You are on page 1of 21

UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

ucsdusdsdsugangstalkinghumantrafficking

A topnotch WordPress.com site

AUGUST 31, 2012 by GANGSTALKEDHUMANTRAFFICKINGSANDIEGO

UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Rings Leslie Williams

THis Blog will be Finished Nex Week

You Tube Organized Stalking -GangStalking and Universities-Look at how many responses you get and what the responses are describing

And make sure you cross reference Organized Stalking or GangStalking to Remote Neural Monitoring to see these Techknowlogies are used in these expeditions Loook at the Amount of the responses you’ll get

The Informer Report 5-6-2012 Leslie Williams OGS And Technological Harassment

Housing Authoritys and Housing Assaociations and City Housing Inspectors and Land Lords and Property Owners are Huge Huge Players in this Crime

LAND GRAB IN AMERICA

Learning Disabled Woman describes the San Diego Connection to 2006 Stalking

Now what we have to UnderStand Here is that Research is all over the Manifesto that is Pasted Below so whatever is On this post You dont understand –( UNDERSTAND ) Human Research is Within these expeditions becvcause its in Part How their Controlling the Victims and How
their Exploiting them –( Neurally )-and How their selling the Results of the resaerch -The Brain mapping and Pysiological and CNS Mappings-I STRONGLY Suggest two Things-

( 1 ) Look at ALL OF THE RESEARCH THAT IS HAPPINING AT UCSD-THEN TWO CLOSLEY OBSERVE THE OLDER VERSIONS OF THE PASTED PDF LINKS RIGHT HERE- Now Understand Social Service’s Workers and lawyers are Clearly Mentioned in the First PDF link
right below these Words

*(1) Remote Neural Monitoring: Civil Action by John St. Clair Akwei h�p://www.freedomfchs.com/remoteneuralmonitoring2.pdf (h�p://www.freedomfchs.com/remoteneuralmonitoring2.pdf)

*2) Remote Behavioral Influencing Technology by John McMurtrey, M.A.


h�p://www.freedomfchs.com/remotebehavioralinfltech.pdf (h�p://www.freedomfchs.com/remotebehavioralinfltech.pdf)

*3) Bio-electromagnetic Weapons by Harlan Girard, Managing Director, International Commi�ee on Offensive Microwave Weapons (ICOMW)
h�p://www.freedomfchs.com/bioelectromagneticweapons2.pdf (h�p://www.freedomfchs.com/bioelectromagneticweapons2.pdf)

James Walbert, electronic harassment and gang stalking

Timothy W @ 2011 the Study of Bioethical Issues

Targeted Individuals and MONARCH

Gang Stalking Targets Speak at Presidential Hearings in NYC on May 18, 2011

Now here is How Land Co-Opting is part of these expeditions

Advertisements

REPORT THIS AD

Another San Diego Target-Elizabeth- ( Or Beth ) Donahue

Gang Stalking Victim, COINTELPRO. Termination of my property through lies and deception

h�p://www.youtube.com/watch?v=SQA6n0lJh-4 (h�p://www.youtube.com/watch?v=SQA6n0lJh-4)

Taff Housing Association Appears to be located in the UK So its Not understood yet –But a Program that is Called Agenda 21 is Co-Opting Peopls property and their Tackiling it on EVERY Front in over 15 Countries right Know Including America and their diffinitly it to Single woman
I heard about how they did it towards and Single Woman in Connecticut neir New haven But its happing all over they Stole Leslie Williams Rent to make her Homeless their Into Multiple differnet types of Racketeering Schemes-So she came back to San Diego Wheir its happining
towards her again-

And these are the mechanisms they a�empt to steer her into Enviroments for Explotation

San Diego Rescue Mission | Helping the Homeless in San Diego

h�p://www.sandiego.gov/police/ (h�p://www.sandiego.gov/police/)

h�p://www.sdcounty.ca.gov/hhsa/ (h�p://www.sdcounty.ca.gov/hhsa/)

This is The Manifesto of a Manager of Organized Stalking Crews Look at Who their Connected to-( The Entire Manifesto is enclosed at the very Bo�om of this Post )

h�p://groups.yahoo.com/group/NewWorldOrderWhistleBlowers/message/62392 (h�p://groups.yahoo.com/group/NewWorldOrderWhistleBlowers/message/62392)

___________________________________________________________________________________________

Now it highley Highly Appearsthey Have Go�on ahold of Sylvia L Moorelos Her Old You Tibe Video’s are Closed down and Her Blogs have been taken Offline

Gang Stalking Victim’s in San Diego Including 2012 Victims (http://gangstalkingvictiminsandiego.wordpress.com/2012/08/31/gangstalkingvictims-in-san-diego-including-2012-victims/)

Sylvia L Moorelos Has Disapeared and All of her old Blogs and You Tube Video’s have Been removed –They Got her in one Form or Another

h�p://www.ipetitions.com/petition/synergy/signatures/page/27 (h�p://www.ipetitions.com/petition/synergy/signatures/page/27)

h�p://www.sylmor1974.blogspot.com/ (h�p://www.sylmor1974.blogspot.com/)

h�p://peacepink.ning.com/forum/topics/victims-stories (h�p://peacepink.ning.com/forum/topics/victims-stories)

◦ BAN ELECTRONIC WARFARE ON CIVILIANS signatures – Page 27 (http://www.ipetitions.com/petition/synergy/signatures/page/27)

www.ipetitions.com/petition/synergy/signatures/page/27
Comments: h�p://www.sylmor1974.blogspot.com (h�p://www.sylmor1974.blogspot.com) and h�p://www.gangstalkinginsandiego (h�p://www.gangstalkinginsandiego)-sylviamorelos.webs.com … Comments: h�p://www.sylmor1974.blogspot.com
(h�p://www.sylmor1974.blogspot.com) …

Signatures 1668 total

Page: « (h�p://www.ipetitions.com/petition/synergy/signatures) ‹ (h�p://www.ipetitions.com/petition/synergy/signatures/page/26) 1 (h�p://www.ipetitions.com/petition/synergy/signatures), … 24 (h�p://www.ipetitions.com/petition/synergy/signatures/page/24), 25


(h�p://www.ipetitions.com/petition/synergy/signatures/page/25), 26 (h�p://www.ipetitions.com/petition/synergy/signatures/page/26), 27, 28 (h�p://www.ipetitions.com/petition/synergy/signatures/page/28), 29 (h�p://www.ipetitions.com/petition/synergy/signatures/page/29), 30
(h�p://www.ipetitions.com/petition/synergy/signatures/page/30), … 34 (h�p://www.ipetitions.com/petition/synergy/signatures/page/34) › (h�p://www.ipetitions.com/petition/synergy/signatures/page/28) » (h�p://www.ipetitions.com/petition/synergy/signatures/page/34)

//

1. 1301 (h�p://www.ipetitions.com/petition/synergy/signatures/page/27#sub-1301)
Name: Sylvia Morelos on Nov 21, 2011
Are you a Targeted Individual: YES
Comments: h�p://www.sylmor1974.blogspot.com (h�p://www.sylmor1974.blogspot.com) and h�p://www.gangstalkinginsandiego-sylviamorelos.webs.com (h�p://www.gangstalkinginsandiego-sylviamorelos.webs.com)
Country: United States
Flag

2. 1302 (h�p://www.ipetitions.com/petition/synergy/signatures/page/27#sub-1302)

Name: Sylvia Morelos on Nov 21, 2011


Are you a Targeted Individual: YES!!!
Comments: h�p://www.sylmor1974.blogspot.com (h�p://www.sylmor1974.blogspot.com) and h�p://www.gangstalkinginsandiego-sylviamorelos.webs.com (h�p://www.gangstalkinginsandiego-sylviamorelos.webs.com)

1 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

Country: United States

◦ Petition | Stop nonlethal microwave weapons attacks & organized … (http://www.change.org/petitions/stop-nonlethal-microwave-weapons-attacks-organized-stalking)

www.change.org/petitions/stop-nonlethal-microwave-weapons-a�acks…
My name is Sylvia Morelos. You can read my blog at h�p://www.sylmor1974.blogspot.com (h�p://www.sylmor1974.blogspot.com) and h�p://www.gangstalkinginsandiego (h�p://www.gangstalkinginsandiego)-sylviamorelos.webs.com. Thank You.

◦ Quam Porto-Rico – Free People Check with News, Pictures & Links … (http://www.yasni.com/quam+porto-rico/check+people)

www.yasni.com/quam+porto-rico/check+people
Comments: h�p://www.sylmor1974.blogspot.com (h�p://www.sylmor1974.blogspot.com) and h�p://www.gangstalkinginsandiego (h�p://www.gangstalkinginsandiego) … Name: Quam PORTO-RICO

◦ I Am Being Gang Stalked and Electronically Harassed : I Am Being … (http://www.experienceproject.com/stories/Am-Being-Gang-Stalked/201561)

www.experienceproject.com/stories/Am-Being-Gang-Stalked/201561
Please read my post www.gangstalkinginsandiego-sylviamorelos.webs.com and h�p://www.sylmor1974.blogspot.com (h�p://www.sylmor1974.blogspot.com). Same experience. Sylvia Morelos

◦ Gangstalking adventures. « Gang Stalking World (http://gangstalking.wordpress.com/about/)

gangstalking.wordpress.com/about
Hello world. This blog is going to be about my adventures with gang stalking. I really didn’t choose this adventure, it choose me about six years or so ago. I didn …

◦ //

◦ BAN ELECTRONIC WARFARE ON CIVILIANS signatures – Page 26 (http://www.ipetitions.com/petition/synergy/signatures/page/26)

www.ipetitions.com/petition/synergy/signatures/page/26
Comments: Please read my blog at h�p://www.sylmor1974.blogspot.com (h�p://www.sylmor1974.blogspot.com). I am being gangstalked … My website is www.gangstalkinginsandiego-sylviamorelos.webs.com

◦ Victims Stories – peacepink (http://peacepink.ning.com/forum/topics/victims-stories)

peacepink.ning.com/forum/topics/victims-stories
Sylvia Morelos h�p://h�p://www.sylmor1974.blogspot.com (h�p://www.sylmor1974.blogspot.com) h�p://www.gangstalkinginsandiego-sylviamorelos.webs.com. T. Target Elephant h�p://www…

______________________________________________________________________________________

Learning Disabled Woman Being Tortured in San Diego PROVES … (http://leaarningdisabledwomanprovessandiegopolicecorrupti.wordpress.com/2012/03/03/learning-disabled-woman-


being-tortured-in-san-diego-proves-san-diego-police-involvemenet-observe-link-in-this-blog-and-video/)

leaarningdisabledwomanprovessandiegopolicecorrupti.wordpress.co…
You +1′d this publicly. Undo (h�p://www.google.com/#)
Mar 3, 2012 – Also rememeber this Very Important Fact Sylvia L Moorelos … we do many things -In Organized Stalking–(Gang Stalking) Expeditions they …

Including goin after people on Disablity to take over their Checks to exploit the Medicare to Exploit them Sexually and For Research
Advertisements

REPORT THIS AD

“””Google a Gangtsalking Tech everything you need to know”””-

Its a Manifesto of a Manager of Organized Gangstalking Crews —It’s Organized Crime within the System

-Mortage Co-Opting and Eviction’s for Multiple Motivations To make Targets Homelsss For explotation-Human Trafficking

5.NAME: BETH DONAHUE


Citizenship: USA
Year Torture/Abuse Began:
Email: bethdon46@hotmail.com (mailto:bethdon46@hotmail.com)
WEB: h�p://www.xeper.org/maquino/nm/MindWar.pdf (h�p://www.xeper.org/maquino/nm/MindWar.pdf#_blank)

__________________________________________________________________________________________

Notice here erica Gillmore How they tryed to suck her into Prostitution and when They do of Victims they take Pictures of it to then Dupe teh Commnunity -( Groups) to harrass her based on the Slandeer that weir trying to run her out of town-( but what their doin in this Section is
Trying to do two Things

-(1)- To break her Down Motive with the Added methods of Additional Non Stop Harrassment-

(2)- Top get this harrassment Acheived thru Cost Effective means by exciting the personality of the Group their soliciting the Slander to-( Example if its a Anti gay Group they will approach them and tell them this Woman is a Prostitue who hates gays-Read the manifesto below and
how they lie to people to get them to do it is shown here

Listen to a Stranger

h�p://www.freedomfchs.com/ericagilmore.pdf (h�p://www.freedomfchs.com/ericagilmore.pdf)

Erica Gilmore
I, Erica Deann Gilmore state on August 6
th, 2011 that the events below are true and factual regarding being a victim of Organized Group Stalking from 1999 to current date.
My name is Erica Deann Gilmore; I am an African America female and have been a victim of Organized Group Stalking since 1999. My stalking began in Ventura, California and has continued in Santa Barbara, California. From 1991-1999 my daughter and I lived in a downstairs
apartment in the Garden Estates apartments in Ventura, Ca. The property owners were named Martha and Bill Spriggs (Spriggs and Company Management). In 1998 my bathroom ceiling was flooded by the upstairs unit. For one year no repairs were made on the water damage. I was
receiving housing assistance through the San Buena Ventura Housing Authority. The unit was failed during an inspection in 1998. I continued to pay my rent but no repairs were made. The bathroom ceiling and walls began to rot from mold and mildew and became inhabitable.
In 1999 I was given a 30-day notice to move by Spriggs and didn’t think it was fair considering the circumstances. I went to the Housing Authority and spoke to my worker Laura Hogan and requested copies of the 1998 inspection report. I needed the paper work because I was going to
sue the management company for back rent. A few days later I was told by Laura Hogan that the paper work in my files were “accidentally destroyed.” I had no proof that there was a pre-existing condition. I believe that Laura Hogan (Jehovah’s Witness) deliberately destroyed my
paperwork to discredit me. I bring up her religion in parenthesis because I have received harassment from some of these people. I contacted the City of Ventura and they came and did an inspection and deemed it un-livable. Afterwards, I could not find a place to live or a job
(blacklisted). Every landlord and management company refused my application. One landlord told me he rejected my application because “you didn’t move when they gave you the 30-day notice.” A property management company told me they didn’t want to get involved and
returned my $30 application fee. Eventually, I found a really nice Mexican husband and wife couple who were going to rent to me. The place was on Ramona Street in Ventura and they had done extensive repairs. The place had new flooring and kitchen appliances and was beautiful. I
was ready to move in and sign a contract when The Gas Company slapped a violation on the unit and we could not move in. I realized then that we were deliberately being made homeless. I lived in Motel 6 and would
spend $50 per night for a room to stay out of the cold and to get a break from the homeless shelters.
The harassment continued with the Ventura police department. A man named Graham Jeffries falsified a police report stating that I accused The Hell’s Angels Ventura, California Chapter members of stealing my laundry. I contacted and met with two police supervisors who refused to
amend the false report. I wrote a 5-page complaint and sent copies to the mayor, more supervisors of the police department and outside agencies. Afterwards, the Ventura police constantly harassed me and it escalated with two female members of the Ventura Sheriff’s Department
ge�ing involved. I made complaints to their supervisors, mayor’s office, FBI, and politicians. At 10pm one evening in Motel 6 the Ventura Police knocked on the door claiming they got a call regarding a domestic dispute between a man and woman. I explained that only my daughter
and I were in the room. The police threatened to arrest me if I did not open the door. The police claimed that the Motel 6 a�endant told them my room number. I contact the front desk during this chaos and was told that the police came into the office and request a list of the rooms. A
woman in a room next door told the police that it was a downstairs couple who got in an argument. Still they insisted that I open the door or be arrested. I did not open the door and eventually they left. Prior to all of this happening I never had any problem with the police and sheriff’s
department. No one would help me get the harassment stopped. I also had strangers in the community harassing me and yelling stuff at me from their cars, giving me dirty looks, and laughing at me as a walked down the street. I use to own a white Dodge hatch back and I believe that
there were tracking devices placed on my vehicle.
In addition, a “death mark” was put on both me and my daughter who was 8yrs old at the time. Their plan for my daughter was to have her taken away from me and sold into sexual slavery, abused in foster care, and or shot with a gun in public. I discovered that false allegations of
child abuse and neglect were made against me to Ventura, CA and Santa Barbara, CA Child Welfare Services. I love my daughter very much and they were trying to turn me against my own child by making it difficult for me to provide for her. I believe the group stalkers wanted me to
see my daughter as a burden and abandon her. I never did that! I have spend many days and nights crying, depressed, and scared wondering why someone would want to kill me and my daughter. Since I have been a victim only 2 people have had the decency to tell me what they
knew about my situation. The group stalkers are human personifications of evil. Since I could not find a place to live, was blacklisted, and being harassed I left Ventura, California.
In 2001 when I moved to Santa Barbara, California the harassment continued. My daughter and I lived in homeless shelters. When I tried to find a place to live in to I was told “we don’t rent to people with children.” I heard this over and over again. The blacklisting continued and I
could only find work through temporary agencies once in a while. No ma�er where I went I went in Santa Barbara I would get street theater, followed and harassed. My main harassment comes from White males, White females, Mexican males, and Mexican females. However, there
are other races involved too but these two races are the most aggressive. I believe some of the people are racist. In 2002 we moved into the Coronell Apartments in Santa Barbara. A short time after signing the lease the on-site manager informed me that different people in Santa Barbara
were telling him not to rent to me. When I asked who these people were he would not tell me. During my stay there the apartment had been illegally entered into several times. I found an apartment through Radis Property Management in 2003. As time went on that unit was illegally
entered with items being misplaced from different rooms. I also believe that there were listening devices and cameras in the apartment. In the corner of the bathroom ceiling, my bedroom and another room I discovered drill holes that were not there before. I had a strange feeling that
something was not right in that apartment. I felt like someone had been in there when we were gone. I also got the feeling we were being watched.
When we were homeless from 1999 to 2002 the group stalkers were always following us and I knew that someone wanted to kill me. A black limousine with the California license plate
LINK 17 followed me in Ventura, California and when I moved to Santa Barbara, California as well. The only person I saw in that limousine was an older white male with gray hair in a suit after he followed me to where my daughter went to elementary school in Santa Barbara. I don’t
know who this man was but I got a bad feeling about him and he just kept staring at me as I walked in a different direction.
Since the targeting I have been blacklisted and they tried to turn me into a prostitute. In the beginning stages of my stalking the men in the stalking groups would approach me out in public; and ask me if I wanted to have sex in exchange for money. The theme of my targeting is the

