARGETS? – TECHNOLOGY TESTED ON CIVILIANS 09.2020 – V. Hellberg
(6) Barry Trower – Microwave Warfare
(7) Robert Duncan – Neuropsychological and electronic “no-touch torture”. The spectrum of ‘interrogation” and torture techniques used by the US and its allies
(8) The Verge – The EU is considering a ban on AI for mass surveillance and social credit scores
(35) An Implantable Wireless Network of Distributed Microscale Sensors for Neural Applications: Jihun Lee; Ethan Mok; Jiannan Huang; Lingxiao Cui; Ah-Hyoung Lee; Vincent Leung; Patrick Mercier; Steven Shellhammer; Lawrence Larson; Peter Asbeck; Ramesh Rao; Yoon-Kyu – 2019 9th International IEEE/EMBS Conference on Neural Engineering (NER)
(36) Control the money, control the media: How government uses funding to keep media in line – Marius Dragomir, Center for Media, Data and Society (CMDS), School of Public Policy, Central European University
CORRESPONDENCE TO THE EU COMMISSION
The UN Convention against torture was signed by nations, many of them only partially, on 10.12.1984. Since that time the world has changed significantly in terms of torture. What the EU intends to do with common legislation on torture? A very timely matter.
What the EU Commission intends to do by the fact that the EU strategy for homeland security is in conflict with its policies for human rights?
The coercive measures of law enforcement of western countries are based on resonance methodologies such as electronic warfare anti-personnel technologies DEW, AW, RNM, EEG, V2K, etc. The usage of this technology at times politically orientated, or the usage is not adequately justified, and is questionable, strongly mitigating human rights or constitutional rights let alone moral aspects. This is because i) the technology produces a spectrum of pain in the target (and injuries of which some fatal), ii) sleep deprivation in long term preventing full participation to the society, iii) the technology is being directed towards civilians (Genova Convention), iv) the technology is being utilized without the permit or consent of the targeted person (Nurnberg Treaty), v) the operations lean on self-supervision and monitoring to the extent the human rights aspects are not being considered appropriately (no measures on corruption), vi) the technology is being directed to people inhumanly while asleep and vii) towards bystanders (especially children while also asleep disturbing their sleep and causing them pain), viii) the technology is being directed to homes of the targeted citizens (constitutional rights for privacy, domestic peace, etc), ix) the period the technologies are being implemented to targets is matter-of-factly inhuman, reportedly from decade up to 30 years (in which time most of the targets are forced outside of their societies and health, social structure, career, and families have been destroyed), x) the technology may cause fatal injuries that are impossible to trace back to the usage of this technology and xi) torture, which by definition the use of this methodology fulfills, hardly is an argumentable solution. Finally, xii) targets do not possess constitutional rights, nor legal protection from practitioner since it is with the significant likelihood the local or other government. In addition, xiii) law enforcement and healthcare have been instructed to deny the matter. Local regulators, political power, legislators, and courts approving the use are not aware of these aspects due to the fact that the military traditionally has been the only instance with this knowledge. The intelligence community has gained an imbalanced position with this tech and now abuses it in each member country. Also, justice system is becoming addicted to this tech. W Binney quite correctly points out concern about democracy, human rights, constitution, and legal protection of our citizens in the following: https://www.youtube.com/watch?v=xF_VYNtDgN8&t=441s
What the EU intends to do in view of human rights in Europe?
Most of the member nations do not have legislation on torture, they rely on the UN convention from 1984. For instance, in the case of Finland, this convention is only partially recognized (article 21 paragraph 1 and 22 paragraph 1).
The security strategy strongly relies on technologies of which use conflicts with human rights and the EU policy for HR. These have a significant impact on 1) democracies, 2) corrosion on constitutional rights and 3) confidence in the future which in turn defines the development of wellbeing in any nation. The security strategy supports electronic warfare (EW) anti-personnel resonance methodologies. These are being proposed as a surveillance tech by the intelligence community and defense forces who do not reveal these technologies have the capacity to cause pain, suffering, and fatalities (Resolution on the Environment, Security and Foreign Policy from January 28, 1999, Nr.A4-005/99) and the capacity is in heavy use and not supervised, controlled properly. The national supervision and control mechanisms are not sufficient. The massive and growing audience of TI (targeted individuals) is a remarkable sign of this issue.
The technology is being supported by the western agenda for anti-terrorism and benefits the defense industry. Why would the EU cast this type of future for itself? There is an interesting phenomenon ongoing in western societies. The intelligence community has been allowed to step up and guide societies. A function that has been purposed to a marginal mechanism within the society now manufactures the consent.
The resonance technology provides the intelligence community and defense function a role during the time of peace that conflicts with the idea of democracy. These instances appear to paint pictures of horror to advance their agenda under national security, threats and crisis constantly to argue stronger participation within the society. A good example of this is the agenda of anti-terrorism that defines the form of society today. We lay an artificial threat to our younger generation. The confidence for the future of the new generation is being tested with the current threats created by geopolitical agendas and the birth rate has sunken significantly in many societies. Why would a society inflict upon itself such a curse?
Does the EU understand that by buying the idea of the threat of terrorism it accepts the idea of the ‘war on terror’ and casts it to Europe? We must remember that terrorism has been defined by the ’west’ and the recent issue may be seen as a result of heavy-handed foreign policy, poor diplomacy of nations from past decades that refer to themselves as the empire. By accepting the idea of the war on terrorism we accept the war is in Europe. As citizens of the EU we are looking for a less gloomy picture for the future and rather would identify from positive models of the future. The human mind operates from the level it identifies. We should do better than this.
How does the EU intend to do to control surveillance activities in the EU?
There is a lack of consistency in surveillance laws among the EU nations. When a surveillance law of a member nation prevents e.g. use of RNM/RMI (remote neuromonitoring/remote mind imaging) towards its citizen the intelligence community turns to the nation where the use of the technologies is allowed. The intelligence community serves each other thus the rights of a citizen or legal protection does not hold anymore. The ruling is awaited that prevents where forbidden technology in one country is being used from another to target civilians. The EU would benefit from resonance-free zones. Social media: Reading an individual’s social media communication private of nature the intelligence community from Finland may turn to Swedish intelligence who is a member of ’nine eyes’ and has access to XkeyScore.
The US intelligence services have become desirable among the European intelligence community due to the technological advantage but also by US anti-constitutional approach their strategy to enhance the sovereign rights by the cost of civilians. A part of the imperialistic agenda is to create security concerns that overrule any rights of citizens and also underpin the position of intelligence communities in democracy. The US has won the European intelligence community on their side by integrating the individual intelligence services by technology that also defines the strategy for the user. In the anti-terrorism agenda, the US hijacks security and foreign policies by defining who is a terrorist and what is a terroristic act. Since a nation identifies from the frame it is given why provide the EU with a gloomy pic? Mass surveillance laws to consider seriously the aspect from resonance technologies, AI, robotics, neuroscience (https://lbry.tv/@RamolaDReports:8/Invasive-Neurotech-True-Neuroethics—Panel-2:e). Fighter jet fleets use EMP to target citizens without their permit or concent torturing civilians with multifunctional radars and manipulating their biometrics.
In Finland, the constitution was amended to provide intelligence service power and tools to operate. The community is asking for more eg allowing trespassing. An analysis was completed from the perspective of resonance technologies why this should not be allowed. Civilians are targeted by military tech to their homes, bystanders, even babies, and children intentionally produced pain, suffering, and even fatal injuries. The big picture indicates absolutely no reason other than the paranoia and profile rise effort by the intelligence service why such powerful tools should be allowed. No legal protection for targets to rely on, constitutional rights, or human rights not respected. The international rights of the accused are being orbited by presenting the target as a suspect. The targets are manufactured to test the ultimate control over an individual. Trust is gone. Testing periods are inhumane.
How are the EU law enforcement agencies regulated, monitored? How does the EU inland security strategy recognize the fact that resonance-based mass surveillance systems (RNM, EEG, RMI) are being targeted to civilians? How common is the knowledge that these cause pain, suffering, psychological trauma even fatal injuries in their targets, bystanders, civilians, even babies, and children? Is it known the execution is careless? How are the individuals chosen for these ’torture programs’? What principles are being met to prevent politically-minded targeting? How does the EU recognize the rights of suspects since there are no rights similar to the rights of the accused? How are the periods of targeting regulated? A large number of govt agencies, also from foreign communities, have access to these programs. Torturing is illegal by law in most EU nations and against human rights, constitutional rights. No legal protection for citizens exists against this crime against humanity. Operations are run by the national military agencies thus, can be defined as a war crime. How the EU intends to root out the problem of torture by state agencies and private sector partners foreign intelligence community? A good memory of the operation ’rendition flights’, that had no legal ground, of which distant cousin this operation is. What the EU intends to do to improve the approach of national law enforcement and healthcare systems to the targets of resonance technologies (government-directed mass surveillance protocol that cause pain and psychological trauma) that clearly degrade their rights? How is the legal protection of these citizens improved? Are these people still degraded and treated as mentally ill in front of police or healthcare? What an uncivilized, backward, and inhumane approach. How is the idea of democracy with this implementation?
Having made myself familiar with the SOCTA 2021 report among other reports it seems the Europol does not make a note of such a problem at all albeit the headcount of targeted civilians is piling up. Pretending such a problem does not exist? The global market reports as well as the manufacturers’ technological guides, scientific articles, etc confirm electronic warfare anti-personnel technology is based on military multifunctional radars and signal tech soon to be operated from ICT framework and indeed, operated by the military. An issue of a war crime? Are we really doing this? Pretending that there is no problem and allowing the extrajudicial purge similar to the holocaust ongo at the EU watch? Even though human rights, the constitutional rights are severely and violently attacked there is no word on the phenomenon of targeted civilians? Individuals, someones’ children, are targeted without consequence, perhaps overlapping. Targets do not have rights, no legal protection. Since the technology in question is operated as an extension of political decision-making as a punitive instrument. We will never know who is going to be the next target. No status will bring a shield in the future.
