Archives for posts with tag: Iris Recognition

the-brain

AREAS OF THE BRAIN AFFECTED BY ALZHEIMER’S AND OTHER DEMENTIAS

LINK:http://www.webmd.com/alzheimers/areas-of-the-brain-affected-by-alzheimers-and-other-dementias

HISTORY OF ELECTRONIC DISSOLUTION OF MEMORY EXPERIMENTATION (EDOM)

LINK:http://www.abovetopsecret.com/forum/thread17725/pg1

ACTIVIST LOG – Friday, February 17, 2017 BRAIN BEAM / BRAIN COOK Day.

Why the focus on the right side of the brain by covert, high tech Human Monsters?

The beam’s focus intensely on the right side of a person’s head is obvious due to the penetrating intense burning sensation. Thanks Dr. Horton, Ph.D, a targeted victim yourself, for the confirming video of these specific types of, covert, official criminal attacks, across the US and all over the world.

With some, the attacks are silencing assaults by high tech covert advanced technology focused on deterioration of brain tissue and cells.

VIDEO: https://www.youtube.com/watch?v=5lNmEB3JHt8&feature=share

 

 

The covert official operation set-up in the corner house behind mine obviously had concluded they have finally found something they hope will control and frighten me out of ongoing whistleblowing. About a month prior, using the Hypersonic Sound Device used to beam verbal harassment into my home and whatever room I am in, the hired goons at this location reported, “She gone.” Then, “They” meaning the agency focused on me, who put them there, and who is spearheading the mobilized the effort around me, “are tired of dealing with her”.

This obviously means, they are tired of watching me expose the monstrosity this program is creating nationwide, the monstrous covert torture, and resulting covert shattering and destroying of human lives “They” believe, undetectable technologically, and without accountability, and more importanly my ongoing determination to reveal this truth.  There is absolutely nothing honorable, ethical, or humane, about these focused hidden operations.

jric
DETAILED LINK SHOWING HOW THE PROGRAM IS STRUCTURED IN CONNECTION WITH THE MILITARY, MILITARY PERSONNEL AND MILITARY TECHNOLOGY

CRAP TYPICALLY STARTS AT THE TOP OF THE CHAIN OF

COMMAND THEN TRICKLES DOWNWARD

LINK:http://www.bigbrotherwatchingus.com/the-program.html

This group of officials we have been programmed to believe since childhood, they will do the right thing, and act morally and not like common criminals, without a doubt, follow and read and follow my blogs, posts, website, etc., and apparently after reading recent posts detailing the renewed, intense focus by the brain beam extremely low frequency weapon system on my head.

As I worked on finalizing Book VI, so does the beam work, focused specifically on cooking of the frontal part of my brain and right side and it.   I have observed it having intensified for a few weeks now consistent, and escalated especially after releasing the documentary “Deceived – Mind Control:  Schizophrenic High Tech Fraud” about three weeks prior on Amazon.

LINK:https://www.amazon.com/Renee-Pittman/e/B005VK7Q3S

You must understand that the personnel and operators of this technology are trained on it and know, full well, the capabilities of their deadly toys and outcome. They know the results of specific focused areas of cooking on the human body, and this is likely gain from observation of other victim end results.  Focus on the human brain like this, without a doubt, can create, aneurysms, strokes, dementia but little known today also Alzheimers, and under these circumstances, it is by obvious intent.

Recognizing this high tech capability, of cooking brain tissue with these penetrating weapons as well as brain cells, causing tissue to expand due to the microwave energy weapon heating, you begin to wonder how many victims of this official criminal activity and horrific silent crime, have already been strategically, covertly silenced in this exact same manner having their lifespan cut short.  One thing is certain,  memory loss is a denial of a connection to life or loved ones around  which high tech memory loss can effortlessly achieve, creating synthetic dementia or Alzheimers as a death sentence?  Dementia literally means brain failure.  It is likely more victims than realized in these types of heinous, “slow kill” operations and use of, advanced, unseen or detectable technological beams, which continue in ongoing research, TESTING and development programs and have done so for DECADES!

Without a doubt, the foundation of these technological attacks is a hope to accomplish  health deterioration overall, or to simply push a victim over the edge by the relentless torture all over the human body.  Apparently, based on numerous victims, some also continue to be deemed candidates worthy  high tech brain failure.

THE RIGHT BRAIN STROKE

https://www.hillcountrymemorial.org/page/patient-education/right-brain-stroke/

The right side of the brain controls the left side of the human body. If the right side is damaged, a stroke can be materialized. If the right side is being diminished by USAF personnel held up in a community location, who also direct and operate a military drone, or portable Active Denial System, targeting a victim, the goal is viciously clear.

The intensity of the focus on the right side of the brain can become painful and sensitive to touch.  These covert operations using GI’s (Government Issues) typically work in shifts around the clock.

There a few agencies, the military for one, of which most would look the other way and let them do their work or carry out orders.  When I Google the results of focus or damage to this specific area, it is clear.  Someone has given permission for my demise.

HERE ARE OTHER REPORTED SYMPTOMS AND MANY I CAN CONFIRM AS PART OF MY SUFFERING AND FOCUSED TARGETED AREAS ON MY BODY

  • Direct pain in the body around the clock –  reported as covertly happening across the USA and globally by use of so-called non-lethal weapons, Directed Energy Weapons (DEWs), Electromagnetic Frequency (EMF) or simply radiation.
  • Pain in the spinal cord
  • Pain in the back of the head
  • Pain in the “amygdala” or the limbic system
  • Pain in the forehead
  • “Cooked”  brain
  • Electroshocks in the brain
  • Pain in the chest
  • Tooth ache
  • “Heart attacks”
  • Pain in vital organs: liver, stomach, heart, lungs, eyes
  • Breast beam to female Activist to cause Breast Cancer
  • Ovarian Cancer**

**Always looking for a method to create a “synthetic deadly illness,” I remembered the other day I thought “why is this operation now focusing the beam on my ovaries as I lay across my bed working on my laptop computer,  That is odd.”

I then remembered that during my routine Pap Smear, a week ago, as this operation sat watching the doctor perform the procedure, they listened to her stating that she could not locate my ovaries and ordered an ultrasound.  Seeing the ovaries is crucial for early detection of Ovarian Cancer.

As I created this blog, and kept feeling painful energy weapon beams to the are, I realized the likely reason.   The same individuals that were there during the exam were now focusing the beam on my right ovary for the very first time radiating shots of pain.

Get the picture?

The fact is there is absolutely no place that this 24/7 real time targeting operation does not follow victims, both outside and inside of our homes and private residences, to include when driving showering, dressing, undressing, eating, sleeping, using the restroom, etc., etc., etc.

The key is to create deadly illness that can be attributed as having another cause and not from the focused beam “slow kill.”

For the record, I have not history of breast or ovarian Cancer no where in my family tree on either side of my family, both mother and father.

LINK TO FEMALE ACTIVIST GIVEN BREAST CANCER BY DIRECTED ENERGY WEAPON FOCUS

LINK: http://9-11themotherofallblackoperations.blogspot.com/2013/10/is-dr-katherine-albrecht-being-targeted_27.html

LARGER LIST OF SYMPTOMS FROM VICTIM SURVEYS

Chilling of Skin/ Instant Coldness – Generalized or Localized
Thermal heating, nighttime, severe night sweats
Thermal heating, daytime, discernible “microwave hot spots” on skull
‘Intense’ Itching

(Commonly referred to by victims as the bee sting sensation.  Moving from that area symptom becomes a non-issue, usually back shoulder area of body)

Ringing in Ears
Body Manipulation
Induced Imagery/Thoughts
Induced Sleep
(especially noteworthy symptom is a common complaint while driving. Step away from the car twenty feet and symptom is a non-issue)

Seizures
Sensation of Blunt Trauma to Head
Sensation of Electric Current Running through the Body
Dehydration
Sudden onset asthma
Irregular Heartbeat
Hyperactive bladder, sudden incontinence

Diarrhea
Deterioration of Cognitive Abilities
Jaw or Tooth Pain
Severe facial and glandular swelling
Sleep Deprivation
Dizziness or Loss of Balance
Blackouts or loss of consciousness
Severe disorientation while driving
Lesions on Internal Organs
Sudden Rashes
Sudden appearance of large burn marks
Memory Loss
Thought Monitoring/Manipulation
Electronic Rape
Metallic Taste in Mouth
Thyroid Problems
Electroshocks
Nausea
Tingling
Extreme Fatigue
Nosebleeds
Topical & Internal Burning
Genital Manipulation
Numbness
Vision Loss/Impairment
Hair Loss
Benign or Malignant Tumors
Coughing up Blood
Induced Smells

JEFF RENSE – GOVERNMENT USING CITIZENS AS GUINEA PIGS… 

LINK:http://rense.com/general71/dire.htm

SLOW KILL DIRECTED ENERGY WEAPONS APPEARING ON CELL TOWERS

LINK:https://thelastgreatstand-older.com/2016/02/14/more-on-new-slow-kill-directed-energy-weapons-appearing-on-fake-cell-towers/

THE COVERT, HIGH TECH, MIND INVASIVE PSYCHO-PHYSICAL PROGRAM AND THE LAWS APPROVING IT

Understanding Electronic Warfare is key!