2 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

word “*****.” What I mean by this is


that everything has been centered on trying to get me to have sex in exchange for food, money, a place to live etc. I learned that different men in Ventura and Santa Barbara were spreading rumors stating that they had sex with me; these were lies. In Ventura they were spreading lies
saying I was a crack cocaine drug dealer. I was living off of $400 from welfare, receiving food stamps and ge�ing unemployment checks. I was sleeping in homeless shelters and my car trying to find a job and a place to live for me and my daughter. In every effort I made to find a place
to live and get a job, I was sabotaged. When the rumor campaigns did not work in 2002 the Child Support Divisions in Ventura, California and in Texas along with Laboratory Corporation of America falsified DNA results stating that my daughter’s father Bobby Fernandez Najar in
Texas was not her father. This occurred after the Child Support Division in Santa Barbara filed papers to extradite my daughter’s father. The Ventura Child Support Division produced fraudulent paper work with a blood test showing negative DNA results. I have never taken a blood
test for paternity only the swab on the side of the mouth. A male employee from the lab in Texas told me that I was being lied to and that they were playing games with me. When I called to speak to this employee again his a�itude changed and he was unreachable via phone. This goes
back to the theme of my targeting the word “*****.” By falsifying DNA documents I look like I slept around with many different men and this is not true! I know who the father of my daughter is and his name is Bobby Fernandez Najar.
For the past 12 years the Organized Group Stalkers have become obsessed with every aspect of my life. They have turned every aspect of my life into a competition and a game. From going to college, finding a job, making friends, raising my child, finding love in a dating/ marital
relationship, and my spiritual dedication to God (Jehovah’s Witness) has been turned into a competition and a game. I have had multiple cell phones and land lines with Verizon, T-Mobile, Blue Casa Communications, Cingular, Boost Mobile and Cox Communications that have been
illegally listened in on by group stalkers. When friends and family would call they would get a recording saying my number was disconnected when the bill was paid. I would also have my telephone service interrupted for days at a time. I would also get telephone bills for three times
the amount. When I no longer had service with Blue Casa Communication they produced a bill claiming I did. The Gas Company and Southern California Edison would produce bills that were three to five times the amount of my normal usage. I have also been harassed by members of
the Fire Department and ambulance drivers as they would drive by my apartment I rented from Radis Property Management or when I was in public.
The Organized Group stalkers are trying to get me to have a nervous breakdown and create a mental illness in me. I have been suffering from depression as a result of being a targeted individual. I have suffered financial losses, loss of peace of mind, loss of privacy, enslavement,
threatened and I want my life back.
____________________________________________________________________________________________

Advertisements

REPORT THIS AD

Now read this and see how the Gangstalking Work Hand in Hand with eventual Entrainment for prostitution Gansgtalking

to break you Down for Casual Entrainment for Neural Encoding for Neural identification then Enslavemenet with Remote Neural Monitoring -Which is used to Stmualate whats entrained

And Before you read this File Listen to this Video carefully–

John Hall – Satellite Terrorism, Surveillance Technology – 1 April 2010 part 2/6

This is a Old illustration but it Give’s you a Vidual representation of What is Listed in the Pdf Link in this Section

Frey Microwave Hearing – Beam Voices Into Your Auditory Cortex

Microwave Hearing

h�p://www.freedomfchs.com/remotebehavioralinfltech.pdf (h�p://www.freedomfchs.com/remotebehavioralinfltech.pdf)

REMOTE BEHAVIORAL INFLUENCE TECHNOLOGY EVIDENCE

by John McMurtrey, 23 Dec, 2003

MICROWAVE HEARING

The first American[7][8] to publish on the microwave hearing effect was Allan H. Frey in 1962,

[9] yet radar technicians had anecdotes of microwave perception in World War II[10]. Deaf

and normal subjects, even with earplugs, can hear appropriately pulsed microwaves at least

up to thousands of feet from the transmi�er[11]. Transmi�er parameters above those

producing the effect result in a severe buffeting of the head with dizziness and nausea, while

parameters below the effect induce a pins and needles sensation. Peak power is the major

determinant of loudness, though there is some dependence on pulse width. Pulse modulation

appears to influence pitch and timbre. The effect “is the most easily and reliably replicated of

low power density (microwave) illumination.”[12]. Review of human and animal microwave

hearing confirmation by independent investigators of the effect establishes validity. [13] [14]

Advertisements

REPORT THIS AD

[15][16] [17] Designs for scaring birds away from aircraft or other hazards by microwave

hearing[18] and induction of vertigo[19] exist.[20][21].

While working for the Advanced Research Projects Agency at Walter Reed Army Institute of

Research, Sharp and Grove discovered “receiverless” and “wireless” voice transmission. [22]

Their method was simple: the negative deflections of voiceprints from recorded spoken

numbers were caused to trigger microwave pulses. Upon illumination by such verbally

modulated energy, the words were understood remotely. The discovery”s applications are

“obviously not limited to therapeutic medicine” according to James C. Lin in Microwave

Auditory Effects and Applications.[23]

A Defense Intelligence Agency review of Communist literature affirmed microwave sound and

indicated voice transmission. The report states, “Sounds and possibly even words which

appear to be originating intracranially (within the head) can be induced by signal modulation

at very low average power densities.”[24] Among microwave weapon implications are “great

potential for development into a system for disorientating or disrupting the behavior pa�erns

of military or diplomatic personnel.” An Army Mobility Equipment Research and Development

Command report affirms microwave speech transmission with applications of “camouflage,

decoy, and deception operations.”[25] “One decoy and deception concept presently being

considered is to remotely create noise in the heads of personnel by exposing them to low

power, pulsed microwaves . . . By proper choice of pulse characteristics, intelligible speech

may be created” quotes the report.

Advertisements

REPORT THIS AD

The Brunkan Patent # 4877027 “Hearing system” is a device capable of verbal microwave

hearing.[26] The invention converts speech for remote introduction into the head by parabolic

antenna with indication of direct microwave influence on neural activity. The microwave

spectrum granted is broad: 100-10,000 MHz (0.1-10 GHz.) Pulse characteristics are essential

to perception. Bursts of narrowly grouped, evenly spaced pulses determine sound intensity by

their amount per unit time. Although a wide spectrum is patented, with ranges of pulse and

burst duration, preferred operation has burst duration at 2 microseconds, and pulse duration

at 100 nanoseconds. Operation is at 1000 MHz, which is the frequency of optimal tissue

penetration.[27] Another patent application based on microwave bursts is “designed in such a

way that the burst frequencies are at least virtually equal to the sound frequencies of the

sounds picked up by the microphone,” though the transducer here is not remote.[28]

3 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

Stocklin Patent # 4858612 “Hearing device” 7 affirms the microwave hearing effect. Stocklin

gives exposition to the concept that a microwave component is part of neurophysiology and

electroencephalogram (EEG) potentials.[29] Microwaves are considered both emi�ed and

absorbed by nerve cell membrane proteins. Microwaves generally excite the brain[30]

perhaps by influencing calcium,[31] a central ion in nerve firing.[32] Stocklin represents the

auditory cortex as normally producing microwave energy, which the device simulates, thus

eliciting sound sensation. Each acoustic tone is weighted for several microwave frequencies

by a formula called the mode matrix, which is used to calculate best perception requirements.

Advertisements

REPORT THIS AD

Observation of EEG desynchronization, delta waves, and brain wave amplitudes helps

calibrate the device.[33] The lowest frequency for hearing is estimated by the cephalic index.

Microwave speech transmission in this patent is unremote with the antenna over and sized for

the auditory cortex. Other patents have non-remote transducers of radiowave elicited hearing.

[34][35]

Descriptions in the above patents a�ribute microwave hearing to direct neural influence.

However, the most accepted mechanism in review is by thermoelastic expansion,12 most

likely inducing bone conducted hearing. The cochlea does appear to be involved, but not the

middle ear.14 This divergence of mechanism illustrates the non-thermal/thermal controversy.

US exposure standards are based on thermal effects, yet there are effects very difficult to

explain by thermodynamics.13[36] All accept thermal effects at some level, yet the thermal

only school is rather dogmatic related to liability issues of commercial[37] and national

security concern.[38] It must be said that the open literature regarding microwave hearing

indicates a thermo-acoustic mechanism.

“Communicating Via the Microwave Auditory Effect.” is the title of a small business contract

for the Department of Defense. Communication initial results are: “The feasibility of the

concept has been established” using both low and high power systems.[39] A Freedom of

Information Act (FOIA) request as to the project”s outcome met with denial on the part of the

Air Force, on the grounds that disclosure “could reasonably be expected to cause damage to

national security.”[40] Though the Air Force denied the FOIA disclosure, such a contract”s

Advertisements

REPORT THIS AD

purpose is elaborated by the Air Force”s “New World Vistas” report: “It would also appear

possible to create high fidelity speech in the human body, raising the possibility of covert

suggestion and psychological direction . . . . If a pulse stream is used, it should be possible to

create an internal acoustic field in the 5-15 kiloher� range, which is audible. Thus it may be

possible to “talk” to selected adversaries in a fashion that would be most disturbing to

them.”[41] Robert Becker, whose eminence was enough to have been twice nominated for

the Nobel Prize in biological electromagnetic fields research, is more explicit: “Such a device

has obvious applications in covert operations designed to drive a target crazy with “voices” or

deliver undetectable instructions to a programmed assassin.”[42]

The above Army efforts had results. A microwave voice transmission non-lethal weapon is

referenced in the thesaurus of the Center for Army Lessons Learned, which is a military

instruction website.18 The military thesaurus entry lists analogous devices using “silent

sound.”[43][44]

[edit] ULTRASOUND TRANSMISSION OF VOICE

Internal voice capability, without discernment by others nearby. is also evident in ultrasoundbased

technology. Lowrey Patent # 6052336 “Apparatus and method of broadcasting audible

sound using ultrasonic sound as a carrier” clearly focuses on non-lethal weapon application

against crowds or directed at an individual.[45] Communication is understood as an inner

voice with loss of the directional quality of sound perception. “Since most cultures a�ribute

inner voices either as a sign of madness, or as messages from spirits or demons, both of

which . . . evoke powerful emotional reactions”, quotes the Lowrey patent”s effect on people.

Replaying speech, with a delay impedes talking and causes stu�ering. Normal brain wave

pa�erns can be changed (or entrained), which “may cause temporary incapacitation, intense

feelings of discomfort.” This technique is detailed by Monroe Patent # 5356368 “Method of

and apparatus for inducing desired states of consciousness”, with license to Interstate

Industries and involves an auditory replication of brainwave pa�erns to entrain the EEG as

desired.[46]

Norris Patent # 5889870 “Acoustic heterodyne device and method”, directionally produces

sound on interference (or heterodyning) of two ultrasound beams.[47] The cancellation leaves

the carried audible sound perceivable. The effect becomes apparent particularly within

cavities such as the ear canal. An individual readily understands communication across a

noisy crowed room without nearby discernment. Sound can also be produced from mid-air or

as reflecting from any surface.

American Technology Corporation, which licensed this patent, has an acoustic non-lethal

weapons technology,[48] a cooperative agreement with the Army Research & Development

Command,[49] and is working with numerous other government agencies.[50] The

corporation”s Long Range Acoustic Devices (LRADTM) account for 60% of military sales, and

have integration into the Navy”s situational awareness & radar surveillance systems[51] with

deployment on naval vessels and fleet harbors.[52] A popular magazine writer describes the

device”s inner nature of sound perception.[53] From separate references, non-lethal weapons

treatments affirm sound localization and individual ultrasound effect limitation[54] with obvious

4 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

lack of nearby discernment;[55] the la�er by a non-lethal weapons program director. A similar

ultrasound method of limiting sound to one person, Audio Spotlight is marketed, with

exhibition at Boston”s Museum of Science and the Smithsonian National Air & Space

Museum.[56] Both the American Technology device and Audio Spotlight are discussed in an

article with some history of ultrasound acoustics, which has origins in sonar.[57] Other

acoustic influence methods may utilize ultrasound.[58][59]

[edit] TARGET TRACKING TECHNOLOGY

The maintenance of effects on people requires obstacle penetration and target tracking.

These internal voice capable energy forms penetrate obstruction and can be localized. Sound

transmission through enclosures is commonly experienced. An inaudible ultrasound high

intensity carrier wave is unnoticed. Solid defect inspection is one use of ultrasound, which is

being developed to discern movement through walls.[60] Common technology utilizes the

microwave hearing spectrum, which partly or completely encompasses cell phone,[61][62] TV,

and radar frequencies.[63] Commercial signals are not perceived, since the hearing effect

requires pulsation within the limits that elicit perception. A variety of antennae localize the

structurally penetrating microwave illumination with collimation or focusing.[64][65] A patent,

“compatible for mobile platforms with DEWs,” (Directed Energy Weapons) includes a modified

Luneburg lens emi�ing parallel rays with over 50 years utilization.[66]

Hablov Patent # 5448501 “Electronic life detection system” is for microwave radar within the

hearing spectrum that finds and distinguishes individuals through obstruction.[67] Therein is

stated: “the modulated component of the reflected microwave signal . . . subjected to

frequency analysis . . . forms a type of “electronic fingerprint” of the living being with

characteristic features, which . . . permits a distinction between different living beings.”

Though this patent has use in trapped victim rescue, another Hablov et. al. Patent # 5530429

“Electronic surveillance system” detects interlopers with security emphasis.[68] Other

literature describes the basic method.[69]

The Hablov et. al. patents discern people thru structures by vital organ motion, but others

offer more detailed imaging. Fullerton et. al. Patent # 6400307 “System and method for

intrusion detection using a time domain radar array” is such a design,[70] and is commercially

available as RadarVision by Time Domain.[71] Further designs for imaging within structures

include: a portable system determining suspect distance,[72] and presentations by the

International Society for Optical Engineering.[73][74] Software for displaying radar detection

on a personal computer is sold.[75]

Rowan Patent # 4893815 “Interactive transector device commercial and military grade”

describes the acquisition, locking onto, and tracking of human targets.[76] Stated therein:

“Potentially dangerous individuals can be efficiently subdued, apprehended and appropriately

detained.” The capability of “isolating suspected terrorists from their hostages . . . or

individuals within a group without affecting other members of the group” is stated. Laser,

radar, infrared, and acoustic sensor fusion is utilized to identify, seek, and locate targets.

Locking illumination upon the target until weapons engagement accomplishes tracking.

Among available non-lethal weapons is an incapacitating electromagnetic painful pulse.

Another target tracking system is the Manportable Surveillance and Target Acquisition Radar

by Systems & Electronics, Inc., which is capable of tracking moving targets including

personnel. This system has an auto target track feature, and lists moving target detection as

12 km for a walking man.[77]

A track initiation processor acquires a target, while a data association filter maintains a

tracking lock on the target.[78] An original method for target tracking is the Kalman filter.

Numerous weapons guidance examples utilize similar processes and illuminate targets for

tracking. Laser illumination is also used for non-human targets.[79] Other examples utilize

microwave beam target recognition and weapons guidance.[80][81] Target illumination

tracking systems have nanosecond to microsecond response times. Such responses do not

require a wide scan area to lock illumination upon persons at achievable speeds. At 90 miles

per hour an auto travels less than 1/100 of an inch in a microsecond.

[edit] DISCUSSION

Ultrasound voice transmission technology is publicly demonstrated in museum exhibits. The

numerous microwave voice transmission citations rest on a considerable foundation of

microwave hearing literature. Internal voice non-lethal weapon applications are discussed in

many of the citations. There are examples of either existence or sales of non-lethal weapons

based on both technologies. Numerous designs involving human location, identification, and

Advertisements

REPORT THIS AD

tracking methods, have long demonstrated the feasibility of constructing devices capable of

producing internal voice continuously in isolated individuals. To deny such technological

capabilities in the face of extensive complaint is willfully to ignore documented development of

the relevant technologies and engineering competence for complete integration.