Is that due to fact that it is the law enforcement and intelligence community in the EU who are targeting civilians with military equipment electromagnetic pulses that cause pain, suffering, and fatal injuries as well as psychological trauma? We have a serious concern since the EU’s strategy for homeland security conflicts with the strategy for human rights.
As Finnish citizens, we experience it difficult to reach information from officials in Finland on our rights and therefore we approach the Commission for this matter.
In 1995 Joseph Biden introduced a bill called the Omnibus Counterterrorism Act of 1995. It previewed the 2001 Patriot Act by 1) allowing secret evidence to be used in prosecutions, 2) expanding the Foreign Intelligence Act and wiretap laws, 3) creating a new federal crime of ’terrorism’ that could be invoked based on political beliefs, permitting the US military to the used in civilian law enforcement, and allowing permanent detection of non-US citizens without judicial review.
The Center for National Security Studies commented the bill would erode ’constitutional and statutory due process protections’ and would ’authorise the Justice Dept to pick and choose crimes to investigate and prosecute based on political beliefs and associations’.
We share the concerns addressed and would urge to review the rights of the accused and suspects of serious crime or terrorism in Finland. It seems the rights of the accused have been degraded and the legal protection of suspects has been eroded similar to their constitutional rights. Coercive measures such as neurotech applications (RNM/RMI) cause pain, suffering, likely fatalities are being misused and directed to homes of investigated for long periods of time.
Who overviews the methodologies of coercive measures? Who supervises the technology is being used correctly? How is the ethical aspect present when technology is being chosen? There is no adequate control.
To what extent it is permitted in the EU (Finland) to benefit materials in a prosecution that a) has been obtained by coercive measures b) that is classified (the accused has no chance to verify the material nor defend themselves against it)?
To what extent are neurotech applications being used in courts? To what extent the technology steers the decision-making of judges? It seems the accused has the role of the bystander in their trial.
The permission-granting process is not controlled properly. To what extent the evidence to open a secret investigation is being verified and examined by the district court of Helsinki? How political or personal interests of investigation are prevented? Coercive measures are used to manufacture state will. The state interest as an investigator is to make the suspect appear guilty or question their integrity, crecitability, and the suspect does not have the position to defend themselves in the process. To convict a terrorist suspect of a felony of any kind reduces the impact of miscalculation or political ambition by the state. There is evidence of implantable devices injected into the bodies of citizens without their permit producing agony and pain. The current correct practice of investigation is not so much to seek the truth that it is to degrade an individual.
JUDICAL SYSTEM AND DEMOCRACY IN FINLAND
The rights of the accused are not self-evident today. In practice, the burden of proof is often shifted to the accused. The accused is granted a chance to make himself heard albeit this rule is being broadly violated. A significant moral dilemma exists also in the access of the accused to counsel. Whilst compensated in quality it is allowed at a good rate in the national courts. Whereas trial above the national judicial system, at the time when legal process often becomes the case of state integrity, no assistance is granted anymore. This remarkably reduces the number of processes reaching the ECtHR and limits the possibility of discovery of potential malpractice of the national judicial system. White collars should follow ethical practices which highlight fairness and equality. The relation of the police and prosecutor seems to put the values to the test(pre-trial). Instead of justice, the national court appears to deliver the ’will of the State in relation to the accused’.
The counter-terrorism laws are used against democracy. Suspects do not have rights nor legal protection against coercive measures. The accused have rights, the rights of the accused. Very few are ever being accused.
Coercive measures are being abused with the assistance of the court and target suspects for an inhumanly long period of time with investigation methodologies that cause pain, suffering, and even fatalities to the targets or family members, even babies. During this time the suspect does not have proper legal protection, even constitutional rights are removed by the execution.
Neuropsychological and remote electronic ’no-touch torture’ applications used under coercive measures compromise heavily human rights and are thought of as WMD by its engineers. Since there is no adequate fair inspection in place suspects are abused during investigations likely for wrong reasons. Counter-measures are being used to manufacture trials directed against the suspect by State or individuals advised to do so. This tactic guarantees further investigation permitted. The accused should never be found guilty on the basis of evidence that has not been brought to light and examined by the accused. The evidence is not presented to the accused to ward coercive measures.
There have been several serious incidents that indicate deep structured corruption of critical infrastructure of Govt institutions under the monitoring of the Parliament. Inadequate supervision has become a significant problem. The role of the political power as the inspector raises many questions of which the least important is not ’whether Finland should have its Constitutional court?’. Although ’professional judges must have a higher university degree in law’ it does not prevent corruption especially since the judicial system is ’independent’. A mature member of society understands, by human nature this is impossible. The judicial system does not seem to convince the citizens anymore.
What mechanisms the EU has to evaluate the level of democracy in member nations? Democracies to be re-evaluated.
How does the EU regulate, overview or monitor the preparation of counter-terrorism and surveillance laws by member states? How is the consistency of the laws being monitored between the nations? How do civil rights and legal protection survive in these circumstances?
By observation, globally ‘the war on terror’ seems to underpin the sovereign power at the expense of civil rights. We have a constant dilemma on how the ‘act of terror’ is being defined and how it has been communicated to the citizen. Similarly, we do have a problem by definition with what may trigger the need for surveillance over an individual. A matter of interpretation is not good enough? In practice, some crimes or anti-social behavior now turn into an ‘act of terror’ by definition or interpretation? Citizens may not even understand their commitment to an act of terror or being a part of a society of which status is turned to be suspected of terroristic activity by the administration. Grey lines everywhere. It seems politicians have created an extrajudicial tool to ensure sovereign access to ultimate power over the citizen. Why the ultimate control?
How are the surveillance technologies and methods overviewed? How are the periods of surveillance regulated by law and human rights? There has been a vast increase of reports coercive measures are indeed producing pain, suffering, and even fatal injuries. The suspects are receiving rough treatment over prolonged periods of time but never accused.
“Although the idea of temporality is not expressed in the derogation provisions of the ICCPR or the European Human Rights Convention, it has been understood to have been implied by the notion of emergency. According to the U.N. Human Rights Committee, article four of the ICCPR requires that “measures derogating from the provisions of the Covenant . . . be of an exceptional and temporary nature”” – “Informal” Suspencion of Normal Processes: The “WAR ON TERROR” as an Autoimmunity Crisis by A. ADDIS, Boston University Law Review.
How is this informality being monitored? How is it supervised no coercive measure or interrogation method consist of an element of torture, cause pain or suffering in the targeted? By observation, most of the suspects will never be accused. Is it possible that being a target of coercive measures is a worse option than imprisonment? How are the rights and legal protection of suspects ensured? We have still countries where even the rights of the accused materialize poorly.
Every question addressed here points to a system error. The ultimate cost is borne by the citizen. We have totalitarian states disguised as democracies. It is the culture of execution and power balance, the relationship between the citizen and the administration. We must measure these things to correct them.
The supervision of the Finnish police relies on internal self-supervision. Recently, there have been a number of court cases questioning the integrity of the entire National Bureau of Investigation. How does the sole internal monitoring compare among the European peer group? By observation of the public reports, news, and personal experience there is a need for a European authority for investigation of police practices to improve and support the moral standards. An external unit, in particular.
The police would not investigate reports of electronic warfare attacks targeting citizens. This has been addressed to the National Police Commissioner Seppo Kolehmainen. No response has been received. Whether this is rather a matter of national security, the activity may continue uninterrupted and the targeted civilians suffer pain, psychological illnesses, even fatalities. On many occasions, the police have reportedly annulled and questioned the mental health of citizens who have requested an investigation on their constant concern. There are reports some individuals have been taken to mental institutions or mental evaluation by force while others proposed to visit their therapist or doctor suggesting an issue with mental health. Kolehmainen has been addressed. No response has been received. Police do not possess the capability to assess the mental health of an individual. What sort of guidance has been given to police in view of this vastly growing issue?How the citizen reporting DEW and resonance attacks should be minded according to police, whether the practice is indeed consistent with this?
The emergency services in Finland are operated by Emergency Response Centres managed by the Ministry of the Interior in cooperation with the Ministry of Social Affairs and Health ie the police and healthcare functions. We would like to understand what sort of guidance there is given to the police and healthcare in terms of individuals who suffer the symptoms of electromagnetic attacks?
The permission granting process for police’s coercive measures by the District Court of Helsinki, in particular, requires monitoring. Since the judges do not know the individuals whose surveillance is on the table the decisions are made on an application basis. How is this process monitored externally? How many times an extension on an existing permission can be granted? How is it controlled the coercive measures are not being used for business, political or personal interests? How is the resilience of individual police officers and the judges, in particular, is being monitored in terms of corruption?
The Finnish police maintain formal and informal databases of citizens, involving profiles of them. This information is not available to the citizen by data access request. Is informal reporting used in cross-governmental communication?
Reports exist the NBI maintains a form of co-operation with the equivalent of Russia. Is this co-operation is indeed approved and formal?
(2) The Limited Effects Technology (LET) Program Report | JPSG, OOTW/LE Programs, 1996
Unremarked in mainstream media, deliberately hidden from wider readership, there have been a series of declassified document FOIA-releases over the past few years which astonishingly reveal many facets of the now-known covert use of electronic-weapon and neurotechnology surveillance, experimentation, weapons-tests, and operations on the American public by various agencies and departments of the US Government and their contractors.