DEFINITION:https://en.wikipedia.org/wiki/Electronic_warfare

This new class of weapons is being used on unaware, not informed humans, who of course did not consent to such experimentation. The Nuremberg Code of Conduct for experimentation with human subjects, is part of the Customary Law and the UDHR. The Code lists ten points, which universally have been adopted after the Nuremberg trials of war criminals by the Nuremberg Military Tribunals.

The secret technologies in question are covered by military/agency secrecy orders, mostly obtained under the US Inventions Secrecy Act, 1951. The US Patriot Act, for example, protects governments and connected criminals from criticism and/or detection and prosecution. Under this act anyone whistleblowing or fighting the system on a major concern is arbitrarily deemed to be unpatriotic. They can then be listed (by a senior politician or at the request, through them, of a connected criminal) as a security risk and harassed covertly; using secret technologies. In fact a Department Of Defense Directive, Directive 5240 1-R, 1994, gives open permission for those under surveillance to be used for remote experimentation. It’s no coincidence that this particularly undemocratic and evil move was followed in 1996 by a significant increase in the number of satellites deployed for the purpose of civilian surveillance and harassment.

The victims are not openly confronted as that would remove any feigned excuses and leave the perpetrators open to all manner of accusation. Instead, the methods used are covert; employing high-tech methods to remotely torture, torment and deceive victims without leaving evidence…

FULL LINK:https://exposeintelligence.blogspot.ca/2014/07/dennis-kucinich-attempted-ban-of-space.html

UNDERSTANDING THE TARGETING PROGRAM VICTIMS HAVE BEEN PLACED INTO

crying-statue

Victims are under attack by the U.S. military and ALL of their “assets” (most often for having damaging information about law enforcement misconduct and corruption) unified by law for nonconsensual, research activity for military testing and any law enforcement purpose.

Propaganda against U.S. civilians has been authorized by the N.D.A.A. and is NOW BEING USED AGAINST YOU!

(the “puppets” constantly surrounding you EVERYWHERE YOU NOW GO are U.S. Special Forces, intelligence agents, federal, state and local law enforcement, and community policing participants)

YOU ARE BEING MONITORED 24/7/365. EVERYTHING you say. EVERY MOVEMENT you make. EVERY phone call. EVERY internet/electronic communication and activity. EVERY transaction. EVERY breath you take. All of your habits have been analyzed. EVERYTHING about you is being analyzed. THIS IS LITERALLY THE MOVIE “Eagle Eye” and YOU are the target

Quantum Physics is being used against you in your new “constantly negative environment” (research the term and understand the detrimental health and emotional effects of constantly “absorbing their negative energy”)

Intimidation is a primary objective in psychological warfare. Understand this key to their puzzle and recognize this objective. This program is designed to silence and discredit. Do not fall for their clever charade – it is all part of their grandiose show!

You are being FRAMED and subjected to an extraordinary entrapment campaign that is designed to alienate you, enrage you and get you to lash out in any way possible in order to incarcerate or simply REMOVE YOU from society

Everything you’ve ever been taught to believe about justice, freedom, constitutional/civil and even human rights have now VANISHED. You are a test subject in a classified and extremely intricate maze of psychological warfare (sometimes also accompanied by ongoing, daily physical torture and poisoning through the targeting of directed energy/radiation/acoustical next-generation weaponry designed to break you and eliminate you)

Your new reality is now that of a non-consenting military test subject in a classified program that is controlled at THE HIGHEST levels of our government and military

The damaging information you have about the police, military or intelligence (our government) is deemed to be MUCH MORE IMPORTANT to SILENCE and DISCREDIT than any individual’s rights (or even life)

WELCOME TO A POST PATRIOT ACT SOCIETY. Your new reality will now more closely resemble a 1984 Orwellian Police State than any normal existence you’ve experienced prior to being placed into this program (you have officially been listed as an enemy of the U.S. government and will now be under constant attack by our government – utilizing ALL of their resources to covertly destroy you)

Yes they will KILL anyone exposing the HORRORS OF WHAT IS HAPPENING TODAY!!!

Understand that ACTIVIST AND WHISTLEBLOWERS are not joking and have no time to play.  Understand that IF an activist, whistleblowers, victim cannot be silenced, and continues to publicize the truth, using many methods, and doing so effectively, the only alternative could become COVERT KILL approved by monstrous high level corruption  by unified government agencies!

Add the names of many to the list of victims being covertly tortured, both inside and outside residences, tracked and monitored around the clock by psycho-physical technology in what is materializing as official “Slow Kill” operations deemed expendable.

The fact is, the TRUTH is the last thing those involved in this monstrous, massive, nationwide subjugation, silencing program want, nor the truth revealed or publicized.

NSA WHISTLEBLOWER ARTICLE LINK:http://www.digitaljournal.com/pr/2964491

SNOWDEN LINK:

http://www.biggerthansnowden.com

The technology today is land, sea, drone, satellite, cellular tower, portable and handheld and victims are TARGETED, in this new paradigm, 24/7 using COINTELPRO tactics and mobilization and reassigned military personnel and unleashed military technology.

The “War on Terror” has become an unjust misnomer for official terror focused on US citizens, denied, Constitutional, Civil and basic Human Rights.

How easy it is today to label anyone a “Domestic or Potential Terrorist” and for any reason under the Sun then unleash advanced psycho-physical and mind invasive targeting technology with covert torture. These efforts are effortlessly originating from nationwide state-of-the-art operation centers both military and police counter-terrorism divisions using advanced military technology.

Directed Energy Weapon Video: https://www.youtube.com/watch?v=f8tyi4O0Exw

hyten

Funding from a 50 Billion dollar “Black Budget” has allowed leased location set-ups in communities settings, allowing operatives in “THE PROGRAM” to covertly target victim’s government agencies want silenced using the Pain Ray which is so painful you literally welcome death.

ALL FUNDED BY THE BLACK BUDGET:https://www.wired.com/1995/11/patton/

BLACK BUDGET:https://en.wikipedia.org/wiki/Black_budget

PAIN RAY VIDEO:

MISINFORMATION: These weapons are known, to cause serious injury but the DOD does not want this publicized. This is especially true how they are being used in covert targeting operations where victim’s nationwide report being beamed around the clock, 24/7, from neighboring locations, in vicious attacks designed to break them down.  These weapons are portable, handheld, land, sea, cellular tower antennae topped, drone, and space-based.

THE FACT IS THESE WEAPONS ARE ANYTHING BUT NON-LETHAL WHEN USED AND FOCUSED IN COVERT OPERATIONS IN AROUND THE CLOCK TARGETING.

Six Horrific Weapons:http://www.cracked.com/article_16710_6-non-lethal-weapons-thatll-make-you-wish-you-were-dead.html

US CITIZENS HAVE BEEN LABLED “DOMESTIC TERRORIST”

LINK:http://freedomoutpost.com/labeling-citizens-domestic-terrorists-ultimate-betrayal-federal-government/

“POTENTIAL” TERRORIST LIST WHICH CAN GET ANYONE TARGETED BY FOCUSED TECHNOLOGY

LINK:http://thetruthwins.com/archives/72-types-of-americans-that-are-considered-potential-terrorists-in-official-government-documents

DIRECTED ENERGY WEAPON REALITY LINK

BELIEVE IT OR NOT!

BLOG WEBSITE:

http://bigbrotherwatchingus.com

BIG BROTHER’S AGENCIES ARE DOING

FAR MORE THAN JUST WATCHING TODAY!

MIND CONTROL IS ANTEDILUVIAN

“Since the dawn of time, the most powerful groups in every society have practiced forms of mind control on populations. They determined it was necessary. Eventually, they decided it was their most important job. Convincing the masses that a fabricated reality is Reality…that task requires formidable mind control.” 

