Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
6Activity
0 of .
Results for:
No results containing your search query
P. 1
Ti Whites Countermeasure

Ti Whites Countermeasure

Ratings: (0)|Views: 479|Likes:
Published by HRC
“Organized Stalking is a form of terrorism used against an individual in a malicious attempt to reduce the quality of a person’s life so they will: have a nervous break-down, become incarcerated, institutionalized, experience constant mental, emotional, or physical pain, become homeless, and/or commit suicide. This is done using well-orchestrated accusations, lies, rumors, bogus investigations, setups, framings, intimidation, overt or covert threats, vandalism, thefts, sabotage, torture, humiliation, emotional terror and general harassment. It is a “ganging up” by members of the community who follow an organizer and participate in a systematic “terrorizing” of an individual.” – Mark M. Rich

TI - Targeted Individual - is a person being targeted with OSEH by a group of individual called "perp" for the purpose of human experimentations.

OSEH - Organized Stalking Electronic Harassment - are methods use by perps in targeting a specific person for the purpose of inducing harm and possibly death.

DEW - Direct Energy Weapon - are device used for OSEH purposes, weapons can be microwave with pulp frequencies, v2k or other electronic and hearing devices.

V2K - voice to skull device - is a weapon use for transmitting voices with low or high frequencies. Voices can be for commands or harassments attacks that may look like the TI's own voice. V2K can also use to induce or manipulate dreams or to deprived TI sleeps.
“Organized Stalking is a form of terrorism used against an individual in a malicious attempt to reduce the quality of a person’s life so they will: have a nervous break-down, become incarcerated, institutionalized, experience constant mental, emotional, or physical pain, become homeless, and/or commit suicide. This is done using well-orchestrated accusations, lies, rumors, bogus investigations, setups, framings, intimidation, overt or covert threats, vandalism, thefts, sabotage, torture, humiliation, emotional terror and general harassment. It is a “ganging up” by members of the community who follow an organizer and participate in a systematic “terrorizing” of an individual.” – Mark M. Rich

TI - Targeted Individual - is a person being targeted with OSEH by a group of individual called "perp" for the purpose of human experimentations.

OSEH - Organized Stalking Electronic Harassment - are methods use by perps in targeting a specific person for the purpose of inducing harm and possibly death.

DEW - Direct Energy Weapon - are device used for OSEH purposes, weapons can be microwave with pulp frequencies, v2k or other electronic and hearing devices.

V2K - voice to skull device - is a weapon use for transmitting voices with low or high frequencies. Voices can be for commands or harassments attacks that may look like the TI's own voice. V2K can also use to induce or manipulate dreams or to deprived TI sleeps.

More info:

Categories:Topics, Art & Design
Published by: HRC on Dec 29, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/20/2013

pdf

text

original

 
COUNTERMEASUREAND DETECTIONEXPERIMENTS
IN THE FIGHT TO EXPOSE AND STOP THECRIME OF ORGANIZED STALKING ANDELECTRONIC HARASSMENT
Eleanor White
WORK IN PROGRESS - frequent updates, check the page number/date/timestamp to see if you have the latest version.
** NOT COPYRIGHTED **
Page 1 (Sep 11, 2009 12:28)
 
LIST OF SECTIONS
Page numbers are not given here, as this booklet will be updated frequently when newinformation becomes available and maintaining page numbers in the contents is more workthan I'm able to provide.Purpose of This Booklet and Cautionary NotesI. ELECTRONIC ASSAULT COUNTERMEASURE EXPERIMENTS1. Julianne McKinney's Successful 7-Radio Anti-V2S Countermeasure2. Eleanor White's EM Shielding Experiment (Total Bed Enclosure)3. The “McKinney Patch” Counteracts Extreme Fatigue4. Signal Evasion Experiments5. Flexible Shielding Material Experiments6. Faraday Cage Experiments7. Electrically Charged Shielding Experiments8. Active Device Countermeasure Experiments9. Water as Shielding Experiments10. Gel Packs as Shielding Experiments11. Rubber as Shielding Experiments12. Grounding Experiments13. Sheet Metal as Shielding Experiments14. Disguised Head Shielding99. Miscellaneous Countermeasure ExperimentsII. ELECTRONIC ASSAULT DETECTION EXPERIMENTS1. Sawtooth ELF waveform observed by Eleanor White2. Eleanor White's EEG and GSR Experiments3. Goldfish Apparently Shunning Restaurant Perpetrators?4. Electromagnetic Detector Experiments5. Sleep Study Experiments6. Specific Test Equipment Experiments99. Miscellaneous Detection ExperimentsIII. PROPOSED EXPERIMENTS1. Recording EEG With Matching Log of Times and Effects
Page 2 (Sep 11, 2009 12:28)
 
A1. GlossaryA2. SourcesA3. Tips1. Determining if Your Camera or Camcorder is Sensitive to Infrared2. Using “D-submini” Pins for Experimental Wiring3. Detecting Ultrasound4. Detecting Infrasound5. Inexpensive Oscilloscopes6. Frequency Counters7. Spectrum Analyzers8. Photographing Anything9. Photographing Anomalous Lumps on Your Body
Page 3 (Sep 11, 2009 12:28)

Activity (6)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Brad Kyle liked this
windua liked this
haltmeyerj liked this
haltmeyerj liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->