Similarity with Covert Global High-Tech Policing Operations: Similar operations have been unleashed worldwide, as reported extensively at this site and others online earlier. Some documentation in the public domain testifies to this global program, and will be reported more fully here shortly. For now, please see this Twitter thread, which discloses NATO High-Tech Non Lethal Weapon/Neuro Policing operations in Europe and discusses also how Non-Lethal Weapons Testing & Neuro Surveillance have been unleashed inside the USA:
Thread on Non-Lethal DEW Operations in USA, Europe, world, with references to US, NATO documents, articles
This series aims to address the public disclosures in recent FOIA releases of ongoing US Government use of Electronic Weapons and Neurotechnologies on Americans.
“Electronic Weapon” herein refers to the spectrum weapons used in Electronic Warfare as defined by the Department of Defense (DOD) in documents, particularly relates to anti-personnel weapons, includes all labeled as non-lethal-weapon, less-than-lethal weapon, psychotronic weapon, neuroweapon, next generation and emerging technologies, and includes RFID (Radio Frequency IDentification) and BCI (Brain Computer Interface) tech.
(2) The Limited Effects Technology (LET) Program Report | JPSG, OOTW/LE Programs, 1996
This FOIA request was made in January 2018 and asked DOD for “Copies of all research reports, annual reports, and indices of the Joint Program Steering Group (JPSG) as established by the 1994 MOU between the Department of Justice and Department of Defense, dating from 1994 to the present.”
The purpose of this article is to report on the structure, disclosure, and highlights of this JPSG LET Program Report, and offer insight into its content with an eye to more fully informing the American public what the implications and ramifications are regarding the use ofanti-personnel military weaponry by domestic law enforcement and military branches on the American public, which is what this JPSG LET Program Report is premised on.
Notable About This Foia-Request Response
DARPA chose to return one single document, after a 1.5 year delay, on this multi-document request for documents dating back (from 2018, time of request) to 24 years.(This should not be found acceptable to the American public—other reports obviously exist and are being withheld; DARPA should be queried again.)
This document is dated 1996; no recent reports were released by DARPA; no notice of the ending of these JPSG joint DOD-DOJ programs has been given in this May 2019 response.
This document is not redacted and is released in full, which implies that the disclosure of technology and policy in this document is acceptable now to DARPA; this is in line with the slow release of information on Non Lethal Weapons, Electronic Warfare, and Neuroweaponry the DOD has made online and in print—via notice of programs, weapons, conferences, articles, and recorded lectures in public-domain documents and sites online–in recent years. However it also implies the JPSG (a DOD-DOJ entity) chooses currently to reveal what’s in this document as applicable to Law Enforcement—which could be a way of corralling tacit public consent to Law Enforcement use by thus publishing notice of this insidious and pernicious weaponry.
It is essential therefore for Media, human and civil rights groups to take note now of the disclosure here and ask further questions, examine implications for all, and delve deeper into what is really at stake with this “Limited Effects Technology Program.”
Basic Structure of This Limited-Effects Technology Report
This 9-page report with the JPSG Defense-Justice logo on the cover and naming David Fields as the Program Manager is divided into the following sections:
The Limited Effects Technology Program
Electric Stun Projectile
Laser Surveillance and Dazzler System
Handheld Laser Dazzler
The Section Titled “Background”
Notable from the information in this section titled “Background” is the following:
This Limited Effects Technology Program is acknowledged to be a JPSG program resulting from the MOU from 1994, reported earlier.
The need for such a joint program merging the efforts of Defense and Justice in developing technology applicable to both is being rationalized and legitimized by recourse to stated historical reference of common “need” as technology requirements for both “converge.” This is assertion which is neither specific, transparent, nor explicatory. It is presumption which seeks to hide the fact that what is being discussed here, as the immediate technological lead-up to the 1994 DOD-DOJ MOU, discussed here, demonstrates, are Remote Human Access-and-Control Neuro/Bio Weapons—Non Lethal Weapons and Neurotechnologies (to some extent revealed in “Program Thrusts”), which are arguably highly invasive of bodily and brain privacy, integrity, health, and safety.
Examples given of operations sharing this need are “the (Defense) provision of humanitarian assistance, peacekeeping, countering the flow of drugs into the United States, counterterrorism, etc.–and (Justice) law enforcement forces engaged in LE operations.” We are expected to agree that military operations, even “peacekeeping” (which should not be considered a military activity in the first place: weapons cannot “peacekeep,” they subjugate) share a common need for “limited effects” tech i.e., silent Human Access Weapons—which, it should be noted, are not being named as such here. This notion of “need” is presumption, and emblematic of coercion of consent.
The Need to Limit Force or apply only a “minimum amount of force” as primary principle of action is posited here—again without corroboration from real-life where war casualties and police violence abound—as a severe constraint to military and police ability to function. The solution to this false claim (false because it does not seem to be a real-life principle by which either police or military adheres) then funnels down to Non Lethals or Limited-Effects weapons, which are being characterized as force-limiting weapons within a claimed hierarchy of severity which completely ignores the unethical, human-rights-violating aspects of bio-hacking and neuro-hacking weapons,which is what they are (as will be seen shortly). More accurately, this section should be headed The Need to Be Seen to Limit Force, with Public-Image-Boosting Non-Visible Weapons.
Common Threats posit militarized drug-smugglers and terroristswith access to military and LE Tech, which in real-life is made possible (as we understand now from much investigative and whistleblowing reportage including from journalist Gary Webb, LAPD investigator and government whistleblower Michael Ruppert and others) by gun-running, drug-running, and open arms sales by government, military, CIA, mafia, and private-sector alike, which makes this a circular argument: Military and LE fuel the arms/police weapons industry which creates these weapons, as well as tools such as electro-optic imaging devices to aid night vision goggles and Electronic Weapon countermeasures. This circular view also promises endless escalation via blackmarket sales of new weapons. “The criminals have our guns so we need new guns” could go on forever.
Common Missions which name the War on Drugs and the War on Terrorism imply that these are both military campaigns just as much as law enforcement campaigns, which would explain both the military-style DEA and LE SWAT team “drug” raids on homes, terrorizing children and families, and the non-lethal weapons-operations via DOD/USAF weapons-testing contracts on people wrongfully labeled “terrorists” as ensured by the Omnibus Counterterrorism Act of 1995 after the Oklahoma Bombing (a staged insider event, as per whistleblower evidence), and later the Patriot Act of 2001 post 9/11 (another staged insider event, as per much public analysis and testimonial). Yet, in mainstream media and government press releases, these missions are not disclosed as such—the military aspect kept hidden–with much secrecy especially attending the field testing aspect of otherwise openly-disclosed non-lethal weapons testing contracts inside America.
The most significant disclosure from this section comprises notice of 1) the members of the Joint Program Steering Group, as deriving from DARPA, the National Institute of Justice, the FBI, the Bureau of Prisons, and the US Army; 2) their ability to engage at any point in R&D of the weapons mentioned here; 3) the notion that they could participate in “demonstrations” of this technology just as much as developments. Are demonstrations then, what people are reporting today as 24/7 silent microwave/milliwave/infra-red/neurotech weapons operations in their neighborhoods, with use of drones, small planes, satellites, helicopters, zooming cars, parked vans and cars, antennas, cell towers, smart meters, backpack stalkers? (These also appear to be weapons-testing activities, weapons-training activities, and weapons-operations activities.)
Also significant is the information that the Limited Effects Technology Program is only one part of a multi-technology program established by the JPSG to address joint tech priorities of Defense and Justice in 1995. The other tech programs are described in Program Thrusts.
The Section Titled “Program Thrusts”
This section in the LET report discusses the actual technology programs of the JPSG, names certain technologies being developed, tested, and used in training, reveals that most if not all of these are Remote Human Access spectrum and sonic technologies, yet maintains quite some obscurity in disclosing certain of these technologies, for example using vague terms like “communications security technologies.”
It is interesting indeed that this document titled The Limited Effects Technology Program Report in actuality presents information on all JPSG DOD-DOJ programs (or all deemed safe to record), yet focuses only on some LE tech, and uses the same opening Background section to preface notice of all JPSG programs—which implies commonality of context and nature of weaponry, i.e., Non-Lethal, Remote Human Access/Control(as will be seen below).
Significant, in this section, are the following.
The JPSG Program—the most essential program ensuring DOD-DOJ liaison re. “advanced technology development” as per the 1994 DOD-DOJ MOU—focuses on 7 technology areas, which, on close perusal, cover quite a bit of territory. This program in other words is being used to develop, test, and demonstrate sophisticated and secretive wireless, remote, radiation, EMF spectrum, acoustic, bio-communications detection, monitoring, tracking, and communications technologies with major implications for all individuals and the entire urban environment.
The first six program areas are presented only in summary, with slightly more elaboration of the Limited Effects Technology program which titles the report. Notably, even this seventh section is not comprehensive in its coverage of the LET it purports to cover: the devices highlighted do not comprise the whole of the LET program, only that portion DARPA is willing to put in a document clearly intended for eventual public-release (after 25 years!) into the public-domain, which has happened now. (More on this subject in the LET Program section below.)
Concealed Weapons Detection:
Concealed- Weapons-Detection technologies the JPSG reports here it seeks to develop are “unobtrusive” —read, concealable in plain sight–systems which can detect weapons of various kinds, including those with little to no metallic content, from over 9 meters—27 feet, width of a couple rooms–away. Initial efforts were to cover stationary devices—but clearly this 1996 wording suggests mobile devices would also be developed.
Actual detection technologies in process then in 1996 included:
3.1 An X-ray sensor: which refers to sensor technology; X-ray sensors are variously used in medical/dental radiography and in scanning systems as in airport scanners for people or baggage.
3.2. Combined passive millimeter wave and infra-red sensors: which are sensors used in scanning systems which can detect objects by their relative millimeter wave glow or infra-red heat signature profile, literally see through clothes better than X-rays and give rise to images highly invasive of personal privacy. Both millimeter wave sensors and infra-red sensors are energy sensors, detecting bio-field energy and thermal signatures; the distance from which such sensors can be used is a matter for further research. Some infra-red sensors are used in cameras mounted on aircraft and satellites.