“The Underground”  ~ Jon Rappoport

THE US GOVERNMENT’S BIO-ELECTROMAGNETIC, ONGOING HUMAN EXPERIMENTATION PROGRAM, IS SHROUDED IN SECRECY FOR OBVIOUS AND GOOD REASON:

LINK: http://www.i-sis.org.uk/BW.php

high-tech-fraud-deceived

MOVIE TRAILER:https://vimeo.com/174279419  

*FREE TO AMAZON PRIME MEMBERS OR RENT FOR JUST $ 1.99 or 2.99*

screen-shot-2017-01-18-at-12-29-54-am

LINK TO AMAZON FILM:

https://www.amazon.com/gp/aw/d/B01N6RQTAU/ref=mp_s_a_1_1?ie=UTF8&qid=1484762102&sr=8-1&pi=PI_PJStripe-Prime-Only-500px%2CTopLeft%2C0%2C0_AC_SX118_SY170_QL70&keywords=mind+control%3A++schizophrenic+high+tech+fraud&dpPl=1&dpID=51GveHiDsWL&ref=plSrch

 A MUST SEE!  

EDUCATE YOURSELF!

Knowledge is power and awareness is key!

TRUTH A POWERFUL,

UNBEATABLE WEAPON,

AND HOPE TO SAVE LIVES!

INSPIRED BY TRUE STORIES and how

“Hearing Voices” technology evolved.

Synopsis:  High school Chemistry teacher, Josh McKensie had a reputation for being one of the best teachers in his state. That was until he gave a student a non-passing grade.

The student then alleged that the reason was due to her not accepting the teacher’s sexual advances.

Josh McKensie, although innocent, and the student’s lie later recanted, however, had been placed into a massive psycho-physical nonconsensual high tech, mind invasive, covert verbal harassment, technology testing operation called “The Program” shattering and destroying his life covertly and reported by untold numbers of very real victim’s worldwide.

SUBSTANTIATING LINKS:

A VOICE ONLY YOU CAN HEAR – DARPA’s Sonic Projector

LINK:

http://www.thelivingmoon.com/45jack_files/03files/Sonic_Projection.html

 

The following are names defining the high-tech “Hearing Voices Effect,” also known as the DOD Voice of God, Voice to Skull (v2k) Synthetic and Artificial Telepathy, Neural Decoding, Remote Neural Monitoring, Frey Effect (after Neuroscientist Alan Frey) Microwave Auditory Effect, and patented Radio Frequency (rf) hearing, etc.

DOD VOICE OF GOD RAY GUN:

https://www.newscientist.com/article/dn14250-microwave-ray-gun-controls-crowds-with-noise/

VOICE TO SKULL (V2K):

https://sites.google.com/site/targetedindividuals101/home/v2k

SYNTHETIC / ARTIFICIAL TELEPATHY:

http://artificialtelepathy.blogspot.com/2009/06/focus-on-us-air-force-space-command.html

http://www.mindcontrol.se/?page_id=1681

NEURAL DECODING:

https://www.newscientist.com/article/mg22429934.000-brain-decoder-can-eavesdrop-on-your-inner-voice/

https://www.ncbi.nlm.nih.gov/pubmed/23558170

REMOTE NEURAL MONITORING (RNM)

Human experimentation victims, globally, report the scientist hoping to control people and operatives using this technology are factually using the covert RNM capability to beam deviant suggestions, against their will or out of character in set-ups, and open literature evidence documents this also as a definite part of the overall brainwashing, testing operation.  However, without a doubt the capability to read the victim’s thoughts is PIVOTAL in these covert terrorist/PSYWAR operations:

LINK:http://www.learning-mind.com/remote-neural-monitoring-how-they-spy-on-your-thoughts/

FREY EFFECT (SYNTHETIC TELEPATHY & THE EARLY MIND WARS):

http://www.nwbotanicals.org/oak/newphysics/synthtele/synthtele.html

MICROWAVE AUDITORY EFFECT:

https://en.wikipedia.org/wiki/Microwave_auditory_effect

RF HEARING PATENT:

movie-patent-rf-hearing-effect

THE DIFFERENCE BETWEEN ARTIFICIAL TELEPATHY AND SCHIZOPHRENIA

NOTE:  As detailed in the documentary, knowledge of the Electromagnetic Spectrum’s various uses and for mental manipulation, influence, and control of individuals, groups and large populations, is antediluvian.  As a result, of this awareness, today, many highly credible individuals now question if the technologically beamed “Synthetic Telepathy” has been the culprit long before revelations.

LINK:

the difference between targeted individuals and schizophrenic persons

TARGETED INDIVIDUALS 101 – THE MILITARIZED INDUSTRIAL COMPLEX

LINK:

https://sites.google.com/site/targetedindividuals101/home/v2k

LINK TO GLOBAL RESEARCH MIND CONTROL ARTICLES

http://www.globalresearch.ca/search?q=Mind+Control&x=0&y=0

MICROWAVES BIO-EFFECT CONGRUENCE WITH SCHIZOPHRENIA

LINK:

http://cogprints.org/6146/

CONVENIENT “MARTHA MITCHELL EFFECT” AND MISDIAGNOSIS OF THE TRUTH AS MENTAL ILLNESS WHEN VICTIM’S REVEAL THE TRUTH OF WHAT IS HAPPENING TO THEM.

LINK:

https://en.wikipedia.org/wiki/Martha_Mitchell_effect

ORGANIZED COMMUNITY STALKING PLAYS A KEY ROLE:

http://www.thomhartmann.com/users/bluedog-294/blog/2015/06/gang-stalking-realis-it-fbi-program

POLITICAL PERSECUTION CONTINUES

YET ANOTHER HIGHLY EDUCATED, BRILLIANT, YOUNG MAN HAS BECOME A TARGETED INDIVIDUAL, AMONG THOUSANDS, AND A THREAT AS A “TRUTHER” EXPOSING THIS ATROCITY, AS HAVE MANY WORLDWIDE, IN A CLIMATE OF HIGH TECH CORRUPTION AND ONGOING EFFORTS FOR SOCIAL CONTROL!

LINK:

http://politicalpersecution.blogspot.com/2015/02/the-machine-organized-gang-stalking-program.html

 IT IS NOT ALIENS NOR DEMONS OPERATING THIS TECHNOLOGY!

IT’S, WITHOUT A DOUBT, HUMAN MONSTERS, WHO HAVE BEEN DOING SO IN ONGOING RESEARCH, TESTING AND DEVELOPMENT PROGRAM, MUCH LONGER THAN REPORTED OR DOCUMENTED BY OPEN LITERATURE EVIDENCE UNDER A SHROUD OF HIGH LEVEL SECRECY.

KEEP IN MIND THAT TESTING OF THIS TECHNOLOGY DATES BACK AT LEAST 100 YEARS!

In fact, it was in opposition to Freemasonry, that people used and constructed “Tin Foil Hats” after believing that their minds were being read and tampered with by the covert power structure.  

This is documented to have occurred as far back as the 1700s.

HISTORY OF THE TIN FOIL HAT BELOW

IT NEVER HAS BEEN ALIENS, DEMONS OR A CHEMICAL IMBALANCE IN THE BRAIN AS PEOPLE HAVE BEEN SOLD FOR DECADES BY COMPLIANT, PSEUDO-SCIENCE PSYCHIATRY!

LINK:http://in5d.com/the-history-of-the-tin-foil-hat/

FILM WEBSITE:

http://bigbrotherwatchingus.com

Einstein Appalling

Following is a list of the actual testing and development programs, which ran for 20 years all across the USA by many agencies.  

Documented are specific focus in specific areas which set the stage for what is happening today, and the resulting highly advanced psychotronic technology, still in ongoing research, testing and development programs by Department of Defense (DOD) contractors, and the DOD aka Military Industrial Complex, etc.

LINK:http://ensemble.va.com.au/tableau/suzy/TT_ResearchProjects/Hexen2039/PsyO/mkultra.html

***************************************************************

THE GOVERNMENT SCIENCE OF DESTROYING WHISTLEBLOWERS

LINK:http://www.activistpost.com/2016/10/government-science-preventing-whistleblowers-speaking.html

JUST HOW FAR WILL THESE COVERT EFFORTS GO TO KEEP THE TRUTH HIDDEN?

Drone Assassination

30,000 drones approved for US skies by 2020 and one, without a doubt, has Author Renee Pittman’s name on it.  And, many activist, whistleblowers report this specific type of aerial focus and that it includes the patented, beamed, psychotronic weapon capability.