[edit] THOUGHT READING CAPACITY

Many people who report experiencing remote behavioral influence also perceive mind

reading. Thought reading capacity, or brain wave analysis word recognition, is seriously

5 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

reported. Publications by a Stanford group support and report recognition of specific words

from brain waves,[82][83][84][85] with recent enhanced success.[86] Other investigators

publish above chance magnetoencephalographic (MEG) word recognition.[87] The current

publications lack reference to a 1975 US government technical report of prior results from

Stanford comparable to the recent articles,[88] and an apparent Russian report of specific

EEG word recognition before 1981.[89] Electroencephalographic (EEG) instant detection by

syllables of “a content of category which the testee wishes to speak” quotes Kiyuna et. al.

Patent # 5785653 “System and method for predicting internal condition of live body.”[90] A

stated use: “the present invention may be use (sic) to detect the internal condition of

surveillance in criminal investigation” by EEG. NEC Corporation licensed this patent. Remote

EEG communication with Armed Forces or clandestine application are the cited uses for

Mardirossian Patent # 6011991 “Communication system and method including brain wave

analysis and/or use of brain activity.”[91] This patent affirms EEG word recognition, proposes

transmi�er capable skin implants, utilizes neural networks (artificial intelligence), and is

licensed by Technology Patents, LLC.

Activation of brain cell assemblies provides a theoretical framework[92] for the above word

recognition reports, and extensive publications of averaged EEG word category

differentiation. These differentiation reports themselves are consistent with specific word

recognition, since their basis is by visual analysis of averaged categories, without the use of

sophisticated computer programs as are essential for specific word recognition. Based on

EEG/MEG responses, words can be differentiated as to length,[93] and visual nouns can be

differentiated from action verbs.[94][95][96][97][98] Brain wave pa�erns distinguish proper

names from common nouns,[99] animal names from numerals,[100] or content from function

words.[101][102][103][104] Face, arm, or leg action verbs are reported distinguished by brain

waves as well.[105][106] Concrete versus abstract words,[107] and unambiguous versus

ambiguous noun/verbs[108] have distinctive EEG pa�erns.

Some of these word category differentiation reports are consistent with both the specific

recognition reports, and/or the differentiation of non-verbal cognition. Based on EEG/MEG

responses, words are readily distinguished from non-words,[109][110][111] or pictures.[112]

EEG differentiation of words rated as to affective meaning such as good-bad, strong-weak, or

active-passive is reported.[113][114] Other literature indicates EEG differentiation of

completely non-verbal cognition. Emotion differentiation by EEG is patented, referencing Air

Force research.[115] Movement anticipation potentials (bereitschaftspotential) and those of

actual movement are detectable by EEG. [116][117] EEG movement signals have been used

to move a cursor left or right,[118] and just the imagination of movement is sufficiently

distinguished by EEG to control switches,[119] or control prosthesis grasp.[120] Guiding

robots through simulated rooms by EEG detection of imagining the spinning of cubes or arm

rising of appropriate direction is reported.[121][122][123] Even more complex grasping and

reaching robot arm control has been achieved by signals from implanted brain electrodes in

monkeys without body arm movement.[124] A number of groups have developed procedures

to detect deception based on the P300 (positive @ 300 millisec.) event related potential

(ERP) from EEG.[125] [126][127][128][129][130] A commercial system, Brain Fingerprinting,

[131] which includes analysis of a late negative ERP potential and frequency analysis in

addition to the P300, even asserts 100% accuracy over five separate studies.[132] [133] [134]

[135] [136][137]

Functional magnetic resonance imaging (fMRI) studies also report differentiation of cognitive

states. Different fMRI brain activation loci for face, natural and manufactured object

recognition are reviewed.[138] Neural network differentiation of fMRI response to noun

categories for fish, four legged animals, trees, flowers, fruits, vegetables, family members,

occupations, tools, kitchen items, dwellings, and building parts is reported.[139] Distinguishing

truthful from deceptive responses by fMRI is also reported.[140] [141] [142] [143] The ability

to discern the state of romantic love towards an individual by fMRI has report as well.[144]

The research arm of agencies with missions to covertly acquire information would certainly

develop to operational capability any technologic thought reading potential. Assertions that

such development has progressed are multiple, and two are confirmed by details of the 1975

government EEG specific word recognition report, which itself is evidence of development

covert to open databases.83 An International Commi�ee of the Red Cross Symposium

synopsis states EEG computer mind reading development by Lawrence Pinneo in 1974 at

Stanford.[145] A le�er by the Department of Defense Assistant General Counsel for

Manpower, Health, and Public Affairs, Robert L. Gilliat in 1976 affirmed brain wave reading by

the Advanced Research Projects Agency.[146] “Thought reading or synthetic telepathy”

communications technology procurement is considered in a 1993 Jane”s[g] Special

Operations Forces (SOF) article: “One day, SOF commandos may be capable of

communicating through thought processes.”[147] Descriptive terms are “mental weaponry

and psychic warfare” Although contemplated in future context, the availability of a technology

without adaptation to troop level requirements is implied, since anticipation of mobile

deployment would have to assume prior development.

In 1976, the Malech Patent # 3951134 “Apparatus and method for remotely monitoring and

altering brain waves” was granted.[148] Example of operation is at 100 and 210 MHz;

frequencies penetrating obstruction. “The individual components of the system for monitoring

and controlling brain wave activity may be of conventional type commonly employed in radar”;

and “The system permits medical diagnosis of patients, inaccessible to physicians, from

remote stations” are quotes indicating remote capacity. License is to Dorne & Margolin Inc.,

but now protection is expired with public domain. The Malech patent utilizes interference of

6 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

210 and 100 MHz frequencies resulting in a 110 MHz return signal, which is demodulated to

give EEG waveform.

The capability of remote EEG is predicted by electromagnetic sca�ering theory using

ultrashort pulses, which are not part of the Malech patent.[149] Ultrashort pulses are currently

defined in the range of 10-12 to 10-15 second. Considering that EEG word elicited potentials

are comparatively long (hundreds of milliseconds), indicates that remote radar EEG capture is

adequate to word recognition, with ultrashort pulses allowing some 109 or more radar

reflections in a millisecond (10-3 sec.)

The possibility of impressing an “experience set” on an individual by ultrashort pulses is also

contemplated.143 The above patent can alter brain waves as well as detect them. Microwave

non-lethal weapon brain wave disruption[150] and behavioral change including

unconsciousness[151] are known.35

The above EEG telemetry patent and ultrashort pulse method are by active radar probe. Yet a

passive field extends as far as 12 feet from man as detected by a cryogenic antenna.[152] A

technical article maintains this device as entirely adaptable to clandestine applications, and

pointedly comments on the disappearance of physiological remote sensing literature since the

1970″s for animals and humans, while all other categories of remote sensing research greatly

expanded.[153]

[edit] DISCUSSION

Complete rejection of assertions of a remote mind reading capability is just as presumptuous,

in the face of complaints, as has been the dismissal of internal voice capacity. Considerable

capacity to detect and differentiate mental states is evident from literature reports particularly

by EEG. The fact that EEG movement imagination signals are detected for robot guidance on

a voluntary unprompted basis[121] [122] [123] suggests a similar capacity is feasible for

specific EEG word identification, which has only been reported for word prompted responses.

Though references to remote EEG are less, they provide plausibly exploitable mechanisms,

which may be covertly developed.

[edit] LEGAL AND INTERNATIONAL REFERENCES TO BEHAVIORAL INFLUENCE

TECHNOLOGIES

References to behavioral influence weapon use by government bodies and international

organizations are numerous. Negotiation submissions to the United Nations Commi�ee on

Disarmament affirm the reality of microwave weapon nervous system effects.[154] European

Parliament passage of resolutions calling for conventions regulating non-lethal weapons and

the banning of “weapons which might enable any form of manipulation of human

beings” [155] includes neuro-influence capability.[156] A resolution relates to HAARP, High

Frequency Active Auroral Research Project, which has environmental consequences, and

although utilizing high frequency, ionospheric extra low frequencies (ELF) emanation results.

Since ELF is within brain wave frequencies the project has capacity to influence whole

populations.[157][158] President Carter”s National Security Advisor, Zbigniew Brzezinski,

predicted development of such capacity.[159] Nature News reports concern by a French

government panel about the potential for thought reading and such a remote capacity.[160]

An American draft law prohibiting land, sea, or space-based weapons using electromagnetic,

psychotronic (behavioral influence), and sound technologies “directed at individual persons or

targeted populations for the purpose of information war, mood management, or mind control”

has not yet passed.[161] Russian electromagnetic standards are nearly 1000 times lower

than the West, so their weapon law forbidding electromagnetic weapons exceeding Health

Department parameters is strict.[162] The Russian draft law explicitly references behavioral

influence non-lethal weapons, and development in several countries.[163] Resolutions by the

International Union of Radio Science recognize criminal use of electromagnetic technology,

though largely relevant to use against infrastructure.[164]

[edit] MICROWAVE AND ULTRASOUND USE AGAINST HUMANS

The microwave irradiation of the American Embassy in Moscow received li�le publicity until

the winter of 1976 instillation of protective screening, but irradiation was known since 1953.34

Original frequencies were 2.56-4.1 GHz with additional intermi�ent 0.6-9.5 GHz signals being

permanent by 1975 in a wide band frequency hopping[h] consistent pa�ern with one signal

pulsating. The irradiation was directional from nearby buildings and modulated. Complaint to

the Soviets had no avail, but the signals disappeared in January 1979 “reportedly as a result

of a fire in one or more of the buildings.”[165] A 9-11 GHz signal recurred in 1988.[166]

Observed frequencies are basically within the microwave hearing spectrum, and pulsation is

required. Psychiatric cases occurred during the exposure period, though no epidemiologic

relationship was revealed with fully a quarter of the medical records unavailable, and

comparison with other Soviet Bloc posts.159 The CIA had Dr. Milton Zaret review medical

Soviet microwave literature to determine the purpose of the irradiation. He concluded the

Russians “believed the beam would modify the behavior of the personnel.”[167] In 1976 the

post was declared unhealthful and pay raised 20% 140

The most documented citizen microwave irradiation was of peace protesters at Greenham

Common American Air Force Base in Berkshire England, who prompted investigation of

unusual symptoms.[168] Radiation measurements exhibited microwaves with symptom

experience up to a hundred times the background level, and rose sharply on protests nearer

the base.160 Symptoms became pronounced on cruise missile transport, a protest focus.160

Recorded were wide ranging complaints: skin burns; “severe” headaches; drowsiness;

temporary paralysis; incoordinated speech; two late (5 mos.) spontaneous abortions; an

apparent circulatory failure; and unlike usual menstrual synchronization, irregular or

postmenopausal menstruation. The symptom complex fits well with electromagnetic exposure

7 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

syndrome 160 It has also been reported that some of the women “heard voices.”[169] The

base closed finally in 1991.

Criminal directed energy weapon use has been reported in Germany.[170] In a number of

cases there is similarity of circumstances, complaints, and symptoms. In at least one case

microwave fields have been measured with exclusion of the usual sources (cell phone towers,

etc.)[171] Plans for construction of a crude device from a microwave oven are sold.[170]

Measurement of non-ionizing radiation fields in the vicinity of an Australian victim is described.

[172] The intensity ranged from 7 mV in an adjacent room to 35 mV next to the head. The

victim suffered from multiple personality disorder a�ributed to ritual abuse, and claimed an

implant with radiological evidence.

Ultrasound behavioral influence technology use in Northern Ireland is cited [173] The device

could focus on one person; and utilized ultrasound cancellation like those patented. It was

employed in Vietnam by the Americans, and is known as the squawk box. Mentioned

infrasound frequency (ultrasound carrier directed) is like Loos 1/25/00 patent, with

psychological effects summarized as “spooky.” More detail by a defense journalist is quoted:

“When the two frequencies mix in the human ear they become intolerable. Some people

exposed to the device are said to feel giddy or nauseous and in extreme cases they faint.

Most people are intensely annoyed by the device and have a compelling wish to be

somewhere else.” [174] British police inventories list the specific device, though a spokesman

denied use.[166]

Sophisticated behavioral influence capability is confirmed by ex-intelligence officers. Julianne

McKinney, Director of The National Security Alumni Electronic Surveillance Project is

prominent. This is a largely classified employee victim study with internal voice transmission

avowal.[175]

CONCLUSION

The logic in the prediction by Brzezinski[176] of the appearance of a more controlled and

directed society dominated by a power elite willing to use the latest modern techniques for

influencing behavior without hindrance by liberal democratic values is compelling.153

Potential behavioral influence targets are multiple. Since those supposedly expert regard a

victim”s perceptions as psychotic, all complaints are disregarded, not to mention capability to

bear witness. Targets may include anyone worth neutralization: domestic adversaries;[177]

security risks, which may only comprise classified disclosures; persons witnessing serious

improprieties; and those prone to commi�ing advantageous felonies. Legality is readily

circumvented by executive orders, (particularly declaration of a crisis or emergency situation),

which can be sealed, and this prerogative is only accountable to co-equal branches of

government as is now the case with terrorism suspects. Internal voice technology is most

applicable within the same language and culture. Space here limits more than mention of

remote EEG influence capacity, hypnosis, and footnoting remote subliminal technique.

Hypnotic or subliminal message presentation represent particularly insidious means of

influencing thought, mood, behavior, and undermining civil liberties.

Most complainants allege public sector involvement or sub-contracted private companies.

[178] Remote behavioral influence research has long been funded by the US,39 with

evidence of development19 22 36 45 46 and weapons,18 44 47 48 51 though denying on

national security grounds project results37 and foreign literature analyses.[179] Some thirty

countries evidence active behavioral influence weapon research.[180]

Though there is some scant psychoanalytical acknowledgement,[181] current medical

awareness ensures effective neutralization of the afflicted. Not all those affected are

stigmatized. However phenomena of “hearing voices”, or perception of remote manipulation,

when recounted to health professionals results in various stigmatizing diagnoses,[182][183]

totally without investigation. Determination of relevant fields around complainants is

mandatory, or abatement by proven shielding of such phenomena. Professional opinions

formed without excluding these technologies are negligent.

The medical community has long heard either identical or similar complaint[184] to that above

delineated as known internal voice technology from numerous victims. This fact indicts the

scholarship and presumption of impossibility evident in the pertinent medical literature. In

addition, microwave bioeffects have considerable congruence with reported symptoms of

major psychosis other than “voices.” [185] All of society should be disturbed at the prospect of

technologic induction of voice, since the unaware subject would perceive such voices as his

own natural thought, without such an assault as to provoke complaint.

It is difficult to deny the level of substantiation for the possibility that a thought reading

capacity exists, even with references that support a remote basis. The logic that in the thirty

years since the Pinneo work started, this capability has had full development is too sound to

dismiss victim corroboration. It would have to be admi�ed that funding for projects by the

defense and security agencies is considerably greater than for open science, and that thought

reading would be a priority area. Educated democracies should not be complacent at this

prospect, given the potential for political control, and existence of a remote EEG method in

the public domain.

Acknowledgements: Thanks are given to God for inspiration, and a benefactor of Christians

Against Mental Slavery for financial support. There is gratitude also to Dr. Paul Canner, and

Dr. Allen Barker for their suggestions.

All patents are printable from the U. S. Patent Office website.

EEG word recognition articles are printable thru Pubmed as designated.

Each is free

Pinneo LR and Hall DJ. “Feasibility Study for Design of a Biocybernetic Communication

System” is available from Christians Against Mental Slavery at info@slavery.org.uk.

8 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

[edit] References

1. ↑ Address: 903 N. Calvert St., Baltimore MD 21202. Email- Johnmcmurt at aol.com –

Phone- 410-539-5140.

2. ↑ Financial contribution to this article was made by fellow members of Christians Against

Mental Slavery.

3. ↑ Citizens Against Human Rights Abuse, Director, Cheryl Welsh, – 915 Zaragoza Street,

Davis, CA 95616, USA. Website at h�p://www.dcn.davis.ca.us/~welsh/ (h�p://www.dcn.davis.ca.us/~welsh/), Email is

welsh@dcn.davis.ca.us

4. ↑ Christians Against Mental Slavery, Secretary, John Allman, 98 High Street,

Knaresbourough, N. Yorks HG5 0HN, United Kingdom. Email is info@slavery.org.uk

5. ↑ Moscow Commi�ee for the Ecology of Dwellings, Chairman, Emile Sergeevne

Chirkovoi, Korpus 1006, Kvrtira 363, Moscow Zelenograd, Russia 103575. Website at

h�p://www.moskomekologia.narod.ru (h�p://www.moskomekologia.narod.ru). Email is moskomekologia@narod.ru (mailto:moskomekologia@narod.ru)

6. ↑ International Movement for the Ban of Manipulation of the Human Nervous System by

Technologic Means, Founder, Mojmir Babacek, P. O. Box 52, 51101 Turnov, Czech Republic,

Europe. Website at h�p://www.geocities.com/CapeCanaveral/Campus/2289/webpage.htm (h�p://www.geocities.com/CapeCanaveral/Campus/2289/webpage.htm).

Email is mbabacek@iol.cz

7. ↑ American discovery may not be the first. Soviet and East European electromagnetic

bioeffect literature is prior, more extensive, and transparent. A translated Russian treatment is

the next text reference, which refers to F. Cazzamalli, an Italian, who mentioned

radiofrequency hallucination about 1920.

8. ↑ Presman AS. Electromagnetic Fields and Life Plenum, New York-London, 1970.