Interestingly, a document online from the Air Force Research Lab, written by an apparent contractor, Decision-Science Applications Inc., found online after the bulk of this article was written, reports in 1998 on Concealed Weapons Detection programsrun on grants from the NIJ and DARPA--which suggests a possible connection to these JPSG programs, while revealing that NIJ and DARPA were funding the Air Force Research Lab, which in turn funded a private contractor, in a chain of inter-agency connections–and points to sensor technologies being intentionally developed to penetrate clothing.
3.3 Combined ultrasound and radar sensors: which translates to:
a) Ultrasonic sensors: the use of high-frequency ultrasonic pulsed transmitter/receiver sensors to send and receive waves in echo from materials to determine their composition or proximity (used in a variety of industries including healthcare, agriculture, target-tracking of animals or humans from UAVs or manned aircraft, water-level sensing, car or obstacle detection), used in short-range, up to 10-meters application;
b) Radar sensors used in short and long range (up to 100 meters) object detection, tracking target movement, collision avoidance in cars, and to detect materials with guided wave radar or special antennas which ultrasonics may miss, such as softer, powdery, foamier, dustier materials, using either Doppler pulses or frequency-modulated continuous wave radar.
3.4 Low Frequency Magnetic sensor: Magnetic sensors use a variety of physical effects related to magnetism, such as eddy current sensing, measuring small relative changes in earth’s magnetic field created by variations in magnetic material, to detect flaws in metal, movement of metals (as in weapons) carried on a person’s body, movement of large metallic objects such as cars, etc. Magnetic sensors detect metal carried on persons when radar alone, stopped by metallic-walls or reflective insulation barriers, is not enough.
Low magnetic fields relate to biofields; low frequency magnetic sensors can pick up low frequency (ELF, ULF body resonance frequency below 10 Hz, below 30 KHz) magnetic fields as indicated in rise and fall of chest cavity; this capacity is used in earthquake life-detection and through-wall surveillance in combination with radar sensors.
Then there are super-conducting quantum interference devices (SQUIDs) which also pick up very low emfs, such as brain ELFs.
MEMS and nanosensors using thin film magnetic technology also exist. (On this subject: Radar sensors used in prisons are taking recourse to radar tagging to distinguish inmates from guards—implying the use of nanosensors in tracking, which appear to be of different kinds.)
Finally, this section’s disclosure on then-current use notes that the X-Ray sensor was being “demonstrated”–meaning, operated–in a correctional institution in California—a prison or juvenile detention center. The use of sensor and imaging technologies in correctional and detention institutions must be thoroughly investigated, in relation to the bioeffect harms from such technology usage.
What Is Not Being Explicitly Stated But Implied In This Entire Section?
All sensor technologies, unless passive, require emission as well as reception of signal. This means that people—unwittingly, without being informed—are being subjected to X-rays, ultrasound radiation, millimeter wave technologies, radar technologies, ULFs, ELFS, and magnetic fields, at short-range and long-range, close-in and remote, ostensibly for weapons-detection testing purposes, in any number and type of environments, including but not limited to airports, train stations, public areas, and private homes. These technologies could be directed at people from inside buildings and homes, from inside cars, pickups, trucks, vans, from mountings in public locations, from parked vehicles in parking-lots and from moving vehicles while driving.
Sensor technologies being tested at short and long range include low frequency magnetic sensors which track biofields, breathing activity, body resonance emfs, and low frequency brainwaves, plausibly using superconducting quantum interference and tunneling technologies, and comprising earthquake-life-detection monitoring or through-wall-surveillance as described in various other public documents, and plausibly also Remote Neural Monitoring or neurosurveillance, of the kind spoken about 28 years ago in the ex-NSA employee John St. Clair Akwei lawsuit against the NSA.
As in the found document Silent Weapons for Quiet Wars, which posits the surreptitious use of socio-economic weapons of degradation to disable and disarm entire populations without their conscious awareness, the surreptitious testing of sensor technologies on populations is essentially the leveling of silent military spectrum weapons technologies on the bodies of citizens, without their knowing.
The surreptitious leveling and usage of silent military spectrum weapons of bodily and brain monitoring, assault, and modification is precisely what thousands of reporting victims of EMF/Neuro DEW crimes worldwide—often labeled and dismissed as Targeted Individuals—are currently reporting, both inside the USA and out. Could it be that the testing of sensor technologies in concealed weapons detection constitutes one aspect of this surreptitious assault on citizens?
Factually speaking, the disclosure in this document along with the disclosure in the 1994 DOD-DOJ MOU that these technologies are being tested is, at minimum, evidence that invisible, spectrum technologies are being operated and tested on the bodies of people, from a distance and from close-by, exactly as thousands of highly credentialled and credible people– often labeled as “Targeted Individuals” and falsely characterized for credibility-disappearance as “Mentally Ill” by mainstream Govt-propaganda-pushing media–are reporting.
Three aspects to location, ID, and tracking technology are being covered in these JPSG programs, as delineated in this section on Geo-Location/Navigation/Communications in the LET Program Report:
4.1 Locating or precision-finding, precision-targeting of specific people, objects, or vehicles—this implicates GPS (Global Positioning Satellite) and other satellite technologies, including handheld satellites, for GPS-tracking of RFID human/object tags, cell phones; as well as human/object RFID/other, Nano/Micro tagging technologies to facilitate GPS-tracking, in other words, Surveillance and Tagging-for-Surveillance technologies.
4.2 Identifying or pinpointing identity of individuals & things—this suggests Identifying Biometric Surveillance & Tagging-for-ID- Surveillance: Facial/Gait/Iris/Fingerprint/Body/DNA/Other Recognition Surveillance; Unique RFID Tagging (Nano/micro biosensors & object tags) & WBANS (Wireless Body Area Networks) for Identification. Again, Surveillance and Tagging-for-Surveillance technologies. Involves Biometric Data Collection.(Law Enforcement has long been involved in this.)
4.3 Monitoring or tracking movement of people and things—this suggests Surveillance & Tagging-for-Surveillance: Audio/Visual Surveillance using microphones and cameras; Cyber Surveillance of computers; Through-Wall Surveillance with RF/ULF/Magnetic sensor technologies; Medical/Health monitoring & continuous detection of RF/other Implants & WBANs using Radar, Wifi; ISR (Intelligence, Surveillance, Reconnaissance) surveillance using Radar from drones, spy/commercial planes, satellites, ground vehicles; Tagging-for-Surveillance: Unique RF/Spectrum & Nano/Micro tagging (correctional, medical) technologies, CCTL—Continuous Clandestine Tracking and Locating (military, intelligence) technologies; Sensor technologies (as discussed in the previous Concealed Weapons-Detection section). Again, Surveillance and Tagging-for-Surveillance technologies. (USAF, AFRL, USMC are currently conducting Non Lethal Weapons tests and ISR tests using these.)
Notably, “reduction of power consumption” is mentioned as a DARPA interest in tracking technologies; this might account for the increased development of passive or inert nanosensors which can be activated or energized by energy signals sent to them, rather than relying on inbuilt battery packs.
4.4 The two JPSG efforts mentioned here include Tagging, as discussed above, very slightly referenced with this line about tiny wireless sensors, termed “devices,” notably marked “modular” as in implantable WBANs, which do indeed have modules or nodes in a network. These are not just object-tagging devices, they are human-tagging devices.
Military tracking of objects and humans using sensors
The fully-implanted and centrally-monitored human
Sensors at level of cell, molecule, DNA
And this is not a slight JPSG effort at all: Tagging and sensor technologies constitute multi-billion dollar businesses and are intimately linked to all aspects of Geo-Location, Navigation, and Communications, as discussed above. Again, here too, DARPA should be more definitively and minutely questioned about these tagging technologies and how they are being used inside America, on Americans—especially since thousands of Americans, as also people worldwide, are reporting violative, non-consensual RFID micro and nano implants in their bodies.
4.5 The first JPSG effort mentioned here, Soldier 911, is mentioned in DARPA literature as an emergency radio to help find soldiers in crisis.
However from the description in the LET report, it also sounds like a handheld satellite linked in to an emergency response network, functioning as a device to locate, identify, and track “the movement of individuals and vehicles,” which, if an additional feature (undisclosed in DARPA literature) on this device, is only possible through the use of pre-tagging of said individuals and vehicles with sensor and tagging technologies–or the use of SIGINT Remote Neural Monitoring, as described in the John St. Clair Akwei lawsuit vs the NSA in 1992, in the case of humans.
5. Sniper DetectionSniper Detection systems as mentioned here were intended to be of various kinds, including manually-portable, bodily-worn, and vehicle-mounted.
These systems, as stated above in the LET Program report–being explored and tested publicly from 1996 on–involve sensors: acoustic sensors, infra-red sensors, and integrated infrared-acoustic and infrared-laser sensors.
Interestingly, this section appears to be discussing technologies for detection of actual gunshot or sniper fire—not non-lethal fire, not spectrum-weapon-related shots. However the detection technologies themselves are spectrum technologies.
Brief research of these detection technology sensors indicates that acoustic, infra-red, and laser technologies are being developed and used by militaries to determine with pin-point precision the direction and location of fire from a weapon after a first shot. Sensors today are becoming highly sophisticated with universities (working on military grants, partnering with private firms) also involved in developing bio-mimetic systems of detection, using neural network learning and studying how bats and dolphins process sound and vibration.
It is notable that this program of Sniper Detection has been included as a JPSG program in this Limited-Effects Technology report as one of the multi-technology program thrusts of the JPSG.
JPSG, we recall, is the Joint Program Steering Group formed by the 1994 DOD-DOJ MOU employing parties from both Defense and Justice in mutually-relevant matters and projects of security and law enforcement, OOTW and LE, intending to jointly develop and test “advanced technologies” of common interest.