BELIEVE IT OR NOT!

 THE SECRET GOVERNMENT RULEBOOK FOR LABELLING YOU A TERRORIST:

https://theintercept.com/2014/07/23/blacklisted/

ACTIVIST, WHISTLEBLOWERS, AND VICTIMS CAN BE LABELED STRATEGICALLY AS ENEMIES OF THE STATE THEN ONE OF APPROVED 30,000 DRONES FOR US SKIES BY 2020, USED FOR FOCUSED TARGETING EFFORTLESSLY AND IT IS COST FREE TO THE REQUESTING AGENCY.

http://www.cnn.com/2014/02/10/politics/us-killing-americans/

drone-red-circle

This particular drone is being operated from a major operation set-up,  from the corner house directly behind my residence, guaranteed!  It is seen perched over a resident’s home who is also, employed by the LAPD, coincidentally?  From the corner location, I have witnessed USAF military personnel, going and coming, LAPD RACR, contractors, and Federally selected criminal informants  typically for these types of unified efforts, used to operate the “slow kill pain ray beam” for ongoing torture.  All have a vested interest in insuring the truth is kept hidden because the technology is available and used by many.  Its purpose is to microwave weapon, slowly cook the fluids away from the joints, of the victim, focus on the head for synthetic creation of an aneurysm, a woman’s breast or heart muscle sporadically.  The ongoing threat is stop what you are doing or you are dead in 6 months.

The drone image is that of a factual image taken with my iPhone that is without a doubt, assigned to me 24 hours a day, 7 days a week.  When I move, it moves, East, West, North or South.  Or, it is positioned in a stationary position when inside my residence.

The purpose is to beam relentless covert physical torture around the clock, both inside and outside my residence, keeping me in pain by the beamed Pain Ray, using tactics characteristic of these specific types of targeting operations.  The hope is that the targeted victim will react negatively in some way, pushed over the edge by the intense, covert high tech, psychological electronic harassment and then strategically sabotage themselves.

Many victims, activist and whistleblowers have consistently proven we will not.

As we continue the battle for rightful humane exposure of the truth, we have been given little options but to hopefully, effectively fight for our lives, in the realization that key is to take the plight, reportedly of at least a half of million victims within the USA alone, founded on unwavering truth, to the public, revealing the horrific wrong of a secret program decades perfecting.

Many have tried everything, which has resulted in untold numbers of dismissed, hopeful Civil Action after Civil Action regarding the denial of Constitutional, Civil and even basic human rights, to include  efforts even brought by the ACLU, and Electronic Frontier Foundation.  Silenced under the guise of National Security Orders is a supreme legal challenge.  Victims have learned and fully recognize the onus strategic machination by specific agencies, and creation of specific laws, hoping to stop the truth at all cost as being a Goliath. 

Many, to include myself, have been marked as expendable, under the literal radar, for simply the courageous to stand resulting in what is reported by many as an operation that materializes from a bogus label of being a threat, or “Domestic Terrorist,” then used as the foundation for approval of “Electronic Surveillance” and ongoing human experimentation programs.

This label approves and legitimizes military, Federal, state and local police covert targeting operations, legalization specifically for these specific agencies and sadly, depending on how effective the victim is at exposure, results in a program reported to be essentially a covert slow kill operation, revealed by nonstop beamed microwave irradiation of the victim’s body.

The fact is, victims have literally been forced to become pro-active or suffer in silence, covert malicious attempts focused on the destruction of their lives in a program proven that will viciously destroy anyone around a victim as well, to impact and to silence the victim in PSYWAR to include targeted victim families.

With high level agency involvement, to include DOD contractors for plausible deniability, revelations of documented patented technology, research, TESTING and development program, and documented factual approving laws, for ongoing human experimentation for military and law enforcement personnel, the odds are great making full disclosure of the truth both pivotal and URGENT!

Blue Ribbon

Conspiracy Theory, TruTV “BRAIN INVADER” episode, December 2012 w/Jesse Ventura

LINK:http://www.dailymotion.com/video/x18uyto_conspiracy-theory-with-jesse-ventura-brain-invaders_shortfilms

ACTIVIST NOTE

Five books and a documentary, with a sixth book in the works and the operatives assigned and camped out around me, determining me special, still refuse to accept that I simply am not scared or will ever be.  Why?  Because they are sticking with what is proven effective with many victim’s silenced or entrapped by these operations using mind invasive technology on everyone!   

The formula is simple, the creation of fear through the  ongoing covert threat of death and extreme covert torture.

My allegiance is to God, fearlessly!  Their allegiance is too the evil energy possessing them, calling evil good in great delusion.

This is a program, established under the guise of a bogus investigation, 100%, with many in this program much longer than realization, and this is the factual reason those pulling the string remain well hidden unless their goons can scare  or brainwash the targeted victim.

A man of average, reasonable, intelligence, would have grasped this by now, based on my consistent productivity while under an intense psycho-physical targeting and focus for now 10 years, as well as, the ongoing combined Covert Organized Stalking mobilization typically mobilized in a victim’s community by those hired as “Surveillance Role Players” and sent out wherever the victim goes, i.e., Starbucks, in acts of hopeful intimidation.   

But nooooo…..  Not this crew of buffoons trying to frighten a woman, proven determined and focused on a rightful fight!

Even more bizarre is their belief that my life is a challenge to their ego driven conceit and apparent vicious derangement!  

Instead, believe it or not, in the theatrics, while sitting on at the helm of their real time computer, tracking and monitoring me, around the clock that eventually I will succumb.  And,  also there is a continuous hope to use anyone by manipulating and influencing anyone around me, as they watched the process for finalization of the docudrama and other efforts.   They, the agency spearheading this effort, choose to send out various characters, in hope that their portrayal of themselves as, believe it or not “hit men” will get the results they seek, which is a ridiculous childish ploy they hope will scare me!   It won’t!  

Far be it for me to be afraid to fight for my God given life or hope to help others!

With Love,  

Renee

Lioness 

“There will be no love, except the love of Big Brother” ~ George Orwell – 1984

On the surface, the military / law enforcement unified biometric surveillance program appears to be of great and useful value to humanity.  This is especially true when the public is sold on the “War on Terrorism,” the foundation and necessity for war, and numerous terrorist within the USA.  This manifestation perception created the necessity for biometric signature download of US citizens, as discussed in previous blogs, and resulted in the Total Information Awareness Program, aka DNA data mining, and advanced technologies, little publicized, and operations which sprang up in Federal, State and local law enforcement counter-terrorism, and unified military divisions, which stepped forth center stage, legally, and officially, after 9/11.

SIGNAL INTELLIGENCE COLLECTION, INTELLECTUAL PROPERTY, MONITORING, TRACKING, AND MIND READING BY BRAINWAVES

RFID Chips implantation today is OBSOLETE in light of Brainwave Signal Intelligence Collection and Biometrics Signatures of EVERYONE, and counting. successfully uploaded into the supercomputer. You can be tracked, monitored, harassed, tortured and terrorized, and your Intellectual Property stolen by operatives listening to your thoughts or plans or even taken out anywhere on the face of the Earth!

http://www.internationallawjournaloflondon.com/protecting-brainwaves-considering-signal-intelligence-technology-advances.html

MILITARY BIOMETRIC PROGRAM

LINK:http://www.eis.army.mil/programs/biometrics

INTRODUCTION TO BIOMETRICS AND BIOMETRIC SYSTEMS

LINK:http://www.tam.usace.army.mil/Portals/53/docs/UDC/Training/Biometrics%20101.pdf

Essentially the technology they sold to track Terrorist or the War on Terror has been turned on US citizens and used for Biometric Satellite Surveillance

MICROWAVES DIRECTED ENERGY WEAPONS RESONATE WITH THE VICTIMS DNA. CAN’T THEY BE BLOCKED?

LINK:https://targetedindividualscanada.com/2010/06/24/article-blocking-microwave-signals/

YOU CAN BE IDENTIFIED BY YOUR BRAINWAVE PATTERN WITH 100% ACCURACY

BIOMETRIC TRACKING OF ANYONE, WHISTLEBLOWERS, ACTIVIST LABELED CRIMINALS CAN BE TRACKED FOR THE REST OF THEIR LIVES AND ARE


LINK:
http://encyclopedia.thefreedictionary.com/Total+Information+Awareness+Office

Most are sold on the concept.  That is until the horrific realization, voiced by Targeted Individuals, nearing millions, began surfacing and reporting that this program, and the technology at hand, has been officially redirected, covertly, covert being the key word, and now used in vicious targeting campaigns, focused on US citizens, nonconsensually, and of whom, in many cases, have been bogusly labeled as criminals to legitimized these operations and testing.