Presman mentions Cazzimalli and another English reference to this Italian work is at

h�p://www.datafilter.com/mc/jaski.html (h�p://www.datafilter.com/mc/jaski.html) p 2, a semi-popular treatment with references.

9. ↑ Frey AH. “Human Auditory System response to modulated electromagnetic energy” J

Applied Physiol 17 (4): 689-92, 1962. Also at h�p://www.raven1.net/frey.htm (h�p://www.raven1.net/frey.htm)

10. ↑ Stocklin PL. Patent #4858612 “Hearing device” USPTO granted 8/22/89.

11. ↑ Frey AH and Messenger R. “Human Perception of Illumination with Pulsed Ultrahigh-

Frequency Electromagnetic Energy” Science 181: 356-8, 1973.

12. ↑ Eichert ES and Frey AH. “Human Auditory System Response to Lower Power Density

Pulse Modulated Electromagnetic Energy: A Search for Mechanisms” J Microwave Power

11(2): 141, 1976.

13. ↑ Michaelson SM. “Sensation and Perception of Microwave Energy” In: Michaelson SM,

Miller MW, Magin R, and Carstensen EL (eds.) Fundamental and Applied Aspects of

Nonionizing Radiation Plenum Press, New York, p 213-24, 1975.

14. ↑ Puranen L and Jokela K. “Radiation Hazards Assessment of Pulsed Microwave

Radars” J Microwave Power Electromagn Energy 31(3): 165-77, 1996.

15. ↑ Hermann DM and Hossman K-A. “Neurological effects of microwave exposure related

to mobile communication” J Neurol Sci 152: 1-14, 1997.

16. ↑ Lai H. “Neurological Effects of Radiofrequency Electromagnetic Radiation” In: Lin JC

(ed.) Advances in Electromagnetic Fields in Living Systems vol 1, Plenum, N Y & London, p

27-80, 1994.

17. ↑ Elder JA and Chou CK. “Auditory Responses to Pulsed Radiofrequency Energy”

Bioelectromagnetics Suppl 8: S162-73, 2003. Also at h�p://www3.interscience.wiley.com/cgibin/ (h�p://www3.interscience.wiley.com/cgibin/)

fulltext/106565261/PDFSTART (cached) and

h�p://grouper.ieee.org/groups/scc28/sc4/Human%20Perception%20FINAL.pdf (h�p://grouper.ieee.org/groups/scc28/sc4/Human%20Perception%20FINAL.pdf) (cached)

18. ↑ Kreithen ML. Patent #5774088 “Method and system for warning birds of hazards”

USPTO granted 6/30/98.

19. ↑ Lenhadt ML and Ochs AL. Patent #6250255 “Methods and apparatus for alerting

and/or repelling birds and other animals” USPTO granted 6/26/01.

20. ↑ Nordwall BD. “Radar Warns Birds of Impending Aircraft” Aviation Wk Space Technol

March 10, p 65-6, 1997.

21. ↑ Center for Army Lessons Learned Thesaurus at

h�p://call.army.mil/products//thesaur/00016275.htm (h�p://call.army.mil/products//thesaur/00016275.htm)

22. ↑ Justesen DR. “Microwaves and Behavior” Am Psychologist, 392(Mar): 391-401, 1975.

Excerpted reference at h�p://www.raven1.net/v2succes.htm (h�p://www.raven1.net/v2succes.htm)

23. ↑ Lin JC. Microwave Auditory Effects and Applications Thomas, Springfield Ill, p 176,

1978.

24. ↑ “Surveillance Technology, 1976: policy and implications, an analysis and compendium

of materials: a staff report of the Subcommi�ee on Constitutional Rights of the Commi�ee of

the Judiciary. United States Senate, Ninety-fourth Congress, second session, p 1280, US

GOV DOC Y 4.J 882:SU 7/6/976.

25. ↑ Oskar KJ. “Effects of low power microwaves on the local cerebral blood flow of

conscious rats” Army Mobility Equipment Command Report,. # AD-A090426, 1980. Available

form NASA Technical Reports. Abstract at h�p://www.raven1.net/v2s-nasa.htm (h�p://www.raven1.net/v2s-nasa.htm)

26. ↑ Brunkan WB. Patent #4877027 “Hearing system” USPTO granted 10/31/89.

27. ↑ Frey AH. “Behavioral Biophysics” Psychol Bull 63(5): 322-37, 1965.

28. ↑ Thijs VMJ. Application #WO1992NL0000216 “Hearing Aid Based on Microwaves”

World Intellectual Property Organization Filed 1992-11-26, Published 1993-06-10. Also at

h�p://www.delphion.com/details?pn=WO09310730A1 (h�p://www.delphion.com/details?pn=WO09310730A1) Not a US Patent.

29. ↑ Stocklin PL and Stocklin BF. “Possible Microwave Mechanisms of the Mammalian

Nervous System” T-I-T J Life Sci 9: 29-51, 1979.

30. ↑ Beason RC and Semm P. “Responses of neurons to an amplitude modulated

microwave stimulus” Neurosci Le� 333: 175-78, 2002.

31. ↑ Adey WR. “Biological Effects of Low Energy Electromagnetic Fields On the Central

Nervous System” NATO Advanced Study Institute on Advances in Biological Effects and

9 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

Dosimetry of Low Energy Electromagnetic Fields Erice Italy, Plenum, p 359-391, 1981.

32. ↑ Shepherd GM. Neurobiology 2nd ed. Oxford Univ. Press, New York-Oxford, p146-7,

1988.

33. ↑ Bise W. “Low power radio-frequency and microwave effects on human

electroencephalogram and behavior” Physiol Chem Phys 10(5): 387-98, 1978.

34. ↑ Puharich HK and Lawrence JL. Patent #3629521″Hearing systems” USPTO granted

12/21/71.

35. ↑ Flanagan GP. Patent #3393279 “Nervous System Excitation Device” USPTO granted

7/16/68.

36. ↑ Frolich H. “The Biological Effects of Microwaves and Related Quiestions” Adv

Electonics Electron Physics 53: 85-152, 1980.

37. ↑ Steneck NH. The Microwave Debate MIT Press Cambridge, Mass, London Eng, 1984.

38. ↑ Becker RO. Cross Currents Jeremy P. Tarcher, Inc, Los Angeles, St Martin”s Press, p

297-304 & p 303-4, 1990.

39. ↑ Kohn B. “Communicating Via the Microwave Auditory Effect” Defense Department

Awarded SBIR Contract # F41624-95-C9007, 1993. Also at

h�p://es.epa.gov/ncer_abstracts/sbir/other/monana/kohn.html (h�p://es.epa.gov/ncer_abstracts/sbir/other/monana/kohn.html) & h�p://www.raven1.net/v2skohn (h�p://www.raven1.net/v2skohn).

htm

40. ↑ Margo P. Cherney Freedom of Information Act Memorandum at h�p://www.raven1.net/ (h�p://www.raven1.net/)

usafletr.jpg

41. ↑ Castelli CJ. “Questions Linger about Health Effects of DOD”s “Non-Lethal Ray” Inside

the Navy 14(12): 1-6, 2001. h�p://globalsecurity.org/org/news/2001/e20010327questions.htm (h�p://globalsecurity.org/org/news/2001/e20010327questions.htm)

42. ↑ Becker RO and Selden G. The Body Electric: Electromagnetism and the Foundation of

Life Quill William Morrow, New York, p 319 & 320, 1985.

43. ↑ Also called S-quad, Silent Sounds, Inc. licensed Lowery Patent #5159703 “Silent

subliminal presentation system”, and has advanced brain wave entrainment technology (vide

infra) with several classified patents. (See h�p://www.mindspring.com/~silent/menu.htm (h�p://www.mindspring.com/~silent/menu.htm) and

links.) Unessential is individual direction, but possible by ultrasound.

44. ↑ Lowery OM. Patent #5159703 “Silent subliminal presentation system” USPTO granted

10/27/92.

45. ↑ Lowrey A. Patent #6052336 “Apparatus and method of broadcasting audible sound

using ultrasonic sound as a carrier” USPTO granted 4/18/00.

46. ↑ Monroe RA. Patent #5356368 Method of and apparatus for inducing desired states of

conscisousness” USPTO granted 10/18/94.

47. ↑ Norris EG. Patent #5889870 “Acoustic Heterodyne device and method” USPTO

granted 3/20/99.

48. ↑ American Technology Corporation Announces Acoustic Non-Lethal Acoustical Weapon

Technology for Military and Law Enforcement, press release of 10/30/01.

49. ↑ American Technology Corporation Shareholder Alert, press release of 4/23/03 at h�p://

h�p://www.atcsd.com/PressReleases/04_23_03.html (h�p://www.atcsd.com/PressReleases/04_23_03.html)

50. ↑ American Technology Corporation Announces Generation II HSSR Emi�er at Annual

General Meeting, press release of 5/30/03 at

h�p://www.atcsd.com/PressReleases/05_30_03.html (h�p://www.atcsd.com/PressReleases/05_30_03.html)

51. ↑ American Technology Corporation Awarded Key Military Contract to Deliver Modified

Long Range Acoustic Devices (LRADTM) press release of 10/21/03 at h�p://www.atcsd.com/ (h�p://www.atcsd.com/)

PressReleases/10_21_03.html

52. ↑ American Technology Corporation Announces Expansion of Military Business press

release of 6/30/03 at h�p://www.atcsd.com/PressReleases/06_30_03.html (h�p://www.atcsd.com/PressReleases/06_30_03.html)

53. ↑ Sparrow D. “Best of What”s New Grand Award Winner: Hypersonic Sound” Popular

Science, Dec, p 94, 2002. Also at

h�p://www.popsci.com/popsci/bown/article/0,16106,388134,00.html (h�p://www.popsci.com/popsci/bown/article/0,16106,388134,00.html)

54. ↑ Bunker RJ (ed.) Less-than-lethal Weapons: Reference Guidebook Los Angles Calif

{National Law Enforcemnt and Corrections Technology, Western Region}, 2000. Similar

treatment is Bunker RJ (ed.) “Nonlethal Weapons Terms and References” INSS Occasional

Paper 15, USAF Institute for National Security Studies, USAF Academy, Colorodo at

Click to access ocp15.pdf (h�p://www.usafa.af.mil/inss/OCP/ocp15.pdf)

55. ↑ Alexander JB. Future War: Non-Lethal Weapons in Twenty-First-Century Warfare, St.

Martin”s Press, New York, p. 101, 1999.

56. ↑ Audio Spotlight, Holosonic Research Labs, 51 Water Street Watertown, MA 02472 at

h�p://www.holosonics.com/ (h�p://www.holosonics.com/)

57. ↑ Lawton G. “They are playing my tune” New Scientist 9 Sept. p 38-42, 2000.

58. ↑ Loos Patent # 6017302 “Subliminal acoustic manipulation of nervous system” can

“cause relaxation, drowsiness, or sexual excitement, depending on the precise acoustic

frequency near ” Hz used. The effects of the 2.5 Hz resonance include slowing of certain

cortical processes, sleepiness, and disorientation.”

59. ↑ Loos HG. Patent #6017302 “Subliminal acoustic manipulation of nervous systems”

USPTO granted 1/25/00.

60. ↑ Hunt A, Tillery C, and Wild N. “Through-the-Wall Surveillance Technologies”

Corrections Today 63(4): 132-3, 2001. Also at

Click to access 07_01.pdf (h�p://www.ojp.gov/nij/sciencetech/aca/07_01.pdf)

61. ↑ Frey AH. “Headaches from Cellular Telephones: Are They Real and What Are the

Implications” Environ. Health Perspect. 106(3): 101-3, 1998.

62. ↑ Lin JC, “Cellular Telephones and Their Effect on the Human Brain” Mob Comput and

Comm Review, 3(3): 34-5, July, 1999. Also at

h�p://www.eecs.uic.edu/eecspeople/lin_acm3.htm (h�p://www.eecs.uic.edu/eecspeople/lin_acm3.htm)

63. ↑ Nolan PJ, Fundaments of College Physics Wm. C. Brown: Dubuque, Iowa, Melbourne,

10 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

Australia, Oxford England, p 716, 1993.

64. ↑ Reits BJ. Patent #5736966 “Adjustable microwave antenna” USPTO granted 4/7/98.

65. ↑ Maier G and Harrison D. Patent #5825554 “Lenses with a variable refraction index”

USPTO granted 10/20/98.

66. ↑ Jasper LJ. Patent #6407708 “Microwave generator/radiator using photoconductive

switching and dielectric lense” USPTO granted 6/18/02.

67. ↑ Hablov DV, Fisun OI, Lupichev LN, Osipov VV, Schestiperov VA, and Schimko R.

Patent #5448501 “Electronic life detection system” USPTO granted 9/5/95.

68. ↑ Hablov DV, Fisun OI, Lupichev LN, Osipov VV, Schestiperov VA, and Schimko R.

Patent #5530429 “Electronic surveillance system” USPTO granted 6/25/96.

69. ↑ Giori FA and Winterberger AR. “Remote Physiological Monitoring Using a Microwave

Interferometer” Biomed Sci Instr 3: 291-307, 1967.

70. ↑ Fullerton LW and Richards JI. Patent #6400307 “System and method for intrusion

detection using a time domain radar array” USPTO granted 6/4/02.

71. ↑ Time Domain Corporation, Cummings Research Park, 7057 Old Madison Pike, Suite

250, Huntsville, AL 35806 at h�p://www.radarvision.com/ (h�p://www.radarvision.com/) , company website is at

h�p://www.timedomain.com/ (h�p://www.timedomain.com/)

72. ↑ Nacci P. “Radar-Based Through-the-Wall Surveillance System” National Law

Enforcement and Corrections Center at h�p://www.raven1.net/nij_p26.htm (h�p://www.raven1.net/nij_p26.htm)

73. ↑ Ferris DD. “Microwave and millimeter-wave systems for wall penetration” SPIE

Proceedings 3375: 269-79, 1998.

74. ↑ Frazier LM. “Surveillance through walls and other opaque materials” SPIE Proceedings

2497: 115-19, 1995.

75. ↑ Radar PC at h�p://www.salsburg.com/product/radar.html (h�p://www.salsburg.com/product/radar.html)

76. ↑ Rowan L. Patent #4893815 “Interactive transector device commercial and military

grade” USPTO granted 1/16/90.

77. ↑ Systems & Electronics Inc., 201 Evans Ave., St. Louis MO 63121, Manportable

Surveillane and Target Acquisition Radar at h�p://www.seistl.com/images/pdf/mstar.pdf (h�p://www.seistl.com/images/pdf/mstar.pdf)

Company website is at h�p://www.seistl.com/directions.html (h�p://www.seistl.com/directions.html)

78. ↑ Brookner E. Tracking and Kalman Filtering Made Easy Wiley, New York, 1998.

79. ↑ Tisdale GE and Lindemann HB. Patent #4497065 “Target recognition system

enhanced by active signature measurements” USPTO granted 1/29/85.

80. ↑ Peralta EA and Rei� KM. Patent #4562439 “Imaging radar seeker” USPTO granted

12/31/85.

81. ↑ Ahlstrom LGW. Patent #4796834 “Method for combating of targets and projectile or

missile for carrying out the method” USPTO granted 1/10/89.

82. ↑ Suppes P, Lu Z, and Han B. “Brain wave recognition of words” Proc Natl Acad Sci 94:

14965-69, 1997. Printable free online thru Pubmed or at

h�p://www.pnas.org/cgi/content/full/94/26/14965 (h�p://www.pnas.org/cgi/content/full/94/26/14965)

83. ↑ Suppes P, Han B, and Lu Z. “Brain-wave recognition of sentences” Proc Natl Acad Sci

95: 15861-66, 1998. Printable free online thru Pubmed or at

h�p://www.pnas.org/cgi/content/full/95/26/15861 (h�p://www.pnas.org/cgi/content/full/95/26/15861)

84. ↑ Suppes P, Han B, Epelboim J, and Lu Z. “Invariance of brain-wave representations of

simple visual images and their names” Proc Natl Acad Sci 96: 14658-63, 1999. Printable free

online thru Pubmed or at h�p://www.pnas.org/cgi/content/full/96/25/14658 (h�p://www.pnas.org/cgi/content/full/96/25/14658)

85. ↑ Suppes P, Han B, Epelboim J, and Lu ZL. “Invariance between subjects of brain wave

representations of language” Proc Natl Acad Sci 96(22): 12953-8, 1999. Printable free online

thru PubMed or at h�p://www.pnas.org/cgi/content/full/96/22/12953 (h�p://www.pnas.org/cgi/content/full/96/22/12953)

86. ↑ Suppes P and Han B. “Brain-wave representation of words by superposition of a few

sine waves” Proc Natl Acad Sci 97: 8738-43, 2000. Printable free online thru Pubmed or at

h�p://www.pnas.org/cgi/content/full/97/15/8738 (h�p://www.pnas.org/cgi/content/full/97/15/8738)

87. ↑ Assadullahi R and Pulvermuller F. “Neural Network Classification of Word Evoked

Neuromagnetic Brain Activity” In: Wermter S, Austin J, and Willahaw D (eds.) Lecture Notes in

Artificial Intelligence: Emergent Neurocomputational Architechures Based on Neuroscience

Heidelberg Springer, p 311-20, 2001. More limited preliminary communication at

h�p://www.his.sunderland.ac.uk/durhamab/ramin.doc (h�p://www.his.sunderland.ac.uk/durhamab/ramin.doc)

88. ↑ Pinneo LR and Hall DJ. “Feasibility Study for Design of a Biocybernetic

Communication System” Report #ADA017405 National Technical Information Service, 1975.