Some Undisclosed Conclusions
1. Could it be therefore that Sniper Detection is related to matters of Mass Shooters, the phenomenon of supposedly crazed “lone gunmen”–plausibly mind-control victims of MK ULTRA RHIC-EDOM (radio hypnosis intra-cerebral electronic dissolution of memory) radio-hypnosis—shooting up people in random settings, as well as the Live Action Drills with Active Shooters run by the Department of Homeland Security?
If so, this offers a connection not merely between the DOD and DOJ but also with the DHS; all three departments are in some way involved in these sniper detection programs.
This also offers a connection to War on Terror programs and funding, since mass shooters are characterized internally as Domestic Terrorists—even if their “Manchurian Candidate” creation is by covert agencies in Defense/Justice/DHS/CIA, undercover of Live Action Drills, for purposes of driving Agenda 21/2030 Gun Control agendas, as is often surmised by many analysts.
2. Further, the JPSG efforts noted here to develop sensors, in its inclusion of biomimetic systems and neuroscience research, now used in sniper detection in the field, may well involve the use of neuroprosthetics, as indicated by the acknowledged use of cochlear implants in medical and neuroscience research over several decades by a Defense contractor, Biomimetic Systems, Inc.
3. It is plausible therefore—and a matter for further investigation—that the non-consensual use and implantation of cochlear and other neurological implants—which numerous citizens have come forward to report, over the last three to four decades–for the study of neural networks and auditory processes has accompanied the JPSG efforts in this area of Sniper Detection.
6. Information Technology:While this section is quite opaque, a few conclusions can be drawn:
The JPSG states that it is addressing the needs for instant and secure communications needs in LE and Military by taking advantage of advances in civilian and govt-sponsored IC technologies.This would not however require a separate program to do so, unless undisclosed advances were being acquired.
These advances, hinted at but not specified, could include Artificial Intelligence, Machine Learning, autonomous systems, cybernetics, cognitive computing, Internet of Things, Internet of Humans, lesser-known Neuro/Bio-communications technologies such as V2K (Voice to Skull) and Synthetic Telepathy, Hive Minds and Brain Nets revealed by whistleblowers like Richard Alan Miller and Robert Duncan (while some brain projects are openly revealed by public-domain DARPA information and known to exist via academic/government focus in US and worldwide), robotics, nanotechnology, the miniaturization of electronics, quantum computing, and other aspects of modern ICT which are left unnamed here.Simulating all 100 billion neural connections of brain on future supercomputers/https://www.kurzweilai.net/new-algorithm-will-allow-for-simulating-neural-connections-of-entire-brain-on-future-exascale-supercomputers
This possibility—of such undisclosed advanced projects being part of the IT program sketchily noted here–is once more underlined by the opaque disclosure of “innovative exploitation” of existing ICT infrastructure intended in the creation of interagency crisis management systems.
“Communications security technology” in common parlance includes encryption and authentication technologies which today include biometrics and RFID microchips, but is not further specified in this section.
Considering that the rollout of biometrics (iris, fingerprint, face, voice recognition) at airports and borders is being overseen by TSA, a part of DHS, and that DNA is collected by LE at jails and detention centers, it can be safely concluded that any joint program of Defense and Justice in this area would indeed encompass all of these certainly exploitative technologies.
“Sharing information among agencies” points to shared information from different databases collected by different parties, including DNA collection databases managed by LE, and recently exposed for massive privacy violations. Police databases are apparently highly insecure, and corrupt officers have made it a practice to sell databases to private companies for thousands of dollars, a practice revealed by recent news articles, including by Chief Jones on Ramola D Reports.
To conclude, the opacity of this section on Information Technology appears to hide much. It is entirely possible that non-consensual, clandestine implantation of RFIDs, as part of developments in Military/LE cybernetics, telemetry, biometrics, neuroinformatics in “innovative exploitation” of communications security technologies, is being executed by this JPSG program—as reported by high numbers of Americans. Again, this presents therefore an issue to be examined further with DARPA and the Justice Department.
7. Personnel Armor:This section, like the Sniper Detection section, seems to pertain explicitly to lethal weapons and not non-lethal or spectrum weapons.
However, it notes that lethal weapons threats—bullets from rifles and handguns—affect OOTW and LE operations both.
Protection from rifle bullets via advanced lightweight body armor in the course of OOTW/LE operations of any kind appears to be the focus here; the implication appears to be that such operations could involve rifle threats; it is possible therefore that this pertains, as also the Sniper Detection section, to mass shooters and the weapons (assault weapons, rifles) some have used, as well as to regular LE activities, which do involve lethal exertion of force, warranted or unwarranted, in situations of gun violence.
It’s interesting that this has been designated an area for Defense-Justice collaboration; plenty of Defense contractors exist who research and develop body armor, as any cursory inquiry into the market shows. LE also has a dedicated market producing police gear. For the JPSG to enter this arena suggests a corralling of new Federal funds perhaps, or some kind of development of new technology – countermeasure shielding for spectrum technology? – that is not being fully disclosed here. Note that what is being stated above as aspects of this program are presented as inclusions (“efforts include”), not all-encompassing and exclusive.
This is also a relatively opaque section suggesting telemedicine application in penitentiaries and OOTW rescue operations, which implies audio-video consultation and data transmission of medical detail perhaps but does not expand on the suggestions implicit in the label of “biomedical technology” which could include medical telemetry, meaning implants, body area networks, biosensors, and implanted biomonitors, at nano- and micro-levels, to aid in remote patient monitoring and other telehealth initiatives.
To reiterate, the incidence of such biomedical implants found to have been non-consensually implanted in what can only be understood to be undisclosed and covert human experimentation and tracking operation projects involving variably, academic, medical, and military/Intelligence personnel has been reported in large numbers by Americans as also people worldwide. It is possible therefore that the opacity of the language in this section obscures the larger truths of such non-consensual implantation being part and parcel of a plethora of telehealth processes and technologies being tested silently on people.
This latter possibility in fact has increasingly been reported by people experiencing invasive radar activation of non-consensual implants within contexts of seemingly being probed in public by a rotating army of stalkers masquerading as community monitors and healthcare workers.
9. Limited Effects Technologies:
Significant, from this brief introduction (further screenshotted below):
As noted earlier, this section, which titles the report and occupies 5 of the 9 pages of this report yet details only one portion of the multi-technology JPSG program.
Further, its detailing is incomplete, as indicated by the language in the opening section.
Crowd control and deterrence devices being studied and developed under this LET program are presented here as innocuous, benign, and needed—as per a nonspecific claim of need. There is no indication however of actual studies to establish they are such, or actually “eyesafe” or “less lethal” as stated.
A significant fact to note is the language referring to “sponsoring” and “funding” programs and projects to develop these limited-effects technologies, which means JPSG is handing out grants and contracts to Defense/LE contractor companies to develop these weapons. This might well be the protocol by which all JPSG programs work, and could explain the AFRL contract with Decision-Sciences Applications, Inc. on NIJ and DARPA grants, mentioned above in the Concealed Weapons Detection section.
Electric Stun Projectile
This “effort” relates to a physical projectile using wireless, gas, or “conventionally propelled” means intended to electrically shock and stun a human target, as Tasers also do.Hardly a “Limited Effect” weapon, this is a stun gun intended to be used as a shock-defence if a soldier or LE officer is attacked. Note that the intent is still incapacitation, blunt trauma, high impact force–but using an electrical charge, not a high-velocity bullet.
Developed in San Diego, tested on the Marine Corps, probably rolled out and in use now, post 1997. Notice that the photograph is blacked out almost and reveals nothing. DARPA is not going out of its way to provide clear information here.
A look into Jaycor, the company, online, now subsumed into Titan Corporation, a larger Defense contractor engaged in large-scale DEW, satellite, and navigational systems manufacture, reveals their interest in other counter-personnel stun-gun non-lethal weapons and crowd-control devices. Titan Corporation is therefore now manufacturing both large-scale DEWs to take out battleships and smaller-scale non-lethal weapons (being characterized here as “Limited-Effects”) to take out human beings, or fell them for a while–no doubt with damages, as “crowd-control.”
Laser Surveillance and Dazzler System
While blinding lasers were banned by the European Parliament in 1995, the use of lasers to dazzle and disorient human targets did not stop, as BOSS, developed by the US Air Force’s Phillips Lab in Albuquerque, New Mexico demonstrates. It is interesting that this surveillance and dazzler system was developed for and presumably funded by the JPSG at an Air Force laboratory.
Notably, this system 1) involves the use of infra-red thermal sensors to find targets plus lasers to dazzle targets, 2) can be applied remotely from a considerable distance, and 3) intends both a psychological effect in alerting targeted individuals to being targeted by way of Show-of-Force bright illumination and the physical effect of deleterious uber-brighting or dazzling of the target’s eyes.
Again, not exactly Limited Effects, but labeled as such.
Finally, it is notable that further integration of this “Limited Effect” optical sensor-and-weapon system with acoustic sniper detection systems already developed under JPSG (as indicated above also by the AFRL/Decision-Sciences Applications 1998 Report) was also being explored in 1996, further evidence that sensor and “non-lethal” spectrum technologies were being developed and tested by the JPSG for multiple uses.
Handheld Laser Dazzler
Also developed by the US Air Force’s Phillips Lab, the handheld laser dazzler—whether portable in a backpack or camouflaged as a flashlight—demonstrates that non-lethal energy weapons, including lasers, promising limited-effects were being made by the JPSG on a smaller scale, at lesser power, for purposes of portability and ease of use.
Again, as per the 1994 DOD-DOJ MOU, the non-lethal Spectrum/Acoustic sensor-and-weapon technologies being developed by the joint Defense-Justice partnership here were being tested—are being tested, have been tested for the past 25 years—and “demonstrated” on real targets.