The sheer fact of these military / law enforcement operation’s bypassing the doctrine of ethical and moral conduct, and protocol, intentionally written into the United States Constitution and the subsequent horrors revealed by many, as a 100% effort for covert destruction of life.   Through ongoing targeting, Targeted Individuals have yet to see anyone released from “The Program” with everyone targeted right up until the death bed.  The fact is, these high tech, technology testing efforts appear designed to secretly push the target over the edge, to hurt self, or others, into a psyche ward after mental illness discrediting to hide the truth, and through electromagnetic, manipulation and influencing, jailed, and, it is all in a day’s work.  The relentless nature of these joint efforts, and technological capabilities reveal a program of non-stop biometric surveillance which tells a tale of a horrific truth regarding an intentionally, undisclosed program, hidden from the public, and, the macabre purpose revealed in 24 hour a day, 7 days a week biometric surveillance, monitoring, tracking, extreme psychological and physical assaults.

Some of the more horrendous, unethical, immoral, and inhumane efforts, are being reported as occurring within the civilian sector, by law enforcement, DHS, who are seeking to create scenarios based on possibilities, through focus of a mere thought deciphered from a targeted using documented and patented mind reading software.  Human thoughts are transitory, as the mind processes a variety of thousands of thoughts in a single a day, and our minds act as a filter before final conclusion are any conclusions ever finalized.  Yet, any one can become a target for a thought which may be emotionally connected, and only the result of brief, passing, emotional response.

In this respect, biometric surveillance, and the many characteristics of biometric electromagnetic “Black Bag” technology frequency, mind invasive, manipulation and influence, as well as covert torture, Psy Op efforts work hand-in-hand within these operations, and the subsequent unscrupulous emerges and becomes a monstrous reality thereby taking police brutality, within the “Militarized Police State” to a whole new, high tech scientific level backed and enforced by NWO agencies.

THE NEXT GENERATION OF THE FBI’S BIOMETRIC DATABASE

LINK:http://www.activistpost.com/2016/06/the-fbi-next-generation-biometric-database-must-be-stopped.html?utm_source=Activist+Post+Subscribers&utm_medium=email&utm_campaign=b393695649-RSS_EMAIL_CAMPAIGN&utm_term=0_b0c7fb76bd-b393695649-387842517

“BLACK BAG” TECHNOLOGY FUNDED BY “BLACK BUDGET”

Tesla 2

THINK WEAPONIZED

The Strategic Defense Initiative (SDI) became a reality by United States President Ronald Reagan on March 23, 1983. However, again, spy satellites quite possibly were already functioning and violating people’s right to privacy when President Reagan proposed SDI, or “Star Wars.” The Cuban Missile Crisis of 1962 demonstrated the military usefulness of satellites.

The Strategic Defense Initiative at that time was for the use of ground (GWEN) and space-based systems to protect the United States from possible attacks by strategic nuclear ballistic missiles. The SDI laid official foundation for the use of satellite surveillance and most believe the classified, little known, satellite delivered technology which has trickled down to fusion center use on United States citizens today called “black bag” technology.

Black bag technology is referred as patented psychological electronic “psychotronic” technology such as mind reading, etc., and infrared lasers that can assault someone even while that someone is indoors. Aviation Week & Space Technology mentioned in 1984 that “facets of the project (in the Star Wars program) that are being hurried along include the awarding of contracts to study…a surveillance satellite network.”

This ideation was bound to be abused yet no group is fighting to cut back or subject to democratic control these programs or the terrifying new influence technology. As one diplomat to the United Nations remarked, “‘Star Wars’ was not a means of creating heaven on earth, but could result in hell on earth.”

BLACK BUDGET

The black budget is the government’s illusory and tangled accounting of what it spends on intelligence gathering, covert operations, and – less noticeably – secret military research and weapons programs.

Exposing the Black Budget – Washington Post

LINK:http://www.washingtonpost.com/wp-srv/special/national/black-budget/

RECONNAISSANCE (SPY) SATELLITES

LINK:https://en.wikipedia.org/wiki/National_Reconnaissance_Office

Blog California Marine and Air Force Operation

California Marine and Air Force Operation

SIGNAL INTELLIGENCE COLLECTION, INTELLECTUAL PROPERTY, AND MIND READING BY BRAINWAVES

RFID Chips implantation today is OBSOLETE in light of Brainwave Signal Intelligence Collection and Biometrics Signatures of EVERYONE, and counting. successfully uploaded into the supercomputer. You can be tracked, monitored, harassed, tortured and terrorized, and your Intellectual Property stolen by operatives listening to your thoughts or plans or even taken out anywhere on the face of the Earth!

http://www.internationallawjournaloflondon.com/protecting-brainwaves-considering-signal-intelligence-technology-advances.html

BIOMETRIC COLLECTION LAWSUIT

LINK:http://www.activistpost.com/2016/05/lawsuits-challenge-tech-giants-large-scale-biometric-collection.html?utm_source=Activist+Post+Subscribers&utm_medium=email&utm_campaign=d43454cd0b-RSS_EMAIL_CAMPAIGN&utm_term=0_b0c7fb76bd-d43454cd0b-387842517

SATELLITE TRACKING BY FACIAL RECOGNITION

LINK:http://skullsinthestars.com/2012/06/13/how-well-can-the-government-spy-on-us-via-satellite/

LOW ORBITING IRIDIUM SPY SATELLITES 

http://www.c4isrnet.com/story/military-tech/uas-isr/2015/06/09/iridium-satellite-spy-capabilities/28742309/

IRIDIUM NEXT

https://www.iridium.com/network/iridiumnext

SPACE-BASED DOMESTIC SPYING – KICKING CIVIL LIBERTIES TO THE CURB LINK

LINK:http://globalresearch.ca/space-based-domestic-spying-kicking-civil-liberties-to-the-curb/10864

ACLU TESTIFIES SPY SATELLITES CALLS MORATORIUM DOMESTIC USE

https://www.aclu.org/news/aclu-testifies-spy-satellites-calls-moratorium-domestic-use?redirect=technology-and-liberty/aclu-testifies-spy-satellites-calls-moratorium-domestic-use

NOTE:  The George Bush Jr. administration’s “National Application Office,” (NAO) was established without approval by the proper channels and was shut down, however, the same goal would emerge as, and become, DHS Fusion Centers.

**********************************************

The fact is, as shown below, Target Individuals are essentially being tracked by biometric characteristics, which resonate to a electromagnetic frequency such as DNA.  Many targets have reported that even after having left one country, under extreme psycho-physical torture horrendous attacks, hoping to save their lives, only to find, after arrival in another, that the inhumane targeting continues and in most cases without missing a beat.

There is a lot of controversy about how this is being accomplished.  Many have zeroed in on the logical explanation when faced with country to country targeting or even inside and outside the target’s residence, or from city to city, or state to state.  The only method capable of this is satellite surveillance, and what is documented as a biometric program, through the use of spy satellites already in place, making, as stated in the last blog, satellite surveillance of anyone on the face of the Earth nearly cost free to Federal, State and local agencies connecting the military, “Militarized Police State.”

DNA ELECTROMAGNETIC FREQUENCY EXPLANATION

DNA, EMF explanation

YOUR DNA THE ULTIMATE ANTENNA

LINK:http://humansarefree.com/2014/11/everything-you-are-is-frequency-and.html#more

TARGETED VICTIMS ARE BEING TRACKED BY DNA

LINK:http://www.ncbi.nlm.nih.gov/m/pubmed/21457072/

Biometrics

IRIS, FINGERPRINT, DNA FREQUENCY, BRAINWAVES

Biometric Task Force

Biometric Capabilities

LINK:https://www.google.com/search?q=BIMA+biometric+program&client=safari&rls=en&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAmoVChMIwe201OrTyAIVUjqICh0R3QzO&biw=1280&bih=635#tbm=isch&tbs=rimg%3ACTcx_1uaTAwKoIjjkLUJkOTLClVw-TIVurf8BeOO_1Md1MnxH83zJnBIu4UpL7TnDtL43JazXBzSl54KzpNaXNUJ_1ObyoSCeQtQmQ5MsKVEeMPMMVzvNwKKhIJXD5MhW6t_1wER4w8wxXO83AoqEgl4478x3UyfERHjDzDFc7zcCioSCfzfMmcEi7hSEeMPMMVzvNwKKhIJkvtOcO0vjckR59lugAGFkM0qEglrNcHNKXngrBHjDzDFc7zcCioSCek1pc1Qn85vEa1FuGrbTqIt&q=BIMA%20biometric%20program&imgrc=jMtvs7O1D8peBM%3A

Now known as the Defense Forensics and Biometric Agency (DFBA), the term “BIMA” is still used in reference to the Biometrics Identity Management Activity in Clarksburg, WV, which maintains the Automated Biometric Identification System (ABIS). The term “BIMA” does not represent the organization at large, but only that specific activity.