Prepared for the Advanced Research Projects Agency Order #2034, Program Code #2D20,

Contractor: Stanford Research Institute Contract dates: 2/9/72-8/31/76, SRI Project

LSU-1936. (US cost ~$50.)

89. ↑ Selden G. “Machines That Read Minds” Sci Digest Oct 89: 60-6, 1981. Also at

h�p://www.datafilter.com/mc/machinesThatReadMinds.html (h�p://www.datafilter.com/mc/machinesThatReadMinds.html)

90. ↑ Kiyuna T, Tanigawa T, and Yamazaki T. Patent #5785653 “System and method for

predicting internal condition of live body” USPTO granted 7/28/98.

91. ↑ Mardirossian A. Patent #6011991 “Communication system and method including brain

wave analysis and/or use of brain activity” USPTO granted 1/4/00.

92. ↑ Pulvermuller F. “Words in the brain”s language” Behav Brain Sci 22: 253-336, 1999.

93. ↑ Assadollahi R and Pulvermuller F. “Neuromagnetic evidence for early access to

cognitive represtentations” Cog Neurosci Neurophysiol 12(2): 207-13, 2001.

94. ↑ Preissl H, Pulvermuller F, Lu�enberger W, and Birbaumer N. “Evoked potentials

distinguish between nouns and verbs” Neurosci Le� 197: 81-3, 1995.

95. ↑ Pulvermuller F, Mohn B, and Schleichert H. “Semantic or lexico-syntactic factors: what

determines word-class specific activity in the human brain?” Neurosci Le� 275: 81-4, 1999.

96. ↑ Pulvermuller F, Lu�enberger W, and Preissl H. “Nouns and Verbs in the Intact Brain:

Evidence from Event-retlated Potentials and High-frequency Cortical Responses” Cerebral

11 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

Cortex 9(5): 497-506, 1999.

97. ↑ Pulvermuller F, Preissl H, Lu�enberger W, and Birbaumer N. “Brain Rhythms of

Language: Nouns Versus Verbs” Eur J Neurosci 8: 917-41, 1996.

98. ↑ Kellenbach ML, Wijers AA, Hovius M, Mulder J, and Mulder G. “Neural Differentiation

of Lexico-Syntactic Categories or Semantic Features? Event-Related Potential Evidence for

Both” J Cog Neurosci 14(4): 561-77, 2002.

99. ↑ Muller HM and Kutas M. “What”s in a name? Electrophysiological differences between

spoken nouns, proper names and one”s own name” Neuroreport 8: 221-5, 1996.

100. ↑ Dehaene S. “Electrophysiological evidence for category-specific word processing”

Neuroreport 6: 2153-7, 1995.

101. ↑ Neville HJ, Mills D, and Lawson DS. “Fractionating Language: Different Neural

Subsystems with Different Sensitive Periods” Cerebral Cortex 2: 244-58, 1992.

102. ↑ Pulvermuller F, Lu�enberger W, and Birbaumer N. “Electrocortical distinction of

vocabulary types” Electroenceph Clin Neurophysiol 94: 357-70, 1995.

103. ↑ Mohr B, Pulvermuller F, and Zaidel E. “Lexical Decision After Left, Right, and Bilateral

Presentation of Function Words, Content Words, and Non-Words: Evidence For

Interhemispheric Interaction” Neuropsychologia 32(1): 105-24, 1994.

104. ↑ Munte TF, Wieringa BM, Weyerts H, Szentkuti A, Ma�ke M, and Johannes S.

“Differences in brain potentials to open and closed class words: class and frequency effects”

Neuropsychologia 39: 91-102, 2001.

105. ↑ Pulvermuller F, Harle M, and Hummel F. “Walking or Talking? Behavioral and

Neruophysiological Correlates of Action Verb Processing” Brain Lang 78: 143-68, 2001.

106. ↑ Pulvermuller F, Harle M, and Hummel F. “Neurophysiological distinction of verb

categories” Cog Neurosci 11(12): 2789-93, 2000.

107. ↑ Kounios J and Holcomb PJ. “Concreteness Effects in Semantic Processing: ERP

Evidence Supporting Dual-Coding Theory” J Exp Psychol 20(4): 804-23, 1994.

108. ↑ Federmeier KD, Segal JB, Lombrozo T, and Kutas M. “Brain responses to nouns,

verbs and class-ambiguous words in context” Brain 123(12): 2552-66, 2000.

109. ↑ Krause CM, Korpilahti P, Porn B, Joskim J, and Lang HA. “Automatic auditory word

perception as measured by 40 Hz EEG responses” Encephal Clin Neurophysiol 107: 84-7,

1998.

110. ↑ Diesch E, Biermann S, and Luce T. “The magnetic mismatch field elicited by words

and phonological non-words” Neuroreport 9(3): 455-60, 1998.

111. ↑ Lu�enberger W, Pulvermuller F, and Birbaumer N. “Words and pseudowords elicit

distinct pa�erns of 30-Hz EEG responses” Neurosci Le� 176: 115-18, 1994.

112. ↑ Kiefer M. “Perceptual and semantic sources of category-specific effects: Event-related

potentials during picture and word categorization” Mem Cog 29(1): 100-16, 2001.

113. ↑ Skrandies W. “Evoked potential correlates of semantic meaning”A brain mapping

study” Cog Brain Res 6: 175-183, 1998.

114. ↑ Skrandies W and Chiu MJ. “Dimensions of affective meaning ” behavioral evoked

potential correlates in Chinese subjects” Neurosci Le� 341: 45-8, 2003.

115. ↑ Pa�on RE. Patent #6292688 “Method and apparatus for analyzing neurological

response to emotion-inducing stimuli” USPTO granted 9/18/01.

116. ↑ Deeke L. “Bereitschaftspotential as an indicatory of movement preparation in

supplementary motor area and motor cortex” Ciba Found Symp 182:132-231, 1987.

117. ↑ Chen R. and Halle� M. “The Time Course of Changes in Motor Cortex Excitability

Associated with Voluntary Movement” Can J Neurol Sci 26(3): 163-9, 1999.

118. ↑ Pfurtscheller G, Kalcher J, Neuper CH, Flo�inger D, and Pregenzer M. “On-line EEG

classification during externally-paced hand movements using a neural network classifier”

Electrophysiol and Neurophysiol 99: 416-25, 1996.

119. ↑ Birch GE. “Initial On-Line Evaluations of the LF-ASD Brain-Computer Interface With

Able Bodied and Spinal-Cord Subjects Using Imagined Voluntary Motor Potentials” IEEE

Trans Neural Syst Rehabil Eng 10(4): 219-24, 2002.

120. ↑ Guger C, Harkam W, Hertnacs C, and Pfurtscheller G. “Prosthetic Control by an EEGbased

Brain-Computer Interface (BCI)” In: B”hler C and Knops H (eds.) Assistive Technology

on the Threshold of the new Millennium, 2003 :at

Click to access aaate.pdf (h�p://www.gtec.at/research/Publications/aaate.pdf)

121. ↑ 121.0 121.1 Millan JR. “Adaptive Brain Interfaces” Communications of the ACM 46(3):

74-80, 2003. Abstract at h�p://www.idiap.ch/publications/millan-2003-comm-acm.bib.abs.html (h�p://www.idiap.ch/publications/millan-2003-comm-acm.bib.abs.html)

122. ↑ 122.0 122.1 Millan JR and Mourifio J. “Asynchronous BCI and Local Neural

Classifiers: An Overview of the Adaptive Brain Interface Project” IEEE Transactions on Neural

Systems and Rehabilitation Engineering (Brain-Computer Interface Technology) 11(2):

159-61, 2003. Article also at ftp://ftp.idiap.ch/pub/reports/2003/millan_2003_nsre.pdf

123. ↑ 123.0 123.1 Millan JR, Renkens F, Mourifio J, and Gerstner W. “Non-Invasive Brain-

Actuated Control of a Mobile Robot” Proceedings of the 18th Joint International Conference

on Artificial Intelligence Aug 9-15, in press, 2003. Article also at

ftp://ftp.idiap.ch/pub/reports/2003/millan_2003_ijcai.pdf

124. ↑ Carmens JM, Lebedev MA, Crist RE, O”Doherty JE, Santucci DM, Dimitrov DF, Patil

PG, Henriques CS, and Nicolelis MAL. “Learning to Control a Brain-Machine Interface for

Reaching and Grasping by Primates” Public Library of Science, Biology Oct 1(1). 2003 at

Click to access 10.1371_journal.pbio.0000042-L.pdf (h�p://www.plosbiology.org/archive/1545-7885/1/2/pdf/10.1371_journal.pbio.0000042-L.pdf)

125. ↑ Farwell LA and Donchin E. “The Truth Will Out: Interrogative Polygraphy (“Lie

Detection”) With Event-Related Brain Potentials” Psychophysiology 28(5): 531-47, 1991.

126. ↑ Johnson MM and Rosenfeld JP. “Oddball-evoked P300-based method of deception

detection in the laboratory II. Utilization of non-selective activation of relevant knowledge” Int J

Psychophysiol 12: 289-306, 1992.

12 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

127. ↑ Rosenfeld JP, Ellwanger J, and Sweet J. “Detecting simulated amnesia with eventrelated

brain potentials” Int J Psychophysiol 19: 1-11, 1995.

128. ↑ Allen JJB and Iacono WG. “A Comparison of methods for the analysis of event-related

potentials in deception detection” Psychophysiology 34: 234-40, 1997.

129. ↑ Lorenz J, Kunze K, and Bromm B. “Differentiation of conversive sensory loss and

malingering by P300 in a modified oddball task” Neuroreport 9: 187-91, 1998.

130. ↑ Tardif HP, Barry RJ, and Johnstone SJ. ” Event-related potentials reveal processing

differences in honest vs. malingered memory performance” Int J Psychophysiol 46: 147-58,

2002.

131. ↑ Brain Fingerprinting Laboratories, Inc., 108 West Palm Drive, Fairfield, IA 52556 at

h�p://www.brainwavescience.com/ (h�p://www.brainwavescience.com/)

132. ↑ Farwell LA and Smith SS. “Using Brain MERMER Testing to Detect Knowledge

Despite Efforts to Conceal” J Forensic Sci 46(1): 135-46, 2001.

133. ↑ Farwell LA. “Two new twists on the truth detector: brain-wave detection of

occupational information” Psychophysiology 29(4A): S3, 1992.

134. ↑ Farwell LA. Patent #5363858 “Method and apparatus for multifaceted

electroencephalographic response analysis” USPTO granted 11/15/94.

135. ↑ Farwell LA and Conte FL. Patent #5406956 “Method and apparatus for truth detection”

USPTO granted 4/18/95.

136. ↑ Farwell LA and Conte FL. Patent #5467777 “Method for electroencephalographic

information detection” USPTO granted 11/21/95.

137. ↑ Referred to, but unavailable, however are a CIA Office of Technology Assessment

report, a security industry publication, and a doctoral dissertation.

138. ↑ Joseph JE. “Functional Neuroimaging studies of category specificity in object

recognition: A critical review and meta-analysis” Cog Affect Behav Neurosci 1(2): 119-36,

2001.

139. ↑ Mitchell TM, Hutchinson R, Just MA, Niculescu RS, Percira F, and Wang X.

“Classifying Instantaneous Cognitive States from fMRI Data” Am Med Informatics Assoc

November, 2003. Also at h�p://www-2.cs.cmu.edu/~tom/amia2003-final.pdf (h�p://www-2.cs.cmu.edu/~tom/amia2003-final.pdf)

140. ↑ Spence SA, Farrow TF, Herford AE, Wilkinson ID, Zheng Y, and Woodruff PW.

“Behavioral and functional anatomical correlates of deception” Neuroreport 12(13): 2849-53,

2001.

141. ↑ Lee TM, Liu HL, Tan LH, Chan CC, Mahankali S, Feng CM, Hou J, Fox PT, and Gao

JH. “Lie detection by functional magnetic resonance imgaging” Hum Brain Mapp 15(3):

157-64, 2002.

142. ↑ Langleben DD, Schrneder L, Maldjian JA, Gur RC, McDonald S, Ragland JD, O”Brien

CP, and Childress AR. “Brain activity during simulated deception: an event-related functional

magnetic resonance study” Neuroimage 15(3): 727-32, 2002.

143. ↑ Ganis G, Kosslyn SM, Stose S, Thompson WL, and Yurgelun-Todd DA. “Neural

correlates of different types of deception: an fMRI investigation” Cereb Cortex 13(8): 830-6,

2003.

144. ↑ Bartels A and Zeki S. “The neural basis of romantic love” Neuroreport 11(17): 3829-34,

2000.

145. ↑ Guya� DG. “Some Aspects of Anti-Personnel Electromagnetic Weapons” International

Commi�ee of the Red Cross Symposium: The Medical Profession and the Effects of

Weapons, ICRC publication ref. 06681996 (The paper is available from the Health Division of

the ICRC.) Also at h�p://www.mahlers.com/wompaoapew.htm (h�p://www.mahlers.com/wompaoapew.htm)

146. ↑ Brodeur, P. The Zapping of America Norton, New York, p 299 & 105, 1977.

147. ↑ Lopez R. “Special operations survives Pentagon budget constraints” Jane”s

International Defense Review 26(3): 247-51, 1993.

148. ↑ Malech RG. Patent #3951134 “Apparatus and method for remotely monitoring and

altering brain waves” USPTO granted 4/20/76.

149. ↑ Department of the Army, USAF Scientific Advisory Board. “New World Vistas: air and

space for the 21st century” 14 vol. (Ancillary Volume) p 89-90, 1996. Also at

h�p://www.azstarnet.com/~freetht/biologic.htm (h�p://www.azstarnet.com/~freetht/biologic.htm)

150. ↑ Morehouse DA. Nonlethal Weapons: War without Death Praeger, p 20, 1996.

151. ↑ Dando M. A New Form of Warfare: The Rise of Non-Lethal Weapons Brassey”s,

London, Washington, p 22, 1996

152. ↑ Taff BE and Stoller KP. Patent #49400558 “Cryogenic remote sensing physiograph”

USPTO granted 7/10/90.

153. ↑ Stoller KP and Taff BE. “Remote Physiological Sensing: Historical Perspective,

Theories and Preliminary Developments” Med Instrum 20(5): 260-5, 1986.

154. ↑ Soviet Union Draft Agreement on the Prohibition of the Development and Manufacture

of New Types of Weapons of Mass Destruction and New Systems of Such Weapons. UN

Commi�ee on Disarmament, CCD/511/Rev.1, Aug 1977. Also at

h�p://www.dcn.davis.ca.us/~welsh/9.htm (h�p://www.dcn.davis.ca.us/~welsh/9.htm)

155. ↑ European Parliament, 28.1.99 Enviroment, security, and foreign affairs , A4-0005/99

EP1159, resolutions 23, 24, & 27, January 28, 1999 . Limited excerpts at

h�p://www.raven1.net/europar.htm (h�p://www.raven1.net/europar.htm)

156. ↑ Wright S. “Future Sub-lethal, Incapacitating & Paralysing Technologies”Their Coming

Role in the Mass Production of Torture, Cruel, Inhumane & Degrading Treatment. Presented

to The Expert Seminar On Security Equipment & The Prevention of Torture 25-26 October

2002 London, UK and The 16th ISODARCO Winter Course On “The Surge in Non-State

Violence: Roots Impacts & Countermeasures” 9 – 16 February, 2003, Andalo, Trento, Italy.

Also at h�p://www.statewatch.org/news/2002/nov/torture.pdf (h�p://www.statewatch.org/news/2002/nov/torture.pdf) &

h�p://www.isodarco.it/html/andalo03-wright.html (h�p://www.isodarco.it/html/andalo03-wright.html)

13 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

157. ↑ Begich N and Manning J. Angels Don”t Play This HAARP: Advances in Telsa

Technology Earthpulse Press, Anchorage Alaska, p 176-8, 1995.

158. ↑ Persinger MA. “On te Possibility of Directly Accessing Every Human Brain By

Elcctromagnetic Induction of Fundamental Algorithims” Percept Motor Skills 80: 791-799,

1995.