The publishing of flash-bang devices designed to fast-bloom-smoke, dazzle, whistle, and other such is the one consistent element that disclosure on non-lethal weapons has maintained. Unwilling to speak openly of radar and sonic devices with silent and invisible physical bio-effects on humans, literature from the Joint Non Lethal Weapons Program has not refrained from pointing openly to these dazzle and vibrate devices, in obvious attempts to misdirect focus away from the far deadlier bio-hacking and neuro-hacking devices of non-lethal sensor technologies and neuroweapons.
This is evidence that infra-sound (below 20 Hz, the threshold of human hearing) weaponry for crowd-control was being researched in 1996 and tested on people, specifically to determine the biological effects of such transmissions, and explore means of incapacitating individuals for crowd-control purposes with infra-sound.
Prior information, available online, shows that infrasound had long been known to produce bio-effects and brain-effects–nausea, disorientation, brain fog–in humans, since Dr. Gavreau’s discoveries and experiments with infrasound in the 1950s, and efforts had already been made to create devices and systems to use infrasound in a weaponized way against humans, as in the published US Patent 3612211, screenshotted below.
A salient point to note is that infrasound weapons (like other emerging weapons technologies) had been reviewed in the 1970s by United Nations conferences on disarmament, and efforts had been made, particularly by the Soviet Union, to halt the development of all such new weapons then seen as weapons of mass destruction. The US and UK were prominent naysayers to this plan in 1978 at the Conference of the Committee on Disarmament, where Hungary presented a paper on infrasound weapons and their effects. Now it appears that not only were such weapons not halted in development between 1978 and 1996, DARPA was arranging in 1996 for further development and testing of these dangerous acoustic weapons, long known to harm human bodies and brains.
The Section Titled Summary
While this document has touched on major program areas of the JPSG, its title and detail elaborate the more obvious flash-bang aspects of the “Limited-Effects Technology” program, while the Summary remains opaque. Notable however is the casual mention of “corrections” being aligned with the main parties involved in these joint programs, as in “military, law enforcement, and corrections” as the primary “user communities” being awarded “new, more effective tools,” with little description or specificity on the nature or kind of tools, and no summation of the high points of this document.
However, some definite conclusions can be reached regarding this entire document, in addition to all noted above at end of sections.
DARPA returned this one 1996 document to a multi-document request on JPSG programs begun 25 years ago, after 25 years.
This is not a fully disclosive document; much is being obscured, summarized, glossed over.
The Limited-Effects Technology program is only one of several JPSG programs mentioned in this document.
All these JPSG programs need to be understood, as stated, as deriving from the 1994 DOD-DOJ MOU which announced the testing and demonstration of “advanced technologies.” That MOU followed on the heels of a classified Non-Lethal Weapons conference in 1993, and several decades of development and study of Non-Lethal technologies and “Psycho-Corrective” Neurotechnologies. (See Background & Context, MOU.)
The need to limit force is reiterated as primary motivator in bringing DOD and DOJ together in a quest to find and use common modalities in wars on drugs and terrorism—a need which points directly to Anti Personnel Non Lethal Weapons—which are EMF Spectrum and Acoustic Weapons.
These JPSG OOTW/LE programs therefore are definitely focused on Non Lethal Weapons, that is, EMF Spectrum and Acoustic Weapons, which, by nature of the physical bio-effects they have on humans’ bodies and brains, are also Bioweapons and Neuroweapons—not mentioned as such in this document, but elsewhere disclosed, as for instance, by Debra Schnelle at the 2019 Blue Ribbon Emerging Biodefense Conference as Neuro Cognitive Weapons, by Dr. James Giordiano as Neuroweapons in numerous lectures, and discussed at length in the declassified US Army document Bio-Effects of Selected Non-Lethal Weapons as Bioweapons and Neuroweapons, with intended damage to the human body and human brain.
The JPSG comprises members from DARPA, US Army, National Institutes of Justice, Bureau of Prisons, and the FBI. Stands to reason that each of these institutions therefore—and their overseers, the Department of Defense and the Justice Department and leaders, the Secretary of Defense Mark Esper and the Attorney-General William Barr–is fully cognizant of the JPSG programs developing and testing sensor-and-weapon technologies on the streets of America described in this report.
Further, each of these institutions is being permitted to participate in all aspects of the RDA (Research, Development, Acquisition) spectrum, meaning it is acknowledged that these non lethal neuro/bio EMF/acoustic technologies can be tested and demonstrated by the Bureau of Prisons (on prisoners), FBI, and NIJ (on watchlisted citizens? on unwitting members of the public at airports, train stations, hospitals, stores, roadways?) just as much as by DARPA and the US Army (on military personnel? On civilians near military bases? on “indefinite detainees”?) and just as much as jointly developed.
Concealed weapons-detection technologies being developed indicate that people—unwittingly, without being informed—are being subjected to X-rays, ultrasound radiation, millimeter wave technologies, radar technologies, ULFs, ELFS, and magnetic fields, at short-range and long-range, close-in and remote, ostensibly for weapons-detection testing purposes, in any number and type of environments, including but not limited to airports, train stations, public areas, and private homes. These technologies could also be directed at people from inside buildings and homes, from cars, pickups, trucks, vans, from mountings in public locations, from parked vehicles in parking-lots and from moving vehicles while driving.
Sensor technologies for weapons-detection being tested at short and long range include low frequency magnetic sensors which plausibly track biofields, breathing activity, body resonance emfs, and low frequency brainwaves, using superconducting quantum interference and tunneling technologies, and comprising through-wall earthquake-life-detection monitoring, remote neural monitoring, and the surveillance and monitoring of brain states and emotion states.
GPS Tracking and identification technologies being tested and developed imply tagging-for-surveillance sensor technologies inclusive of RFID microchips, WBANs, biosensors, and nanosensors, and include monitoring and surveillance technologies such as different kinds of radar being tested and operated under ISR and military/Air Force Non Lethal Weapons Testing programs.
Sensor technologies being developed for sniper detection, based on biomimetic systems, could include the use of cochlear implants and other neuroprosthetics in the study of auditory and neurological processes, as indicated by companies developing such systems.
“Innovative exploitation” of IT communications infrastructure & new technology here could include hive-minding AI projects, nanobots, Brain Nets, quantum computing, and synthetic telepathy, among other undisclosed technologies, involving non-consensual, clandestine implantation of RFIDs and BCI Tech, as well as biometrics/DNA data collection and sharing—as part of developments in Military/LE cybernetics and telemetry, and as reported today by high numbers of Americans.
“Personnel armor” being developed as a JPSG program could include research and development of countermeasure shielding for spectrum and acoustic non-lethal bio/neuroweapons, although not expressly stated here.
Biomedical technology initiatives involving telemedicine and telehealth could include medical telemetry, meaning implants, body area networks, biosensors, and implanted biomonitors, of nano- and micro-levels, to aid in remote patient monitoring and other telehealth initiatives. Non-consensual implantation may well be part and parcel of a plethora of telehealth processes and technologies being tested silently on people, in prisons, as noted, and elsewhere.
Limited-effects technologies being developed and tested under JPSG include electric stun projectiles, dazzling laser devices of both mountable and portable kinds, and other crowd-control devices.
Acoustic devices using infrasound to produce physical effects for use in crowd-control to “incapacitate” was being studied at an Air Force Laboratory—and possibly being field-tested and “demonstrated” on populations to provide the needed “hard evidence” mentioned here.
Factually speaking, the disclosure in this document along with the disclosure in the 1994 DOD-DOJ MOU that these technologies are being tested is, at minimum, incontrovertible evidence that invisible, spectrum technologies are being operated and tested on the bodies of people, from a distance and from close-by, exactly as thousands of highly credentialled and credible people– often labeled as “Targeted Individuals” and characterized for credibility-disappearance as “mentally ill” by mainstream Govt-propaganda-pushing media –are reporting.
This document’s disclosure therefore—notwithstanding that much of its details have been withheld–is profoundly important in establishing that non-lethal weapons and sensor technologies, specifically EMF Spectrum and Acoustic Bio/Neuro Weapons have been developed, demonstrated and tested on populations under the aegis of joint Defense-Justice JPSG programs, since 1994.
The US Army is known for telling its recruits to be “Army Strong” ironically the Army is strong in violating our National Security. New technologies created by the Pentagon’s Brain, DARPA, have new weapons to use on US citizens on US soil apparently!
The Army is currently targeting Americans on the very soil they are ordered to protect.
Former Army Ranger Justin Pitts was attacked by non-lethal weapons by the US Army’s Program Executive Office Simulation, Training, and Instrumentation (PEO STRI). They are located at 12211 Science Drive, Orlando, FL 32826. Justin was a personal friend, we were both what is termed Targeted Individuals. This is a new program run by our government. If you are unlucky enough to be put in this program, your life as you knew it will NEVER be the same.
Electromagnetic Frequency (EMF) and Cyber Operations
The US Army in this case is running what they have labeled Electromagnetic Frequency (EMF) Warfare and Cyber Operations. The Army is using the PEO STRI to run simulations that control a target’s electronics, including his or her actual mind and body. The carrier EMF signals have the ability to send voices to your head that only you hear, termed Microwave Acoustic Hearing. The technology is so advanced that you can have EMF signals sent directly to your brain changing your mood. The technology causes all kinds of life- changing problems for those attacked.