BIMA is the primary proponent of biometrics within DoD. Biometrics are distinct, measureable features of an individual (e.g., facial features, fingerprints, voice/speech, walking gaits, etc.) that can be utilized to discern their identity.  BIMA leads the development and implementation of biometric technologies for DoD Combatant Commands and other related agencies to assist the U.S. warfighter in accurately identifying unknown persons. BIMA also coordinates the activities related to the acquisition and maintenance of biometrics databases which U.S. warfighters can access to identify individuals.

The Department of Defense Forensic and Biometric Research and Development Program (“Program”) is administered by the U.S. Army Research Office and the Defense Forensics and Biometrics Agency. The Program aims to enhance the capability of forensic science and biometric applications for DoD customers both in traditional law enforcement/criminal justice purviews and in expeditionary environments. The Program accomplishes this mission by funding research projects that lead to the production of useful knowledge, materials, devices, systems, or methods that have forensic or biometric function. The Program also supports the Armed Forces Medical Examiner System (AFMES), Department of Defense Cyber Crime Center (DC3), and Joint POW/MIA (Prisoner of War/Missing in Action) Accounting Command Central Identification Laboratory (JPAC – CIL). For more information about the mission, functions, and objectives of these customers please see their websites below…

FBI BIOMETRIC SURVEILLANCE CONNECTION

LINK:https://www.fbi.gov/about-us/cjis/fingerprints_biometrics/biometric-center-of-excellence/partners

FBI BILLION DOLLAR BIOMETRIC PROGRAM IS FOR **EVERYONE** IT IS BEING SOLD AS SPECIFICALLY FOR ALLEGED CRIMINALS, BUT IN REALLY IT IS PART OF THE POPULATION CONTROL EFFORT

TWO VIDEO LINKS:

LINK:https://www.youtube.com/watch?v=c1Ucu8qMZEE

HOW MILITARY OPERATIONS ARE CONNECTED TO *ALL* LEVELS OF LAW ENFORCEMENT, OPERATING AS COUNTER-INTELLIGENCE DIVISIONS, FROM STATE-OF-THE-ART OPERATION CENTERS GROWING NATIONWIDE

LINK:https://login.milsuite.mil/?goto=https%3A%2F%2Fwww.milsuite.mil%3A443%2Fwiki%2FBiometrics_Training

HOW THE DOD AUTOMATION BIOMETRIC TARGETING SYSTEM IS SET-UP

  • ABIS interfaces with global biometrics data collectors and users, as well as outside databases.-  Military Services and Combatant Commands collect biometrics data (fingerprint, palm print, iris scans, and facial scans) from persons of interest in the field using hand-held devices and submit that data to ABIS.
  • Intelligence analysts analyze and fuse biometrics information via the Biometric Identity Intelligence Resources (BI2R), an automated database outside the ABIS, and provide information back to the users in the field.

LINK:http://www.dote.osd.mil/pub/reports/FY2013/pdf/army/2013dodabis.pdf

LEGAL CONCERNS RELATED TO THE ARMY’S BIOMETRIC HUMAN TRACKING AND MONITORING PROGRAM

LINK:https://www.rand.org/content/dam/rand/pubs/monograph_reports/MR1237/MR1237.appc.pdf

BIOMETRICS

Fingerprints being scanned as part of the US-VISIT program

Biometric surveillance is any technology that measures and analyzes human physical and/or behavioral characteristics for authentication, identification, or screening purposes. Examples of physical characteristics include fingerprints, DNA, and facial patterns. Examples of mostly behavioral characteristics include gait (a person’s manner of walking) or voice.

Facial recognition is the use of the unique configuration of a person’s facial features to accurately identify them, usually from surveillance video. Both the Department of Homeland Security and DARPA are heavily funding research into facial recognition systems. The Information Processing Technology Office, ran a program known as Human Identification at a Distance which developed technologies that are capable of identifying a person at up to 500 ft by their facial features.

Another form of behavioral biometrics, based on affective computing, involves computers recognizing a person’s emotional state based on an analysis of their facial expressions, how fast they are talking, the tone and pitch of their voice, their posture, and other behavioral traits. This might be used for instance to see if a person is acting “suspicious” (looking around furtively, “tense” or “angry” facial expressions, waving arms, etc.).

A more recent development is DNA profiling, which looks at some of the major markers in the body’s DNA to produce a match. The FBI is spending $1 billion to build a new biometric database, which will store DNA, facial recognition data, iris/retina (eye) data, fingerprints, palm prints, and other biometric data of people living in the United States. The computers running the database are contained in an underground facility about the size of two American football fields.

The Los Angeles Police Department is installing automated facial recognition and license plate recognition devices in its squad cars, and providing handheld face scanners, which officers will use to identify people while on patrol.

Facial thermographs are in development, which allow machines to identify certain emotions in people such as fear or stress, by measuring the temperature generated by blood flow to different parts of their face. Law enforcement officers believe that this has potential for them to identify when a suspect is nervous, which might indicate that they are hiding something, lying, or worried about something.

AERIAL

Micro Air Vehicle with attached surveillance camera

Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle—such as an unmanned aerial vehicle, helicopter, or spy plane. Military surveillance aircraft use a range of sensors (e.g. radar) to monitor the battlefield.

Digital imaging technology, miniaturized computers, and numerous other technological advances over the past decade have contributed to rapid advances in aerial surveillance hardware such as micro-aerial vehicles, forward-looking infrared, and high-resolution imagery capable of identifying objects at extremely long distances. For instance, the MQ-9 Reaper, a U.S. drone plane used for domestic operations by the Department of Homeland Security, carries cameras that are capable of identifying an object the size of a milk carton from altitudes of 60,000 feet, and has forward-looking infrared devices that can detect the heat from a human body at distances of up to 60 kilometers. In an earlier instance of commercial aerial surveillance, the Killington Mountain ski resort hired ‘eye in the sky’ aerial photography of its competitors’ parking lots to judge the success of its marketing initiatives as it developed starting in the 1950s.

“HART” PROGRAM CONCEPT DRAWING FROM OFFICIAL IPTO (DARPA) OFFICIAL WEBSITE

The United States Department of Homeland Security is in the process of testing UAVs to patrol the skies over the United States for the purposes of critical infrastructure protection, border patrol, “transit monitoring”, and general surveillance of the U.S. population. Miami-Dade police department ran tests with a vertical take-off and landing UAV from Honeywell, which is planned to be used in SWAT operations. Houston’s police department has been testing fixed-wing UAVs for use in “traffic control”.

The United Kingdom, as well, is working on plans to build up a fleet of surveillance UAVs ranging from micro-aerial vehicles to full-size drones, to be used by police forces throughout the U.K.

In addition to their surveillance capabilities, MAVs are capable of carrying tasers for “crowd control”, or weapons for killing enemy combatants.

Programs such as the Heterogeneous Aerial Reconnaissance Team program developed by DARPA have automated much of the aerial surveillance process. They have developed systems consisting of large teams drone planes that pilot themselves, automatically decide who is “suspicious” and how to go about monitoring them, coordinate their activities with other drones nearby, and notify human operators if something suspicious is occurring. This greatly increases the amount of area that can be continuously monitored, while reducing the number of human operators required. Thus a swarm of automated, self-directing drones can automatically patrol a city and track suspicious individuals, reporting their activities back to a centralized monitoring station. In addition, researchers also investigate possibilities of autonomous surveillance by large groups of micro aerial vehicles stabilized by decentralized bio-inspired swarming rules.

DATA MINING AND PROFILING

Data mining is the application of statistical techniques and programmatic algorithms to discover previously unnoticed relationships within the data. Data profiling in this context is the process of assembling information about a particular individual or group in order to generate a profile — that is, a picture of their patterns and behavior. Data profiling can be an extremely powerful tool for psychological and social network analysis. A skilled analyst can discover facts about a person that they might not even be consciously aware of themselves.