159. ↑ Viking Press, New York, p 57 & 252, 1970. Article also at h�p://www.bariumblues.com/ (h�p://www.bariumblues.com/)

persinger.htm

160. ↑ Butler D. “Advances in neuroscience “may threaten human rights”” Nature 22 January

391: 316, 1998. Also at h�p://raven1.net/nature1.htm (h�p://raven1.net/nature1.htm)

161. ↑ Space Preservation Act of 2001 (Introduced in the House) HR 2977 IH, 107th

Congress 1st Session Introduced by Hon. Dennis J. Kucinich. Also at

h�p://www.raven1.net/govptron.htm (h�p://www.raven1.net/govptron.htm)

162. ↑ Federal Law “About Weapons” Federal Laws of the Russian Federation from 21.07.98

[1998] No. 117-F3, from 31.07.98 [“98] No. 156-F3 , from 17.12.98 [“98] No. 187-F3, from

19.11.99 [“99] No. 194-F3, from 10.04.2000 [“00] No. 52-F3, from 26.07.01 [“01] ISBN

5-86894-393-7 Translation at h�p://www.raven1.net/1-02-5.htm (h�p://www.raven1.net/1-02-5.htm)

163. ↑ Gurov AI. Federal Assembly”Parliament of the Russian Assembly, Govermental Duma,

Commi�ee on Safety, “Resolution: Regarding the draft of the Federal Law “About the

Sumission of addendum to Article 6 of the Federal Law “About Weapons” No 28/3 Nov. 30,

2000. Also at h�p://www.raven1.net/1-02-6.htm (h�p://www.raven1.net/1-02-6.htm)

164. ↑ General Assembly. International Union of Radio Science “USRI Resolution on Criminal

Activities Using Electromagnetic Tools” In: Records of the USRI General Assembly, Toronto,

25: 178-9, 1999. Also at h�p://www.intec.rug.ac.be/ursi/Tor99ResolENG.htm (h�p://www.intec.rug.ac.be/ursi/Tor99ResolENG.htm)

165. ↑ Microwave irradiation of the U.S. Embassy in Moscow: review of its history and

studies to determine whether or not related health defects were experienced by employees

assigned in the period 1953-1977. United States, Congress, Senate Commi�ee on

Commerce, Science and Transportation. US GOV. DOC. Y 4.C 73/7: IR 7.

166. ↑ 166.0 166.1 Smith CW and Best S. Electromagnetic Man J.M. Dent & Sons Ltd.,

London p 211, 233, & 235, 1989.

167. ↑ Smith CW and Best S. Electromagnetic Man J.M. Dent & Sons Ltd., London p 211,

233, & 235, 1989.

168. ↑ Parry G. “Doctors investigating claims of Greenham radiation cases: Peace women

fear electronic zapping at base” (Manchester) Guardian, Mar. 10: 3, 1986.

169. ↑ Ramsay R. “ELF: from Mind Control to Mind Wars” Lobster 19: 23, 1990.

170. ↑ 170.0 170.1 Munzert R. “High-Tech Waffe Mikrowelle – Kriminelle Anwendungen von

Mikrowellen” Au�l”rungsarbeit, Heft 9, April, S. 25-31, 2003. English treatment “Targeting of

the Human with Directed Energy Weapons” is at

h�p://www.grn.es/electropolucio/munzert6902.doc (h�p://www.grn.es/electropolucio/munzert6902.doc)

171. ↑ Munzert R. personal communication.

172. ↑ Gillin LM and Gillin L. “Subtle Energies, Intentionality and the Healing of Traumatically

Abused Persons” International Conference on Trauma, A�achment and Dissociation,

Melborne, Australia, Sept 12-14, 2003. Internet availability of victim field measurements are

“Submission to Coroner: Additional Information on Possible Cause of Death of Ms. Deva

Denise Paul on 10th September 2000, Case Reference 2958/00.” at

h�p://www.globaltwa.com/SUBMISSION%20TO%20CORONER.pdf (h�p://www.globaltwa.com/SUBMISSION%20TO%20CORONER.pdf) CAT scan indication on

an implant is “Mind Control Using Holography and Dissociation a Process Model” at

Click to access MindControl.pdf (h�p://www.globaltwa.com/documents/MindControl.pdf)

173. ↑ Lewer N and Schofield S. Non-Lethal Weapons: A Fatal A�raction? : Military

Strategies and Technologies for 21st-Century Conflict Zed Books, London & New Jersey, p

62, 1997.

174. ↑ Rodwell R. defense correspondent report “Army tests new riot weapon” New Scientist

Sept. 20, p 684, 1973.

175. ↑ McKinney J. “Microwave Harassment and Mind Control Experimentation” Unclassified,

June-July1992 4(3): 1-20. Also at h�p://www.webcom.com/~pinknoiz/coldwar/microwave.html (h�p://www.webcom.com/~pinknoiz/coldwar/microwave.html)

176. ↑ National Security Advisor to President Carter.

177. ↑ Lamb C, and Swe� C. Department of Defense Directive, Non-Lethal Weapons Policy

Draft of 21 July 1994. ath�p://www.heart7.net/mcf/mindnet/mn168.htm particularly last

paragraph of p 7 onto p 8.

178. ↑ McKinney J. Le�er to President Clinton at h�p://www.heart7.net/mcf/mckinney.htm (h�p://www.heart7.net/mcf/mckinney.htm)

179. ↑ Cheryl Welsh Freedom of Information Act request reply for review of Soviet literature,

March 19, 1997 at h�p://www.raven1.net/nsa1.gif (h�p://www.raven1.net/nsa1.gif)

180. ↑ Lopatin VN, and Tsygankov VD. Psychotronic War and the Security of Russia

Moscow, 1999. See research abroad section in translation at

h�p://www.raven1.net/russtran.htm (h�p://www.raven1.net/russtran.htm)

181. ↑ Smith C. “On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind

Invasive Technology” J Psycho-Social Studies 2(2) #3, 2003. Article at

h�p://www.btinternet.com/~psycho_social/Vol3/JPSS-CS2.html (h�p://www.btinternet.com/~psycho_social/Vol3/JPSS-CS2.html)

182. ↑ American Psychiatric Association DSM-IV Task Force. Diagnostic and Statistical

Manual of Mental Disorders Fourth Edition (DSM-IV-TRTM) American Psychiatric Association,

2000.

183. ↑ Flaum M and Schul� SK. “The Core Symptoms of Schizophrenia” Ann Med 28(6):

525-31, 1996.

184. ↑ Isselbacher, KJ, Adams RD, Brunwald E, Petersdorf RG, and Wilson JD. Harrison”s

Principles of Internal Medicine Ninth Ed., McGraw-Hill, New York, p 150, 1980.

185. ↑ McMurtrey JJ. “Microwave Bioeffect Congruence with Schizophrenia” In press, 2003.

Microwav.rtf

14 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

__________________________________________________________________________________________

h�p://www.freedomfchs.com/remoteneuralmonitoring2.pdf (h�p://www.freedomfchs.com/remoteneuralmonitoring2.pdf)

How The NSA Harasses Thousands Of

Law Abiding Americans Daily By The Usage Of

Remote Neural Monitoring (RNM)

John St. Clair Akwei

vs.

NSA, Ft. Meade, MD, USA

Evidence for the Lawsuit filed at the US courthouse in Washington, D.C.

(Civil Action 92-0449)

John St.Clair Akwei vs. NSA Ft George G. Meade, MD

My knowledge of the National Security Agency’s structure, national security activities,

proprietary technology,and covert operations to monitor individual citizens.

The NSA’s mission and the

NSA’s domestic Intelligence operation.

Communications Intelligence (COMINT)

Blanket coverage of all electronic communication in the U.S. and the world to ensure national

security. The NSA at Ft. Meade, Maryland has had the most advanced computers in the world since

the early 1960’s. NSA technology is developed and implemented in secret from private

corporations, academia, and the general public.

Signals Intelligence (SIGINT)

The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves

in the environment for wirelessly tapping into computers and tracking persons with the electrical

currents in their bodies. Signals Intelligence is based on the fact that everything in the environment

with an electric current in it has a magnetic flux around it which gives off EMF waves. The

NSA/DoD has developed proprietary advanced digital equipment which can remotely analyze all

objects whether man-made or organic that have electrical activity.

Domestic Intelligence (DOMINT)

The NSA has records on all U.S. citizens. The NSA gathers information on U.S. citizens who might

be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by

executive order to spy on anyone. The NSA has a permanent National Security Anti-Terrorist

surveillance network in place. This surveillance network is completely disguised and hidden from

the public.

Tracking individuals in the U.S. is easily and cost-effectively implemented with the NSA’s

electronic surveillance network. This network (DOMINT) covers the entire U.S., involves tens of

thousands of NSA personnel, and tracks millions of persons simultaneously. Cost effective

implementation of operations is assured by NSA computer technology designed to minimize

operations costs.

NSA personnel serve in Quasi-public positions in their communities and run cover businesses and

legitimate businesses that can inform the intelligence community of persons they would want to

track. N.S.A. personnel in the community usually have cover identities such as social workers,

lawyers and business owners.

Individual citizens occasionally targeted for surveillance

by independently operating NSA personnel.

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using

the NSA’s domestic intelligence network and cover businesses. The operations independently run

by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of

thousands of unwi�ing citizens by NSA operatives is likely to happen. NSA Domint has the ability

to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects

to be diagnosed with ill mental health.

NSA’s domestic electronic surveillance network

As of the early 1960’s the most advanced computers in the world were at the NSA, Ft. Meade. Research

breakthroughs with these computers were kept for the NSA. At the present time the NSA has

nanotechnology computers that are 15 years ahead of present computer technology.

The NSA obtains blanket coverage of information in the U.S. by using advanced computers that use

artificial intelligence to screen all communications, irregardless of medium, for key words that should

be brought to the a�ention of NSA agents/cryptologists. These computers monitor all communications

at the transmi�ing and receiving ends. This blanket coverage of the U.S. is a result of the NSA’s

Signals Intelligence (SIGINT) mission.

The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can

monitor the entire EMF spectrum. This equipment was developed, implemented, and kept secret in the

same manner as other electronic warfare programs.

With this technology NSA personnel can non-obtrusively tap into any communication device in

existence. This includes computers, telephones, radio and video-based devices, printers, car electronics,

and even the minute electrical fields in humans (for tracking individuals).

Signals Intelligence Remote Computer Tampering

The NSA keeps track of all PCs and other computers sold in the U.S. This is an integral part of the

Domestic Intelligence network.

The NSA’s EMF equipment can tune in RF emissions from personal computer circuit boards (while

filtering out emissions from monitors and power supplies). The RF emission from PC circuit boards

contains digital information in the PC. Coded RF waves from the NSA’s equipment can resonate PC

circuits and change data in the PC’s. Thus the NSA can gain wireless modem-style entry into any

computer in the country for surveillance or anti-terrorist electronic warfare.

Radio and Television signals can be substituted at the receiving end with special EMF equipment.

Replacing signals in Radios and Televisions is another outgrowth of the NSA’s Signals Intelligence

(SIGINT) mission.

15 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

Detecting EMF Fields in Humans for Surveillance.

A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are.

With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs).

These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored

from a distance.

NSA personnel can dial up any individual in the country on the Signals lntelligence EMF scanning

network and the NSA’s computers will then pinpoint and track that person 24 hours-a-day. The NSA

can pick out and track anyone in the U.S.

NSA Signals Intelligence Use of EMF Brain Stimulation

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and

Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra

program of the early 1950’s, which included neurological research into “radiation” (non-ionizing EMF)

and bioelectric research and development. The resulting secret technology is categorized at the

National Security Archives as “Radiation Intelligence,” defined as “information from unintentionally

emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation.”

Signals Intelligence implemented and kept this technology secret in the same manner as other

electronic warfare programs of the U.S. government. The NSA monitors available information about

this technology and withholds scientific research from the public. There are also international

intelligence agency agreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a

distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in

the brain continuously. The NSA records and decodes individual brain maps (of hundreds of thousands

of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military

for Brain-to-computer link. (In military fighter aircraft, for example.)

For electronic surveillance purposes electrical activity in the speech center of the brain can be

translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory

cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can

use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid

schizophrenia.

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from

the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA

operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM

can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can

use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for

brain-programming purposes.

Capabilities of NSA operatives using RNM

There has been a Signals Intelligence network in the U.S. since the 1940’s. The NSA, Ft. Meade has in

place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor

audio-visual information in their brain. This is all done with no physical contact with the subject. RNM

is the ultimate method of surveillance and domestic intelligence. Speech and 3D sound, and subliminal

audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears) and images can be

sent into the visual cortex. RNM can alter a subject’s perceptions, moods, and motor control.

Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence

community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.

National Security Agency Signals Intelligence

Electronic Brain Link Technology

NSA SigInt can remotely detect, identify and monitor a person’s bioelectric fields.

The NSA’s Signals Intelligence has the proprietary ability to remotely and non-invasively monitor

information in the human brain by digitally decoding the evoked potentials in the 30-50 hz, .5 milliwa�

electro-magnetic emissions from the brain.

Neuronal activity in the brain creates a shifting electrical pa�ern that has a shifting magnetic flux. This

magnetic flux puts out a constant 30-50 hz, .5 milliwa� electromagnetic (EMF) wave. Contained in the

electromagnetic emission from the brain are spikes and pa�erns called “evoked potentials.”

Every thought, reaction, motor command, auditory event, and visual image in the brain has a

corresponding “evoked potential” or set of “evoked potentials.” The EMF emission from the brain can

be decoded into the current thoughts, images and sounds in the subject’s brain.

NSA SigInt uses EMF-transmi�ed Brain Stimulation as a communications system to transmit

information (as well as nervous system messages) to intelligence agents and also to transmit to the

brains of covert operations subjects (on a non-perceptible level).

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to

trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s

neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control.

Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while

transmi�ing sound to the auditory cortex (bypassing the ears) and transmi�ing faint images to the

visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the

brain).

Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA

personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the

human brain) has become the ultimate surveillance system. It is used by a limited number of agents in

the U.S. Intelligence Community.

RNM requires decoding the resonance frequency of each specific brain area. That frequency is then

modulated in order to impose information in That specific brain area. The frequency to which the

various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates

signals in this frequency band.

An example of EMF Brain Stimulation:

Brain Area Bioelectric

16 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

Resonance

Frequency

Information Induced

Through Modulation

Motor Control Cortex 10 HZ Motor Impulse Co-ordination

Auditory Cortex 15 HZ Sound which bypasses the ears

Visual Cortex 25 HZ Images in the brain, bypassing the eyes

Somatosensory Cortex 09 HZ Phantom Touch Sense

Thought Center 20 HZ Imposed Subconscious Thoughts

This modulated information can be put into the brain at varying intensities from subliminal to

perceptible.

Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio

information to a person’s brain at the frequency of another person’s auditory cortex would result in that

audio information not being perceived.

The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the

NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to

5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM

to a�empt to incapacitate the Plaintiff and hinder the Plaintiff from going to authorities about their

activities against the Plaintiff in the last twelve years.

The Kinnecome group has about 100 persons working 24-hours-a-day at Ft Meade. They have also

brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time

ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against

NSA personnel misusing this intelligence operations method.

NSA Techniques and Resources

Remote monitoring/tracking of individuals in any location. inside any building, continuously, anywhere

in the country.

A system for inexpensive implementation of these operations allows for thousands of persons in every

community to be spied on constantly by the NSA.

Remote RNM Devices

a) NSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for

tracking individuals and can send messages through the nervous system to affect their performance.

b) [Information missing from original]

c) RNM can electronically identify individuals and track then anywhere in the U.S. This equipment

is on a network and is used for domestic intelligence operations, government security, and military

base security, and in case of bioelectric warfare.

Spo�ers and Walk-Bys in Metropolitan Areas

a) Tens of thousands of persons in each area are working as spo�ers in neighborhood/business

place spies (sometimes unwi�ingly) following and checking on subjects who have been identified

for covert control by NSA personnel.

b) Agents working out of offices can be in constant communication with Spo�ers who are keeping

track of the NSA’s thousands of subjects in public.

c) NSA Agents in remote offices can instantly identify (using RNM) any individual spo�ed in

public whom is in contact with surveillance subject.

Chemicals and Drugs into Residential Buildings with

hidden NSA-lnstalled and maintained plastic plumbing lines.

a) The NSA has kits for running lines into residential tap water and air ducts of subjects for the

delivery of drugs (such as sleeping gas or brainwashing aiding drugs). This is an outgrowth of CIA

pharmapsychology.

Brief Overview of Proprietary U.S.

Intelligence/Anti-Terrorist Equipment Mentioned.

Fixed network of special EMF equipment that can read EEGs in human brains and identify/track

individuals by using digital computers. ESB (Electrical Stimulation to the Brain) via EMF signal

from the NSA Signals Intelligence is used to control subjects.

EMF equipment that gathers information from PC circuit boards by deciphering RF emissions

thereby gaining wireless modem-style entry into any personal computer in the country.

All equipment hidden, all technology secret, all scientific research unreported (as in electronic

warfare research).

Not known to the public at all, yet complete and thorough implementation of this method of

domestic intelligence has been in place since the early 1980’s.

Resources

These publications have only been discovered since December 1991, after Plaintiff had already notified

authorities (Dept. of Justice, etc.) of Public Corruption by named NSA employees. When no action was

taken against the NSA employees I researched the Intelligence Community electronic surveillance

technology involved and discovered the following publications: The Body Electric

Electromagnetism and the Foundrrtion of Life, by Robert Becker, M.D.

p. 265/313/318. Monitoringeuroelectric information in the brain. E-M wave E.S.B.

Cross Currents, by Robert Becker, M.D.

p. 70, p. 78, p. 105/210/216/220/242/299/303 E-M ESB. Simulating auditory hallucinations. p. 274,

“Remote computer tampering using the RF emissions from the logic board.”

Currents of Death by Paul Brodeur

p. 27/93. Driving brain electrical activity with external E-M, Magnetophosphenes, Delgado.

The Zapping of America by Paul Brodeur

DoD E-M ESB Research, simulating auditory hallucinations.

Of Mice, Men and Molecules, by John H. Heller. 1963.

p. 110, Bioelectricity. probing the brain with E-M waves.