US Army Ranger Justin Pitts
Justin and I met on YouTube. He was a kind, skinny, short southern Army Ranger that was targeted during his last year as a recruiter for the military. While he was still Active-Duty, the Army base in Orlando, FL started targeting him. Justin started hearing voices receiving Synthetic Telepathy. This is not too different to my targeting; however, Justin could not keep weight on his body. He was constantly eating junk food. Justin also had severe EMF attacks where his entire body would shake. His targeting increased when he, through microwave hearing, heard someone blow their nose into a trash can while he was not at work. This gesture is common among military men. He had heard the guys at the recruiting office make that noise before and identified it. This was the first time he realized that someone had tapped into his brain. Justin’s targeting would start to escalate at that time.
We decided to take our information and put it together to figure out a way to help expose the targeting of US citizens. We knew these were crimes against humanity not unlike the Nazi treatment of anyone they deemed unfit. These non-lethal weapons were designed in the last 40 years. Justin and I interviewed on YouTube to get information out about how individuals are targeted.
Justin was targeted with gang stalking. He had military helicopters and planes fly over his home in South Carolina. Justin was smart and had the ability to review the Army’s Cyberspace and EMF Operations FM 3-12 Manual that is available online. Justin’s targeting would continue and his hearing one person turned into a classroom of Army soldiers exchanging paperwork and talking. He would be in his home and hear the classroom become animated. He saw cars drive into his neighborhood with Florida license plates at this time. Justin continued to also be targeted throughout his body with electromagnetic-frequency-attacking causing him to shake uncontrollably. No matter how much they attacked Justin, he continued to fight back going up the Army’s chain of command to expose the National Security violations.
Targeting Individuals Threatens National Security and Abuses the Security Clearance System
The Congressional hearing dated September 30, 2015 stated that definition of cyber included “emerging technologies, drones, nanotechnology, and a slew of other technologies which the term cyber is inadequate to define.” This is true and is why Targeted Individuals have a hard time trying to explain what is going on with them. Targeted Individuals will be labelled a psychological dysfunction by uneducated citizens. However, these crimes are really happening.
Justin was able to start to file complaints with numerous military and intelligence agencies. He went up the Army’s chain of command and this went nowhere. Then, he was harassed by the military planes in his neighborhood, so Justin filed a report with the Oconee County, South Carolina Sheriff’s Department. This was not enough to stop the program. Justin went to US Army Special Operations and Military Police to file complaints. However, people including military and intelligence agents do not know about technologies torturing US citizens on US soil. This is by the very definition treason, punishable by death.
Justin then was clever enough to start recording phone conversations when he filed complaints. His perpetrators told him where they lived and their names. Justin had one of them come near him. This perpetrator told Justin his name over the Acoustic Microwave Hearing from the base in Florida. The man’s name is Joshua Pierce, Sergeant 1st Class, Non-Commission Officer. This perpetrator had a complaint filed by Justin to the FBI.
Justin contacted the NSA and filed a report with them since the Army was violating National Security with the Cyber and Electromagnetic Warfare tools at their disposal. Next, he contacted an UN journalist and NATO’s biomedical military command.
Justin talked with Presidential correspondents, however, he could never get his computer secure enough to send the information to the White House. Finally, when all these attempts to stop the targeting did not succeed, he went to Washington, DC. Justin tried to have Congress listen as well as the Pentagon. Unfortunately, this technology is so powerful that people at all levels are mind controlled with electromagnetic frequencies. Functional MRIs are also used to read and change people’s thoughts and minds.
Our world is no longer a free will society. We can be mind controlled without our knowledge at anytime. That is how truly powerful these weapons are becoming. All of Justin’s complaints fell on deaf ears, and he started to become very depressed. I did not see Justin at that time. If he was feeling that way it was probably an inserted frequency and not actual depression.
In December 2018 around Christmas, Justin supposedly took his own life; I do not believe that to be true. I cannot believe it when the soldiers at the US Army Base in Orlando, FL have the power to insert frequencies to make you feel how they wish. It is extremely unfortunate that I lost my friend, but he has left us the ability to stop the PEO STRI. This base is threatening our National Security by causing a substantial and specific danger to public health and safety. This is one of thousands of crimes they commit hiding behind a security clearance that needs revocation. We can together stop this base from taking all Americans’ free will. The 5G network will only enhance the crimes they are already commit daily. The PEO STRI is abusing their authority, causing gross mismanagement of military assets and wasting taxpayer funds.
Mainly, I am bothered by the children that they can essentially mind control to do whatever they wish. This is a sick form of pedophilia, and these soldiers are criminals. The amount of people under the treasonous Cyber and Electromagnetic Warfare will continue to increase. Thus, more citizens will become human experiment test subjects without consent.
Neuroweapons kill US Veterans at a staggering amount daily. These programs are murdering good people as they come back from war. We must join together and support Targeted Individuals notifying Congressional Representatives. We can also fight back by filing FOIA Requests for the US Army’s PEO STRI program, alerting Inspector General offices, and Civil Liberties offices everywhere.
We must not turn a blind eye to our enslavement. No matter who is in political office or where you are, you will not have free will to go and choose what you want in life. Our children deserve their innocence and freedom. America’s children deserve protection even if you choose to be complacent, what about the children of our nation and the entire world? Please, if you do not understand the technologies, try to, for our nation is at stake in a major way.
We must always remember what Thomas Jefferson stated, “Does the government fear us? Or do we fear the government? When the people fear the government tyranny has found victory. The federal government is our servant and not our master!”
Karen Rex describes herself as a Targeted Individual and former Security Operations Manager and contractor with Lockheed Martin. An Accountant & Business Information Associate with degrees from De Anza College in Silicon Valley, Karen has 15 years’ experience as Construction Financial Controller and Software Migration Engineer in the Bay Area. A whistle-blower of Cyber Espionage in 2015, she is currently a Whistle-blower of the Targeted Individual Program being run by the US Army.
Many thanks to Karen Rex for her article and information on unlawful targeting operations and disclosure as related to Remote Neural Monitoring Terrorism activities from an US Army base, as reported by late US Army Ranger Justin Pitts, and the broad framework of Cyberwarfare and Electronic Warfare operations within which they are putatively conducted. Many thanks also to Justin Pitts for his many commendable efforts to report these crimes to both government agencies and the public–Rest in Power, Justin. Many thanks to Nexx Level for conducting that video interview with Karen and Justin at an important time. This article will be followed up soon with further discussion and analysis, including focus on related targeting technologies reported by those targeted as well as by government and military whistleblowers.
A former Security Operations manager and Lockheed contractor has stepped forward to whistleblow on national security violations, treason against American citizens, and hazards to public safety engendered by abusive Electronic Warfare weaponry use on targeted Americans by a US Army operation named Program Executive Office Simulation, Training, and Instrumentation (PEO)(STRI) operating out of an Army base in Orlando, Florida.
Working currently on sending FOIA requests and letters of information to various offices such as the OIG and ODNI as well as civil liberties organizations, Cyber Reconnaisance (Karen) wrote recently to the Pentagon Security Clearance Review team, requesting that the military base be reviewed for violations of security clearance and national security (letter below).
“ They are committing treason, human trafficking, murder, cyber espionage, and violating children’s online privacy act (COPPA). The other violations are abuse of authority, gross mismanagement, gross waste of funds, and putting national security at risk.
These soldiers are targeting US citizens including children on US soil. These crimes use electronic warfare, electronic harassment, EMF non-lethal weapons, and microwave acoustic weapons to target US citizens on US soil.”
The base itself had been identified by late US Army Ranger Justin Pitts, a friend of Karen’s who had reported that he was told as much by soldiers who worked there.
“The soldiers there have been located by violating their security clearance and alerting citizens they are using for experimentation who they are and where they are.”
Justin Pitts had made efforts to report violations of security clearance and abusive experimentation on Americans, going up the chain of command as per his Army training.
“Justin made a complaint to the US Army Special Operations, Military Police, Oconee County South Carolina Sheriffs Department, FBI, Pentagon, NSA, NATO, UN, and presidential correspondence. He warned all appropriate parties going up the correct chain of command for the US Army and the intelligence agencies.”
His death one month later, in December 2018, was reported as a suicide, but those today being targeted with radio frequency weapons know that neural and emotion manipulation can be achieved with this neuroweaponry and may have been responsible, as Karen surmises. (More needs to be investigated here.)
Aware that national security is being violated and public safety endangered by the use of these weapons and trafficking operations on citizens and their children, Karen is seeking to expose these crimes, and alerting military and Intelligence authorities of the great harm to Americans.
Illicit Military Experimentation and Weapons-Tests Targets Individuals
US military and federal security clearance reviews were shifted to the Department of Defense last year from the Office of Personnel Management apparently after Edward Snowden and Chelsea/Bradley Manning’s disclosures of classified documents prompted interest in periodic criminal and financial background checks of cleared personnel and backlogs of 700, 000 applications were noticed, according to the Associated Press.
Karen’s letter to the Pentagon is below. Many thanks to Cyber Reconnaisance (Karen) for disclosing this matter and stepping forward to whistleblow on these crimes against humanity and Americans.
Dear Security Clearance Review Team,
am a former Security operations manager that worked with Lockheed
Martin in Sunnyvale, CA. It has come to my attention that the
US Army base located at 12211 Science Drive, Orlando, FL 32826 is
abusing the security clearance system and violating national
security. My friend and US Army Ranger, Justin Pitts, was
murdered in Newry, SC by the soldiers that told them they worked in
Orlando, FL in December of 2018. This base operation named
Program Executive Office Simulation, Training, and
Instrumentation (PEO) (STRI) is
a substantial and specific danger to public health and safety.
soldiers there have been located by violating their security
clearance and alerting citizens they are using for experimentation
who they are and where they are. I am requesting that this base
have it’s current programs reviewed for security clearance and
national security violations. They are committing treason,
human trafficking, murder, cyber espionage, and violating children’s
online privacy act (COPPA). The other violations are abuse of
authority, gross mismanagement, gross waste of funds,
and putting national security at risk.
soldiers are targeting US citizens including children on US soil.