Economic (such as credit card purchases) and social (such as telephone calls and emails) transactions in modern society create large amounts of stored data and records. In the past, this data was documented in paper records, leaving a “paper trail”, or was simply not documented at all. Correlation of paper-based records was a laborious process—it required human intelligence operators to manually dig through documents, which was time-consuming and incomplete, at best.

But today many of these records are electronic, resulting in an “electronic trail”. Every use of a bank machine, payment by credit card, use of a phone card, call from home, checked out library book, rented video, or otherwise complete recorded transaction generates an electronic record. Public records—such as birth, court, tax and other records—are increasily being digitized and made available online. In addition, due to laws like CALEA, web traffic and online purchases are also available for profiling. Electronic record-keeping makes data easily collectable, storable, and accessible—so that high-volume, efficient aggregation and analysis is possible at significantly lower costs.

Information relating to many of these individual transactions is often easily available because it is generally not guarded in isolation, since the information, such as the title of a movie a person has rented, might not seem sensitive. However, when many such transactions are aggregated they can be used to assemble a detailed profile revealing the actions, habits, beliefs, locations frequented, social connections, and preferences of the individual. This profile is then used, by programs such as ADVISE and TALON, to determine whether the person is a military, criminal, or political threat.

In addition to its own aggregation and profiling tools, the government is able to access information from third parties — for example, banks, credit companies or employers, etc. — by requesting access informally, by compelling access through the use of subpoenas or other procedures,[88] or by purchasing data from commercial data aggregators or data brokers. The United States has spent $370 million on its 43 planned fusion centers, which are national network of surveillance centers that are located in over 30 states. The centers will collect and analyze vast amounts of data on U.S. citizens. It will get this data by consolidating personal information from sources such as state driver’s licensing agencies, hospital records, criminal records, school records, credit bureaus, banks, etc. — and placing this information in a centralized database that can be accessed from all of the centers, as well as other federal law enforcement and intelligence agencies.

Under United States v. Miller (1976), data held by third parties is generally not subject to Fourth Amendment warrant requirements.

CORPORATE

Corporate surveillance is the monitoring of a person or group’s behavior by a corporation. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of business intelligence, which enables the corporation to better tailor their products and/or services to be desirable by their customers. Or the data can be sold to other corporations, so that they can use it for the aforementioned purpose. Or it can be used for direct marketing purposes, such as the targeted advertisements on Google and Yahoo, where ads are targeted to the user of the search engine by analyzing their search history and emails (if they use free webmail services), which is kept in a database.

For instance, Google, the world’s most popular search engine, stores identifying information for each web search. An IP address and the search phrase used are stored in a database for up to 18 months. Google also scans the content of emails of users of its Gmail webmail service, in order to create targeted advertising based on what people are talking about in their personal email correspondences. Google is, by far, the largest Internet advertising agency—millions of sites place Google’s advertising banners and links on their websites, in order to earn money from visitors who click on the ads. Each page containing Google advertisements adds, reads, and modifies “cookies” on each visitor’s computer. These cookies track the user across all of these sites, and gather information about their web surfing habits, keeping track of which sites they visit, and what they do when they are on these sites. This information, along with the information from their email accounts, and search engine histories, is stored by Google to use for building a profile of the user to deliver better-targeted advertising.[93]

According to the American Management Association and the ePolicy Institute that undertake an annual quantitative survey about electronic monitoring and surveillance with approximately 300 U.S. companies, “more than one fourth of employers have fired workers for misusing e-mail and nearly one third have fired employees for misusing the Internet“. More than 40% of the companies monitor e-mail traffic of their workers, and 66% of corporations monitor Internet connections. In addition, most companies use software to block non-work related websites such as sexual or pornographic sites, game sites, social networking sites, entertainment sites, shopping sites, and sport sites. The American Management Association and the ePolicy Institute also stress that companies “tracking content, keystrokes, and time spent at the keyboard … store and review computer files … monitor the blogosphere to see what is being written about the company, and … monitor social networking sites“. Furthermore, about 30% of the companies had also fired employees for non-work related email and Internet usage such as “inappropriate or offensive language“ and ”viewing, downloading, or uploading inappropriate/offensive content“.

The United States government often gains access to these databases, either by producing a warrant for it, or by simply asking. The Department of Homeland Security has openly stated that it uses data collected from consumer credit and direct marketing agencies—such as Google—for augmenting the profiles of individuals whom it is monitoring. The FBI, Department of Homeland Security, and other intelligence agencies have formed an “information-sharing” partnership with over 34,000 corporations as part of their InfraGard program.

The U.S. Federal government has gathered information from grocery store “discount card” programs, which track customers’ shopping patterns and store them in databases, in order to look for “terrorists” by analyzing shoppers’ buying patterns.

HUMAN OPERATIVES

Organizations that have enemies who wish to gather information about the groups’ members or activities face the issue of infiltration.

In addition to operatives’ infiltrating an organization, the surveilling party may exert pressure on certain members of the target organization to act as informants (i.e., to disclose the information they hold on the organization and its members).

Fielding operatives is very expensive, and for governments with wide-reaching electronic surveillance tools at their disposal the information recovered from operatives can often be obtained from less problematic forms of surveillance such as those mentioned above. Nevertheless, human infiltrators are still common today. For instance, in 2007 documents surfaced showing that the FBI was planning to field a total of 15,000 undercover agents and informants in response to an anti-terrorism directive sent out by George W. Bush in 2004 that ordered intelligence and law enforcement agencies to increase their HUMINT capabilities.

SATELLITE IMAGERY

Reconnaissance (spy) satellite

On May 25, 2007 the U.S. Director of National Intelligence Michael McConnell authorized the National Applications Office (NAO) of the Department of Homeland Security to allow local, state, and domestic Federal agencies to access imagery from military intelligence Reconnaissance satellites and Reconnaissance aircraft sensors which can now be used to observe the activities of U.S. citizens. The satellites and aircraft sensors will be able to penetrate cloud cover, detect chemical traces, and identify objects in buildings and “underground bunkers”, and will provide real-time video at much higher resolutions than the still-images produced by programs such as Google Earth.

***************************************************

NICK BEGICH – GLOBAL MIND CONTROL

 

Don’t miss reading “Identity Dominance” biometric surveillance” link within Jon Rappoport’s blog

LINK:https://jonrappoport.wordpress.com/2014/07/04/the-surveillance-state-covert-revolution/

***************************************************

Evidence is emerging of a global system of remote mind-control, primarily facilitated by the manipulation of the ionosphere to create a virtual global ‘radar’ system used for the guiding of ‘exotic’ energy pulses as carriers of acoustic and electromagnetic energies.  This is supported by satellites, cellular telephone networks and the clandestine imbedding of head and ear implants. The technology is based on new science hidden from both the public and all governments around the globe, which is believed to have originated from Nikola Tesla’s work on scalar waves and other exotic ideas. The system is said to be capable of controlling any individual virtually anywhere on Earth by the use of remote mental-suggestion, hypnosis and alter-identity creation, among other brainwashing techniques.

The result is that you could be controlled in real-time to act out and say things that are not the product of your free will but someone else’s manipulation.

You could be mentally steered by subliminal suggestions to:

• Distract your own attention and mental focus.
• Steer your conversation and thinking process.
• Believe in principles and ideas which are a fraud.
• Frustrate other’s conversation.
• Spread lies and untruths.
• Create ersatz insights that mimic a process of discovery.

You could be remotely hypnotized to:

• Stalk individuals.
• Bear false witness.
• Commit a crime.
• Incriminate yourself.
• Lure and trap a person into compromising sexual misconduct.
• Unwittingly participate to discredit honorable individuals.

Your alter-identity could be used to create:

• A political career for you only to be manipulated for other purpose.
• A terrorist to wreak chaos and destruction.
• An assassin to murder individuals for political or other purpose.
• A TV or radio host to spread propaganda.
• A doctor to unwittingly aid the perpetrators’ cause

The above are a small example of possible uses of such a system; the power of mental suggestion, hypnosis and alter identity creation affords the ‘controllers’ an amazing array of means to manipulate the human condition on many levels.

THE MORE DISTURBING CAPABILITIES OF THIS SYSTEM ARE:

1. The stun effect: To render subconscious (effectively tranquilize) a person remotely so that prolonged and repeated pulsing of energy can be applied to cause bodily damage like burning, incisions, contusions, skin defoliating, etc. Also, while immobile and subconscious infra-sound pulsing to the head is used to damage a person’s brain or to cause mental dissonance, or to subject to electro-shock without the victim being aware. It is used under some circumstances to enter the victim’s house under stealth. And, to make the victim effectively brain-dead when sleeping so as not to allow the brain to do the normal housekeeping duties which progressively leads to mental disturbance or to aid in creating psychosis.