The 3-Pound Universe, by Judith Hooper

17 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

p. 29/132/137. CIA EEG research. EEG’s for surveillance.

In the Palaces or Memory, by George Johnson

E-M emissions from the brain,the brain as an open electromagnetic circuit.

The Puzzle Palace, by James Bamford

Signals intelligence, most advanced computers in the early Sixties

The U.S. Intelligence Community – Glossary terms at National Security Archives:

Radiation intelligence – information from unintentionally emanated electromagnetic energy,

excluding radioactive sources.

The Search for the “Manchurian Candidate,” by John Marks

p. 327. Electrical or radio stimulation to the brain, CIA R&D in bioelectrics.

Secret Agenda, by Jim Hougan

National Security cult groups.

Crines of the Intelligence Commununity. by Morton Halperin

Surreptitious entries; intelligence agents running operations against government workers

War in the Age of Intelligent Machines

NSA computer supremacy, complete control of information

Alternate Computers, by Time-Life Books

Molecule Computers

The Mind, by Richard Restak, M.D.

p. 258, EEG Systems Inc., decoding brain E-M emanations, tracking thoughts on a computer.

MedTech, by Lawrence Gallon

Triggering events in the brain” direct to auditory cortex signals.

Cyborg, by D.S. Halacy, Jr. (1965)

Brain-to-computer link research contracts given out by the U.S. Govemment

Psychiatry and the C.I.A.: Victims of Mind Control by Harvey M. Weinstein. M.D.

Dr. Cameron, psychic driving. ultraconceptual communications.

Journey Into Madness: Ihe True Story of Secret CIA Mind Control and Medical Abuse, by Gordon

Thomas

p. 127/276/116, 168-69. Intelligence R & D. Delgado. Psychic driving with radio telemetry.

Mind Manipulators, by Alan Scheflin and Edward M. Opton

MKULTRA brain research for information gathering

The Brain Changers, by Maya Pines.

p. 19. Listening to brain E-M emissions.

___________________________________________________________________________________________

Now read this and see how the Gangstalking Work Hand in Hand with eventual Entrainment for prostitution Gansgtalking

to break you Down causl Entrainment for neural identification then Enslavemenet with Remote Neural Monitoring / Influenicng

h�p://groups.yahoo.com/group/NewWorldOrderWhistleBlowers2 (h�p://groups.yahoo.com/group/NewWorldOrderWhistleBlowers2)

— On Tue, 9/6/11, Josef Sharon <nmontenero8@…> wrote:

18 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

via rr (links at the end)GANG STALKING TECH … EVERYTHING YOU NEED TO KNOW!!!!!!!
“I was eventually offered a place in the syndicate. The syndicate was presented to me as a kind of fraternity, a masonic-like mutual profit organization with strong police- like overtones. I was told that I was helping to build a be�er society. However, I have never been given any of the advancement opportunities
I was promised.The “advancement system” of the syndicate is a slippery slope. They make you give up your security priveliges, so eventually all of your communications are watched (which is why I composed this email offline where they can’t see me, and sent it via an internet cafe) and you have to a�end
meeting after meeting of mind-numbing pledges and chants. The premise is that if you sign contracts giving up personal liberties for the group, and you are genuinely innocent, then you will be promoted. I have only been promoted once, to the rank of manager, and I don’t feel as if it is a rewarding experience.

Worse, you are never allowed to leave because they think you will give away secrets. Leaving is only permissible with a special contract that permits the syndicate to destroy your credibility (usually they make sure that the most a�ention any secrets that you reveal get is from crackpot UFO magazines, or
diagnose you with schizophrenia).
There are other problems. If you have children, you have to send them to education in syndicate owned schools. If you have a wife, you have to report on her, allow her to be spied upon, and be prepared to target her if they decide to turn her into a TI. The official “compensation” policy is that you will get to keep
the children if she lodges a divorce. However, you won’t get to keep most of her material goods. They only want her to lose in the divorce proceedings so she gets nothing, not so the husband gets anything, so the syndicate takes it back as a tithe.

I suppose I should introduce the syndicate in a li�le more detail. I’m still not sure precisely what it is trying to do. [Blog Author note: It depends on the person selected and who initiated the campaign. In my case, CR is a Psychopath who likes to abuse women and this is the method he employs to do it. There are
also different groups doing this that are not necessarily connected and whose motivations are different.] To everyday citizens, it presents itself as a group trying to monitor terrorists (or any other kind of flavour-of-the-month undesirables like gays/communists/witches) and drive them out. To other people, its a
rotary club/chamber of commerce type operation. To others still, the most twisted conspiratorial minds, it is an organization that pulls the strings behind everything. To the puritan, it is a cleansing force. To the deviant, it is a gang of other deviants where everything is permissible. It’s the syndicate to everyone,
though. I
don’t know the extent of what it owns.

I do, however, know a great deal about the targeting process. When we get targets, we divide them into four categories: mercenary, practice, planning, and enemy. Mercenary targets are bought by outside parties. We advertise under a range of guises, from ads by “individuals” claiming to be able to kidnap
people, to practical jokers. Some groups, like big corporations and some governments (the government of Xxxxxx pays us to keep some people busy, so do the Xxxxxxs when they have too many people protesting whaling) know fully well what sort of services we do, so we don’t really hide them. [Blog Author
note: Certain unethical PI firms are actively involved. I know of two. One has become a national firm simply because they were rewarded by CR for participating in his campaign against me and the other is a large multi-national firm where CR has very high level connections. He has also spawned another firm
involved in online “identity theft protection”. –
Ironic given his predilection for stealing and abusing people’s identities.]

We get a lot of money from them, but we can still muster up a fair bit if worst comes to worst. I’m not sure so much about the NWO theory. Maybe the Xxxxxxx count, but you’d be surprised at how much money we can get from crime. [Blog Author note: CR agrees. He was responsible for two major thefts
ne�ing him 1.3 million dollars each. One was an Art Theft and the other a Jewellery Theft (from close friends).] I don’t mean that we go out robbing people, but we can outsource money from biker gangs/skinheads/drug dealers pre�y easily. [Blog Author note: And from Government Grants when one is
connected as well as CR.] Our syndicate gets a lot of support from people in rough areas like Xxxxxx and Xxxx’s Xxxx. Because there are areas with a lot of people in genuine need, who would leap at the thought of fighting back at the criminals, we can always find allies to pressure the criminal portions of
society. Of course, they are only pressuring them into giving
us money, but it’s a pre�y cozy arrangement. [Blog Author note: Sure it’s cozy. It’s called blackmail but what are the criminals going to do? Report it to the police?]

The second type of target is the practice target. We use them to train mobs. The targets don’t actually change, because we don’t want TOO many people fighting back at us. But we do rotate trainees between practice targets. This stops the person seeing the same people every time there’s a street show.

Then there are planning targets. These are selected by the syndicate for some reason or rather but aren’t paid for by mercenaries. You can usually tell the difference between planning and practice targets because they send people with experience after them. They’re still chosen by the same people though. The
practice ones are of course chosen for their timidity. I don’t know how the planning ones are chosen.

Enemy targets are people that decide they’ve had enough and turn against us. Since they protest and try to foil our plans (which, considering that our jobs are already nervy, is a real pain in the arse), we try to really give them hell. The best way, of course, is through the psychs. My supervisor used to say that
the Soviets had it right with Sluggishly Progressing Schizophrenia. [Blog Author note: CR figured this out in 1958 through his “friendly” (if that’s even possible) association with Dr. Ewan Cameron of MKUltra fame and his use of this strategy against his earlier victim GG who I believe ended up an
MKUltra victim.]

Some people up-top are proposing that we just kill them and have them declared Natural Causes or Accidental by the coroner. It isn’t likely to happen, though. [Blog Author note: CR has killed at least three people who got in his way. So some people at the top are in fact doing this. Of course, CR doesn’t hire
“syndicates”. He is his own syndicate and has put together his own organization for this purpose. His targets are innocent women associated with controversial figures. In only one case has he violated this rule and in this case the woman was as guilty as the man – of course he’s not obsessing over the man…
he’s too gutless to do that. And the people who were killed were all men who got in the way of his hate campaign against a woman he targeted. My guess is that he kills them when he loses control over them because he’s basically afraid of men.]

Anyway, I should introduce the main branches of the syndicate. Each branch recruits its own (everybody is a member of one of the branches) instead of people just joining a common pool. This keeps the work separate and stops people from finding stuff out that they shouldn’t.

My branch is the Scripting, Observation, and Execution Bureau (or “The Theatre” as it is popularly known). By execution, I mean the execution of orders, not the other kind. We do the work that the majority of people with any knowledge of gang stalking will be familiar with: pestering and scripting minor
incidents.

The Theatre is actually divided into two sub-branches: Scripting Orchestration Officers (or “playwrights” as they call themselves) and Field Officers (or “thespians” as we call ourselves).

We have the most variety in our recruits. Popular sources are the police, the fire department, the zoo, and technicians of any kind. But we recruit from all places. Most members are neighborhood watch types (not official Neighborhood Watch, but “concerned people”). Ironically, we make sure that we do a lot of
good, just to get some credibility. [Blog Author note: CR likes to “help” vulnerable people like abused women, women with cancer, mentally ill people, victimized minorities, etc. then recruit them for his hate campaigns. If a person is a key person (like a friend of the target) he will often victimize the person
himself to “soften” them up, claim that the target did it and then use that to recruit them.]

Then there is the Bureau of Authority (“The Moneybags”). They don’t actually control the syndicate, but they have all the right jobs and connections. So, a judge might have control over the judicial process, but he will answer to a superior in the syndicate. Psychiatrists belong here too.

The Moneybags are so-called because they raise a lot of the money. It would be suspicious if big corporations funded groups like this, but they can invest money into front- groups. [Blog Author note: Like government funded “anti-hate” networks which they use to actually incite hate. CR set one up in 2007 in
my community.] And the majority of the syndicate’s work is done through completely legitimate fronts. We can tap phone lines and access people’s records from behind government agencies. [Blog Author note: CR has done this to me using high level corporate, government, police and intelligence connections.]
Usually, these are the guys that go after Enemy Targets. Normally, harrassment is organized under several “action policies”. If a target isn’t an enemy, a standard policy is enforced. Low level organizers (the aforementioned “playwrights”) play around with the target for a while and rotate crews. [Blog Author
note: While the individuals change
certain other things do not so it’s easy to identify these “crews”.]

When a target is an “enemy”, the policy doesn’t immediately change, but orders filter down from high-level organizers (usually the Supreme Council) which direct ‘Thespians’ to provoke the target or a similar action, and Moneybags to crack down on them once they get in the way of the system. This is called
Mincing, because the thespians lure the “meat” (by making it complain or fight back) into the “mincer”. [Blog Author note: This is what CR is doing to me right now. I receive negligent medical care because he is paying people to tamper with my lab results. In some cases they indicate perfect results where I
actually do have issues and in other cases where I don’t have issues I’m ge�ing positive results. See my comments on the mammogram issues. There is no lump in breast and a birth mark appeared where mammogram detected something. The Doctor is aware of this and yet continues to force the issue by
insisting on ridiculously frequent testing on this.
despite the visible birth mark. I complain about this and refuse to act on the positive results but want action on the negative results (which I have actually proven concretely are wrong. See my comments on my blood sugar). The Doctor is told that I’m complaining , the complaints are exaggerated and law suits
are mentioned. This is intended to and does make the Doctor get defensive. The Doctor is encouraged to a�ribute this to my medical issues all “being in my head”. The next step will be the Doctor fabricating some reason to involve a psychiatrist.]

The Bureau also protects members of the syndicate. Normally, in a court case/psych examination or similar situation where a syndicate member is at the mercy of a moneybag, a special order arrives from above telling the moneybag to take it easy on the guy and let him off sco� free. The order is always printed
in blue, on fancy cherry-blossom paper, but in a very official border/font. [Blog Author note: I know of several cases where the person was caught doing something illegal (the intent being to frame me) and in all cases, with the exception of one, neither the news media reported nor was any action taken. This one
case was not done in the commission of a frame up against me, but it involved one of CRs paid skanks. The news media picked it up, and the person was not charged under the most bizarre justification imaginable. He commi�ed a hit and run killing the person. There was suspicion that he was drunk but since
he had left the scene this couldn’t
be proven. His story was that road was slippery and he couldn’t stop. There was no evidence that he even tried to stop. He was not charged on the grounds that he was a new immigrant (Filipino) and he wasn’t used to driving in the snow. Frankly I have never heard of anything so ridiculous.]

“Cherrying” is the name for this secret process. The Bureau of Authority has a very organized system of lawyers, judges, medical officers, etc. Whenever you’re commi�ing a crime for the good of the syndicate, you must always report your location. Then they send Cousin Nancy (this is an affectionate term for
the police in the employment of the syndicate that they send to arrest you instead of non- syndicate cops, so you can go straight through the appropriate channels without anything suspicious being seen) to tail you and “arrest” you the moment somebody calls 911.

They all follow a minimalist strategy though. For example, the mayor of Xxxxx isn’t a member of the syndicate. But several of his advisors and aides are. This way we can get laws passed in a discreet manner, and if a high-profile figure is targeted, our hold on an organization doesn’t loosen. We try to arrange
elections of mayors that aren’t too headstrong. Though the governement is mainly used as a minor nuisance. We prefer the courts for most activities. [Blog Author note: Watch the current Mayoralty race in Toronto for an example of this in action. Except that CR wants a candidate he can control directly. The
media golden boy in this race is that candidate.]

The Bureau of Technology (Field), BoT(F) is the group in charge of the electrical equipment. They work alongside us thespians and “gaffer” the targets by giving them the usual fatigue/headaches/medical problems. They can also destroy equipment, screw up televisions, the works. I think they are particuarly
sadistic.

Different crews use different Techs, but they’re all unpleasant. The incapacitators come in a lot of different forms. There are ones that come as a lightbulb that slowly gives people eye-strain and makes them tired. You can fit some in computer/TV monitors and the glare irritates people.

I’ve heard they’re even building fridge magnets with electronic devices in them. That isn’t the extent of the BoT(F)’s machinery.

They manufacture pills that can cause deformities in the womb, as well as miscarriage and give them to women in their food. They can fake HIV/AIDS so the test shows up positive the first time, but subsequent tests show that it was a false positive. This faux-HIV can be put in the target’s food. They usually
give the target a few health scares, but they don’t like to physically hurt anyone. [Blog author note: Not true in the case of CR but then we know he’s more extreme than your average since he’s a sexually sadistic Psychopath. His intent is to create real health problems and ensure they aren’t looked after. or
misdiagnose health problems where the treatment itself will damage the health of a healthy person. See my comments on my mammogram fiasco and recent rumors that my other health problems “are in my head” (an excuse to justify involving a shrink). CR has recently funded an Alzheimer’s clinic and has
made a new contact, a well known psychiatrist,
who specialized in the mental health of older adults. (I’m in my 50s). He’s also been spreading ugly rumors about me to dentists (and I suspect offering bribes and favors). As a result every dentist I’ve gone to has done serious damage to my teeth to the point where my face is changing and my bite is so messed
up now that I can’t eat without biting my lips or the inside of my mouth. In some cases (most) these dentists have engaged in deliberate fraud which has been covered up by the Dental Insurance company which has another paid skank of CR’s on the BOD, Lorna M. The last dentist deliberately drilled too deep
to force a root canal which I would have had to pay for. Previously my co-workers were se�ing the stage that the coverage only covered “certain types of root canals”. Of course this is a fabrication which would have been backed by the Insurance Company simply to ensure that I had to pay out of pocket. Since
CR has wiped me out financially and
uses his connections to violate my privacy by accessing my bank and other financial records through various illegal means, he’s well aware that I can’t afford this and as a result the work won’t get done and my teeth will deteriorate further.]

One Field Tech I knew had a penchant for giving people Syphillis. They could treat it easily enough with pennicillin (and the syndicate always made sure that it would be diagnosed on time), but it showed up on the targets’ permanent records for medical treatment. They also conduct extensive testing without
the target’s knowledge. [Blog Author note: I believe this was done to me when I contracted Trichomoniasis a couple of years ago, which I also believe was improperly treated by the Doctor I was seeing at the time. I believe she is one of CRs paid skanks and related to a Sikh terrorist who claimed to be a CSIS
informant but conveniently never gave CSIS any useful information that would have resulted in the conviction of the Air India terrorists. (another of CRs paid skanks). I also believe the person who transmi�ed it to me did so unknowingly and was deliberately infected by someone else. The Doctor felt it
necessary to report this (not normally done
because it’s so common) and improper treatment can result in the Protozoa going into one’s organs (liver and kidney) and damaging them permanently. Since I’m a kidney donor and only have one kidney this is particularly pernicious assault on me by CR amongst many other assaults intended to do damage
to and weaken my single remaining kidney. Something in the drug treatment I was provided also resulted in my face swelling and hooded eyelids.]

One TI we were monitoring was found to have a malignant tumor in his head (not our doing). He wasn’t experiencing any of the symptoms, so we gave him some through the incapacitators and had a few of his friends warn him about cancer. He had a test done, and just for fun, we had the doctor tell him how
dangerous it could be and how he could die soon. We gave him a six month waiting period and told him that by then the tumor could progress so far that it could never be removed. That’s a lie, of course. Our BoT(F) had it out in a jiffy by sending one of their brain surgeons to do the job, but it’s the fear that
counts. [Blog Author note: CR would have gone further and had the Brain Surgeon do deliberate damage. Enough to cause problems but not enough to put the person out of commission. This is the difference between how a Psychopath and a non-Psychopath function.]