These crimes use electronic warfare, electronic harassment, EMF
non-lethal weapons, and microwave acoustic weapons to target US
citizens on US soil. If we do not expose this immediately my
fear is that more US citizens will be exposed and possibly used as
human experiment test subjects against their will. Please,
investigate these programs and help stop them from committing
violations against our National Security and abuse to security
security is at stake if no one exposes these new cyber, neurological,
and microwave acoustic non-lethal weapons that are currently being
used on US soil. Justin made a complaint to the US Army Special
Operations, Military Police, Oconee County South
Carolina Sheriffs Department, FBI, Pentagon, NSA, NATO, UN,
and presidential correspondence. He warned all appropriate
parties going up the correct chain of command for the US Army and the
intelligence agencies. Please, review all documentation regarding
Justin’s complaints against this base and its soldiers.
worked in Silicon Valley and ruined my career trying to expose these
crimes. I would be happy to give you any other additional
information you need to help you in your investigation. I have
video, audio, and other documentation. I have sent a FOIA
request on the US Army base and the PEO STRI.
fear that the request will not reach the US Army FOIA office in Ft.
Belvior, VA due to my computer web security being totally
would like to help in anyway possible due to the fact that Justin is
dead. I am making FOIA requests, and notifying the Inspector
Generals and civil liberties offices trying to expose these crimes
time and attention is greatly needed to address the national security
violations and abuse to the security clearance system.
–RAE (Report, Analysis, Op-Ed) | Ramola D | Posted September 10, 2019
On the 21st of April, 2019, the Chicago Sun-Times, owned by a group of neither intellectuals nor literati but businessmen and politicians in Chicago, ran a story by columnist and editorial-team member Neil Steinberg, who was once arrested for getting drunk and beating his wife, and spent a month in an alcohol-rehab facility, as his profile in Wikipedia—in itself a forum famous for its selective truths and rampant propaganda (much like Steinberg’s article here)—so ardently details.
The title of this masterpiece by a little-known journalist now marked in Wikipedia as a drunken wife-beater is “Are you being tracked? Burned by lasers? Maybe you are a ‘Targeted Individual‘
Not solicitous, not concerned, not critically enquiring nor journalistically curious, but skeptical, mocking, stopping just short of sticking a question-mark at the end of that pithy projection of disbelief, and offering a label in quotes, “Targeted Individual,” priming the reader to care just as less as the writer about all of it.
A label, indeed, used as an indictment and straitjacket, a closed door and condemnation, as labels usually are.
And a not-so-subtle invite to the reader to dismiss the entire subject as illusory.
No Longer in Kansas, Neil, Time to Read Orwell
Which is more than confirmed in
Steinberg’s opening as he launches into a cascade of scenarios, all
presented as improbable, unimaginable—a skepticism which might be
convincing if we lived in Dorothy’s Kansas, but reeks of
Fusion-Center-driven propaganda instead since we actually reside in
post 9/11, post-Orwell, All-Horrors-Plausible America:
“Strangers are following you. Teams of them, coordinating their surveillance. Recording you. Attacking you with sonic devices. Maybe burning you with lasers. Maybe implanting grain-sized trackers inside your body. You can feel the hard bumps under your skin.
You are alarmed, naturally, and turn for help to those you trust: your family and friends. Maybe law enforcement. Only they don’t believe you. They might even act like you’re the problem. Like you’re crazy.
Welcome to the world of Targeted Individuals, a loose confederation of those, in their words, subject to the “growing crimes of organized stalking, surveillance, abuse and electronic harassment.””
This last, in tandem with the bland caption below the photo of a group of people with signs noting Covert Experiments, Torture, Microwave Weapons, and Failures of Law Enforcement, now labelled as “People who claim they are being put under organized surveillance and harassed by shady forces” continues the priming: you, the reader, are enjoined to react only with skepticism to the possibility of surveillance crimes, illicit experiments, torture, microwave weapons, and harassment being reported.
Because of course, with the callous promiscuities of the Patriot Act, the excesses of the NDAA’s Indefinite Detentions, the twisted revisions of the Common Rule favoring carte blanche secret experiments for Intelligence agencies & the Justice department in conjunction with Executive Order 12333, the cannibalizing military complacencies of 5241.1R which permit surveillees to be experimented on and character-assassinated, the hundreds of bio-behavioral field-tests with millimeter/microwave weapons currently ongoing, the numerous categories of citizen the FBI has declared it must and will surveil and investigate, the nauseous militarizing of police and hand-over of multiple powers to fusion centers, the sinister 1994 Memorandum of Understanding between the DOD and DOJ permitting the testing of “advanced technologies” on Americans, the many revelations by whistleblowers from the CIA, NSA, FBI, DHS of perfidy in-house inclusive of DEW attacks on whistleblowers, the hundreds of thousands of National Security Letters rubberstamped every year by the corrupt FISA court, the unauthorized spying of innocents up and down the coasts & heartland of the US, including the outright targeting and surveillance of an elected President by men in high office, the Stasi crossover into community policing nationwide, no organized surveillance and harassment by shady forces could possibly be happening, oh no…Neil Steinberg (the rehabilitated alcoholic) says so.
The Mental Illness, Paranoia, and Delusion Fraud: The DOD/CIA Psy Op of Labeling Victims and Equating that Label with Paranoia and Delusion
One part of this troubled scenario—where purported journalists can write hit-pieces on whole groups of people and get away with it, thanks also to precedent set by such stalwarts as The New York Times (“The United States of Paranoia”) and Wired (“Mind Games: The Tortured Lives of “Targeted Individuals””), proving they’re really full-on propagandists, paid to deceive—is the inherent difficulty in the label “Targeted Individual.”
A military term quite factual in its meaning yet offering a pigeonholing label now historically misused and abused by reporters who claim people “self-identify” as TIs (short-form for Targeted Individual) and do nothing to investigate their claims/reports but spend reams of column-inches mocking, ridiculing, and calling them “delusional,” this term now occupies a conflicted signifying space, at once literal and associative, which no doubt has been the intention all along, to tie the term to notions of paranoia and delusion.
Stage set, therefore, for a propaganda artist like Mr. Steinberg to engage in some hard-core Media POPPCon—Psy Op Propaganda Piece Conning—which he does, with aplomb. Reading the rest of his article follows the formula for propaganda success over at POPPConville (a MockOp subdivision of Langley): Cast TIs as delusional, interview someone who helps establish TIs are delusional, cast this someone as delusional, call on a psychologist to state the lot are delusional, bring up “mass delusions” and “Internet” syndromes, close-case on anything TIs claim, now that you’ve worked so hard to damage their credibility by naming them delusional.
What is lost in this merry-go-round of formula madness is that “Targeted Individuals” are reporting victims of extremely grave human rights violations under cover of Fusion Center Surveillance, involving the non-consensual use of silent electromagnetic weapons, sonic weapons, scalar weapons, neuroweapons, bioweapons such as microchip implants—all bio-hacking, neuro-hacking “advanced technologies” and “non-lethal weapons” that both DOD and DOJ have publicly established they are testing—treasonously and unethically—on Americans, in addition to harassive COINTELPRO, extrajudicial surveillance, and worldwide “community policing” Psy Ops also known colloquially as Gang Stalking—as this writer has been reporting for several years now, and as many other writers and whistleblowers, such as Paul Baird, Barbara Hartwell, Karen Melton-Stewart, Dr. Rauni Kilde, Mark Rich, Cheryl Welsh, Soleil Mavis, John Finch, Dr. John Hall, Dr. Eric Karlstrom, Harlan Girard, Dr. Corkin Cherubini, Mary Gregory, Renee Pittman Mitchell, Rosanne Schneider, Mojmir Babacek, and others, have also been reporting for years.
It is no exaggeration to say Targeted Individuals have been extrajudicially targeted for extreme persecution and illicit and unethical Mil/Intel experimentation—by corrupt criminals in power seeking to ruthlessly silence people of integrity, including activists and whistleblowers—and my own numerous interviews over the years, my own 6-year experience of being extrajudicially targeted, and my research and published investigative journalism, in addition to that of others (named above) confirms this.
Free’s Statement to Neil Steinberg Regarding Targeted Individuals
Being Mentally Ill
In this particular case, it has been extraordinarily concerning to myself and other journalists and human rights activists to note that Ella Free who runs talk shows on Talkshoe for TIs and has tried to establish herself as a radio and talk show persona under her banner “Freedom For Targeted Individuals,” purporting to be deeply concerned about TIs and seeking to offer human rights “support” is quoted as herself calling TIs mentally ill.
Calling spokeswoman, “Ella Free,” started with a surprise.
“A good portion of people who claim to be Targeted Individuals are actually mentally ill,” she said. Straight to the elephant in the room. “So many of them, people have the same story: it’s interesting that a person isolated is having a very similar scenario.”
She meant “interesting” as in “persuasive” — these people are describing the same thing, therefore it must have basis in reality. That logic doesn’t hold up.
Giving Ella the benefit of the doubt, despite being incensed—as an investigative science and technology journalist who has been researching and reporting on this subject for 5 years–at this false statement (more on this below) I contacted Ella fairly immediately on Twitter, DM (text on Twitter), and email to find out what she had said to Neil Steinberg and if indeed she had said what he claimed, that many TIs are mentally ill.
Free: “It Was A Strategy Behind It”
In the course of the convoluted text/email conversations that followed, it became clear that Ella Free had 1) indeed said to Steinberg that a “portion” of Tis were mentally ill, and 2) sought to explain to him simultaneously—with her apparently non-existent communications skills—that TIs “came across that way’ because “it’s hard to discern the symptoms”/”the symptoms seem the same.” Her texts sought to explain to me that she’d had a “strategy” behind this statement of hers, a strategy which had apparently backfired.
Does agreeing with a propaganda-publishing misleading reporter working for mainstream media constitute a strategy?