2. Mental-suggestion: The ability to ‘inject’ thought-webs as mental suggestion by EEG composite transfer from the controller to the victim, which can contain primarily thoughts, but also sounds, imagery in daytime and dreaming or nightmares at night.

3. Hypnosis: The ability to hypnotise individuals while at sleep and to have the victims act out directions without being aware and having no memory of the event. This is accomplished remotely without any other preparatory work with the victim –it is applicable to anyone, virtually anywhere in the world.

4. Voice in the Head: The ability to generate voice inside the head that is as pure and obvious as somebody talking next to you. This can be used to create the belief in the higher being, to hypnotise, to cause mental dissonance or disturbance and disorientation. It is used extensively as subliminal suggestion when the speech is generated at higher speeds and mixed with emotional content. This is enabled via an implant inside the middle ear, which converts an electromagnetic signal to speech inside the auditory cortex. Associated ability includes the creation of ‘new’ memories or beliefs and mental illness.

5. Alter-personalities: Creation of alter-personalities is performed inside your own home while you sleep over a period of a few days. The technique is to reduce the level of conscious awareness to the state of a four year old child, then to traumatise you with virtual satanic ritual torture and virtual sexual abuse dreams until the distress reaches the level when a personality splits, which is then conditioned to obey mental suggestion commands from the controller.

6. Mind Reading: This is the transmission of the subject’s sub-vocal thinking to the controllers aided by a scalp implant located behind the left ear. When used in concert with mental suggestion it is possible to interrogate an individual without awareness.

7. Wiping short-term memory: This is affected immediately after the thought or thoughts are made. An implant located at the left temple is used to ‘inject’ EMR (electromagnetic radiation) into a precise location of the brain where thinking memory is processed. The thought feels like it has been ‘hollowed out’. This is extensively used to interfere with the verbal expression of the victim by constantly wiping the thinking process manifesting in paused speech while searching for the right word, and word substitution.

8. Erasing long-term memory: The victim is not aware what is erased until the time comes to recall a name, a place or a word. Erasure is not specific but indiscriminate and imprecise. Here also an implant is used, usually located on the back above the shoulder blade, to generate specific frequency EMR which produces tingling at the back of the head (the cerebellum).

9. Undermining voluntary movement: In order to achieve greater control of the victim the perpetrators will target the cerebellum (as above) with prolonged pulsing. The reason for this is to manifestly render the victim with yet another mental disorder characteristic by deliberately causing uncoordinated movement. The victim will experience hand and arm movement which cannot be willingly restrained and a change in gait.

10. Creating false memories: This is accomplished by first electro-shocking the brain of the victim (while stunned), and then repeating falsehoods (psychic driving) during a hypnagogic phase of awareness using subliminal mental suggestion to create a memory, which is then made permanent by semi-conscious regurgitation of this information.

11. Simulating mental illness: To affect this it is necessary to position implants at various locations under the scalp on the front and the right side of the head of the victim. The implants receive signals via bone demodulation and emit a pulsing magnetic frequency at predetermined brain locations affecting the brain cell orientation to temporarily manifest anger, loss of reasoning, loss of moral orientation, inability to plan ahead or visual distortion. All the fabricated symptoms predictably conform to formal descriptions of mental illnesses like psychosis or schizophrenia as described in DSM (Diagnostic and Statistical Manual) which is enough ‘evidence’ to certify the victim.

It will be argued here that the purpose of this system is the creation of a one world communist government. However, the cynical aspect of this is the deliberate discrediting and destruction of the current political systems and social order for the purpose of demonstrating that western culture and life is a failure, and that communism underpinned by global mind-control is a superior alternative. This view is supported by the political conviction that Man cannot rule himself and needs to be guided by the ‘invisible hand’.

The annihilation of the present order is referred to as creative destruction and can be seen in almost every country around the world where:

1.  Financial markets are conspired to fail in order to discredit the free market system.

2.  Governments are manipulated into inertia, incompetence and humiliation to incite riots and finally removal of current leaders.

3.  The manipulation of youth into violence and dissolution as a way to force governments to introduce increasingly strict laws creating a backlash.

4.  The systematic and deliberate setting-up of priesthood into sexual abuse –that never happened– for the purpose of removing any vestige of moral authority and guidance in a society.

5.  The discrediting of the scientific process so as to eradicate inquisitive minds and pave the way for spirituality as a guiding principle.

6.  The validating of God’s presence and power by ersatz miracles and prophecies.

7.  The manipulation of climatic conditions on a world scale for the purpose of dividing people, discrediting the United Nations and the scientific process, creating chaos, failing crops and wasting resources.

8.  Causing earthquakes to cause misery and chaos, and waste resources, but also to shift global sentiment for a particular purpose.

9.  The reformation of the mental institutions to facilitate ‘mental healing’ of the anticipated uncooperative, self-deterministic rugged individual who believes in freedom, and the silencing of those who discover the truth.

10. The humiliation of sports personalities, the self-made individual and exemplary figures in a society so as to eradicate collective pride, honour and dignity that spiritually feeds and drives a nation.

11. The discrediting of judges, heads of mental institutions, police commissioners, and other important institutions in order to replace them with either communist ideologues (called psychopoliticians) or unwitting proxies.

12. Creating celebrity criminals through the media to exemplify the depravity of the society, and to use criminals unwittingly to do the dirty work of murder, rape, bashing, arson and drug dealing.

NO ONE IS EXEMPT AND MANY LAWSUITS ARE DISMISSED BY COURTS, JUDGES ALONG WITH THE FACT THAT MANY ATTORNEYS DO NOT WANT TO GET INVOLVED KNOWING THEY THEMSELVES RISK BECOMING TARGETS AND HAVING THEIR CAREER’S DESTROYED.  THIS IS JUST HOW MUCH THEY WANT THIS PROGRAM HIDDEN.

****************************************************

The fact is, and one thing is certain, the puppet master, pulling the strings, do not care about us as a whole.  The average man or woman, no matter what race, they believe beneath them and are simply considered as pawns in a global ideation. And, apparently they will pay handsomely, and use their hired gun, goon squad puppets, to enforce for them their agenda to ensure silencing and continued mass population control, which criminally includes torture and murder of anyone speaking the harsher truths!  And it can be done covertly, through extremely low frequency, electromagnetic radio waves, and without leaving a trace by programming of someone to do a specific the deed and create and manage the perceptions of society as a whole.

We are talking about the efforts of  what many recognized as the “Secret Government” in place at the highest echelon, literally.  The United States, in decisive, unified efforts has become a prime testing ground using the average man or woman who cannot fight literal evil in high places without finances to go up against these efforts and the high power attorneys or the laws legalizing and condoning criminal activity by those manning this technology.

Wealth

Psychopaths 2ab

The end result is a Targeted Individual and the global community worse NIGHTMARE!

MILITARY CIVILIAN SECTOR BIOMETRIC PROGRAM

LINK:http://www.eis.army.mil/programs/biometrics

DRONE CAPABIILTY TO DOWNLOAD FACIAL RECOGNITION BIOMETRICS

LINK:https://epic.org/privacy/drones/

TOTAL INFORMATION AWARENESS OFFICE GOAL WHICH DOWNLOADED EVERYONE INTO SUPERCOMPUTER

LINK:http://encyclopedia.thefreedictionary.com/Total+Information+Awareness+Office

REFERENCE WEBSITE

http://bigbrotherwatchingus.com

NOTE:  30,000 drones approved for US Skies by 2020 with biometric upload and the capability to manipulate, influence, and torture via a bio-coded weapon system.

Body Electric

REFERENCE:

http://www.biometrics.dod.mil/training.aspx

NEW RELEASE OF THRILLER DOCUMENTARY/DOCUDRAMA.  AVAILABLE ON AMAZON

“DECEIVED – Mind Control: Schizophrenic High Tech Fraud”

LINK TO AMAZON FILM JUST $2.99 TO RENT:

https://www.amazon.com/gp/aw/d/B01N6RQTAU/ref=mp_s_a_1_1?ie=UTF8&qid=1484762102&sr=8-1&pi=PI_PJStripe-Prime-Only-500px%2CTopLeft%2C0%2C0_AC_SX118_SY170_QL70&keywords=mind+control%3A++schizophrenic+high+tech+fraud&dpPl=1&dpID=51GveHiDsWL&ref=plSrch 

screen-shot-2017-01-18-at-12-29-54-am