The Bureau of Technology (Communications) monitors the target’s phone calls, emails, and absolutely everything else. They tend to recruit from the national archives, census takers office, records office, credit card companies, medicare, insurance, etc. They are the logistics branch. As I said, most of the
syndicate’s work is done from within legitimate areas.

What the BoT(C) does (very often) is send a “receptionist applicant” over to a credit card company or government agency pretending she knows nothing about hacking computers or accessing records. We pull a few strings and she’s in. She then steals information while nobody is looking. A few old-timers like
to have 100% control over the “records farm” but most prefer the minimalist approach. This is the bureau that gives out information and orders to everybody else, and also acts as a communications post for the whole syndicate.

The Supreme Council delivers orders through them. Outside orders are also taken in through the BoT(C), which advertises as a mercenary group through certain channels.

The Bureau of Alliances, or “trading partners” handles our allies. As far as I know, the syndicate is Xxxxxxan only. The only other gang stalking group in this country is a West Xxxxxxxxan organization called the confederacy. Very often they try to move into the xxxxx xxxxx so we have to hold them back,
diplomatically or otherwise. However, we have contracts with Xxxxxxan groups whereby we handle their targets when they move into Xxxxxx. The same with the Xxxxan groups and the confederacy. The other groups pay for their targets to be “handled” while they travel here. We make millions of dollars this
way.

Finally, the Supreme Council controls the entire operation. I have no idea who they are, except that they have a fancy name instead of being a Bureau. They do not recruit their own men. They promote from the other departments.

Most of them seem to be wealthy individuals with inheritances that manage to maintain their fortunes from investments. Not one is a CEO, Judge, or Politician. They are all just old money family types that live in the Xxxxxx Xxxxx and seem unusually lucky with their money (no doubt through insider
trading).

Despite this, they have a lot of spiffy technology. They have a kind of reverse incapacitator that improves their health and increases their performance. Most of them look incredibly young for their age. We don’t see them much, though. Often, an audience with one of them is a kind of reward for good service.

There are also ranks in our syndicate. The lowest members are pawns. They’re not technically members, because there’s no permanent service contract and they don’t know they’re working for us. They take orders from us but they’re not expected to a�end meetings. We call our pawns “concerned citizens”, the
Authority bureau has “office boys” or “secretaries”, the BoT(F) has “lab rats” (who very often are paid volunteers for experiments, or people who don’t know what they’re testing), the BoT(C) has “spelunkers”, the BoA has “travel agents”.

Unfortunately, we’re not obligated to give protection to any of these people. So, we can give a vet an order to put down a dog, without telling him that it isn’t consented to by the owner, and he will do the job and get sued without us giving him legal protection. A lot of our street theater is done by people that
don’t even know they’re part of a syndicate. They think they’re a grass roots movement and don’t know that there are other people harrassing the target.

The BoT(C) recruits people that think they’re joining l33t hacker groups on the internet, or people that think that they’re just following orders from the archives. The BoT(F) does 80% of its research at legitimate agencies like Xxxxxx’s XXXXX and its drug companies. The task of pawns is to think that what
they’re doing is either normal and routine, or criminal in an individual isolated manner.

Recruits, however, are aware of a conspiracy. However, they still remain at a misinformed level. We simultaneously maintain teams of “religious” actors and “punk” actors. A person might join us thinking he’s going to clean up the community. Another person might join us thinking he’s going to cause
trouble and anarchy. And they can go about their merry ways.

We even deliver information to them in different ways. To the religious ones, it’s wrapped up in prophecy and revelation. To the punks, it’s given a communist candy coating. However, they’re all aware that the group is large.

They’re also aware of a mutual benefit aspect to the operation. Only greedy un-idealistic people get beyond the recruit rank.

All the Bureaus wrap themselves up in different colours. The Moneybags pretend to be a secret club for the elite (and many of them are indeed quite powerful and wealthy, second only to the Supreme Council). The BoT(F) claims to be a “humane” research agency, or a means by which scientists can resist

19 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

corporate greed, though it still a�racts deviants. The BoT(C) is conspiratorially minded, and pretends to be a group searching for the ‘secrets of the illuminati’ or the illuminati themselves. The BoA claims to be a contract agency, traveller’s club, or accounting firm.

Recruits perform tasks that they know are illegal, or immoral, but they still generally believe that they’re doing it for a reason.

Managers like me come above the recruits and do some actual organization, whether leading a crew to a street theater match or planning an a�ack. Generally, managers know everything about the syndicate except what its goal is. Most are greedy enough to accept that it isn’t a morally motivated group. We
also engage in communication with other Bureaus to co-ordinate our activites.

Different terms are used for different MOs.

The Theater has “Playwrights” and “Leading Roles”. The moneybags have “Success Stories”. The BoT(F) has “Research Directors”. The BoT(C) has “Information Awareness Officers”. The BoA has “Arrangers”.

Finally, a rare few are promoted to the Supreme Council.

GLOSSARY OF TERMS (both coloquial and official):

Contract: A TI or Target. This is the official term. Used as “Enemy Contract” or “Planning Contract”. Enemy contract is often referred to as “hostile contract”.

CHERRYING: Ge�ing out of a legal tangle through the syndicate’s intervention.

NIPPLE-KISSER: a ‘deviant’ recruit, recruited because of a desire for sadism.

HOLY POLY: a ‘religious’ puritan recruit.

THE EFFECT: the fact that greedy and sadistic recruits are selected for managing jobs more readily than anybody with integrity.

FBG (fertile breeding ground): a crew of nipple-kissers, based on the idea that they are a fertile breeding ground for future managers.

MINCING: Luring a target into the legal system.

DEFACING: making faces at a contract, or otherwise intimidating them.

XXXXXX XXXXX SYNDROME: having a target so socially unpredictable and badly-off that you can’t really think of many ways to make their life much worse.

RAINBOW SHOCK: the fact that you have to act nice to the rest of the public immediately after you’ve stopped defacing a contract.

BREAK-A-LEG JOB: a particuarly hostile a�ack against a contract, or a plan which involves appoaching the target and talking to them.

SAKURAKAI: a crew that is particuarly overt in its stalking and gets caught too often. In other words, it has to be cherried all the time.

CREW: A unit of recruits and pawns under a single MO. In other words, a group of gang stalkers.

ZAPPERATING: using electronic devices to affect the health of a target.

XXXXXXX XXXXX: rhyming slang. for big mistake, roughly means “we shouldn’t have used this method”.

UNCHAINED, UNCOVERED: authorities that are not pawns or recruits.

COVERED: A member of the public that is under the control of the syndicate (as a pawn).

PUBLIC FACE: A recruit or manager’s official life outside of the syndicate.

PRIVATE LIFE: a syndicate member’s activities with the syndicate.

INCAPACITATOR: a device that affects the sleeping pa�erns/stress/fatigue/headaches of a contract.

VOODOO: the means of acting hostile to a target (pointing, staring, etc).

LOMOSEXUAL: a syndicate member with a knack for photography. (“There’s a lomo in every crew!”)

NYUNKIA: (Not Your Usual Nipple-Kissing Incapacitator Asshole), the “yu” is pronounced as the “oo” in ‘moon’. refers to a particuarly sadistic or deviant BoT(F) member.

BONER: another word for an enemy target.

YELLOW MEAT: criminals, as opposed to “concerned citizens”. refers to criminals recruited into the syndicate.

XXXXXXXX (verb): to Xxxxxx somebody is to run them over or chase them with a car.

GIGOLO-BOP: to make sexual advances to an una�ractive target, term mainly used by “nipple kisser” deviants.

CANCELLING: causing a miscarriage.

CRASH TEST DUMMY: a practice target.

HANG-JOB: the experience of having a target that one has enjoyed tormenting suddenly commit suicide. Term used mainly by nipple kissers/nyunkias.

COUSIN NANCY: a police unit sent to tail a crew and arrest them before an unchained police unit can do it.

XXXXXX NECKTIE: a death threat made with no intention of it being carried out.

GENERAL LEEING: randomly chasing after a target and threatning to rape them before immediately running away.

XXXX’S LAW: a police department that is thoroughly under the syndicate’s control.

THE GOOD OLD GANG AT THE OFFICE: the Syndicate.

SHALLOW THROAT: see NYUNKIA

CLITWEED: see NYUNKIA

DEJA VOOOO: doing the same skit over and over again.

I hope this glossary is of help. If you have any questions, please reply.

Xxxxxxxx”

FULL ARTICLE HERE


h�p://organizedstalkingandcyberstalking.blogspot.com/2010/03/stalker-confesses.htmlGang (h�p://organizedstalkingandcyberstalking.blogspot.com/2010/03/stalker-confesses.htmlGang) Stalking FAQ
h�p://www.gangstalkingworld.com/GSFAQ.html (h�p://www.gangstalkingworld.com/GSFAQ.html)


LEGAL JUDICIAL POLITICAL RESISTANCE

Sponsored Content
‫ ראה את העלויות כפרי פרישה | מודעות חיפוש‬:‫ | בתי האבות הטובים בישראל‬Sponsored ‫ עורכי דין | מודעות חיפוש‬.‫? ראה את רשימת השכר עכשיו‬2023 ‫ | כמה מרוויחים עורכי דין בשנת‬S Cardiologists: Too Much belly fat? Do This Before Bed getfi�oday.online | Sponsored
(h�ps://trck.tracking505.com/b324c6cb-5383-40b7-928a- ponsored (h�ps://trackbtg.com/view/O9dbJkQIKC1XE2tqXajWcXcJkK37psULpLC79vzci6vyJY?c=39997&
2d14d16eb1be?campaign_id=00e44a6e12cfa0db0f2b3a7ff6bc30403c&publisher_id=$publisher_id$& (h�ps://trck.tracking505.com/9a9b033e-dbc9-4f9f- pid=4443&tid=$ob_click_id$&ob_marketer=MKA_Wap5&ob_publisher_id=$publisher_id$&
publisher_name=$publisher_name$&ad_id=0072cf42790b7e9004dd510aee4466da6f&ad_title=%D7%91 83c6-54c755a1b632?campaign_id=0095ecdeda4db91c22dbd3987277dccd3b& ob_section_id=$section_id$&ob_ad_id=007f0863313b45c4fc0c9823d8c22df946&
%D7%AA%D7%99+%D7%94%D7%90%D7%91%D7%95%D7%AA+%D7%94%D7%98%D7%95%D7%91 publisher_id=$publisher_id$&publisher_name=$publisher_name$& ob_timestamp=$time_stamp$&ob_platform=WEB&
%D7%99%D7%9D+%D7%91%D7%99%D7%A9%D7%A8%D7%90%D7%9C%3A+%D7%A8%D7 ad_id=00bd87534bf08e5d091295c05075cb56dc&ad_title=%D7%9B%D7%9E ob_campaign_id=007a2�20a9df35af3234cec3d8e243a3f&
%90%D7%94+%D7%90%D7%AA+%D7%94%D7%A2%D7%9C%D7%95%D7%99%D7%95%D7%AA& %D7%94+%D7%9E%D7%A8%D7%95%D7%95%D7%99%D7%97%D7%99 ob_doc_title=Burn+Unwanted+Belly+Fat+Fast+with+This+Simple+10-
section_id=$section_id$&section_name=$section_name$&req_id=$req_id$& %D7%9D+%D7%A2%D7%95%D7%A8%D7%9B%D7%99+%D7%93%D7%99 Second+%27Hack%27+%28WATCH%29&
promoted_link_id=0072cf42790b7e9004dd510aee4466da6f&time_stamp=$time_stamp$&cpc=$cpc$& %D7%9F+%D7%91%D7%A9%D7%A0%D7%AA+2023%3F+%D7%A8%D7%90 site=DietWWAllJava_$publisher_name$_$section_name$_007f0863313b45c4fc0c9823d8c22df946&
ob_click_id=$ob_click_id$&obOrigUrl=true) %D7%94+%D7%90%D7%AA+%D7%A8%D7%A9%D7%99%D7%9E%D7%AA+ mavcid=39997&ob_marketer_id=00dc7db6d834f949531eb0ccdc70c32bd9&ob_cpc=$cpc$&
%D7%94%D7%A9%D7%9B%D7%A8+%D7%A2%D7%9B%D7%A9%D7%99 obOrigUrl=true)
%D7%95.&section_id=$section_id$&section_name=$section_name$&
req_id=$req_id$&promoted_link_id=00bd87534bf08e5d091295c05075cb56dc&
time_stamp=$time_stamp$&cpc=$cpc$&ob_click_id=$ob_click_id$&
obOrigUrl=true)

Israel Doctors Suprised: Passive Weight Loss Method Taking Petah Tikva by Storm tech4-you.com | ʺ‫ מנקה ריאותʺ כובש את ישראל בסערה‬getairphysio.io | Sponsored ‫ כמעט כל אחד זכאי לדרכון אירופאי דרכון זר | מודעות חיפוש‬- ‫ | בעקבות חוק חדש‬Sponsored
Sponsored (h�ps://deals.getairphysio.io/8T2FWPJ/22XQKHP/?uid=1316&gulang=he& (h�ps://8cacf1.zbrjtstrclnm.com?subid1=00ddac350315d88aad3bf59aa564944169&
(h�ps://trackbrk.com obOrigUrl=true) subid2=$publisher_id$&subid3=$section_id$|00ec2d2253cd0a4e1eba14958cac0ff22f&subid4=is-
/view/bDwD94R1in27vuizgOsULpaWYiZX5Wkyas0sULpkwmBsULp7aPAU?c=37681&pid=4443& he-ob-d-foreignpassport&network=outbrain&OutbrainClickId=$ob_click_id$&adtitle=%D7%91
tid=$ob_click_id$&ob_marketer=ZMav_wap&ob_publisher_id=$publisher_id$& %D7%A2%D7%A7%D7%91%D7%95%D7%AA+%D7%97%D7%95%D7%A7+%D7%97%D7%93
ob_section_id=$section_id$&ob_ad_id=001922a45f0b2fed8dc6d0557dc47f5133& %D7%A9+-+%D7%9B%D7%9E%D7%A2%D7%98+%D7%9B%D7%9C+%D7%90%D7%97
ob_timestamp=$time_stamp$&ob_platform=WEB& %D7%93+%D7%96%D7%9B%D7%90%D7%99+%D7%9C%D7%93%D7%A8%D7%9B%D7%95
ob_campaign_id=00ca7fc8bcb9402f6a447cb269e449e336&ob_doc_title=Best- %D7%9F+%D7%90%D7%99%D7%A8%D7%95%D7%A4%D7%90%D7%99&
seller+Japanese+Patches+Now+Back+In+Stock& site=$publisher_name$&obOrigUrl=true)
site=NuubuWWWeb1CPA_$publisher_name$_$section_name$_001922a45f0b2fed8dc6d0557dc47f5133&
mavcid=37681&ob_marketer_id=00ca0c63d47dfa4c2f357280bb93df3b73&ob_cpc=$cpc$&
obOrigUrl=true)

‫ | לגור בבית אבות יכול להיות מדהים )תסתכל על המחירים( כפרי פרישה | מודעות חיפוש‬Sponsored (‫ מנקה ליחה וריר )למצבי קוצר בנשימה ולזרימת אויר חלקה‬,‫ מכשיר לחיזוק הריאות‬:‫חדש בישראל‬ 30+ ‫ הגאדגʹטים המקוריים ביותר שכדאי לקנות בבלאק פריידי‬Trending Boom | Sponsored
(h�ps://trck.tracking505.com/50bfe9ed-a888-4e1f- lifetechadviser.com | Sponsored (h�ps://trendingboom.com/top-gadgets-he-bf-new-2/?obOrigUrl=true)
a289-097209�c40d?campaign_id=0096e03ae7af552dc25bf88ae82b4b30ae& (h�ps://lifetechadviser.com/airphysio-he/?obOrigUrl=true)
publisher_id=$publisher_id$&publisher_name=$publisher_name$&
ad_id=00018cbdcbb4ee022f9dd9da51715d1357&ad_title=%D7%9C%D7%92%D7%95%D7%A8+%D7%91
%D7%91%D7%99%D7%AA+%D7%90%D7%91%D7%95%D7%AA+%D7%99%D7%9B%D7%95
%D7%9C+%D7%9C%D7%94%D7%99%D7%95%D7%AA+%D7%9E%D7%93%D7%94%D7%99
%D7%9D+%28%D7%AA%D7%A1%D7%AA%D7%9B%D7%9C+%D7%A2%D7%9C+%D7%94%D7
%9E%D7%97%D7%99%D7%A8%D7%99%D7%9D%29&section_id=$section_id$&
section_name=$section_name$&req_id=$req_id$&
promoted_link_id=00018cbdcbb4ee022f9dd9da51715d1357&time_stamp=$time_stamp$&cpc=$cpc$&
ob_click_id=$ob_click_id$&obOrigUrl=true)
Bookmark the permalink.
Leave a comment

20 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...

Create a free website or blog at WordPress.com.

Advertisements

REPORT THIS AD

21 of 21 2/20/2023, 5:19 AM

You might also like